WorldWideScience

Sample records for vulnerability

  1. Redistributing vulnerabilities

    DEFF Research Database (Denmark)

    Seeberg, Jens; Padmawati, Retna Siwi

    2015-01-01

    It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw...... Central Java earthquake, and we explore relations between citizens and the state during post-disaster house reconstruction. We argue that disastrous outcomes of catastrophic events do not follow pre-existing fault lines of vulnerability in a simple or predictable manner, and that the social process...

  2. Assessing vulnerability

    NARCIS (Netherlands)

    Hellmuth, M.; Kabat, P.

    2003-01-01

    It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the

  3. Redistributing vulnerabilities

    DEFF Research Database (Denmark)

    Seeberg, Jens; Padmawati, Retna Siwi

    2015-01-01

    It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw a...

  4. Assessing vulnerability

    NARCIS (Netherlands)

    Hellmuth, M.; Kabat, P.

    2003-01-01

    It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the peo

  5. Vulnerable Hunter

    Directory of Open Access Journals (Sweden)

    Md.Asha Begum

    2016-05-01

    Full Text Available This project "VULNERABLE HUNTER" application main aim is to detect risk in our mobile applications. This application contains modules like Fetch Application, Generate Score, Uninstall and Display Graph. Through this application it detects risk so that this application is very useful to smart phone users Now-a-days so many people are using smart phones and people are crazy about new apps. But by installing all the applications into our mobile may reduce its performance. Some apps contain more risk. But user may not know the effects that are caused by the app which is installed until the performance of mobile is reduced. With the prosperity of the Android app economy, many apps have been published and sold in various markets. However, short development applications and insufficient security development apps have led to many vulnerable apps. So to reduce these type of problems Vulnerable Hunter is proposed. Through the proposed application user can see which application is risky and then the user may uninstall that application. The main advantage of designing this app is without internet also the users will use this application. Users also feel more convenient to work with mobile apps.

  6. Software Vulnerability Taxonomy Consolidation

    Energy Technology Data Exchange (ETDEWEB)

    Polepeddi, Sriram S. [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2004-12-07

    In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of a particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data

  7. Selective vulnerability in brain hypoxia

    DEFF Research Database (Denmark)

    Cervos-Navarro, J.; Diemer, Nils Henrik

    1991-01-01

    Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis......Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis...

  8. Arizona - Social Vulnerability Index

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Social Vulnerability Index is derived from the 2000 US Census data. The fields included are percent minority, median household income, age (under 18 and over...

  9. County Population Vulnerability

    Data.gov (United States)

    City and County of Durham, North Carolina — This layer summarizes the social vulnerability index for populations within each county in the United States at scales 1:3m and below. It answers the question...

  10. spatially identifying vulnerable areas

    African Journals Online (AJOL)

    System (SMDSS) to identify factors that make forest and game reserves vulnerable .... involve the creation of a Digital Elevation Model (DEM), Slope Settlement and ... Feature). Spatial. Analyst Tool. (Slope). Buffer Tool. Buffer Tool. Buffer Tool.

  11. Facility Environmental Vulnerability Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and

  12. Energy vulnerability relationships

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  13. Plutonium Vulnerability Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  14. Beyond 'vulnerable groups': contexts and dynamics of vulnerability

    NARCIS (Netherlands)

    Zarowsky, C.; Haddad, S.; Nguyen, V.K.

    2013-01-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of

  15. Beyond 'vulnerable groups': contexts and dynamics of vulnerability

    NARCIS (Netherlands)

    Zarowsky, C.; Haddad, S.; Nguyen, V.K.

    2013-01-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of vulnera

  16. Beyond 'vulnerable groups': contexts and dynamics of vulnerability

    NARCIS (Netherlands)

    Zarowsky, C.; Haddad, S.; Nguyen, V.K.

    2013-01-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of vulnera

  17. VT - Vermont Social Vulnerability Index

    Data.gov (United States)

    Vermont Center for Geographic Information — Social vulnerability refers to the resilience of communities when responding to or recovering from threats to public health. The Vermont Social Vulnerability Index...

  18. Vulnerability survival analysis: a novel approach to vulnerability management

    Science.gov (United States)

    Farris, Katheryn A.; Sullivan, John; Cybenko, George

    2017-05-01

    Computer security vulnerabilities span across large, enterprise networks and have to be mitigated by security engineers on a routine basis. Presently, security engineers will assess their "risk posture" through quantifying the number of vulnerabilities with a high Common Vulnerability Severity Score (CVSS). Yet, little to no attention is given to the length of time by which vulnerabilities persist and survive on the network. In this paper, we review a novel approach to quantifying the length of time a vulnerability persists on the network, its time-to-death, and predictors of lower vulnerability survival rates. Our contribution is unique in that we apply the cox proportional hazards regression model to real data from an operational IT environment. This paper provides a mathematical overview of the theory behind survival analysis methods, a description of our vulnerability data, and an interpretation of the results.

  19. Beyond 'vulnerable groups': contexts and dynamics of vulnerability.

    Science.gov (United States)

    Zarowsky, Christina; Haddad, Slim; Nguyen, Vinh-Kim

    2013-03-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of vulnerability: the initial level of wellbeing, the degree of exposure to risk, and the capacity to manage risk effectively. We stress the dynamic interactions linking material and social deprivation, poverty, powerlessness and ill health: risks or shocks and their health impacts are intimately interconnected and reinforce each other in a cycle which in the absence of effective interventions, increases vulnerability. An inductive process which does not begin with an a priori definition or measurement of 'vulnerability' and which does not assume the existence of fixed 'vulnerable groups' allowed us both to re-affirm core aspects of existing conceptual frameworks, and to engage in new ways with literature specifically addressing vulnerability and resilience at the population level as well as with literature - for example in ecology, and on the concept of frailty in research on aging - with which researchers on health and poverty in Africa may not be familiar. We invite conceptual and empirical work on vulnerability in complex systems frameworks. These perspectives emphasize contexts and nonlinear causality thus supporting analyses of vulnerability and resilience as both markers and emergent properties of dynamic interactions. We accept a working definition of vulnerability, and recognize that some definable groups of people are more likely than others to suffer harm from exposure to health risks. But we suggest that the real work - at both intellectual and policy/political levels - lies in understanding and responding to the dynamics, meanings and power relations underlying actual instances and processes of vulnerability and harm.

  20. [Homicides and social vulnerability].

    Science.gov (United States)

    Tavares, Ricardo; Catalan, Valeria Dutra Batista; Romano, Pedro Machado de Melo; Melo, Elza Machado

    2016-03-01

    The goal of this study was to analyze the spatial distribution of homicide rates (H) according to the social vulnerability index (SVI) and the quality of urban life index (QUL) in Betim, State of Minas Gerais, from 2006 to 2011. Descriptive analysis was performed using Moran's spatial correlation analysis, and the H, SVI and QUL spatial analyses. During this period there were 1,383 deaths, mostly of males (91.9%), aged 15-24 years (46.9%), brown/black (76.9%), with secondary education (51.1%), and single (83.9%). No spatial autocorrelation was revealed, indicating that the distribution of homicide rates is random; the same occurred with the SVI and the QUL index. Taken together, however, the H, SVI and QUL index overlapped, which was analyzed using different theories of crime, such as those addressing socioeconomic issues, arms of drugs dealing and Durkheim's and Habermas' theories, namely anomie and colonization of the lifeworld. social vulnerability and homicide are associated from both empirical and theoretical perspectives.

  1. Assessing flash flood vulnerability using a multi-vulnerability approach

    Directory of Open Access Journals (Sweden)

    Karagiorgos Konstantinos

    2016-01-01

    Full Text Available In the framework of flood risk assessment, while the understanding of hazard and exposure has significantly improved over the last years, knowledge on vulnerability remains one of the challenges. Current approaches in vulnerability research are characterised by a division between social scientists and natural scientists. In order to close this gap, we present an approach that combines information on physical and social vulnerability in order to merge information on the susceptibility of elements at risk and society. With respect to physical vulnerability, the study is based on local-scale vulnerability models using nonlinear regression approaches. Modified Weibull distributions were fit to the data in order to represent the relationship between process magnitude and degree of loss. With respect to social vulnerability we conducted a door-to-door survey which resulted in particular insights on flood risk awareness and resilience strategies of exposed communities. In general, both physical and social vulnerability were low in comparison with other European studies, which may result from (a specific building regulations in the four Mediterranean test sites as well as general design principles leading to low structural susceptibility of elements at risk, and (b relatively low social vulnerability of citizens exposed. As a result it is shown that a combination of different perspectives of vulnerability will lead to a better understanding of exposure and capacities in flood risk management.

  2. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  3. DEMOGRAPHIC VULNERABILITIES IN TECUCI PLAIN

    Directory of Open Access Journals (Sweden)

    Iulian Adrian ŞORCARU

    2013-06-01

    Full Text Available The study focuses on analyzing and mapping 8 indicators considered to best reflect the demographic vulnerability in Tecuci Plain in the year 2010 and proposes a model of aggregation which finally allows us to distinguish three major types of demographic vulnerability (low, medium and high. Mapping the final values also shows significant disparities in the territorial administrative units that broadly overlap the plain, the most vulnerable being Tecuci city and the peripheral communes, towards Vrancea and Vaslui Counties.

  4. Common Control System Vulnerability

    Energy Technology Data Exchange (ETDEWEB)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an

  5. Vulnerability and Trustworthiness.

    Science.gov (United States)

    Barnard, David

    2016-04-01

    Although recent literature on professionalism in healthcare abounds in recommended character traits, attitudes, or behaviors, with a few exceptions, the recommendations are untethered to any serious consideration of the contours and ethical demands of the healing relationship. This article offers an approach based on the professional's commitment to trustworthiness in response to the vulnerability of those seeking professional help. Because our willingness and ability to trust health professionals or healthcare institutions are affected by our personality, culture, race, age, prior experiences with illness and healthcare, and socioeconomic and political circumstances-"the social determinants of trust"-the attitudes and behaviors that actually do gain trust are patient and context specific. Therefore, in addition to the commitment to cultivating attitudes and behaviors that embody trustworthiness, professionalism also includes the commitment to actually gaining a patient's or family's trust by learning, through individualized dialogue, which conditions would win their justified trust, given their particular history and social situation.

  6. Region 9 - Social Vulnerability Index

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Social Vulnerability Index is derived from the 2000 US Census data. The fields included are percent minority, median household income, age (under 18 and over...

  7. CDC's Social Vulnerability Index (SVI)

    Data.gov (United States)

    U.S. Department of Health & Human Services — Social vulnerability refers to the resilience of communities when confronted by external stresses on human health, stresses such as natural or human-caused...

  8. VT - Vermont Heat Vulnerability Index

    Data.gov (United States)

    Vermont Center for Geographic Information — This map shows: The overall vulnerability of each town to heat related illness. This index is a composite of the following themes: Population Theme, Socioeconomic...

  9. Vulnerability of pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2006-07-01

    Although pipelines may be damaged due to natural sources such as stress corrosion cracking (SCC) or hydrogen-induced cracking (HIC), most pipeline damages are a result of third-party interference, such as unauthorized construction in a right of way. Pipelines are also among the prime targets for sabotage because interruptions in energy distribution can render large segments of a population debilitated. The importance of protecting critical infrastructure was emphasized in this theme issue which disseminated information on vulnerability of pipelines due to third-party intrusions, both intentional and unintentional. It summarized the 10 presentations that were delivered at a pipelines security forum in Calgary, Alberta, addressing Canadian and U.S. government and industry approaches to oil and natural gas pipeline security. The opening keynote address remarked on the evolution of international terror networks, the targeting of the energy sector, and the terrorist threat and presence in Canada. Policies towards critical energy infrastructure protection (CIP) were then examined in light of these threats. A policy shift away from traditional defensive protective security towards an offensive intelligence-led strategy to forestall terrorist threats was advocated. Energy sector representatives agreed that Canada needs an effective national lead agency to provide threat assessments, alert notification, and coordination of information pertaining to CIP. It was agreed that early warning information must come from Canadian as well as U.S. sources in order to be pertinent. The conference session on information collection concentrated on defining what sort of threat information is needed by the energy sector, who should collect it and how should it be shared. It was emphasized that government leadership should coordinate threat reporting and disseminate information, set standards, and address the issues of terrorism risk insurance. Concern was raised about the lack of

  10. Vulnerability Assessments in Ethical Hacking

    OpenAIRE

    Ashiqur Rahman; Md. SarwarAlam Rasel; Asaduzzaman Noman; Shakh Md. Alimuzjaman Alim

    2016-01-01

    Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

  11. Are Vulnerability Disclosure Deadlines Justified?

    Energy Technology Data Exchange (ETDEWEB)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  12. Land tenure, disasters and vulnerability.

    Science.gov (United States)

    Reale, Andreana; Handmer, John

    2011-01-01

    Although often overlooked, land tenure is an important variable impacting on vulnerability to disaster. Vulnerability can occur either where land tenure is perceived to be insecure, or where insecure tenure results in the loss of land, especially when alternative livelihood and housing options are limited. Disasters often provide the catalyst for such loss. This paper avoids making generalisations about the security of particular types of tenure, but instead explores factors that mediate tenure security, particularly in the wake of a disaster. The paper identifies five mediating factors: (1) the local legal system; (2) government administrative authority; (3) the economy; (4) evidence of tenure, and; (5) custom and dominant social attitudes. It is shown that some mediating factors are more salient for particular types of tenure than others. The paper will highlight the importance of land tenure in any assessment of vulnerability, and conclude with suggestions for further research.

  13. Chronic stress-induced hippocampal vulnerability: the glucocorticoid vulnerability hypothesis.

    Science.gov (United States)

    Conrad, Cheryl D

    2008-01-01

    The hippocampus, a limbic structure important in learning and memory, is particularly sensitive to chronic stress and to glucocorticoids. While glucocorticoids are essential for an effective stress response, their oversecretion was originally hypothesized to contribute to age-related hippocampal degeneration. However, conflicting findings were reported on whether prolonged exposure to elevated glucocorticoids endangered the hippocampus and whether the primate hippocampus even responded to glucocorticoids as the rodent hippocampus did. This review discusses the seemingly inconsistent findings about the effects of elevated and prolonged glucocorticoids on hippocampal health and proposes that a chronic stress history, which includes repeated elevation of glucocorticoids, may make the hippocampus vulnerable to potential injury. Studies are described to show that chronic stress or prolonged exposure to glucocorticoids can compromise the hippocampus by producing dendritic retraction, a reversible form of plasticity that includes dendritic restructuring without irreversible cell death. Conditions that produce dendritic retraction are hypothesized to make the hippocampus vulnerable to neurotoxic or metabolic challenges. Of particular interest is the finding that the hippocampus can recover from dendritic retraction without any noticeable cell loss. When conditions surrounding dendritic retraction are present, the potential for harm is increased because dendritic retraction may persist for weeks, months or even years, thereby broadening the window of time during which the hippocampus is vulnerable to harm, called the 'glucocorticoid vulnerability hypothesis'. The relevance of these findings is discussed with regard to conditions exhibiting parallels in hippocampal plasticity, including Cushing's disease, major depressive disorder (MDD), and post-traumatic stress disorder (PTSD).

  14. Higher-order risk vulnerability

    OpenAIRE

    Huang,Xiaoping; Stapleton, Richard Christopher

    2017-01-01

    We add an independent unfair background risk to higher-order risk-taking models in the current literature and examine its interaction with the main risk under consideration. Parallel to the well-known concept of risk vulnerability, which is defined by Gollier and Pratt (Econometrica 64:1109–1123, 1996), an agent is said to have a type of higher-order risk vulnerability if adding an independent unfair background risk to wealth raises his level of this type of higher-order risk aversion. We der...

  15. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  16. Vulnerability assessment of distributed systems

    OpenAIRE

    Ruiz Utgés, Guifré

    2013-01-01

    In this project I have carried out a vulnerability assessment of a component of the Condor Middleware. In this assessment I have sought and found the more dangerous software vulnerabilities of this system, I have reported them to the development team such that they may be fixed, and thus improve the security of this distributed system, and the networks that use it. En este proyecto he desarrollado una evaluación de vulnerabilidades de un componente del Middleware Condor. En esta evaluación...

  17. Autonomy, Vulnerability, Recognition, and Justice

    NARCIS (Netherlands)

    Anderson, J.H.; Honneth, A.

    2005-01-01

    One of liberalism’s core commitments is to safeguarding individuals’ autonomy. And a central aspect of liberal social justice is the commitment to protecting the vulnerable. Taken together, and combined with an understanding of autonomy as an acquired set of capacities to lead one’s own life, these

  18. Autonomy, Vulnerability, Recognition, and Justice

    NARCIS (Netherlands)

    Anderson, J.H.; Honneth, A.

    2005-01-01

    One of liberalism’s core commitments is to safeguarding individuals’ autonomy. And a central aspect of liberal social justice is the commitment to protecting the vulnerable. Taken together, and combined with an understanding of autonomy as an acquired set of capacities to lead one’s own life, these

  19. Autonomy, Vulnerability, Recognition, and Justice

    NARCIS (Netherlands)

    Anderson, J.H.; Honneth, A.

    2005-01-01

    One of liberalism’s core commitments is to safeguarding individuals’ autonomy. And a central aspect of liberal social justice is the commitment to protecting the vulnerable. Taken together, and combined with an understanding of autonomy as an acquired set of capacities to lead one’s own life,

  20. Capturing agroecosystem vulnerability and resilience

    NARCIS (Netherlands)

    Groot, Jeroen C.J.; Cortez-Arriola, José; Rossing, Walter A.H.; Massiotti, Ricardo D.A.; Tittonell, Pablo

    2016-01-01

    Vulnerability and resilience are two crucial attributes of social-ecological systems that are used for analyzing the response to disturbances. We assess these properties in relation to agroecosystem buffer capacity and adaptive capacity, which depend on the ‘window of opportunities’ of possible

  1. Cognitive vulnerability and dental fear

    Directory of Open Access Journals (Sweden)

    Spencer A John

    2008-01-01

    Full Text Available Abstract Background The Cognitive Vulnerability Model proposes that perceptions of certain characteristics of a situation are critical determinants of fear. Although the model is applicable to all animal, natural environment and situational fears, it has not yet been applied specifically to dental fear. This study therefore aimed to examine the association between dental fear and perceptions of dental visits as uncontrollable, unpredictable and dangerous. Methods The study used a clustered, stratified national sample of Australians aged 15 years and over. All participants were asked in a telephone interview survey to indicate their level of dental fear. Participants who received an oral examination were subsequently provided with a self-complete questionnaire in which they rated their perceptions of uncontrollability, unpredictability and dangerousness associated with dental visiting. Results 3937 participants were recruited. Each of the three vulnerability-related perceptions was strongly associated with the prevalence of high dental fear. In a logistic regression analysis, uncontrollability and dangerousness perceptions were significantly associated with high dental fear after controlling for age and sex. However, unpredictability perceptions did not have a statistically significant independent association with dental fear after controlling for all other variables. Conclusion Results are mostly consistent with the Cognitive Vulnerability Model of the etiology of fear, with perceptions of uncontrollability, unpredictability and dangerousness each showing a strong bivariate relationship with high dental fear prevalence. However, more extensive measures of vulnerability perceptions would be valuable in future investigations.

  2. Vulnerability to air pollution: a building block in assessing vulnerability to multiple stressors

    CSIR Research Space (South Africa)

    Matooane, M

    2010-08-30

    Full Text Available the customised predictive model by means of what-if scenarios • Spider graphs - Household level: comparing odds ratios of different vulnerability factors - Municipal level: comparing prevalences of different vulnerability factors Vulnerability vs Resilience...

  3. Assessing European wild fire vulnerability

    Science.gov (United States)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  4. Aircraft vulnerability analysis by modelling and simulation

    CSIR Research Space (South Africa)

    Willers, CJ

    2014-09-01

    Full Text Available attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft...

  5. Helping air quality managers identify vulnerable communities

    CSIR Research Space (South Africa)

    Wright, C

    2008-10-01

    Full Text Available population exposure and vulnerability risk prioritisation model is proposed for potential use by air quality managers in conjunction with their air quality management plans. The model includes factors such as vulnerability caused by poverty, respiratory...

  6. Infrastructure Vulnerability Assessment Model (I-VAM).

    Science.gov (United States)

    Ezell, Barry Charles

    2007-06-01

    Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS).

  7. Groundwater vulnerability map for South Africa

    African Journals Online (AJOL)

    Chiedza Musekiwa

    Coastal vulnerability is the degree to which a coastal system is susceptible to, ... methods, indicator-based approaches, GIS-based decision support systems and ..... E 2005, 'Coastal Vulnerability and Risk Parameters', European Water, vol.

  8. Measuring Vulnerability in the Food System

    OpenAIRE

    Paloviita, Ari; Puupponen, Antti; Kortetmäki, Teea; Silvasti, Tiina

    2015-01-01

    Food system vulnerability is an emerging concept for food security policies and food supply chain management. Hence, measuring food system vulnerability is necessary for developing appropriate food security policies and managing food supply chain vulnerabilities. In this paper, we aim to clarify the development process of food system vulnerability indicators. We conducted an abducted qualitative content analysis based on public documents of various Finnish organizations, including mi...

  9. Climate vulnerability, communities' resilience and child labour

    OpenAIRE

    Boutin, Delphine

    2014-01-01

    This article clarifies and quantifies the causal impact of climate change vulnerability on child labour incidence and intensity. For this purpose, we create an index of vulnerability to climate change, composed of biophysical vulnerability and communities' resilience. Both, participation to economic activities and to household chores have been taken into account. We find that climate vulnerability negatively affects child labour incidence and intensity, while has no significant impact on hous...

  10. CSRF Vulnerabilities and Defensive Techniques

    OpenAIRE

    Rupali D. Kombade; Meshram, B B

    2012-01-01

    Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF). CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is diffic...

  11. Interactive Vulnerability Analysis Enhancement Results

    Science.gov (United States)

    2012-12-01

    vulnerability detection. This investigation focused on making performance improvements to this technology to allow deployments of the technology in...numerous challenges with existing automated tools for this purpose. About Aspect Security Aspect’s team has focused exclusively on application...be navigated. The problem is that the crawlers just aren’t smart enough to fill out forms and navigate wizards to exercise all of the functionality

  12. Soil vulnerability for cesium transfer.

    Science.gov (United States)

    Vandenhove, Hildegarde; Sweeck, Lieve

    2011-07-01

    The recent events at the Fukushima Daiichi nuclear power plant in Japan have raised questions about the accumulation of radionuclides in soils and the possible impacts on agriculture surrounding nuclear power plants. This article summarizes the knowledge gained after the nuclear power plant accident in Chernobyl, Ukraine, on how soil parameters influence soil vulnerability for radiocesium bioavailability, discusses some potential agrochemical countermeasures, and presents some predictions of radiocesium crop concentrations for areas affected by the Fukushima accident.

  13. Vulnerabilities

    Science.gov (United States)

    2009-05-04

    May 1, 2006)”, http://www.mod.go.jp/e/d_policy/dp13.html (accessed 1 April 2009). 6 ibid 7 Hongo , Jun. “Japan, U.S. sign accord on forces,” The...Jacobs, G. Keith. "Guam Becoming US Pacific Linchpin." Asia-Pacific Defence Reporter 29 (2003): 38-39. Jun, Hongo . "Japan, U.S. sign accord on forces

  14. Groundwater Pollution and Vulnerability Assessment.

    Science.gov (United States)

    Kurwadkar, Sudarshan

    2017-10-01

    Groundwater is a critical resource that serve as a source of drinking water to large human population and, provide long-term water for irrigation purposes. In recent years; however, this precious resource being increasingly threatened, due to natural and anthropogenic activities. A variety of contaminants of emerging concern such as pharmaceuticals and personal care products, perfluorinated compounds, endocrine disruptors, and biological agents detected in the groundwater sources of both developing and developed nations. In this review paper, various studies have been included that documented instances of groundwater pollution and vulnerability to emerging contaminants of concern, pesticides, heavy metals, and leaching potential of various organic and inorganic contaminants from poorly managed residual waste products (biosolids, landfills, latrines, and septic tanks etc.). Understanding vulnerability of groundwater to pollution is critical to maintain the integrity of groundwater. A section on managed artificial recharge studies is included to highlight the sustainable approaches to groundwater conservation, replenishment and sustainability. This review paper is the synthesis of studies published in last one year that either documented the pollution problems or evaluated the vulnerability of groundwater pollution.

  15. Vulnerability to coastal cholera ecology.

    Science.gov (United States)

    Collins, Andrew E

    2003-10-01

    The battle to completely control cholera continues. Multiple strains, high levels of morbidity in some regions of the world, and a complex of influences on its distribution in people and the environment are accompanied by only rough resolution prediction of outbreaks. Uncertainty as to the most effective array of interventions for one of the most researched infectious diseases thwarts further progress in providing cost-effective solutions. Progress on the research front consistently points towards the importance of disease ecology, coastal environments, and the sea. However, evaluation of the link between cholera in people and environment can only be effective with analysis of human vulnerability to variable coastal cholera ecologies. As there are some clear links between the organism, cholera incidence and the sea, it is appropriate that cholera research should examine the nature of coastal population vulnerability to the disease. The paper reviews the cholera risks of human-environment interactions in coastal areas as one component of the evaluation of cholera management. This points to effective intervention through integrative knowledge of changing human and environmental ecologies, requiring improved detection, but also an acceptance of complex causality. The challenge is to identify indicators and interventions for case specific ecologies in variable locales of human vulnerability and disease hazard. Further work will therefore aim to explore improved surveillance and intervention across the socio-behavioural and ecological spectrum. Furthermore, the story of cholera continues to inform us about how we should more effectively view emergent and resurgent infectious disease hazards more generally.

  16. Vulnerability Assessments in Ethical Hacking

    Directory of Open Access Journals (Sweden)

    Ashiqur Rahman ,

    2016-06-01

    Full Text Available Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. Vulnerabilities tend to be found in poor or improper system configuration, known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. One of the first examples of ethical hacking occurred in the 1970s, when the United States government used groups of experts called "red teams" to hack its own computer systems. It has become a sizable sub-industry within the information security market and has expanded to also cover the physical and human elements of an organization's defenses. A successful test doesn't necessarily mean a network or system is 100% secure, but it should be able to withstand automated attacks and unskilled hackers.

  17. Vulnerability Is Dynamic! Conceptualising a Dynamic Approach to Coastal Tourism Destinations’ Vulnerability

    NARCIS (Netherlands)

    Student, J.R.; Amelung, B.; Lamers, M.A.J.

    2016-01-01

    Coastal regions and islands are among the most popular tourist destinations.
    They are also highly vulnerable to climate change. Much of the literature on
    vulnerability, including IPCC reports, states that vulnerability is dynamic. However,
    vulnerability conceptualisations in the tourism

  18. Measuring vulnerability to disaster displacement

    Science.gov (United States)

    Brink, Susan A.; Khazai, Bijan; Power, Christopher; Wenzel, Friedemann

    2015-04-01

    Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We

  19. Vulnerability Analysis in Web Distributed Applications

    Directory of Open Access Journals (Sweden)

    Ion Ivan

    2011-03-01

    Full Text Available The paper analyze vulnerabilities found on web based distributed applications from different perspectives. Classes of vulnerabilities types are identified in order to cope with their different characteristics that each one develops. Methods for analyzing vulnerabilities of an authentication process are developed and solutions are proposed. A model for vulnerability minimization is discussed based on an indicator built on the amount of sensitive data revealed to the end users. Risks are analyzed together with the vulnerabilities that they exploit and measures are identified to combat these pairs.

  20. Research on security vulnerability of chip

    Science.gov (United States)

    Chen, Zhifeng; Li, Qingbao; Li, Zhou

    2013-03-01

    The 21st century is the information era. IC (Integrated Circuit) is the basis of the modern information industry. The security vulnerability or back door of IC is directly related to the entire information system security. From the perspective of information security, security vulnerability of chip is led out through the practical examples and then the importance of security vulnerability of chip is emphasized. By comparing the security vulnerability of chip with the software virus, the characteristics of the chip vulnerabilities are summed up. Moreover, this paper describes the security vulnerability models of different control logic chips, combinational and sequential logic chips models. Finally it puts forward two kinds of detecting methods of security vulnerability of chip against the two models.

  1. Wireless LAN Security Threats & Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Md. Waliullah

    2014-01-01

    Full Text Available Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.

  2. Symbian `vulnerability' and Mobile Threats

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  3. Scenarios for coastal vulnerability assessment

    Science.gov (United States)

    Nicholls, Robert J.; Woodroffe, Colin D.; Burkett, Virginia; Hay, John; Wong, Poh Poh; Nurse, Leonard; Wolanski, Eric; McLusky, Donald S.

    2011-01-01

    Coastal vulnerability assessments tend to focus mainly on climate change and especially on sea-level rise. Assessment of the influence of nonclimatic environmental change or socioeconomic change is less well developed and these drivers are often completely ignored. Given that the most profound coastal changes of the twentieth century due to nonclimate drivers are likely to continue through the twenty-first century, this is a major omission. It may result in not only overstating the importance of climate change but also overlooking significant interactions of climate change and other drivers. To support the development of policies relating to climate change and coastal management, integrated assessments of climatic change in coastal areas are required, including the effects of all the relevant drivers. This chapter explores the development of scenarios (or "plausible futures") of relevant climate and nonclimate drivers that can be used for coastal analysis, with an emphasis on the nonclimate drivers. It shows the importance of analyzing the impacts of climate change and sea-level rise in a broader context of coastal change and all its drivers. This will improve the analysis of impacts, key vulnerabilities, and adaptation needs and, hence, inform climate and coastal policy. Stakeholder engagement is important in the development of scenarios, and the underlying assumptions need to be explicit, transparent, and open to scientific debate concerning their uncertainties/realism and likelihood.

  4. Dynamics of immune system vulnerabilities

    Science.gov (United States)

    Stromberg, Sean P.

    The adaptive immune system can be viewed as a complex system, which adapts, over time, to reflect the history of infections experienced by the organism. Understanding its operation requires viewing it in terms of tradeoffs under constraints and evolutionary history. It typically displays "robust, yet fragile" behavior, meaning common tasks are robust to small changes but novel threats or changes in environment can have dire consequences. In this dissertation we use mechanistic models to study several biological processes: the immune response, the homeostasis of cells in the lymphatic system, and the process that normally prevents autoreactive cells from entering the lymphatic system. Using these models we then study the effects of these processes interacting. We show that the mechanisms that regulate the numbers of cells in the immune system, in conjunction with the immune response, can act to suppress autoreactive cells from proliferating, thus showing quantitatively how pathogenic infections can suppress autoimmune disease. We also show that over long periods of time this same effect can thin the repertoire of cells that defend against novel threats, leading to an age correlated vulnerability. This vulnerability is shown to be a consequence of system dynamics, not due to degradation of immune system components with age. Finally, modeling a specific tolerance mechanism that normally prevents autoimmune disease, in conjunction with models of the immune response and homeostasis we look at the consequences of the immune system mistakenly incorporating pathogenic molecules into its tolerizing mechanisms. The signature of this dynamic matches closely that of the dengue virus system.

  5. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  6. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade

    2012-02-01

    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  7. Assessing human vulnerability: Daytime residential distribution as a vulnerability indicator

    Science.gov (United States)

    Gokesch, Karin; Promper, Catrin; Papathoma-Köhle, Maria; Glade, Thomas

    2014-05-01

    Natural hazard risk management is based on detailed information on potential impacts of natural hazards. Especially concerning fast onset hazards such as flash floods, earthquakes but also debris flows and landslides, knowing potential hotspots of impact to both, assets and human lives is essential. This information is important for emergency management and decision making in the response phase of the disaster management cycle. Emergency managers are in need of information regarding not only the number of humans being potentially affected but also the respective vulnerability of the group affected based on characteristics such as age, income, health condition, mobility, etc. regarding a certain hazard. The analysis presented focuses on the distribution of the population, assuming a certain pattern of people in a certain radius of action. The method applied is based on a regular pattern of movement of different groups of people and a pattern of presence in certain units, e.g. schools, businesses or residential buildings. The distribution is calculated on a minimum of available data including the average household size, as well as information on building types. The study area is located in the Southwest of Lower Austria, Austria. The city of Waidhofen/Ybbs can be regarded as a regional center providing basic infrastructure, shops and schools. The high concentration of buildings combining shops and residential units leads to a high damage potential throughout the whole study area. The presented results indicate the population distribution within the study area on an average working day. It is clear that explicitly high numbers of people are located in specific buildings (e.g. schools and hospitals) which also include highly vulnerable groups especially to fast onset hazards. The results provide emergency services with the information that they need in order to intervene directly where large numbers of victims or people that need to be evacuated are located. In this

  8. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    Science.gov (United States)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  9. Assessing the Security Vulnerabilities of Correctional Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  10. Optimal redundancy against disjoint vulnerabilities in networks

    CERN Document Server

    Krause, Sebastian M; Zlatić, Vinko

    2015-01-01

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  11. Secure Web Development Based on Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Ms. Daljit Kaur Dr. Parminder Kaur

    2012-02-01

    Full Text Available This paper is an effort to develop secure web applications based on known vulnerabilities. It has been seen that in the rapid race of developing web applications in minimum time and budget, security is given least importance as consequence of which web applications are developed and hosted with number of vulnerabilities in them. And in this race, one thing is constant that attackers take advantage of weaknesses existing in technology for financial gain and theft of intellectual property. In this proposed method of secure web development, most common vulnerabilities and their occurrence in development process is discussed. Mapping vulnerabilities to the actions needed to take during development process may help developers to understand vulnerability and avoid vulnerabilities in application.

  12. Vulnerability analysis of three remote voting methods

    CERN Document Server

    Enguehard, Chantal

    2009-01-01

    This article analyses three methods of remote voting in an uncontrolled environment: postal voting, internet voting and hybrid voting. It breaks down the voting process into different stages and compares their vulnerabilities considering criteria that must be respected in any democratic vote: confidentiality, anonymity, transparency, vote unicity and authenticity. Whether for safety or reliability, each vulnerability is quantified by three parameters: size, visibility and difficulty to achieve. The study concludes that the automatisation of treatments combined with the dematerialisation of the objects used during an election tends to substitute visible vulnerabilities of a lesser magnitude by invisible and widespread vulnerabilities.

  13. Assessing vulnerability of urban African communities

    DEFF Research Database (Denmark)

    Karlsson Nyed, Patrik; Jean-Baptiste, Nathalie; Herslund, Lise Byskov

    2014-01-01

    East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions......, Attitudes and the Physical environment, with Dar es Salaam, Tanzania, as a case city. The methodology is actively involving the expertise of the stakeholders, and uses GIS to analyze and compile the data. The final output is presented as a comprehensible map, delineating the varying vulnerability...

  14. ICMPv6 RA Flooding Vulnerability Research

    Directory of Open Access Journals (Sweden)

    Linas Jočys

    2016-06-01

    Full Text Available ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1 and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability.

  15. Mining Bug Databases for Unidentified Software Vulnerabilities

    Energy Technology Data Exchange (ETDEWEB)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  16. Proliferation Vulnerability Red Team report

    Energy Technology Data Exchange (ETDEWEB)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  17. Vulnerable participants in health research

    DEFF Research Database (Denmark)

    Nordentoft, Helle Merete; Nanna, Kappel

    2011-01-01

    and leave both professionals and researchers in ethical and moral dilemmas. In the article we specifically focus on the methodological challenges of obtaining informed consent from drug users and terminally ill cancer patients in our PhD-research. The question is how you can illuminate the needs......Ethical guidelines for conducting research are embedded in the Helsinki declaration of 1964. We contend that these abstract and intentionally universal guidelines need to be appropriated for social and health care research in which purpose and methods often deviate from medical research....... The guidelines appear to be instrumental and over simplistic representations of the often ´messy´ realities surrounding the research process which is often guided by relational and local negotiations of ethical solutions. Vulnerable participants, for instance, challenge both professional and research ethics...

  18. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  19. Climate Vulnerability Assessments : An Assessment of Climate Change Vulnerability, Risk, and Adaptation in Albania's Energy Sector

    OpenAIRE

    World Bank

    2009-01-01

    Many countries are increasingly vulnerable to destructive weather events, floods, droughts, windstorms, or other parameters. The vulnerability is driven in part by recent extremes in climate variability but also by countries' sensitivity to events exacerbated by past practices, socioeconomic conditions, or legacy issues. The degree to which vulnerability to weather affects the countries' e...

  20. Romanian Labour Market – Vulnerable persons and vulnerabilities

    Directory of Open Access Journals (Sweden)

    Daniela TODOSE

    2011-06-01

    Full Text Available Romanian economy’s transition process began suddenly and was accompanied by disintegration of former political and economic system. In terms of GDP per capita, Romania has been one of the poorest countries in Central and Eastern Europe. Also, the Romanian economy was one of the most agrarian economies in Europe. Completely isolated from the informational point of view, Romania had a fully centralized economic system. Beginning of transition was completely chaotic, especially because of the complexity of integrating the fundamentals of democracy and market economy. Internal problems, instability, political corruption or lack of appropriate reforms have led to a difficult restructuring and privatization process.In this paper we present and analyze the tendencies and vulnerabilities on Romanian labor market between 19991 and 2009 versus EU member states. There were identified three shocks with major social impact on Romanian economy: the revolution in December 1989; the EU accession in January 2007 and the world economic crisis began in 2007. These three structural shocks have deeply influenced and still do the evolution of Romanian labor market.

  1. Predicting Vulnerability Risks Using Software Characteristics

    Science.gov (United States)

    Roumani, Yaman

    2012-01-01

    Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…

  2. Climate change vulnerability assessment in Georgia

    Science.gov (United States)

    Binita KC; J. Marshall Shepherd; Cassandra Johnson Gaither

    2015-01-01

    Climate change is occurring in the Southeastern United States, and one manifestation is changes in frequency and intensity of extreme events. A vulnerability assessment is performed in the state of Georgia (United States) at the county level from 1975 to 2012 in decadal increments. Climate change vulnerability is typically measured as a function of exposure to physical...

  3. Multidimensional perfectionism and narcissism: Grandiose or vulnerable?

    OpenAIRE

    Stoeber, Joachim; Sherry, Simon B.; Logan J Nealis

    2015-01-01

    Multidimensional perfectionism is related to grandiose narcissism, with other-oriented perfectionism showing the strongest, most consistent relationships. The relationships with vulnerable narcissism, however, are unclear. Our study investigated how three forms of perfectionism--self-oriented, other-oriented, and socially prescribed perfectionism (Hewitt & Flett, 1991)--are related to narcissistic grandiosity and vulnerability. A sample of 375 university students completed the Narcissistic Pe...

  4. IT Security Vulnerability and Incident Response Management

    NARCIS (Netherlands)

    Hafkamp, W.H.M.; Paulus, S.; Pohlman, N.; Reimer, H.

    2006-01-01

    This paper summarises the results of a Dutch PhD research project on IT security vulnerability and incident response management, which is supervised by the University of Twente in the Netherlands and which is currently in its final stage. Vulnerabilities are ‘failures or weaknesses in computer (appl

  5. Towards Individualized Vulnerability in Migration Policies

    NARCIS (Netherlands)

    Flegar, Veronika

    2016-01-01

    The Dutch parliament recently pledged for separate reception centres for vulnerable asylum seekers. In a reaction, the Dutch State Secretary of Security and Justice Klaas Dijkhoff objected to this claim, arguing that placing “vulnerable groups” into separate reception centres is stigmatizing. Instea

  6. Vulnerabilities Classification for Safe Development on Android

    Directory of Open Access Journals (Sweden)

    Ricardo Luis D. M. Ferreira

    2016-06-01

    Full Text Available The global sales market is currently led by devices with the Android operating system. In 2015, more than 1 billion smartphones were sold, of which 81.5% were operated by the Android platform. In 2017, it is estimated that 267.78 billion applications will be downloaded from Google Play. According to Qian, 90% of applications are vulnerable, despite the recommendations of rules and standards for the safe software development. This study presents a classification of vulnerabilities, indicating the vulnerability, the safety aspect defined by the Brazilian Association of Technical Standards (Associação Brasileira de Normas Técnicas - ABNT norm NBR ISO/IEC 27002 which will be violated, which lines of code generate the vulnerability and what should be done to avoid it, and the threat agent used by each of them. This classification allows the identification of possible points of vulnerability, allowing the developer to correct the identified gaps.

  7. Oxytocin and vulnerable romantic relationships.

    Science.gov (United States)

    Grebe, Nicholas M; Kristoffersen, Andreas Aarseth; Grøntvedt, Trond Viggo; Thompson, Melissa Emery; Kennair, Leif Edward Ottesen; Gangestad, Steven W

    2017-02-27

    Oxytocin (OT) has been implicated in the formation and maintenance of various social relationships, including human romantic relationships. Competing models predict, alternatively, positive or negative associations between naturally-occurring OT levels and romantic relationship quality. Empirical tests of these models have been equivocal. We propose a novel hypothesis ('Identify and Invest') that frames OT as an allocator of psychological investment toward valued, vulnerable relationships, and test this proposal in two studies. In one sample of 75 couples, and a second sample of 148 romantically involved individuals, we assess facets of relationships predicting changes in OT across a thought-writing task regarding one's partner. In both studies, participants' OT change across the task corresponded positively with multiple dimensions of high relationship involvement. However, increases in participants' OT also corresponded to their partners reporting lower relationship involvement. OT increases, then, reflected discrepancies between assessments of self and partner relationship involvement. These findings are robust in a combined analysis of both studies, and do not significantly differ between samples. Collectively, our findings support the 'Identify and Invest' hypothesis in romantic couples, and we argue for its relevance across other types of social bonds.

  8. Vulnerability of pension fund balances

    Directory of Open Access Journals (Sweden)

    Ólafur Ísleifsson

    2012-12-01

    Full Text Available Although the Icelandic general labour market pension funds are built on the proviso that pension schemes are fully funded these funds are still grappling with the devastating financial effects of the 2008 economic collapse that rendered most of them in a significant actuarial deficit. The public sector pension funds are based on an employer guarantee that makes up for any lack of funding that historically has been quite significant. We identify the relatively high actuarial discount rate and increasing longevity as two factors that add to the vulnerability of the Icelandic pension system. We present a stochastic model in order to obtain reasonably sound estimates of the effect of revising such key parameters of the actuarial assessments of the pension funds and thus obtain a view of the viability of the Icelandic pension system when confronted with the potential necessity of such parameter shifts. We present results of stochastic simulations of this models made to assess effects of changes in these major financial and demographic assumptions in actuarial evaluations of pension fund balances. Our results suggest that the Icelandic pension funds may be significantly less well funded than is generally perceived.

  9. Vulnerability, Health Agency and Capability to Health.

    Science.gov (United States)

    Straehle, Christine

    2016-01-01

    One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability.

  10. Groundwater vulnerability mapping of Qatar aquifers

    Science.gov (United States)

    Baalousha, Husam Musa

    2016-12-01

    Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.

  11. Heat Wave Vulnerability Mapping for India.

    Science.gov (United States)

    Azhar, Gulrez; Saha, Shubhayu; Ganguly, Partha; Mavalankar, Dileep; Madrigano, Jaime

    2017-03-30

    Assessing geographic variability in heat wave vulnerability forms the basis for planning appropriate targeted adaptation strategies. Given several recent deadly heatwaves in India, heat is increasingly being recognized as a public health problem. However, to date there has not been a country-wide assessment of heat vulnerability in India. We evaluated demographic, socioeconomic, and environmental vulnerability factors and combined district level data from several sources including the most recent census, health reports, and satellite remote sensing data. We then applied principal component analysis (PCA) on 17 normalized variables for each of the 640 districts to create a composite Heat Vulnerability Index (HVI) for India. Of the total 640 districts, our analysis identified 10 and 97 districts in the very high and high risk categories (> 2SD and 2-1SD HVI) respectively. Mapping showed that the districts with higher heat vulnerability are located in the central parts of the country. On examination, these are less urbanized and have low rates of literacy, access to water and sanitation, and presence of household amenities. Therefore, we concluded that creating and mapping a heat vulnerability index is a useful first step in protecting the public from the health burden of heat. Future work should incorporate heat exposure and health outcome data to validate the index, as well as examine sub-district levels of vulnerability.

  12. Transdisciplinary knowledge integration : cases from integrated assessment and vulnerability assessment

    NARCIS (Netherlands)

    Hinkel, J.

    2008-01-01

    Keywords: climate change, integrated assessment, knowledge integration, transdisciplinary research, vulnerability, vulnerability assessment. This thesis explores how transdisciplinary knowledge integration can be facilitated in the context of integrated assessments and vulnerability assessments of

  13. The vulnerability of Palestinian refugees from Syria

    Directory of Open Access Journals (Sweden)

    Leah Morrison

    2014-09-01

    Full Text Available While Syrian nationals may eventually return to their home country, the future for Palestinians from Syria is increasingly uncertain. Meanwhile they are more vulnerable than, and treated worse than, most other refugees from the Syrian conflict.

  14. Violence and vulnerabilities: Afghans in Pakistan

    Directory of Open Access Journals (Sweden)

    Sanaa Alimia

    2014-05-01

    Full Text Available Given that the majority of Afghans who live in Pakistan today are unlikely to return to Afghanistan, more needs to be done to address their vulnerabilities and protect them from harassment and violence.

  15. Coastal vulnerability assessment for Egypt's Mediterranean coast

    Directory of Open Access Journals (Sweden)

    Mohamed E. Hereher

    2015-05-01

    Full Text Available The Egyptian Mediterranean coast was examined for the vulnerability to sea-level rise using the coastal vulnerability index (CVI, which was derived from the geologic and physical characteristics of the coast. This paper is the first to apply the CVI along the Egyptian coasts. The coast has different geomorphologic aspects ranging from steep-slope-rocky cliffs to gentle sloping deltaic sediments. Although the coast is under low tidal effect and low height waves, results showed that more than one-third of the 1000 km long coast is severely vulnerable to sea-level rise. Unfortunately, the area under high vulnerability to sea-level rise comprises the densely populated Nile Delta coast. National actions should be implemented to safeguard the entire coast at the threatened locations.

  16. Blast vulnerability assessment : challenges and myths

    Energy Technology Data Exchange (ETDEWEB)

    Braimah, A.; Contestabile, E. [Natural Resources Canada, Ottawa, ON (Canada). Canadian Explosives Research Laboratory

    2007-07-01

    Challenges related to the creation of a comprehensive blast vulnerability assessment program for Canadian buildings was presented. Many building owners are now seeking to assess the vulnerability of their structures to blast loads, and wish to increase the survivability of both occupants and structures. However, the engineering community has not yet incorporated existing physical security measures into comprehensive mitigation strategies and designs. Different institutions are currently using varying amounts of explosives in vulnerability assessments, and there is an urgent need for information on terrorist capabilities in both the present and the future. Pressure-impulse diagrams are now used by engineers to assess component responses to blasts. However, pressure-impulse diagrams are based on single modes of failure, and may not be capable of capturing all failure modes of building components, nor are they able to ensure that vulnerability assessments do not overestimate the blast load resistance of buildings.

  17. Environmental conflicts and women's vulnerability in Africa

    African Journals Online (AJOL)

    the linkages between environmental conflicts, women's vulnerability and .... local human rights organisations, as well as the Kenya National Commission ... ability to access resources such as safe water and services such as education and.

  18. Vulnerability of Energy Consumers - National Security Issue

    Directory of Open Access Journals (Sweden)

    Musatescu Virgil

    2016-04-01

    Full Text Available Energy providing is a complex problem, which includes both common features for all categories of consumers and particularities, which emerge from the declaration on human rights. As an index of the level of heat using the concept of 'energy poverty'. In counterbalance, this concept proposes the use of the notion of "vulnerability" for these purposes. The concept of "vulnerable consumer" point of view of energy is still defined in the 2012 electricity law in Romania. In this context, the paper examines the vulnerability characteristics indicating meanings on widening energy paradigm by replacing the phrase "energy poverty" by "energy welfare". The paper presents quantitative issues regarding the current situation in Romania with explaining the need treatment paradigm change simplistic approach to the problem of vulnerable consumers, which really is a matter of national security.

  19. CDC's Social Vulnerability Index (SVI) Mapping Dashboard

    Data.gov (United States)

    U.S. Department of Health & Human Services — The interactive maps are visual representations of the Social Vulnerability Index (SVI). Data were extracted from the US Census and the American Community Survey.

  20. Vulnerability in the South African context

    CSIR Research Space (South Africa)

    John, J

    2006-02-28

    Full Text Available www.csir.co.za Categories and factors associated with vulnerability EmploymentFuel useDiseaseDisease state Cultural practicesBody burdenObesityGender Socio-economic status Background exposure FitnessRace Education...

  1. Vulnerability and Knowledge of Sexually Transmitted Infections ...

    African Journals Online (AJOL)

    hanumantp

    common causes of illness world-wide with far reaching health, ... Keywords: Enugu, Female traders, Knowledge, Prevention, Sexually transmitted infections, Vulnerability. Original ... constituted the work force, especially in developing countries.

  2. [Aged woman's vulnerability related to AIDS].

    Science.gov (United States)

    Silva, Carla Marins; Lopes, Fernanda Maria do Valle Martins; Vargens, Octavio Muniz da Costa

    2010-09-01

    This article is a systhematic literature review including the period from 1994 to 2009, whose objective was to discuss the aged woman's vulnerability in relation to Acquired Imunodeficiency Syndrome (Aids). The search for scientific texts was accomplished in the following databases: Biblioteca Virtual em Saúde, Scientific Eletronic Library Online (SciELO), Literatura Latino-Americana e do Caribe em Ciências da Saúde (LILACS) and Medical Literature Analysis and Retrieval System Online (MEDLINE). The descriptors used were vulnerability, woman and Aids. Eighteen texts were analyzed, including articles in scientific journals, thesis and dissertations. As a conclusion, it was noted that aged women and vulnerability to Aids are directly related, through gender characteristics including submission and that were built historical and socially. We consider as fundamental the development of studies which may generate publications accessible to women, in order to help them see themselves as persons vulnerable to Aids contagion just for being women.

  3. Aquifer vulnerability for Colorado and New Mexico

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The U.S. Geological Survey Data Series provides raster data representing an estimate of aquifer vulnerability calculated for each 30-meter raster cell. Depth to...

  4. ASSESSMENT OF VULNERABILITY OF FARMING HOUSEHOLDS ...

    African Journals Online (AJOL)

    Osondu

    2012-03-31

    Mar 31, 2012 ... reducing interest rate on loans for crop production as well as ... Keywords: Climate change, vulnerability, farming households .... tolerant and or resistant to temperature stresses as .... Coping strategy is an adjustment or self.

  5. Camana, Peru, and Tsunami Vulnerability

    Science.gov (United States)

    2002-01-01

    A tsunami washed over the low-lying coastal resort region near Camana, southern Peru, following a strong earthquake on June 23, 2001. The earthquake was one of the most powerful of the last 35 years and had a magnitude of 8.4. After the initial quake, coastal residents witnessed a sudden drawdown of the ocean and knew a tsunami was imminent. They had less than 20 minutes to reach higher ground before the tsunami hit. Waves as high as 8 m came in four destructive surges reaching as far as 1.2 km inland. The dashed line marks the approximate area of tsunami inundation. Thousands of buildings were destroyed, and the combined earthquake and tsunami killed as many as 139 people. This image (ISS004-ESC-6128) was taken by astronauts onboard the International Space Station on 10 January 2002. It shows some of the reasons that the Camana area was so vulnerable to tsunami damage. The area has a 1 km band of coastal plain that is less than 5 m in elevation. Much of the plain can be seen by the bright green fields of irrigated agriculture that contrast with the light-colored desert high ground. Many of the tsunami-related deaths were workers in the onion fields in the coastal plain that were unwilling to leave their jobs before the end of the shift. A number of lives were spared because the tsunami occurred during the resort off-season, during the daylight when people could see the ocean drawdown, and during one of the lowest tides of the year. Information on the Tsunami that hit Camana can be found in a reports on the visit by the International Tsunami Survey Team and the USC Tsunami Research Lab. Earthquake Epicenter, Peru shows another image of the area. Image provided by the Earth Sciences and Image Analysis Laboratory at Johnson Space Center. Additional images taken by astronauts and cosmonauts can be viewed at the NASA-JSC Gateway to Astronaut Photography of Earth.

  6. Defense Against National Vulnerabilities in Public Data

    Science.gov (United States)

    2017-02-28

    governments can use to understand and make decisions based on the vulnerability of their open data footprint. An intuitive human machine interface...National Vulnerabilities in Public Data Open Data Threat Contract: W911NF-14-C-0031 Period of Performance: March 13, 2014 – January 31, 2017...unintentional disclosure of sensitive information through open data like social media. In the process of developing methods to quantify and track the

  7. Designing For- and With- Vulnerable People

    OpenAIRE

    2013-01-01

    Ubiquitous technology, coupled with a surge in empirical research on people that engages people with multiple challenges in their lives, is increasingly revealing the potential for HCI to enrich the lives of vulnerable people. Designing for people with vulnerabilities requires an approach to participation that is sensitive to the risks of possible stigmatization and an awareness of the challenges for participant involvement. This workshop will bring together researchers and practitioners to e...

  8. Rockfall vulnerability assessment for reinforced concrete buildings

    Directory of Open Access Journals (Sweden)

    O. Mavrouli

    2010-10-01

    Full Text Available The vulnerability of buildings to the impact of rockfalls is a topic that has recently attracted increasing attention in the scientific literature. The quantification of the vulnerability, when based on empirical or heuristic approaches requires data recorded from historical rockfalls, which are not always available. This is the reason why appropriate alternatives are required. The use of analytical and numerical models can be one of them. In this paper, a methodology is proposed for the analytical evaluation of the vulnerability of reinforced concrete buildings. The vulnerability is included in the risk equation by incorporating the uncertainty of the impact location of the rock block and the subsequent damage level. The output is a weighted vulnerability that ranges from 0 to 1 and expresses the potential damage that a rock block causes to a building in function of its velocity and size. The vulnerability is calculated by the sum of the products of the probability of block impact on each element of the building and its associated damage state, the latter expressed in relative recovery cost terms. The probability of exceeding a specific damage state such as non-structural, local, partial, extensive or total collapse is also important for the quantification of risk and to this purpose, several sets of fragility curves for various rock diameters and increasing velocities have been prepared. An example is shown for the case of a simple reinforced concrete building and impact energies from 0 to 4075 kJ.

  9. Drought vulnerability assesssment and mapping in Morocco

    Science.gov (United States)

    Imani, Yasmina; Lahlou, Ouiam; Bennasser Alaoui, Si; Naumann, Gustavo; Barbosa, Paulo; Vogt, Juergen

    2014-05-01

    Drought vulnerability assessment and mapping in Morocco Authors: Yasmina Imani 1, Ouiam Lahlou 1, Si Bennasser Alaoui 1 Paulo Barbosa 2, Jurgen Vogt 2, Gustavo Naumann 2 1: Institut Agronomique et Vétérinaire Hassan II (IAV Hassan II), Rabat Morocco. 2: European Commission, Joint Research Centre (JRC), Institute for Environment and Sustainability (IES), Ispra, Italy. In Morocco, nearly 50% of the population lives in rural areas. They are mostly small subsistent farmers whose production depends almost entirely on rainfall. They are therefore very sensitive to drought episodes that may dramatically affect their incomes. Although, as a consequence of the increasing frequency, length and severity of drought episodes in the late 90's, the Moroccan government decided, to move on from a crisis to a risk management approach, drought management remains in practice mainly reactive and often ineffective. The lack of effectiveness of public policy is in part a consequence of the poor understanding of drought vulnerability at the rural community level, which prevents the development of efficient mitigation actions and adaptation strategies, tailored to the needs and specificities of each rural community. Thus, the aim of this study is to assess and map drought vulnerability at the rural commune level in the Oum Er-Rbia basin which is a very heterogeneous basin, showing a big variability of climates, landscapes, cropping systems and social habits. Agricultural data collected from the provincial and local administrations of Agriculture and socio-economic data from the National Department of Statistics were used to compute a composite vulnerability index (DVI) integrating four different components: (i) the renewable natural capacity, (ii) the economic capacity, (iii) human and civic resources, and (iv) infrastructure and technology. The drought vulnerability maps that were derived from the computation of the DVI shows that except very specific areas, most of the Oum er Rbia

  10. A knowledge integration approach to flood vulnerability

    Science.gov (United States)

    Mazzorana, Bruno; Fuchs, Sven

    2014-05-01

    Understanding, qualifying and quantifying vulnerability is an essential need for implementing effective and efficient flood risk mitigation strategies; in particular if possible synergies between different mitigation alternatives, such as active and passive measures, should be achieved. In order to combine different risk management options it is necessary to take an interdisciplinary approach to vulnerability reduction, and as a result the affected society may be willing to accept a certain degree of self-responsibility. However, due to differing mono-disciplinary approaches and regional foci undertaken until now, different aspects of vulnerability to natural hazards in general and to floods in particular remain uncovered and as a result the developed management options remain sub-optimal. Taking an even more fundamental viewpoint, the empirical vulnerability functions used in risk assessment specifically fail to capture physical principles of the damage-generating mechanisms to the build environment. The aim of this paper is to partially close this gap by discussing a balanced knowledge integration approach which can be used to resolve the multidisciplinary disorder in flood vulnerability research. Modelling techniques such as mathematical-physical modelling of the flood hazard impact to and response from the building envelope affected, and formative scenario analyses of possible consequences in terms of damage and loss are used in synergy to provide an enhanced understanding of vulnerability and to render the derived knowledge into interdisciplinary mitigation strategies. The outlined formal procedure allows for a convincing knowledge alignment of quantified, but partial, information about vulnerability as a result of the application of physical and engineering notions and valuable, but often underspecified, qualitative argumentation strings emerging from the adopted socio-economic viewpoint.

  11. Windows Server 2012 vulnerabilities and security

    Directory of Open Access Journals (Sweden)

    Gabriel R. López

    2015-09-01

    Full Text Available This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS. AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.

  12. Livelihood vulnerability index analysis: An approach to study vulnerability in the context of Bihar

    Directory of Open Access Journals (Sweden)

    Madhuri .

    2014-03-01

    Full Text Available Vulnerability is the capacity to anticipate, cope with, resist and recover from the impact of natural disasters. Floods add to the distressed conditions of the poor and vulnerable people in Bihar. Floods have a different impact on households depending on differences in their livelihood choices. Therefore, in order to identify the variability in vulnerability of affected households, the livelihood vulnerability index (LVI of Hahn, Riederer and Foster was modified according to the context of the study area. The LVI aims to identify sources and forms of vulnerability that are specific to the context in order to design context-specific resilience measures. However, vulnerability and resilience are not interdependent but discrete entities. The study was conducted in the seven blocks of Bhagalpur district in the state of Bihar. Naugachia was found to be the least vulnerable because of better access to basic amenities and livelihood strategies, whilst Kharik was found to be highly vulnerable in respect to other blocks because of high sensitivity and less adaptive strategy. The study also revealed that better access to resources does not necessarily mean that households are adopting resilience measures because of apathetic or indifferent attitudes.

  13. Vulnerability of schools to floods in Nyando River catchment, Kenya.

    Science.gov (United States)

    Ochola, Samuel O; Eitel, Bernhard; Olago, Daniel O

    2010-07-01

    This paper assesses the vulnerability of schools to floods in the Nyando River catchment (3,600 km(2)) in western Kenya and identifies measures needed to reduce this vulnerability. It surveys 130 schools in the lower reaches, where flooding is a recurrent phenomenon. Of the primary schools assessed, 40% were vulnerable, 48% were marginally vulnerable and 12% were not vulnerable. Of the secondary schools, 8% were vulnerable, 73% were marginally vulnerable and 19% were not vulnerable. Vulnerability to floods is due to a lack of funds, poor building standards, local topography, soil types and inadequate drainage. The Constituencies Development Fund (CDF), established in 2003, provides financial support to cover school construction and reconstruction costs; CDF Committees are expected to adopt school building standards. In an effort to promote safe and resilient construction and retrofitting to withstand floods, this paper presents vulnerability reduction strategies and recommendations for incorporating minimum standards in the on-going Primary School Infrastructure Programme Design.

  14. Mental vulnerability and survival after cancer

    DEFF Research Database (Denmark)

    Nakaya, Naoki; Bidstrup, Pernille E; Eplov, Lene F

    2009-01-01

    BACKGROUND: It has been hypothesized that personality traits affect survival after cancer, but studies have produced inconsistent results. This study examined the association between mental vulnerability and survival after cancer in Denmark in a prospective cohort study. METHODS: Between 1976...... and 2001, 12733 residents of Copenhagen completed a questionnaire eliciting information on a 12-item mental vulnerability scale, as well as various personal data. Follow-up in the Danish Cancer Registry until 2003 identified 884 incident cases of primary cancer, and follow-up for death from the date...... of cancer diagnosis until 2003 identified 382 deaths. Mental vulnerability scores were divided into 4 approximately equal-sized groups. Cox proportional hazards regression models were used to estimate the hazard ratio (HR) of all-cause mortality. RESULTS: Multivariate HR for all-cause mortality for persons...

  15. Mapping Regional Drought Vulnerability: a Case Study

    Science.gov (United States)

    Karamouz, M.; Zeynolabedin, A.; Olyaei, M. A.

    2015-12-01

    Drought is among the natural disaster that causes damages and affects many people's life in many part of the world including in Iran. Recently, some factors such as climate variability and the impact of climate change have influenced drought frequency and intensity in many parts of the world. Drought can be divided into four categories of meteorological, hydrological, agricultural and social-economic. In meteorological the important feature is lack of rainfall. In hydrological drought river flows and dam storage are considered. Lack of soil moisture is the key factor in agricultural droughts while in social-economic type of drought the relation between supply and demand and social-economic damages due to water deficiency is studied. While the first three types relates to the lack of some hydrological characteristics, social-economic type of drought is actually the consequence of other types expressed in monetary values. Many indices are used in assessing drought; each has its own advantages and disadvantages and can be used for specific types of drought. Therefore knowing the types of drought can provide a better understanding of shortages and their characteristics. Drought vulnerability is a concept which shows the likelihood of damages from hazard in a particular place by focusing on the system status prior to the disaster. Drought vulnerability has been viewed as a potential for losses in the region due to water deficiency at the time of drought. In this study the application of vulnerability concept in drought management in East Azarbaijan province in Iran is investigated by providing vulnerability maps which demonstrates spatial characteristics of drought vulnerability. In the first step, certain governing parameters in drought analysis such as precipitation, temperature, land use, topography, solar radiation and ground water elevation have been investigated in the region. They are described in details and calculated in suitable time series. Vulnerabilities

  16. MAPPING REGIONAL DROUGHT VULNERABILITY: A CASE STUDY

    Directory of Open Access Journals (Sweden)

    M. Karamouz

    2015-12-01

    Full Text Available Drought is among the natural disaster that causes damages and affects many people’s life in many part of the world including in Iran. Recently, some factors such as climate variability and the impact of climate change have influenced drought frequency and intensity in many parts of the world. Drought can be divided into four categories of meteorological, hydrological, agricultural and social-economic. In meteorological the important feature is lack of rainfall. In hydrological drought river flows and dam storage are considered. Lack of soil moisture is the key factor in agricultural droughts while in social-economic type of drought the relation between supply and demand and social-economic damages due to water deficiency is studied. While the first three types relates to the lack of some hydrological characteristics, social-economic type of drought is actually the consequence of other types expressed in monetary values. Many indices are used in assessing drought; each has its own advantages and disadvantages and can be used for specific types of drought. Therefore knowing the types of drought can provide a better understanding of shortages and their characteristics. Drought vulnerability is a concept which shows the likelihood of damages from hazard in a particular place by focusing on the system status prior to the disaster. Drought vulnerability has been viewed as a potential for losses in the region due to water deficiency at the time of drought. In this study the application of vulnerability concept in drought management in East Azarbaijan province in Iran is investigated by providing vulnerability maps which demonstrates spatial characteristics of drought vulnerability. In the first step, certain governing parameters in drought analysis such as precipitation, temperature, land use, topography, solar radiation and ground water elevation have been investigated in the region. They are described in details and calculated in suitable time

  17. Implementing Security in a Vulnerable CRM

    Directory of Open Access Journals (Sweden)

    Alexandru Valentin Besciu

    2015-03-01

    Full Text Available This paper work objective is to scan and analyze a web application developed in early 2013 by the author of this paperwork. The application has been improved constantly since then, but without having a security plan included. Unfortunately the application arrived at a point where the security isn’t optional anymore and it needs to be improved. In order to do this I scanned the web application files with Acunetix Web Vulnerabilities Scanner. After the analysis the results pointed which vulnerabilities the application has and how to fix them. After I had fixed the vulnerabilities I rescanned the application to see if there were any others which appeared because of the new code. After the scanning the results were good, Acunetix WVS showing only notices.

  18. Narcissistic grandiosity and narcissistic vulnerability in psychotherapy.

    Science.gov (United States)

    Pincus, Aaron L; Cain, Nicole M; Wright, Aidan G C

    2014-10-01

    This article briefly summarizes the empirical and clinical literature underlying a contemporary clinical model of pathological narcissism. Unlike the DSM Narcissistic Personality Disorder (NPD), this clinical model identifies and differentiates between two phenotypic themes of dysfunction-narcissistic grandiosity and narcissistic vulnerability-that can be expressed both overtly and covertly in patients' ways of thinking, feeling, behaving, and participating in treatment. Clinical recognition that narcissistic patients can and often do present for psychotherapy in vulnerable states of depression, anxiety, shame, and even suicidality increases the likelihood of accurate diagnosis and effective treatment planning. This article provides case examples derived from psychotherapies with narcissistic patients to demonstrate how narcissistic grandiosity and narcissistic vulnerability concurrently present in patients who seek treatment.

  19. Vulnerabilities in Academic E-governance Portals

    Directory of Open Access Journals (Sweden)

    Subhash Chander

    2013-03-01

    Full Text Available Internet has become one of the most versatile sources of information and on the other way it has become source of various security threats. Various existing vulnerabilities in the web portals are compromised easily by hackers sitting at their places. There are so many vulnerabilities available in various websites in case of government sectors may be because of financial constraints or other. E-government is a new fast growing area in developing as well as in developed countries. New e-governance applications are emerging and being implemented and utilized by the common man. Providing government information and services on the web has resulted in mushrooming of websites with very little attention is paid to security issues of these websites. This paper discusses certain security issues & vulnerabilities in websites of educational institutes. The organizations taken into consideration are educational institutes of Haryana.

  20. Creativity and psychopathology: a shared vulnerability model.

    Science.gov (United States)

    Carson, Shelley H

    2011-03-01

    Creativity is considered a positive personal trait. However, highly creative people have demonstrated elevated risk for certain forms of psychopathology, including mood disorders, schizophrenia spectrum disorders, and alcoholism. A model of shared vulnerability explains the relation between creativity and psychopathology. This model, supported by recent findings from neuroscience and molecular genetics, suggests that the biological determinants conferring risk for psychopathology interact with protective cognitive factors to enhance creative ideation. Elements of shared vulnerability include cognitive disinhibition (which allows more stimuli into conscious awareness), an attentional style driven by novelty salience, and neural hyperconnectivity that may increase associations among disparate stimuli. These vulnerabilities interact with superior meta-cognitive protective factors, such as high IQ, increased working memory capacity, and enhanced cognitive flexibility, to enlarge the range and depth of stimuli available in conscious awareness to be manipulated and combined to form novel and original ideas.

  1. Measuring Road Network Vulnerability with Sensitivity Analysis

    Science.gov (United States)

    Jun-qiang, Leng; Long-hai, Yang; Liu, Wei-yi; Zhao, Lin

    2017-01-01

    This paper focuses on the development of a method for road network vulnerability analysis, from the perspective of capacity degradation, which seeks to identify the critical infrastructures in the road network and the operational performance of the whole traffic system. This research involves defining the traffic utility index and modeling vulnerability of road segment, route, OD (Origin Destination) pair and road network. Meanwhile, sensitivity analysis method is utilized to calculate the change of traffic utility index due to capacity degradation. This method, compared to traditional traffic assignment, can improve calculation efficiency and make the application of vulnerability analysis to large actual road network possible. Finally, all the above models and calculation method is applied to actual road network evaluation to verify its efficiency and utility. This approach can be used as a decision-supporting tool for evaluating the performance of road network and identifying critical infrastructures in transportation planning and management, especially in the resource allocation for mitigation and recovery. PMID:28125706

  2. Climate challenges, vulnerabilities, and food security.

    Science.gov (United States)

    Nelson, Margaret C; Ingram, Scott E; Dugmore, Andrew J; Streeter, Richard; Peeples, Matthew A; McGovern, Thomas H; Hegmon, Michelle; Arneborg, Jette; Kintigh, Keith W; Brewington, Seth; Spielmann, Katherine A; Simpson, Ian A; Strawhacker, Colleen; Comeau, Laura E L; Torvinen, Andrea; Madsen, Christian K; Hambrecht, George; Smiarowski, Konrad

    2016-01-12

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the "weight" of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.

  3. Earthquake vulnerability evaluation Faizabad district of Kermanshah

    Directory of Open Access Journals (Sweden)

    Saba Naderi

    2014-07-01

    Full Text Available This paper as examplehas been studied Faizabad district of Kermanshah and to reach its main purpose, which is reducing the damagecaused by the earthquake on the Faizabad district is been providedand in subsidiary purposes part the research is tried identify factors influence in vulnerability earthquakes,pay to provide the factors required; All these factors havean impact on reducing earthquake vulnerability. This data using geological data, soil texture, getting satelliteimages and layering over Arc Gis software identified and for long term periods donepredict using relation kernel PSHA also. In determining the level ofenvironmental risk is to use software crisis. Finally, by recognizing the riskzone, solutions for Faizabad district offered.

  4. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    OpenAIRE

    Papathoma-Köhle, Maria

    2016-01-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerab...

  5. Climate vulnerability of drinking water supplies

    Science.gov (United States)

    Selmeczi, Pál; Homolya, Emese; Rotárné Szalkai, Ágnes

    2016-04-01

    Extreme weather conditions in Hungary led to difficulties in drinking water management on diverse occasions in the past. Due to reduced water resources and the coexisting high demand for drinking water in dry summer periods the availability of a number of water supplies became insufficient therefore causing limitations in water access. In some other cases, as a result of floods and flash floods over karstic areas evolving in consequence of excessive precipitation, several water supplies had to be excluded in order to avoid the risk of infections. More frequent occurrence of extreme weather conditions and further possible changes in the future induce the necessity for an analysis of the vulnerability of drinking water resources to climate change. Since 95% of the total drinking water supply in Hungary originates from subsurface layers, significance of groundwater resources is outstanding. The aim of our work carried out in the frames of the NAGiS (National Adaptation Geo-information System) project was to build up a methodology for the study and determination of the vulnerability of drinking water supplies to climate. The task covered analyses of climatic parameters influencing drinking water supplies principally and hydrogeological characteristics of the geological media that significantly determines vulnerability. Effects on drinking water resources and their reduction or exclusion may imply societal and economic consequences therefore we extended the analyses to the investigation of possibilities concerning the adaptation capacity to changed conditions. We applied the CIVAS (Climate Impact and Vulnerability Assessment Scheme) model developed in the frames of the international climate research project CLAVIER (Climate Change and Variability: Impact on Central and Eastern Europe) to characterize climate vulnerability of drinking water supplies. The CIVAS model, being based on the combined evaluation of exposure, sensitivity and adaptability, provides a unified

  6. Indicators of Terrorism Vulnerability in Africa

    Science.gov (United States)

    2015-03-26

    56 Contagion ...impoverished people that are more vulnerable to being recruited by terrorist. Insurgents are no longer seeking money, but actually have financial power to... contagion , or lagged autoregressive term, promotes terrorist attacks both temporally and spatially. Addi- tionally, it is important to note that fourteen

  7. Intracoronary Thermography: a vulnerable Plaque Detection Technique?

    NARCIS (Netherlands)

    A.G. ten Have (Anna)

    2006-01-01

    textabstractThe studies reported in this thesis were performed to answer the central question: can intracoronary thermography be used for vulnerable plaque detection? To answer this question, we have identified parameters that influence intracoronary thermography measurements, and have studied to w

  8. Development on Vulnerability Assessment Methods of PPS

    Institute of Scientific and Technical Information of China (English)

    MIAO; Qiang; ZHANG; Wen-liang; BU; Li-xin; YIN; Hong-he; LI; Xin-jun; FANG; Xin

    2013-01-01

    Through investigating information from domestic and abroad,joint the domestic assessment experience,we present a set of physical protection system(PPS)vulnerability assessment methods for on-operating nuclear power plants and for on-designing nuclear facilities.The methods will help to strengthen and upgrade the security measures of the nuclear facilities,improve the effectiveness and

  9. Food fraud vulnerability and its key factors

    NARCIS (Netherlands)

    Ruth, van Saskia M.; Huisman, Wim; Luning, Pieternel A.

    2017-01-01

    Background Food fraud prevention and fraud vulnerability reduction are the first steps to combat food fraud and require a recurrent effort throughout the food supply chain. Due to the intentional nature of fraud, it requires different tactics than the common food safety approaches. However,

  10. Vulnerability of tanks under seismic actions

    Energy Technology Data Exchange (ETDEWEB)

    Rocha, L.E.P.R.; Nuno, I.E.A.N.; Torres, M.A.F.T. [Electrical Research Inst., Cuernavaca, Morelos (Mexico)

    2010-07-01

    The purpose of this study was to create a simplified procedure to predict the accelerations in which some failure modes are presented and to build vulnerability curves in terms of the probability that the identified failure modes would be presented. The paper presented a procedure to examine the vulnerability of tanks under seismic load. The study considered seismic intensity, ground dynamic conditions, soil-structure interaction effects and structural dynamic behavior. Tanks were characterized by their aspect ratio and capacity. Vulnerability was defined as the probability of failure function, whose main parameter was the acceleration that led to the failure mode of interest. A part of the study focused on the description of the main failure modes, such as circumferential collapse, elastic failure and elastoplastic failure and with the determination of the corresponding accelerations and the calculation of the vulnerability curves. An example was presented. It was concluded that the collapse acceleration suit corresponding to rock condition was used to get the collapse acceleration of a tank in soft soil without and with soil-structure interaction. Errors were less than five percent. 9 refs., 1 fig.

  11. Assessing infrastructure vulnerability to major floods

    Energy Technology Data Exchange (ETDEWEB)

    Jenssen, Lars

    1998-12-31

    This thesis proposes a method for assessing the direct effects of serious floods on a physical infrastructure or utility. This method should be useful in contingency planning and in the design of structures likely to be damaged by flooding. A review is given of (1) methods of floodplain management and strategies for mitigating floods, (2) methods of risk analysis that will become increasingly important in flood management, (3) methods for hydraulic computations, (4) a variety of scour assessment methods and (5) applications of geographic information systems (GIS) to the analysis of flood vulnerability. Three computer codes were developed: CULVCAP computes the headwater level for circular and box culverts, SCOUR for assessing riprap stability and scour depths, and FASTFLOOD prepares input rainfall series and input files for the rainfall-runoff model used in the case study. A road system in central Norway was chosen to study how to analyse the flood vulnerability of an infrastructure. Finally, the thesis proposes a method for analysing the flood vulnerability of physical infrastructure. The method involves a general stage that will provide data on which parts of the infrastructure are potentially vulnerable to flooding and how to analyse them, and a specific stage which is concerned with analysing one particular kind of physical infrastructure in a study area. 123 refs., 59 figs., 17 tabs= .

  12. USMLE Step 1 Examination: Legal Vulnerability.

    Science.gov (United States)

    Templeton, Bryce

    1996-01-01

    In 1994 the Federation of State Medical Boards and the National Board of Medical Examiners instituted a three-step U.S. Medical Licensing Examination (USMLE). Step one of the USMLE may be vulnerable to legal challenge on the basis of minority group bias and lack of construct validity. (SLD)

  13. A physical approach on flood risk vulnerability

    Science.gov (United States)

    Mazzorana, Bruno; Fuchs, Sven; Keiler, Margreth

    2013-04-01

    The design of efficient flood risk mitigation strategies and their subsequent implementation relies on a careful vulnerability analysis of the elements exposed to flood hazard. Recently, extensive research efforts were undertaken to develop and refine empirical relationships linking the structural vulnerability of buildings to the intensity of the impacting water-related hazard processes. These empirical vulnerability functions allow for an estimation of the expected direct losses as a result of the hazard scenario on the basis of a spatially explicit representation of the process patterns and the elements at risk, and improve both risk assessments and cost-benefit analyses of planned mitigation strategies. However, due to the underlying empiricism of such vulnerability functions, the physics of the damage generating mechanisms remain unveiled, and, as such, the applicability of the empirical approach for planning hazard-proof residential buildings is rather limited. Therefore, we propose a conceptual assessment scheme to close this gap. This assessment scheme comprises distinct analytical steps: (a) modelling the process intensity and (b) the impact on the element at risk exposed, (c) the physical response of the building envelope, (d) the damage accounting and (f) the economic damage valuation. This dynamic assessment supports all relevant planning activities with respect to a minimisation of flood hazard losses, and can be implemented in the operational risk assessment procedure.

  14. Consumer Vulnerability to Fraud: Influencing Factors.

    Science.gov (United States)

    Lee, Jinkook; Soberon-Ferrer, Horacio

    1997-01-01

    A questionnaire on market knowledge and awareness of unfair business practices was completed by 464 adults aged 18-64 and by 493 over 64. Consumers were more susceptible to fraud if they were older, poor, less educated, and/or living without spouses. Gender and race were not significant predictors of vulnerability. (SK)

  15. Food fraud vulnerability and its key factors

    NARCIS (Netherlands)

    Ruth, van Saskia M.; Huisman, Wim; Luning, Pieternel A.

    2017-01-01

    Background Food fraud prevention and fraud vulnerability reduction are the first steps to combat food fraud and require a recurrent effort throughout the food supply chain. Due to the intentional nature of fraud, it requires different tactics than the common food safety approaches. However, knowl

  16. Evaluating Youth Work with Vulnerable Young People.

    Science.gov (United States)

    Furlong, Andy; Cartmel, Fred; Powney, Janet; Hall, Stuart

    This report presents the results of an 18-month research project that studied the effectiveness of youth work with vulnerable young people. The research, representing six distinct geographical areas of Scotland characterized by disadvantage, focused on young people aged 13 to 16. In each neighborhood, the project examined the experiences of young…

  17. Urbanising Thailand: Implications for climate vulnerability assessment

    NARCIS (Netherlands)

    R. Friend; C. Choosuk; K. Hutanuwatr; Y. Inmuong; J. Kittitornkool; B. Lambregts; B. Promphakping; T. Roachanakanan; P. Thiengburanathum; S. Siriwattanaphaiboon

    2016-01-01

    This report summarises a series of studies carried out by a multi-disciplinary team of Thai scholars. It focuses on the dynamics of urbanisation and climate change risks, and on the linkages between urbanisation, climate change and emerging patterns of urban poverty and vulnerability. It provides ne

  18. Vulnerability Assessment Tools for Complex Information Networks

    Science.gov (United States)

    2007-11-02

    Chi Ho, Avrom Pfeffer Harvard University Office of Sponsored Research 1350 Massachusetts Ave. Holyoke 727 Cambridge, MA 02138 - Vulnerability...security to allow network administrators to determine when a security problem exists; Identification of actual, possible, or potential areas of...domain; the identification and exploitation of architectural structures that facilitate security modeling testing and management decomposition; the

  19. Vulnerability of several conifers to air embolism.

    Science.gov (United States)

    Cochard, H

    1992-07-01

    Hydraulic properties of xylem in seven species of conifer were studied during late winter and early spring 1991. Vulnerability to cavitation and air embolism was investigated using hydraulic conductivity and acoustic techniques. Embolisms were induced in branches excised from mature trees by air-drying them in the laboratory. Both techniques gave comparable results indicating that they both assess the same phenomenon. Within a tree, vulnerability was related to the permeability of the xylem, the largest stems tended to cavitate before the smallest ones when water deficits developed in a branch. Interspecific comparisons showed large differences in the xylem water potential needed to induce significant embolism, values ranged from -2.5 MPa in Pinus sylvestris to -4 MPa in Cedrus atlantica, but these differences did not correlate with differences in the xylem permeability of the species. The vulnerability of a species to air embolism was found to be consistent with its ecophysiological behavior in the presence of water stress, drought-tolerant species being less vulnerable than drought-avoiding species.

  20. Vulnerability--A New View of Schizophrenia

    Science.gov (United States)

    Zubin, Joseph; Spring, Bonnie

    1977-01-01

    Although descriptive and etiological approaches to psychopathology have made notable advances, they seem to have reached a plateau. After reviewing the six approaches to etiology that now preempt the field--ecological, developmental, learning, genetic, internal environment, and neurophysiological models--a second-order model, vulnerability, is…

  1. Structural vulnerability assessment of electric power grids

    NARCIS (Netherlands)

    Koç, Y.; Warnier, M.; Kooij, R.E.; Brazier, F.

    2014-01-01

    Cascading failures are the typical reasons of blackouts in power grids. The grid topology plays an important role in determining the dynamics of cascading failures in power grids. Measures for vulnerability analysis are crucial to assure a higher level of robustness of power grids. Metrics from Comp

  2. Chemical Safety Vulnerability Working Group Report

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  3. Governing for Resilience in Vulnerable Places

    NARCIS (Netherlands)

    Trell, Elen-Maarja; Restemeyer, Britta; Bakema, Melanie; van Hoven, Bettina

    2017-01-01

    Governing for Resilience in Vulnerable Places provides an overview and a critical analysis of the ways in which the concept ‘resilience’ has been addressed in social sciences research. In doing so, this edited book draws together state of the art research from a variety of disciplines (i.e. spatial

  4. Urbanising Thailand: Implications for climate vulnerability assessment

    NARCIS (Netherlands)

    Friend, R.; Choosuk, C.; Hutanuwatr, K.; Inmuong, Y.; Kittitornkool, J.; Lambregts, B.; Promphakping, B.; Roachanakanan, T.; Thiengburanathum, P.; Siriwattanaphaiboon, S.

    2016-01-01

    This report summarises a series of studies carried out by a multi-disciplinary team of Thai scholars. It focuses on the dynamics of urbanisation and climate change risks, and on the linkages between urbanisation, climate change and emerging patterns of urban poverty and vulnerability. It provides

  5. Specific vulnerability of substantia nigra compacta neurons

    NARCIS (Netherlands)

    Smidt, M.P.; Giovanni, G.; Di Matteo, V.; Esposito, E.

    2009-01-01

    The specific loss of substantia nigra compacta (SNc) neurons in Parkinson’s disease (PD) has been the main driving force in initiating research efforts to unravel the apparent SNc-specific vulnerability. Initially, metabolic constraints due to high dopamine turnover have been the main focus in the a

  6. Analysis of computational vulnerabilities in digital repositories

    Directory of Open Access Journals (Sweden)

    Valdete Fernandes Belarmino

    2015-04-01

    Full Text Available Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilities of digital directories in public Universities. Argues the relevance of information in contemporary societies like an invaluable resource, emphasizing scientific information as an essential element to constitute scientific progress. Characterizes the emergence of Digital Repositories and highlights its use in academic environment to preserve, promote, disseminate and encourage the scientific production. Describes the main software for the construction of digital repositories. Method. The investigation identified and analyzed the vulnerabilities that are exposed the digital repositories using Penetration Testing running. Discriminating the levels of risk and the types of vulnerabilities. Results. From a sample of 30 repositories, we could examine 20, identified that: 5% of the repositories have critical vulnerabilities, 85% high, 25% medium and 100% lowers. Conclusions. Which demonstrates the necessity to adapt actions for these environments that promote informational security to minimizing the incidence of external and / or internal systems attacks.Abstract Grey Text – use bold for subheadings when needed.

  7. Seismic vulnerability assessments in risk analysis

    Science.gov (United States)

    Frolova, Nina; Larionov, Valery; Bonnin, Jean; Ugarov, Alexander

    2013-04-01

    The assessment of seismic vulnerability is a critical issue within natural and technological risk analysis. In general, there are three common types of methods used for development of vulnerability functions of different elements at risk: empirical, analytical and expert estimations. The paper addresses the empirical methods for seismic vulnerability estimation for residential buildings and industrial facilities. The results of engineering analysis of past earthquake consequences, as well as the statistical data on buildings behavior during strong earthquakes presented in the different seismic intensity scales, are used to verify the regional parameters of mathematical models in order to simulate physical and economic vulnerability for different building types classified according to seismic scale MMSK-86. Verified procedure has been used to estimate the physical and economic vulnerability of buildings and constructions against earthquakes for the Northern Caucasus Federal region of the Russian Federation and Krasnodar area, which are characterized by rather high level of seismic activity and high population density. In order to estimate expected damage states to buildings and constructions in the case of the earthquakes according to the OSR-97B (return period T=1,000 years) within big cities and towns, they were divided into unit sites and their coordinates were presented as dots located in the centers of unit sites. Then the indexes obtained for each unit site were summed up. The maps of physical vulnerability zoning for Northern Caucasus Federal region of the Russian Federation and Krasnodar area includes two elements: percent of different damage states for settlements with number of inhabitants less than 1,000 and vulnerability for cities and towns with number of inhabitants more than 1,000. The hypsometric scale is used to represent both elements on the maps. Taking into account the size of oil pipe line systems located in the highly active seismic zones in

  8. Completing Northeast Regional Vulnerability Assessment Incorporating the NatureServe Climate Change Vulnerability Index

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — NatureServe and Heritage Program collaborators have developed a Climate Change Vulnerability Index (CCVI) to provide a rapid, scientifically defensible assessment of...

  9. Vendor System Vulnerability Testing Test Plan

    Energy Technology Data Exchange (ETDEWEB)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system

  10. Groundwater vulnerability maps for pesticides for Flanders

    Science.gov (United States)

    Dams, Jef; Joris, Ingeborg; Bronders, Jan; Van Looy, Stijn; Vanden Boer, Dirk; Heuvelmans, Griet; Seuntjens, Piet

    2017-04-01

    Pesticides are increasingly being detected in shallow groundwater and and are one of the main causes of the poor chemical status of phreatic groundwater bodies in Flanders. There is a need for groundwater vulnerability maps in order to design monitoring strategies and land-use strategies for sensitive areas such as drinking water capture zones. This research focuses on the development of generic vulnerability maps for pesticides for Flanders and a tool to calculate substance-specific vulnerability maps at the scale of Flanders and at the local scale. (1) The generic vulnerability maps are constructed using an index based method in which maps of the main contributing factors in soil and saturated zone to high concentrations of pesticides in groundwater are classified and overlain. Different weights are assigned to the contributing factors according to the type of pesticide (low/high mobility, low/high persistence). Factors that are taken into account are the organic matter content and texture of soil, depth of the unsaturated zone, organic carbon and redox potential of the phreatic groundwater and thickness and conductivity of the phreatic layer. (2) Secondly a tool is developed that calculates substance-specific vulnerability maps for Flanders using a hybrid approach where a process-based leaching model GeoPEARL is combined with vulnerability indices that account for dilution in the phreatic layer. The GeoPEARL model is parameterized for Flanders in 1434 unique combinations of soil properties, climate and groundwater depth. Leaching is calculated for a 20 year period for each 50 x 50 m gridcell in Flanders. (3) At the local scale finally, a fully process-based approach is applied combining GeoPEARL leaching calculations and flowline calculations of pesticide transport in the saturated zone to define critical zones in the capture zone of a receptor such as a drinking water well or a river segment. The three approaches are explained more in detail and illustrated

  11. Modelling farm vulnerability to flooding: A step toward vulnerability mitigation policies appraisal

    Science.gov (United States)

    Brémond, P.; Abrami, G.; Blanc, C.; Grelot, F.

    2009-04-01

    Recent catastrophic flood events such as Elbe in 2002 or Rhône in 2003 have shown limits of flood management policies relying on dykes protection: worsening of flood impacts downstream, increased damage by dykes rupture. Those events, among others, contributes to radical changes on the philosophy of flood prevention, with the promotion of new orientations for mitigating flood exposition. Two new trends may have a significant impact on rural areas: floodplain restoration and vulnerability mitigation. The Rhône River program, which is an contract of objectives signed between French Government and local collectivites, is highly illustrative of these new trends and their impact on agricultural sector. In this program, it appears that areas to be concerned by floodplain restoration are agricultural ones, because their supposed vulnerability to flood is expected to be less important to urban areas. As a consequence, agricultural sector is particularly concerned by planned actions on mitigation of assets vulnerability, an important part of the program (financial support of European Union of 7.5 Million euros). Mitigation of agricultural assets vulnerability reveals particularly interesting for two following reasons. Firstly, it is a way to maintain agricultural activities in floodplains yet existing, without promoting flood protection. Secondly, in case of floodplain restoration, vulnerability mitigation is a way for local authorities to compensate over-flooding impacts. In practice, local authorities may financially support farmers for implementing measures to mitigate their farm vulnerability. On the Rhône River, an important work has already been done to identify farm vulnerability to flooding, and propose measures to mitigate it. More than 3 000 farms exposed to flood risk have been identified representing 88 690 ha of agricultural areas which is estimated to generate damage between 400 and 800 Million euros depending on the season of occurrence for a catastrophic

  12. Red Team Operations to Assess Information Technology Vulnerabilities

    NARCIS (Netherlands)

    Veltman, M.; Parker, R.L.

    1999-01-01

    All Information and Communication Technology (ICT) systems have vulnerabilities. Weaknesses in these systems are introduced either during the specification, implementation or operational phase. Leaving aside these introduced vulnerabilities are intentional or unintentional, the fact remains that the

  13. Cognitive vulnerability to depression : genetic and environmental influences

    NARCIS (Netherlands)

    Antypa, Niki

    2011-01-01

    This thesis explores cognitive vulnerability to depression and the interplay between genetic and environmental influences. Cognitive vulnerability to depression is characterized by negative patterns of information processing. One aspect is cognitive reactivity - the tendency to respond with maladapt

  14. evaluation of models for assessing groundwater vulnerability to ...

    African Journals Online (AJOL)

    DR. AMINU

    Key words: Groundwater, Vulnerability, Pollution, Nigeria. INTRODUCTION ... natural groundwater vulnerability: net recharge, soil properties, unsaturated zone ... such as dispersion, oxidation, natural attenuation, sorption etc. A low depth to ...

  15. Climate change vulnerability in Ethiopia : disaggregation of Tigray Region

    NARCIS (Netherlands)

    Gidey Gebrehiwot, T.; Gidey, T.G.; van der Veen, A.

    2013-01-01

    Climate change and variability severely affect rural livelihoods and agricultural productivity, yet they are causes of stress vulnerable rural households have to cope with. This paper investigated farming communities' vulnerability to climate change and climate variability across 34

  16. Identifying institutional vulnerability : The importance of language, and system boundaries

    NARCIS (Netherlands)

    Dolfsma, Wilfred; Finch, John; McMaster, Robert

    2011-01-01

    Taking the idea that institutional reproduction is not obvious and that institutions are vulnerable has significant conceptual implications. Institutional vulnerability can arise through communication between actors in a common language. To apprehend this requires an elaboration of John Searle's (19

  17. 77 FR 28894 - Maritime Vulnerability Self-Assessment Tool

    Science.gov (United States)

    2012-05-16

    ... SECURITY Transportation Security Administration Maritime Vulnerability Self-Assessment Tool AGENCY: Transportation Security Administration, DHS. ACTION: Notice of removal of TSA's maritime vulnerability self... Self-Assessment Risk Module (TMSARM), developed to support the United States Coast Guard's...

  18. Identifying institutional vulnerability : The importance of language, and system boundaries

    NARCIS (Netherlands)

    Dolfsma, Wilfred; Finch, John; McMaster, Robert

    2011-01-01

    Taking the idea that institutional reproduction is not obvious and that institutions are vulnerable has significant conceptual implications. Institutional vulnerability can arise through communication between actors in a common language. To apprehend this requires an elaboration of John Searle's

  19. Psychological Vulnerability to Completed Suicide: A Review of Empirical Studies.

    Science.gov (United States)

    Conner, Kenneth R.; Duberstein, Paul R.; Conwell, Yeates; Seidlitz, Larry; Caine, Eric D.

    2001-01-01

    This article reviews empirical literature on psychological vulnerability to completed suicide. Five constructs have been consistently associated with completed suicide: impulsivity/aggression; depression; anxiety; hopelessness; and self-consciousness/social disengagement. Current knowledge of psychological vulnerability could inform social…

  20. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    Science.gov (United States)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  1. Urban Vulnerability and Climate Change in Africa

    DEFF Research Database (Denmark)

    Jørgensen, Gertrud

    Urbanisation and climate change are among the major challenges for sustainable development in Africa. The overall aim of this book is to present innovative approaches to vulnerability analysis and for enhancing the resilience of African cities against climate change-induced risks. Locally adapted...... IPCC climate change scenarios, which also consider possible changes in urban population, have been developed. Innovative strategies to land use and spatial planning are proposed that seek synergies between the adaptation to climate change and the need to solve social problems. Furthermore, the book...... explores the role of governance in successfully coping with climate-induced risks in urban areas. The book is unique in that it combines: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences...

  2. Vulnerability, diversity and scarcity: on universal rights.

    Science.gov (United States)

    Turner, Bryan Stanley; Dumas, Alex

    2013-11-01

    This article makes a contribution to the on-going debates about universalism and cultural relativism from the perspective of sociology. We argue that bioethics has a universal range because it relates to three shared human characteristics,--human vulnerability, institutional precariousness and scarcity of resources. These three components of our argument provide support for a related notion of 'weak foundationalism' that emphasizes the universality and interrelatedness of human experience, rather than their cultural differences. After presenting a theoretical position on vulnerability and human rights, we draw on recent criticism of this approach in order to paint a more nuanced picture. We conclude that the dichotomy between universalism and cultural relativism has some conceptual merit, but it also has obvious limitations when we consider the political economy of health and its impact on social inequality.

  3. The Mental Vulnerability Questionnaire: a psychometric evaluation

    DEFF Research Database (Denmark)

    Eplov, Lene Falgaard; Petersen, Janne; Jørgensen, Torben

    2010-01-01

    The Mental Vulnerability Questionnaire was originally a 22 item scale, later reduced to a 12 item scale. In population studies the 12 item scale has been a significant predictor of health and illness. The scale has not been psychometrically evaluated for more than 30 years, and the aim of the pre......The Mental Vulnerability Questionnaire was originally a 22 item scale, later reduced to a 12 item scale. In population studies the 12 item scale has been a significant predictor of health and illness. The scale has not been psychometrically evaluated for more than 30 years, and the aim...... of the present study was both to evaluate the psychometric properties of the 22 and 12 item scales and of three new scales. The main study sample was a community sample comprising more than 6,000 men and women. In this sample the coefficients of homogeneity were all over 0.30 for the three new scales, but below...

  4. Noninvasive diagnosis of vulnerable coronary plaque

    Science.gov (United States)

    Pozo, Eduardo; Agudo-Quilez, Pilar; Rojas-González, Antonio; Alvarado, Teresa; Olivera, María José; Jiménez-Borreguero, Luis Jesús; Alfonso, Fernando

    2016-01-01

    Myocardial infarction and sudden cardiac death are frequently the first manifestation of coronary artery disease. For this reason, screening of asymptomatic coronary atherosclerosis has become an attractive field of research in cardiovascular medicine. Necropsy studies have described histopathological changes associated with the development of acute coronary events. In this regard, thin-cap fibroatheroma has been identified as the main vulnerable coronary plaque feature. Hence, many imaging techniques, such as coronary computed tomography, cardiac magnetic resonance or positron emission tomography, have tried to detect noninvasively these histomorphological characteristics with different approaches. In this article, we review the role of these diagnostic tools in the detection of vulnerable coronary plaque with particular interest in their advantages and limitations as well as the clinical implications of the derived findings. PMID:27721935

  5. Urban Vulnerability and Climate Change in Africa

    DEFF Research Database (Denmark)

    Urbanisation and climate change are among the major challenges for sustainable development in Africa. The overall aim of this book is to present innovative approaches to vulnerability analysis and for enhancing the resilience of African cities against climate change-induced risks. Locally adapted...... explores the role of governance in successfully coping with climate-induced risks in urban areas. The book is unique in that it combines: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences...... IPCC climate change scenarios, which also consider possible changes in urban population, have been developed. Innovative strategies to land use and spatial planning are proposed that seek synergies between the adaptation to climate change and the need to solve social problems. Furthermore, the book...

  6. [The Helsinki Declaration: relativism and vulnerability].

    Science.gov (United States)

    Diniz, D; Corrêa, M

    2001-01-01

    The Helsinki Declaration is a crucial ethical landmark for clinical research involving human beings. Since the Declaration was issued, a series of revisions and modifications have been introduced into the original text, but they have not altered its humanist approach or its international force for regulating clinical research. A proposal for an extensive revision of the Declaration's underlying ethical principles has been debated for the past four years. If the proposal is approved, international clinical research involving human beings will be modified, further increasing the vulnerability of certain social groups. This article discusses the historical process involved in passing the Helsinki Declaration and the most recent debate on the new draft. The article analyzes the new text's social implications for underdeveloped countries, arguing for a political approach to the vulnerability concept.

  7. Resilience and Vulnerability: Complementary or Conflicting Concepts?

    Directory of Open Access Journals (Sweden)

    Tom Downing

    2010-09-01

    Full Text Available Resilience and vulnerability represent two related yet different approaches to understanding the response of systems and actors to change; to shocks and surprises, as well as slow creeping changes. Their respective origins in ecological and social theory largely explain the continuing differences in approach to social-ecological dimensions of change. However, there are many areas of strong convergence. This paper explores the emerging linkages and complementarities between the concepts of resilience and vulnerability to identify areas of synergy. We do this with regard to theory, methodology, and application. The paper seeks to go beyond just recognizing the complementarities between the two approaches to demonstrate how researchers are actively engaging with each field to coproduce new knowledge, and to suggest promising areas of complementarity that are likely to further research and action in the field.

  8. Techniques for Finding Vulnerabilities in Web Applications

    Directory of Open Access Journals (Sweden)

    Mihai Sandulescu

    2014-03-01

    Full Text Available The current trend is to move everything on the Internet. Because a lot of companies store sensitive user information, security has become mandatory. Usually, software developers don’t follow some basic practices in order to secure their applications. This paper will present in the second chapter, the white-box, black-box and gray-box methods which can be used in order to test applications for possible vulnerabilities. It focuses on fuzz testing, which is a black-box testing method, presented in the third chapter. The fourth chapter presents the stages of a fuzzing test and in the final chapter, we show a basic practical example on how to use the Burp Suite[8] fuzzer to find a vulnerability.

  9. Urban Vulnerability and Climate Change in Africa

    DEFF Research Database (Denmark)

    Urbanisation and climate change are among the major challenges for sustainable development in Africa. The overall aim of this book is to present innovative approaches to vulnerability analysis and for enhancing the resilience of African cities against climate change-induced risks. Locally adapted...... IPCC climate change scenarios, which also consider possible changes in urban population, have been developed. Innovative strategies to land use and spatial planning are proposed that seek synergies between the adaptation to climate change and the need to solve social problems. Furthermore, the book...... explores the role of governance in successfully coping with climate-induced risks in urban areas. The book is unique in that it combines: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences...

  10. Terminological Ontologies for Risk and Vulnerability Analysis

    DEFF Research Database (Denmark)

    Madsen, Bodil Nistrup; Erdman Thomsen, Hanne

    2014-01-01

    Risk and vulnerability analyses are an important preliminary stage in civil contingency planning. The Danish Emergency Management Agency has developed a generic model and a set of tools that may be used in the preparedness planning, i.e. for identifying and describing society’s critical functions......, for formulating threat scenarios and for assessing consequences. Terminological ontologies, which are systems of domain specific concepts comprising concept relations and characteristics, are useful, both when describing the central concepts of risk and vulnerability analysis (meta concepts), and for further...... structuring and enriching the taxonomies of society’s critical functions and threats, which form an important part of the model. Creating terminological ontologies is a time consuming work, and therefore there is a need for automatic tools for extraction of terms, concept relations and characteristics...

  11. Mental vulnerability as a risk factor for depression

    DEFF Research Database (Denmark)

    Østergaard, Ditte; Dalton, Susanne Oksbjerg; Bidstrup, Pernille Envold;

    2012-01-01

    Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression.......Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression....

  12. Supply Chain Vulnerability in the automotive industry

    OpenAIRE

    Xanthopoulos, Panagiotis; Pejicic, Jerko

    2015-01-01

    Purpose: The purpose of this research study is the empirical analysis of theelements affecting supply chain vulnerability with a focus on theautomotive industry. Methodology: This research is based on a deductive approach. In order to fulfilthe purpose of the study, the authors stated three hypotheseswhich were tested with help of quantitative data. Moreover, thesurvey strategy was used while using questioning in order to gatherinformation from subjects. With the help of a web-based questionn...

  13. Current status of vulnerable plaque detection.

    LENUS (Irish Health Repository)

    Sharif, Faisal

    2012-02-01

    Critical coronary stenoses have been shown to contribute to only a minority of acute coronary syndromes (ACS) and sudden cardiac death. Autopsy studies have identified a subgroup of high-risk patients with disrupted vulnerable plaque and modest stenosis. Consequently, a clinical need exists to develop methods to identify these plaques prospectively before disruption and clinical expression of disease. Recent advances in invasive and noninvasive imaging techniques have shown the potential to identify these high-risk plaques. The anatomical characteristics of the vulnerable plaque such as thin cap fibroatheroma and lipid pool can be identified with angioscopy, high frequency intravascular ultrasound, intravascular MRI, and optical coherence tomography. Efforts have also been made to recognize active inflammation in high-risk plaques using intravascular thermography. Plaque chemical composition by measuring electromagnetic radiation using spectroscopy is also an emerging technology to detect vulnerable plaques. Noninvasive imaging with MRI, CT, and PET also holds the potential to differentiate between low and high-risk plaques. However, at present none of these imaging modalities are able to detect vulnerable plaque neither has been shown to definitively predict outcome. Nevertheless in contrast, there has been a parallel development in the physiological assessment of advanced atherosclerotic coronary artery disease. Thus recent trials using fractional flow reserve in patients with modest non flow-limiting stenoses have shown that deferral of PCI with optimal medical therapy in these patients is superior to coronary intervention. Further trials are needed to provide more information regarding the natural history of high-risk but non flow-limiting plaque to establish patient-specific targeted therapy and to refine plaque stabilizing strategies in the future.

  14. Commercial Air Carrier Vulnerabilities to Information Operations

    Science.gov (United States)

    2007-11-02

    GMO /ENS/02E-11 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio...AFIT/ GMO /ENS/02E-11 COMMERCIAL AIR CARRIER VULNERABILITIES TO INFORMATION OPERATIONS...networks that without them, “there is no water coming out of your tap; there is no electricity lighting your room; there is no food being transported to

  15. An Empirical Measure of Computer Security Strength for Vulnerability Remediation

    Science.gov (United States)

    Villegas, Rafael

    2010-01-01

    Remediating all vulnerabilities on computer systems in a timely and cost effective manner is difficult given that the window of time between the announcement of a new vulnerability and an automated attack has decreased. Hence, organizations need to prioritize the vulnerability remediation process on their computer systems. The goal of this…

  16. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...

  17. Spatial variation of vulnerability in geographic areas of North Lebanon

    NARCIS (Netherlands)

    Issa, Sahar; van der Molen, Peterdina; Nader, M.R.; Lovett, Jonathan Cranidge

    2014-01-01

    This paper examines the spatial variation in vulnerability between different geographical areas of the northern coastal region of Lebanon within the context of armed conflict. The study is based on the ‘vulnerability of space’ approach and will be positioned in the academic debate on vulnerability

  18. Web Vulnerability Scanner (WVS: A Tool for detecting Web Application Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Shivam Swarup

    2014-03-01

    Full Text Available Abstract: In recent years, internet applications have became enormously well-liked, and today they're habitually employed in security-critical environments, like medical, financial, and military systems. Because the use of internet applications has increased, the amount and class of attacks against these applications have also matured. Moreover, the research community primarily targeted on detecting vulnerabilities, which results from insecure information flow in internet applications like cross-site scripting and SQL injection have also increased. Injection Attacks exploit vulnerabilities of websites by inserting and executing malicious code (e.g., information query, JavaScript functions in unsuspecting users, computing surroundings or on a web server. Such attacks compromise user’s information, system resources and cause a significant threat to private and business assets. We tend to investigate and develop a tool Web Vulnerability Scanner (WVS which queries the vulnerable fragments of applications (written in query and application languages and are then identified and analyzed offline (statically. Results show the effectiveness of our Tool, compared to the present ones in dimensions alike, it has been observed that vulnerabilities go undetected once the existing ways of area unit used; it makes offline analysis of applications time efficient; and finally, it reduces the runtime observation overhead.

  19. Dynamic Assessment on Ecosystem Vulnerability in Dashanbao Wetland

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    [Objective] The aim was to assess the ecosystem vulnerability of Dashanbao wetland.[Method] The evaluation index system of ecosystem vulnerability of Dashanbao wetland was constructed by using analytic hierarchy process(AHP),and the ecosystem vulnerability of Dashanbao wetland from 2002 to 2008 was assessed based on vulnerable degree of ecosystem.[Result] The vulnerable degree of ecosystem of Dashanbao wetland from 2002 to 2008 was 0.560 0,0.513 7,0.516 4,0.465 4,0.476 0,0.449 2 and 0.400 6 respectively,tha...

  20. Vulnerability of Coastal Communities from Storm Surge and Flood Disasters.

    Science.gov (United States)

    Bathi, Jejal Reddy; Das, Himangshu S

    2016-02-19

    Disasters in the form of coastal storms and hurricanes can be very destructive. Preparing for anticipated effects of such disasters can help reduce the public health and economic burden. Identifying vulnerable population groups can help prioritize resources for the most needed communities. This paper presents a quantitative framework for vulnerability measurement that incorporates both socioeconomic and flood inundation vulnerability. The approach is demonstrated for three coastal communities in Mississippi with census tracts being the study unit. The vulnerability results are illustrated as thematic maps for easy usage by planners and emergency responders to assist in prioritizing their actions to vulnerable populations during storm surge and flood disasters.

  1. Unified Approach to Vulnerability Analysis of Web Applications

    Science.gov (United States)

    Le, H. T.; Loh, P. K. K.

    2008-11-01

    Web vulnerabilities in web-based applications may be detected, classified and documented. Several Web scanners exist for vulnerabilities in Web applications implemented via different technologies. However, none of them provides the technology-independent, generic coverage of possible vulnerabilities. In this project that is funded by Mindef Singapore, we propose a new approach for Web application security and vulnerability analysis. The design addresses the categorization of scanner results with a generic data model and the design of a language-independent rule-based engine that detects, analyses and reports suspected vulnerabilities in web-based applications.

  2. Vulnerability of Forests in India: A National Scale Assessment

    Science.gov (United States)

    Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N. H.

    2017-09-01

    Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.

  3. Karst morphology and groundwater vulnerability of high alpine karst plateaus

    Science.gov (United States)

    Plan, Lukas; Decker, Kurt; Faber, Robert; Wagreich, Michael; Grasemann, Bernhard

    2009-07-01

    High alpine karst plateaus are recharge areas for major drinking water resources in the Alps and many other regions. Well-established methods for the vulnerability mapping of groundwater to contamination have not been applied to such areas yet. The paper characterises this karst type and shows that two common vulnerability assessment methods (COP and PI) classify most of the areas with high vulnerability classes. In the test site on the Hochschwab plateau (Northern Calcareous Alps, Austria), overlying layers are mostly absent, not protective or even enhance point recharge, where they have aquiclude character. The COP method classifies 82% of the area as highly or extremely vulnerable. The resulting maps are reasonable, but do not differentiate vulnerabilities to the extent that the results can be used for protective measures. An extension for the upper end of the vulnerability scale is presented that allows identifying ultra vulnerable areas. The proposed enhancement of the conventional approach points out that infiltration conditions are of key importance for vulnerability. The method accounts for karst genetical and hydrologic processes using qualitative and quantitative properties of karst depressions and sinking streams including parameters calculated from digital elevations models. The method is tested on the Hochschwab plateau where 1.7% of the area is delineated as ultra vulnerable. This differentiation could not be reached by the COP and PI methods. The resulting vulnerability map highlights spots of maximum vulnerability and the combination with a hazard map enables protective measures for a manageable area and number of sites.

  4. Cultural knowledge and local vulnerability in African American communities

    Science.gov (United States)

    Miller Hesed, Christine D.; Paolisso, Michael

    2015-07-01

    Policymakers need to know what factors are most important in determining local vulnerability to facilitate effective adaptation to climate change. Quantitative vulnerability indices are helpful in this endeavour but are limited in their ability to capture subtle yet important aspects of vulnerability such as social networks, knowledge and access to resources. Working with three African American communities on Maryland’s Eastern Shore, we systematically elicit local cultural knowledge on climate change and connect it with a scientific vulnerability framework. The results of this study show that: a given social-ecological factor can substantially differ in the way in which it affects local vulnerability, even among communities with similar demographics and climate-related risks; and social and political isolation inhibits access to sources of adaptive capacity, thereby exacerbating local vulnerability. These results show that employing methods for analysing cultural knowledge can yield new insights to complement those generated by quantitative vulnerability indices.

  5. Aren't we all vulnerable: why do vulnerability analysis?

    Energy Technology Data Exchange (ETDEWEB)

    Moench, Marcus

    2011-11-15

    The idea of 'vulnerability' is widely-used shorthand for the disproportionate impacts that climate change will have on high-risk groups and fragile ecosystems. Decision makers increasingly want to target adaptation funding to those people and environments most affected by climate change. They must also be able to monitor the effectiveness of their investments. Vulnerability analysis is sometimes presented as the solution to these wants and needs — but existing approaches are often of little use: at best, they reiterate what we already know; at worst, they are used to justify entrenched agendas. To be truly useful as a basis for dialogue, action and accountability, the meaning of 'vulnerability' must be clarified and the methods for analysing it greatly strengthened. This means establishing standard, replicable approaches that differentiate between the roles and exposure of stakeholders, systems and institutions.

  6. Integrated flash flood vulnerability assessment: Insights from East Attica, Greece

    Science.gov (United States)

    Karagiorgos, Konstantinos; Thaler, Thomas; Heiser, Micha; Hübl, Johannes; Fuchs, Sven

    2016-10-01

    In the framework of flood risk assessment, vulnerability is a key concept to assess the susceptibility of elements at risk. Besides the increasing amount of studies on flash floods available, in-depth information on vulnerability in Mediterranean countries was missing so far. Moreover, current approaches in vulnerability research are driven by a divide between social scientists who tend to view vulnerability as representing a set of socio-economic factors, and natural scientists who view vulnerability in terms of the degree of loss to an element at risk. Further, vulnerability studies in response to flash flood processes are rarely answered in the literature. In order to close this gap, this paper implemented an integrated vulnerability approach focusing on residential buildings exposed to flash floods in Greece. In general, both physical and social vulnerability was comparable low, which is interpreted as a result from (a) specific building regulations in Greece as well as general design principles leading to less structural susceptibility of elements at risk exposed, and (b) relatively low economic losses leading to less social vulnerability of citizens exposed. The population show high risk awareness and coping capacity to response to natural hazards event and in the same time the impact of the events are quite low, because of the already high use of local protection measures. The low vulnerability score for East Attica can be attributed especially to the low physical vulnerability and the moderate socio-economic well-being of the area. The consequence is to focus risk management strategies mainly in the reduction of the social vulnerability. By analysing both physical and social vulnerability an attempt was made to bridge the gap between scholars from sciences and humanities, and to integrate the results of the analysis into the broader vulnerability context.

  7. 通用Web漏洞库%Common Web Vulnerability Database

    Institute of Scientific and Technical Information of China (English)

    张昊星; 孙应飞

    2013-01-01

    Based on the research of Web vulnerability database and the situation of vulnerability database construction at home and aboard, the paper designed and implemented a vulnerability database focused on Web vulnerabilities. In consideration of both the features of Web vulnerability and the differences with traditional vulnerability, the paper designed the Web vulnerability database description model, enriched the ways of Web vulnerability collection, redefined the Web vulnerability scoring attributes and added the Web vulnerability reproduce function. The Web vulnerability database guarantees the comprehensive collection of Web vulnerability information and the standard release of Web vulnerability information, helps analyze the Web vulnerability information and data better, and provides a powerful technical support to Web security.%本文研究了国内外Web漏洞库及建设的现状,设计并实现了一个专注于Web漏洞发布的Web漏洞数据库。文中兼顾了Web漏洞的固有特点及其与传统漏洞的属性差别,设计了Web漏洞库描述模型,丰富了Web漏洞的收集方法,定义了Web漏洞的漏洞评价属性标准,并在Web漏洞库中添加了Web漏洞重现模块。我们所设计的Web漏洞库确保了全面的Web漏洞信息收集和Web漏洞信息发布的标准化,可更好地对Web漏洞信息和数据进行分析研究,也为Web安全提供了有力的技术支撑。

  8. Extending Vulnerability Assessment to Include Life Stages Considerations

    Science.gov (United States)

    Hodgson, Emma E.; Essington, Timothy E.; Kaplan, Isaac C.

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill–Euphausia pacifica and Thysanoessa spinifera, pteropod–Limacina helicina, pink shrimp–Pandalus jordani, Dungeness crab–Metacarcinus magister and Pacific hake–Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species’ vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate. PMID:27416031

  9. Extending Vulnerability Assessment to Include Life Stages Considerations.

    Directory of Open Access Journals (Sweden)

    Emma E Hodgson

    Full Text Available Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1 the maximum stage vulnerability and (2 a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate.

  10. Aquifer Vulnerability maps and climate change

    Science.gov (United States)

    Ducci, Daniela; Sellerino, Mariangela

    2017-04-01

    The aquifer vulnerability maps to contamination are used worldwide by environmental agencies and water-resource managers with the aim of preserving the water resources and of evaluating the most suitable areas where to locate new settlements. In the parametric methods, more used to assess the groundwater contamination vulnerability, e.g. the DRASTIC and the AVI methods, an important role is played by the protective capacity of cover layers to the introduction and transport of contaminants into the aquifer. Therefore, these methods point out the importance of the "Depth to water" parameter, which represents, where the aquifer is unconfined, the depth of the piezometric level and, where the aquifer is confined, the top of the aquifer. This parameter is rarely variable in confined aquifers and in deep unconfined aquifers, as karst aquifers, where the piezometric oscillations are low, compared with the depth of the water table. On the contrary, in shallow aquifers of flat areas, where in addition a large number of human activities are practiced and the contamination risk is high, the piezometric level varies suddenly with the rainfall, and it is very sensitive to drought periods and climatic changes. This affects noticeably the "Depth to water" parameter and consequently the vulnerability maps (e.g. 3 m of piezometric lowering can produce a change in the DRASTIC index from 10 to 7…). To validate this hypothesis, the DRASTC and AVI methods have been applied on a shallow aquifer located in a flat area in Campania (Italy,) considering data corresponding to an average rainfall period and to a drought period.

  11. Mechanical model of vulnerable atherosclerotic plaque rupture

    Institute of Scientific and Technical Information of China (English)

    SU; Haijun; ZHANG; Mei; ZHANG; Yun

    2004-01-01

    Rupture of atherosclerotic plaque is the main trigger of acute cardiovascular events, but the mechanism of plaque rupture is still unknown. We have constructed a model describing the motion of the fibrous cap of the plaque using the theory of elastic mechanics and studied the stability of the plaque theoretically. It has shown that plaque rupture is the result of a dynamic interplay between factors intrinsic to the plaque itself and extrinsic factors. We have proposed a new mechanism of plaque rupture, given a new explanation about the nonlinear dynamic progress of atherosclerosis and suggested a method to identify the vulnerable plaques to manage atherosclerosis.

  12. Ruptures of vulnerability: Linda Stein's Knight Series.

    Science.gov (United States)

    Bible, Ann Vollmann

    2010-01-01

    Drawing on the work of Monique Wittig, this article understands Linda Stein's Knight Series as a lacunary writing communicating both her challenges to come to representation and her creative registration of subjectivity. The argument is grounded in an exploration of the rich interplay of power and vulnerability across the series as against the discourse of escapist fashion. Specifically, Stein's critical contradictions of inside and outside, conflated temporality, disjunctions between decoration and abstraction, and fluidity of sex and gender are examined. The discussion is elaborated through consideration of the work of Julia Kristeva, Elizabeth Grosz, and Hayao Miyazaki.

  13. Evaluating operating system vulnerability to memory errors.

    Energy Technology Data Exchange (ETDEWEB)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  14. Framework for Vulnerability Assessment of Coastal Infrastructure

    Science.gov (United States)

    Obrien, P. S.; Moritz, H. R.; White, K. D.

    2015-12-01

    Coastal infrastructure can be highly vulnerable to changing climate, including increasing sea levels and altered frequency and intensity of coastal storms. Existing coastal infrastructure may be of a sufficient age that it is already experiencing noticeable impacts from global sea level rise, and require a variety of potential preparedness and resilience measures to adapt to changing climate. Methods to determine vulnerability to changing sea level and support planning of potential future adaptation measures are needed for application to projects having multiple purposes (e.g., navigation, coastal risk reduction). Here we describe a potential framework for assessing projects with several components typical of existing coastal infrastructure spanning a range of engineering disciplines (e.g., hydrology, geotechnical, structural, electrical, and mechanical). The US Army Corps of Engineers (USACE) Climate Preparedness and Resilience Register (CPRR) framework is currently under development. It takes a tiered approach as described in earlier USACE guidance (Engineer Technical Letter 1100-2-1) using the three scenarios prescribed by Engineer Regulation ER 1100-2-8162. Level 1 is a qualitative assessment defining the major sea level change-related impacts and ranks them in order of soonest occurrence. Level 2 is a quantitative evaluation that analyzes current and future performance of individual project components, including electrical, mechanical and structural components and functions using the sea level change scenarios prescribed by ER 1100-2-8162. Level 3 proposes adaptation measures per ETL 1100-2-1 and evaluates changes in sea level change-related impacts.

  15. Contract gangs: race, gender and vulnerability

    Directory of Open Access Journals (Sweden)

    Heather Goodall

    2015-12-01

    Full Text Available While violence directed at Indian students in Australian cities has been highlighted in the Indian and Australian press, far less attention has been paid to the violence directed at Indians in rural areas. This has most often involved Indians employed in contract labour in seasonal industries like fruit or vegetable picking. This article reviews various media accounts, both urban and rural, of violence directed at Indians from 2009 to 2012. It draws attention to the far longer history of labour exploitation which has taken place in rural and urban Australia in contract labour conditions and the particular invisibility of rural settings for such violence. Racial minorities, like Aboriginal and Chinese workers, and women in agriculture and domestic work, have seldom had adequate power to respond industrially or politically. This means that in the past, these groups been particularly vulnerable to such structural exploitation. The paper concludes by calling for greater attention not only to the particular vulnerability of Indians in rural settings but to the wider presence of racialised and gendered exploitation enabled by contract labour structures.

  16. [Neuroethics and Human Vulnerability in Philosophical Perspective].

    Science.gov (United States)

    Marcos, Alfredo

    2015-01-01

    This article tries to assess the potentials and limits of neuroethics. It argues that neuroscience and ethics should collaborate each other with mutual respect and preservation of their respective identities, scientific in the first case and philosophical in the second one ( neuroethics as cooperation). The text develops also a criticism in front of any attempt to replace the philosophical ethics by the neurosciences ( neuroethics as substitution). Consequently, the most appropriate ontological and anthropological foundations are explored to develop a cooperative neuroethics. These foundations refer to the Aristotelian hylomorphic conception of the substances. On such foundations it is possible to develop a collaborative neuroethics which includes two aspects: on the one hand, we have an ethics of neuroscience and, on the other one, a neuroscience of ethics. The first one shows us how to conduct neuroscience while preserving human dignity. The second one teaches us about the neurobiological basis of our moral agency. These bases enable our moral behavior without determining it. By studying them our vulnerability as moral agents emerges as evidence. This vulnerability, which is rooted in the very human nature, must be, as it is argued along the last pages of the text, recognized as well as mitigated.

  17. The assessment of radio vulnerability in agroecosystems

    Energy Technology Data Exchange (ETDEWEB)

    Wasserman, Maria Angelica; Viana, Aline G.; Conti, Claudio C.; Rochedo, Elaine R.; Vivone, Ronaldo J. [Instituto de Radioprotecao e Dosimetria (IRD), Rio de Janeiro, RJ (Brazil)]. E-mail: angelica@ird.gov.br; Bartoly, Flavia; Perez, Daniel V. [Empresa Brasileira de Pesquisa Agropecuaria, Rio de Janeiro, RJ (Brazil). Centro Nacional de Pesquisa de Solos

    2005-07-01

    A soil specific sequential extraction protocol, associated to soil to plant transfer factors (TF) data is proposed in this work as a methodology able to detect vulnerability of agro-ecosystems to the contamination with {sup 137}Cs and {sup 90}Sr. The objective is to provide parameters for environmental assessment models and to optimize emergency response planning for the main Brazilian agro-ecosystems and to other Countries with similar soil conditions. Transfer factor values were determined for reference plants, cultivated in Ferralsol, Nitisol and Acrisol that constitute great part in the national agricultural soil. The preliminary results of geochemical partition for these radionuclides were coherent with soil to plant transfer factors (TF) data. And with some soil properties recognized by the specialized literature as related with mechanisms of sorption to Cs (e.g. exchangeable K, organic matter and iron oxides content) and Sr (e.g. exchangeable Ca). Nitisol, showed lower TF for {sup 90}Sr and {sup 137}Cs compared with the other studied soil. In the Nitisol, it is possible that reduction in {sup 137}Cs transfer be also associated with fixation in the internal faces of 2:1 clay mineral type. The integration of experimental methods results obtained in the laboratory with results obtained in field experiments seems to confirm the vulnerability of some Brazilian soil to the radioactivity contamination. (author)0.

  18. Addressing the vulnerabilities of pass-thoughts

    Science.gov (United States)

    Fernandez, Gabriel C.; Danko, Amanda S.

    2016-05-01

    As biometrics become increasingly pervasive, consumer electronics are reaping the benefits of improved authentication methods. Leveraging the physical characteristics of a user reduces the burden of setting and remembering complex passwords, while enabling stronger security. Multi-factor systems lend further credence to this model, increasing security via multiple passive data points. In recent years, brainwaves have been shown to be another feasible source for biometric authentication. Physically unique to an individual in certain circumstances, the signals can also be changed by the user at will, making them more robust than static physical characteristics. No paradigm is impervious however, and even well-established medical technologies have deficiencies. In this work, a system for biometric authentication via brainwaves is constructed with electroencephalography (EEG). The efficacy of EEG biometrics via existing consumer electronics is evaluated, and vulnerabilities of such a system are enumerated. Impersonation attacks are performed to expose the extent to which the system is vulnerable. Finally, a multimodal system combining EEG with additional factors is recommended and outlined.

  19. Vulnerabilities to misinformation in online pharmaceutical marketing.

    Science.gov (United States)

    De Freitas, Julian; Falls, Brian A; Haque, Omar S; Bursztajn, Harold J

    2013-05-01

    Given the large percentage of Internet users who search for health information online, pharmaceutical companies have invested significantly in online marketing of their products. Although online pharmaceutical marketing can potentially benefit both physicians and patients, it can also harm these groups by misleading them. Indeed, some pharmaceutical companies have been guilty of undue influence, which has threatened public health and trust. We conducted a review of the available literature on online pharmaceutical marketing, undue influence and the psychology of decision-making, in order to identify factors that contribute to Internet users' vulnerability to online pharmaceutical misinformation. We find five converging factors: Internet dependence, excessive trust in the veracity of online information, unawareness of pharmaceutical company influence, social isolation and detail fixation. As the Internet continues to change, it is important that regulators keep in mind not only misinformation that surrounds new web technologies and their contents, but also the factors that make Internet users vulnerable to misinformation in the first place. Psychological components are a critical, although often neglected, risk factor for Internet users becoming misinformed upon exposure to online pharmaceutical marketing. Awareness of these psychological factors may help Internet users attentively and safely navigate an evolving web terrain.

  20. Mapping of earthquakes vulnerability area in Papua

    Science.gov (United States)

    Muhammad Fawzy Ismullah, M.; Massinai, Muh. Altin

    2016-05-01

    Geohazard is a geological occurrence which may lead to a huge loss for human. A mitigation of these natural disasters is one important thing to be done properly in order to reduce the risks. One of the natural disasters that frequently occurs in the Papua Province is the earthquake. This study applies the principle of Geospatial and its application for mapping the earthquake-prone area in the Papua region. It uses earthquake data, which is recorded for 36 years (1973-2009), fault location map, and ground acceleration map of the area. The earthquakes and fault map are rearranged into an earthquake density map, as well as an earthquake depth density map and fault density map. The overlaid data of these three maps onto ground acceleration map are then (compiled) to obtain an earthquake unit map. Some districts area, such as Sarmi, Nabire, and Dogiyai, are identified by a high vulnerability index. In the other hand, Waropen, Puncak, Merauke, Asmat, Mappi, and Bouven Digoel area shows lower index. Finally, the vulnerability index in other places is detected as moderate.

  1. Regionalisation of global insights into dryland vulnerability: Better reflecting smallholders' vulnerability in Northeast Brazil

    NARCIS (Netherlands)

    Sietz, D.

    2014-01-01

    Global analyses of vulnerability reveal generic insights into the relation between socio-ecological systems and the stress impacting upon them including climate and market variability. They thus provide a valuable basis for better understanding and comparing the evolution of socio-ecological systems

  2. Regionalisation of global insights into dryland vulnerability: Better reflecting smallholders' vulnerability in Northeast Brazil

    NARCIS (Netherlands)

    Sietz, D.

    2014-01-01

    Global analyses of vulnerability reveal generic insights into the relation between socio-ecological systems and the stress impacting upon them including climate and market variability. They thus provide a valuable basis for better understanding and comparing the evolution of socio-ecological systems

  3. Vulnerability of housing buildings in Bucharest, Romania

    Science.gov (United States)

    Bostenaru, M.

    2009-04-01

    The author participates to the World Housing Encyclopedia project (www.world-housing.net), an internet based database of housing buildings in earthquake prone areas of the world. This is a voluntary project run by the Earthquake Engineering Research Institute, Oakland, California and the International Association of Earthquake Engineering, financial means being available only for the website where the information is shared. For broader dissemination in 2004 a summary publication of the reports to date was published. The database can be querried for various parameters and browsed after geographic distribution. Participation is open to any housing experts. Between 2003 and 2006 the author was also member of the editorial board. The author contributed numerous reports about building types in Romania, and each one about building types in Germany and Switzerland. This presentation will be about the contributed reports on building types in Romania. To the Encyclopedia eight reports on building types from Bucharest were contributed, while in further research of the author one more was similarly described regarding the vulnerability and the seismic retrofit. The selection of these types was done considering the historic development of the built substance in Bucharest from 1850 on, time from which a representative amount of housing buildings which can be classified in typologies can be found in Bucharest. While the structural types are not necessarily characteristic for the style, since the style has other time limits, often appearing before the type became common and then remaining being practiced also after another style gained ground, a historic succession can be seen also in this case. The nine types considered can be grouped in seven time categories: - the time 1850-1880, for a vernacular housing type with masonry load bearing walls and timber floors, - the time 1880-1920, for the type of two storey or multi-storey house with masonry walls and timber floors (in which

  4. Susceptibility to mountain hazards in Austria - paradigms of vulnerability revisited

    Science.gov (United States)

    Fuchs, Sven

    2010-05-01

    The concept of vulnerability is pillared by multiple disciplinary theories underpinning either a technical or a social origin of the concept and resulting in a range of paradigms for either a qualitative or quantitative assessment of vulnerability. However, efforts to reduce susceptibility to hazards and to create disaster-resilient communities require intersections among these theories, since human activity cannot be seen independently from the environmental setting. Acknowledging different roots of disciplinary paradigms, issues determining structural, economic, institutional and social vulnerability are discussed with respect to mountain hazards in Austria. The underlying idea of taking such an integrative viewpoint was the cognition that human action in mountain environments affects the state of vulnerability, and the state of vulnerability in turn shapes the possibilities of human action. It is argued that structural vulnerability as originator results in considerable economic vulnerability, generated by the institutional settings of dealing with natural hazards and shaped by the overall societal framework. Hence, the vulnerability of a specific location and within a considered point of time is triggered by the hazardous event and the related physical susceptibility of structures, such as buildings located on a torrent fan. Depending on the specific institutional settings, economic vulnerability of individuals or of the society results, above all with respect to imperfect loss compensation mechanisms in the areas under investigation. While this potential for harm can be addressed as social vulnerability, the concept of institutional vulnerability has been developed with respect to the overall political settings of governmental risk management. As a result, the concept of vulnerability, as being used in natural sciences, can be extended by integration of possible reasons why such physical susceptibility of structures exists, and by integration of compensation

  5. Social vulnerability assessment: a growing practice in Europe?

    Science.gov (United States)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of

  6. Benchmark analysis for quantifying urban vulnerability to terrorist incidents.

    Science.gov (United States)

    Piegorsch, Walter W; Cutter, Susan L; Hardisty, Frank

    2007-12-01

    We describe a quantitative methodology to characterize the vulnerability of U.S. urban centers to terrorist attack, using a place-based vulnerability index and a database of terrorist incidents and related human casualties. Via generalized linear statistical models, we study the relationships between vulnerability and terrorist events, and find that our place-based vulnerability metric significantly describes both terrorist incidence and occurrence of human casualties from terrorist events in these urban centers. We also introduce benchmark analytic technologies from applications in toxicological risk assessment to this social risk/vulnerability paradigm, and use these to distinguish levels of high and low urban vulnerability to terrorism. It is seen that the benchmark approach translates quite flexibly from its biological roots to this social scientific archetype.

  7. Mental vulnerability as a predictor of early mortality

    DEFF Research Database (Denmark)

    Eplov, Lene Falgaard; Jørgensen, Torben; Birket-Smith, Morten;

    2005-01-01

    pressure, lipid levels), and lifestyle factors. We determined vital status of the study sample through linkage to the Civil Registration System until 2001 and to the Cause of Death Registry until 1998. The mean follow-up time was 15.9 years for analysis of total mortality and 13.6 years for analysis...... of mortality as the result of natural causes. The association between mental vulnerability and survival was examined using Kaplan-Meir plots and Cox proportional-hazard models adjusting for possible confounding factors. RESULTS: With respect to mental vulnerability, 79% of the sample was classified...... as not vulnerable, 13% as moderately vulnerable, and 8% as highly vulnerable. Compared with the nonvulnerable group, highly vulnerable persons showed increased total mortality (hazard ratio = 1.6; 95% confidence interval = 1.3-1.9) and increased mortality from natural causes (1.6; 1.2-2.0). The inclusion...

  8. Analysis of Zero-Day Vulnerabilities in Java

    Directory of Open Access Journals (Sweden)

    Marius Popa

    2013-09-01

    Full Text Available The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software providers. The paper highlights the main features of such kind of vulnerabilities, some exploitation methods and examples of them for Java zero-day vulnerabilities and how protection strategies can be built on intelligence extracted from attack anatomy analysis.

  9. Childhood physical abuse and aggression: Shame and narcissistic vulnerability.

    Science.gov (United States)

    Keene, Amanda C; Epps, James

    2016-01-01

    This study examined narcissistic vulnerability and shame-proneness as potential mediators between childhood physical abuse (CPA) and adult anger and aggression. Participants were 400 undergraduate students, 134 of whom had a history of CPA. All participants completed self-report questionnaires assessing history of CPA, shame-proneness, narcissistic vulnerability, physical aggression, trait anger, and hostility. Results indicated abused participants were more angry and aggressive and experienced higher levels of shame-proneness and narcissistic vulnerability than nonabused participants. Multiple mediation analyses showed that narcissistic vulnerability, but not shame-proneness, partially mediated the relation between abuse and physical aggression. However, narcissistic vulnerability and shame-proneness both emerged as partial mediators between abuse and the anger and hostility variables. These findings suggest that narcissistic vulnerability and shame-proneness may function as mediators of adjustment following childhood maltreatment. Study limitations and recommendations for future research are discussed.

  10. Intravascular probe for detection of vulnerable plaque

    Science.gov (United States)

    Patt, Bradley E.; Iwanczyk, Jan S.; MacDonald, Lawrence R.; Yamaguchi, Yuko; Tull, Carolyn R.; Janecek, Martin; Hoffman, Edward J.; Strauss, H. William; Tsugita, Ross; Ghazarossian, Vartan

    2001-12-01

    Coronary angiography is unable to define the status of the atheroma, and only measures the luminal dimensions of the blood vessel, without providing information about plaque content. Up to 70% of heart attacks are caused by minimally obstructive vulnerable plaques, which are too small to be detected adequately by angiography. We have developed an intravascular imaging detector to identify vulnerable coronary artery plaques. The detector works by sensing beta or conversion electron radiotracer emissions from plaque-binding radiotracers. The device overcomes the technical constraints of size, sensitivity and conformance to the intravascular environment. The detector at the distal end of the catheter uses six 7mm long by 0.5mm diameter scintillation fibers coupled to 1.5m long plastic fibers. The fibers are offset from each other longitudinally by 6mm and arranged spirally around a guide wire in the catheter. At the proximal end of the catheter the optical fibers are coupled to an interface box with a snap on connector. The interface box contains a position sensitive photomultiplier tube (PSPMT) to decode the individual fibers. The whole detector assembly fits into an 8-French (2.7 mm in diameter) catheter. The PSPMT image is further decoded with software to give a linear image, the total instantaneous count rate and an audio output whose tone corresponds to the count rate. The device was tested with F-18 and Tl-204 sources. Spectrometric response, spatial resolution, sensitivity and beta to background ratio were measured. System resolution is 6 mm and the sensitivity is >500 cps / micrometers Ci when the source is 1 mm from the detector. The beta to background ratio was 11.2 for F-18 measured on a single fiber. The current device will lead to a system allowing imaging of labeled vulnerable plaque in coronary arteries. This type of signature is expected to enable targeted and cost effective therapies to prevent acute coronary artery diseases such as: unstable angina

  11. Quantifying social vulnerability for flood disasters of insurance company

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Social vulnerability assessments are largely ignored when compared with biophysical vulnerability assessments. This is mainly due to the fact that there are more difficulties in quantifying them. Aiming at several pitfalls still existing in the Hoovering approach which is widely accepted, a suitable modified model is provided. In this modified model, the integrated vulnerability is made an analogy to the elasticity coefficient of a spring, and an objective evaluation criterion is established. With the evalu...

  12. A physical approach on flood risk vulnerability of buildings

    OpenAIRE

    B. Mazzorana; S. Simoni; Scherer, C.; B. Gems; Fuchs, S.; Keiler, M.

    2014-01-01

    The design of efficient hydrological risk mitigation strategies and their subsequent implementation relies on a careful vulnerability analysis of the elements exposed. Recently, extensive research efforts were undertaken to develop and refine empirical relationships linking the structural vulnerability of buildings to the impact forces of the hazard processes. These empirical vulnerability functions allow estimating the expected direct losses as a result of the hazard scenar...

  13. A physical approach on flood risk vulnerability of buildings

    OpenAIRE

    B. Mazzorana; S. Simoni; Scherer, C.; B. Gems; Fuchs, S.; Keiler, Margreth

    2014-01-01

    The design of efficient hydrological risk mitigation strategies and their subsequent implementation relies on a careful vulnerability analysis of the elements exposed. Recently, extensive research efforts were undertaken to develop and refine empirical relationships linking the structural vulnerability of buildings to the impact forces of the hazard processes. These empirical vulnerability functions allow estimating the expected direct losses as a result of the hazard scenario based on spatia...

  14. Nutritional Vulnerability in Older Adults: A Continuum of Concerns

    OpenAIRE

    Porter Starr, Kathryn N.; McDonald, Shelley R.; Bales, Connie W.

    2015-01-01

    A nutritionally vulnerable older adult has a reduced physical reserve that limits the ability to mount a vigorous recovery in the face of an acute health threat or stressor. Often this vulnerability contributes to more medical complications, longer hospital stays, and increased likelihood of nursing home admission. We have characterized in this review the etiology of nutritional vulnerability across the continuum of the community, hospital, and long term care settings. Frail older adults may ...

  15. Sense in Sensitivity: Assessing Species Vulnerability to Climate Change

    OpenAIRE

    Mcdougall, Amy

    2013-01-01

    This thesis investigates the impact of future climate change upon species vulnerability. Reports of shifts in species distributions are already numerous, but the pattern of change is not fully understood. This thesis looks to predict which species are likely to be most at risk under climate change and why? This thesis takes the equation; Vulnerability= Sensitivity + Exposure to better discover which species are most vulnerable to climate change. Additionally, this research explores how mitiga...

  16. Mapping disaster vulnerability in India using analytical hierarchy process

    Directory of Open Access Journals (Sweden)

    Anusheema Chakraborty

    2016-01-01

    Full Text Available Disasters are the coincidences between hazardous events, elements at risk, and conditions of vulnerability. Vulnerability integrates social and environmental systems to reduce the intensity and frequency of these risks. By categorizing regions according to their level of vulnerability, one can examine and assess the possible impacts of developmental and environmental degradation processes. This study is an attempt to map the sub-national areas (districts in India that are vulnerable to natural and climate-induced disasters. The assessment is considered under the framework of Intergovernmental Panel on Climate Change definition of vulnerability. Using analytical hierarchy process as a multi-criteria decision-mapping method, vulnerability is measured in terms of exposure, sensitivity, and adaptive capacity. Based on this mapping assessment, districts in the state of Arunachal Pradesh, Assam, Bihar, Himachal Pradesh, Jharkhand, Manipur, Meghalaya, Mizoram, Uttar Pradesh, Uttarakhand, and West Bengal are the most vulnerable regions; while districts in the state of Punjab, Haryana, Gujarat, Tamil Nadu, Maharashtra, Goa, Andhra Pradesh, Kerala, and Karnataka are among the least vulnerable regions. The results of this study can serve as the basis for targeting prioritization efforts, emergency response measures, and policy interventions at district level for mitigating disaster vulnerability in the country.

  17. Assessing Vulnerability to Drought on a pan-European scale

    Science.gov (United States)

    Urquijo, Julia; De Stefano, Lucia; González-Tánago, Itziar; Blauhut, Veit; Stahl, Kerstin

    2014-05-01

    During the past decade, a number of theoretical frameworks have been defined within the Disaster Risk Reduction and Climate Change communities to assess drought vulnerability at different scales, sectors, socio-political contexts, and geo-climatic conditions. However, there is still little consensus around the criteria, dimensions and factors used in these assessments; and none of them has been applied at a pan-European scale. This is due to a triple complexity. Firstly, drought as a natural hazard is a complex phenomenon due to the difficulty of determining its onset and its multiscale, multifaceted and dynamic nature. Secondly, there is an on-going debate regarding the concept of vulnerability and its constitutive elements, together with an important diversity of theoretical approaches to assess it. Finally, Europe's diversity in bioclimatic conditions, national water use practice and water use policies adds a challenging characteristic for working on pan-European scale. This work addresses the challenge of defining a methodological approach to the assessment of vulnerability factors to drought at a pan-European scale. For this purpose, we first review existing conceptual frameworks as well as of past initiatives for drought vulnerability assessment. The literature review showed that the high complexity of drought vulnerability assessment requires a clear definition of the concept of vulnerability and the associated terms, and that, before undertaking any assessment, it is necessary to clearly define the "vulnerable unit" i.e. replying to the questions 'whose vulnerability is being assessed?' and 'vulnerability to what type of impact?'. In this context, this work proposes the application of a factor-based approach, consisting in the analysis of significant factors that influence vulnerability in the context of specific situations of potential vulnerability. Those situations are framed within the specific drought characteristics of four different geoclimatic macro

  18. Human Rights and Vulnerability. Examples of Sexism and Ageism

    Directory of Open Access Journals (Sweden)

    Mª DEL CARMEN BARRANCO AVILÉS

    2015-12-01

    Full Text Available A human rights based approach applied to the idea of ‘vulnerable group’ connects vulnerability and structural discrimination. The Convention on the Rights of Persons with Disability provides some elements that allow to state that we are facing a new paradigm in the International Human Rights Law. One of the keys for the understanding of this new framework is the assumption of the disadvantage related to vulnerability as, at least in a part, socially built and ideologically justified. Sexism and ageism are examples of how ideologies reinforce vulnerability of women, children and aged persons transforming them in groups which members are in risk of discrimination.

  19. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    Energy Technology Data Exchange (ETDEWEB)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  20. Vulnerable Subjects: Why Does Informed Consent Matter?

    Science.gov (United States)

    Goodwin, Michele

    2016-09-01

    This special issue of the Journal Law, Medicine & Ethics takes up the concern of informed consent, particularly in times of controversy. The dominant moral dilemmas that frame traditional bioethical concerns address medical experimentation on vulnerable subjects; physicians assisting their patients in suicide or euthanasia; scarce resource allocation and medical futility; human trials to develop drugs; organ and tissue donation; cloning; xenotransplantation; abortion; human enhancement; mandatory vaccination; and much more. The term "bioethics" provides a lens, language, and guideposts to the study of medical ethics. It is worth noting, however, that medical experimentation is neither new nor exclusive to one country. Authors in this issue address thorny subjects that span borders and patients: from matters dealing with children and vaccination to the language and perception of consent.

  1. Method and tool for network vulnerability analysis

    Science.gov (United States)

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  2. Protection of vulnerable adults: an interdisciplinary workshop.

    Science.gov (United States)

    Day, Mary Rose; Bantry-White, Eleanor; Glavin, Pauline

    2010-09-01

    This paper reports on the development, delivery, content and student evaluation of a comprehensive elder abuse and self-neglect workshop for public health nursing and social work students.The workshop provided an interdisciplinary shared learning experience for the students to prepare them for their critical role in safeguarding vulnerable adults. The aim of the workshop was to increase knowledge, awareness and understanding of roles and responsibilities and critical practice problems in the prevention and management of elder abuse and self-neglect. The shared learning approach provided clarity on roles and responsibility, valuing and respecting the contribution of each team member. The importance of building communication and trust with team members and clients was seen as critical. Through case studies and group discussion, assessment and practice skills were developed and awareness heightened on the complexity of the critical practice problems and ethical issues.

  3. Scheduler Vulnerabilities and Attacks in Cloud Computing

    CERN Document Server

    Zhou, Fangfei; Desnoyers, Peter; Sundaram, Ravi

    2011-01-01

    In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single physical system, each executing a separate operating system instance. The hypervisor schedules execution of these VMs much as the scheduler in an operating system does, balancing factors such as fairness and I/O performance. As in an operating system, the scheduler may be vulnerable to malicious behavior on the part of users seeking to deny service to others or maximize their own resource usage. Recently, publically available cloud computing services such as Amazon EC2 have used virtualization to provide customers with virtual machines running on the provider's hardware, typically charging by wall clock time rather than resources consumed. Under this business model, manipulation of the scheduler may allow theft of service at the expense of other customers, rather than merely reallocating resources within the same administrative domain. We describe a flaw in the Xen scheduler allowing virtual machines to consume almost...

  4. Hierarchical model of vulnerabilities for emotional disorders.

    Science.gov (United States)

    Norton, Peter J; Mehta, Paras D

    2007-01-01

    Clark and Watson's (1991) tripartite model of anxiety and depression has had a dramatic impact on our understanding of the dispositional variables underlying emotional disorders. More recently, calls have been made to examine not simply the influence of negative affectivity (NA) but also mediating factors that might better explain how NA influences anxious and depressive syndromes (e.g. Taylor, 1998; Watson, 2005). Extending preliminary projects, this study evaluated two hierarchical models of NA, mediating factors of anxiety sensitivity and intolerance of uncertainty, and specific emotional manifestations. Data provided a very good fit to a model elaborated from preliminary studies, lending further support to hierarchical models of emotional vulnerabilities. Implications for classification and diagnosis are discussed.

  5. Exploiting epigenetic vulnerabilities for cancer therapeutics.

    Science.gov (United States)

    Mair, Barbara; Kubicek, Stefan; Nijman, Sebastian M B

    2014-03-01

    Epigenetic deregulation is a hallmark of cancer, and there has been increasing interest in therapeutics that target chromatin-modifying enzymes and other epigenetic regulators. The rationale for applying epigenetic drugs to treat cancer is twofold. First, epigenetic changes are reversible, and drugs could therefore be used to restore the normal (healthy) epigenetic landscape. However, it is unclear whether drugs can faithfully restore the precancerous epigenetic state. Second, chromatin regulators are often mutated in cancer, making them attractive drug targets. However, in most instances it is unknown whether cancer cells are addicted to these mutated chromatin proteins, or whether their mutation merely results in epigenetic instability conducive to the selection of secondary aberrations. An alternative incentive for targeting chromatin regulators is the exploitation of cancer-specific vulnerabilities, including synthetic lethality, caused by epigenetic deregulation. We review evidence for the hypothesis that mechanisms other than oncogene addiction are a basis for the application of epigenetic drugs, and propose future research directions.

  6. Vulnerable Derivatives and Good Deal Bounds

    DEFF Research Database (Denmark)

    Murgoci, Agatha

    2013-01-01

    can be obtained. We provide a link between the objective probability measure and the range of potential risk-neutral measures, which has an intuitive economic meaning. We also provide tight pricing bounds for European calls and show how to extend the call formula to pricing other financial products......We price vulnerable derivatives – i.e. derivatives where the counterparty may default. These are basically the derivatives traded on the over-the-counter (OTC) markets. Default is modelled in a structural framework. The technique employed for pricing is good deal bounds (GDBs). The method imposes...... a new restriction in the arbitrage free model by setting upper bounds on the Sharpe ratios (SRs) of the assets. The potential prices that are eliminated represent unreasonably good deals. The constraint on the SR translates into a constraint on the stochastic discount factor. Thus, tight pricing bounds...

  7. [Clinical trials: vulnerability and ethical relativism].

    Science.gov (United States)

    Lima, Cristina

    2005-01-01

    Research in human beings is an important chapter of medical ethics. In recent years, investigation has been taken over by profit driven corporations that must guarantee the medical and commercial application of results. This new model of investigation has generated conflicts of interest in doctor-patient, researcher-subject relationship. The inevitable debate and media reaction has led. These trials of controversial design to regions of the globe where the vulnerability of the populations continues to allow their undertaking. This article includes a historical perspective on experimentation in human beings and the conditions that led to its regulation: the Nuremberg CODE, followed by the Helsinky Declaration in its different versions, and the Belmont Report, that defend the subject according to the ethic of principles used in western medicine. There is then a review of the attempts to change international regulation to reintroduce clinical trials with placebo--which since 1996 is only permitted where there are no therapeutic or diagnostic methods--on populations that would otherwise have no access to treatment. This then leads on to the issue of double standards in medical investigation defended by many investigators and some official entities. The article concludes that it may be prudent to allow local ethical commissions to approve deviation from the established norm if such is necessary to resolve urgent questions of health in the country, but it is unacceptable that any such emergency is used as a reason to reduce the ethical prerequisites, in clinical trials. It also concludes that true urgency is in making available to all who need it the effective products already in existence. Furthermore, that the acceptance of ethical relativism can result in the exploitation of vulnerable third world populations for research programmes that cannot be undertaken in their sponsoring countries due to the ethical restrictions in place.

  8. Vulnerability of Ukrainian Forests to Climate Change

    Directory of Open Access Journals (Sweden)

    Anatoly Shvidenko

    2017-06-01

    Full Text Available Ukraine is a country of the Mid-Latitude ecotone—a transition zone between forest zone and forestless dry lands. Availability of water defines distribution of the country’s forests and decreases their productivity towards the south. Climate change generates a particular threat for Ukrainian forests and stability of agroforestry landscapes. This paper considers the impacts of expected climate change on vulnerability of Ukrainian forests using ensembles of global and regional climatic models (RCM based on Scenarios B1, A2, A1B of the Intergovernmental Panel for Climate Change, and a “dry and warm” scenario A1B+T−P (increasing temperature and decreasing precipitation. The spatially explicit assessment was provided by RCM for the WMO standard period (1961–1990, “recent” (1991–2010 and three future periods: 2011–2030, 2031–2050 and 2081–2100. Forest-climate model by Vorobjov and model of amplitude of flora’s tolerance to climate change by Didukh, as well as a number of specialized climatic indicators, were used in the assessment. Different approaches lead to rather consistent conclusions. Water stress is the major limitation factor of distribution and resilience of flatland Ukrainian forests. Within Scenario A1B, the area with unsuitable growth conditions for major forest forming species will substantially increase by end of the century occupying major part of Ukraine. Scenario A1B+T−P projects even a more dramatic decline of the country’s forests. It is expected that the boundary of conditions that are favorable for forests will shift to north and northwest, and forests of the xeric belt will be the most vulnerable. Consistent policies of adaptation and mitigation might reduce climate-induced risks for Ukrainian forests.

  9. Global trends and vulnerabilities of mangrove forests

    Science.gov (United States)

    Simard, M.; Fatoyinbo, T. E.; Rivera-Monroy, V. H.; Castaneda, E.; Roy Chowdhury, R.

    2015-12-01

    Mangrove forests are located along Earth's coastlines and estuaries within tropical and subtropical latitudes. They provide numerous services functioning as an extraordinary carbon sequestration system and serving as habitat and nursery for fish, crustaceans and amphibians. To coastal populations, they provide livelihood, food, lumber and act as an effective protection against tsunamis, storm surges and hurricanes. Their vulnerability to sea level rise is strongly related to their extraordinary ability to accumulate soils, which is in part related to their productivity and therefore canopy structure. As a first step to understand their vulnerability, we seek to understand mangrove dependencies on environmental and geophysical setting. To achieve this, we mapped mangrove canopy height and above ground biomass (AGB) at the Global scale. To identify mangrove forests, existing maps derived from a collection of Landsat data around the 2000 era were used. Using the Shuttle Radar Topography Mission elevation data collected in February of 2000, we produced a Global map of mangrove canopy height. The estimated heights were validated with the ICESat/Geoscience Altimeter System (GLAS) and in situ field data. Most importantly, field data were also used to derive relationships between canopy height and AGB. While the geographical coverage of in situ data is limited, ICESat/GLAS data provided extensive geographical coverage with independent estimates of maximum canopy height. These estimates were used to calibrate SRTM-estimates of height at the Global scale. We found the difference between GLAS RH100 and SRTM resulted from several sources of uncertainty that are difficult to isolate. These include natural variations of canopy structure with time, system errors from GLAS and SRTM, geo-location errors and discrepancies in spatial resolution. The Global canopy height map was trnasormed into AGB using the field-derived allometry. Depending on the scale of analysis and geographical

  10. Assessing Hydro-Ecological Vulnerability from Space

    Science.gov (United States)

    Stampoulis, D.; Andreadis, K.; Granger, S. L.; Fisher, J. B.; Turk, F. J.; Behrangi, A.; Das, N. N.; Ines, A.

    2015-12-01

    The main driver of economic growth in East Africa is agriculture. However, climate change and the resulting intensification of the hydrologic cycle will increase water limitation in this already drought-burdened region, and the challenge of ensuring food security is bound to become critical. Efforts must, therefore, be made to develop appropriate adaptation strategies for agriculture in such regions. Assessing and predicting ecosystem responses to global environmental change can advance management and decision support systems that would improve food security and economic development. The current study uses a plethora of multi-year remote sensing earth observations to study the hydro-ecological vulnerability of the various ecosystems in the water-stressed East African region to droughts. More specifically, we assess the hydrologic sensitivity and resilience of soil moisture and vegetation water content (derived from NRL's WindSat radiometer), during dry spells, for different dry-period durations, and for various vegetation categories. Spatiotemporal patterns and characteristics of the response of the two aforementioned variables to sustained precipitation deficits (derived from TRMM 3B42 V7), as well as their persistence in maintaining their stability are identified. We also assess changes, in space and time, in the normalized radar surface-backscattering cross-sections from NASA's QuikSCAT Scatterometer, to obtain information on the vegetation regimes, as well as changes in vegetation phenometrics using the enhanced vegetation index (EVI) derived from MODIS. Quantifying the response and characterizing the resilience of the two aforementioned major hydrological attributes using various remote sensing techniques that complement each other, can provide critical insight into the region's vulnerability and adaptive capacity with respect to rainfall variability.

  11. Ecosystems Vulnerability Challenge and Prize Competition

    Science.gov (United States)

    Smith, J. H.; Frame, M. T.; Ferriter, O.; Recker, J.

    2014-12-01

    Stimulating innovation and private sector entrepreneurship is an important way to advance the preparedness of communities, businesses and individuals for the impacts of climate change on certain aspects of ecosystems, such as: fire regimes; water availability; carbon sequestration; biodiversity conservation; weather-related hazards, and the spread of invasive species. The creation of tools is critical to help communities and natural resource managers better understand the impacts of climate change on ecosystems and the potential resulting implications for ecosystem services and conservation efforts. The Department of the Interior is leading an interagency effort to develop the Ecosystems Vulnerability theme as part of the President's Climate Action Plan. This effort will provide seamless access to relevant datasets that can help address such issues as: risk of wildfires to local communities and federal lands; water sensitivity to climate change; and understanding the role of ecosystems in a changing climate. This session will provide an overview of the proposed Ecosystem Vulnerability Challenge and Prize Competition, outlining the intended audience, scope, goals, and overall timeline. The session will provide an opportunity for participants to offer new ideas. Through the Challenge, access will be made available to critical datasets for software developers, engineers, scientists, students, and researchers to develop and submit applications addressing critical science issues facing our Nation today. Application submission criteria and guidelines will also be discussed. The Challenge will be open to all sectors and organizations (i.e. federal, non-federal, private sector, non-profits, and universities) within the United States. It is anticipated the Challenge will run from early January 2015 until spring of 2015.

  12. An Integrated Approach for Urban Earthquake Vulnerability Analyses

    Science.gov (United States)

    Düzgün, H. S.; Yücemen, M. S.; Kalaycioglu, H. S.

    2009-04-01

    The earthquake risk for an urban area has increased over the years due to the increasing complexities in urban environments. The main reasons are the location of major cities in hazard prone areas, growth in urbanization and population and rising wealth measures. In recent years physical examples of these factors are observed through the growing costs of major disasters in urban areas which have stimulated a demand for in-depth evaluation of possible strategies to manage the large scale damaging effects of earthquakes. Understanding and formulation of urban earthquake risk requires consideration of a wide range of risk aspects, which can be handled by developing an integrated approach. In such an integrated approach, an interdisciplinary view should be incorporated into the risk assessment. Risk assessment for an urban area requires prediction of vulnerabilities related to elements at risk in the urban area and integration of individual vulnerability assessments. However, due to complex nature of an urban environment, estimating vulnerabilities and integrating them necessities development of integrated approaches in which vulnerabilities of social, economical, structural (building stock and infrastructure), cultural and historical heritage are estimated for a given urban area over a given time period. In this study an integrated urban earthquake vulnerability assessment framework, which considers vulnerability of urban environment in a holistic manner and performs the vulnerability assessment for the smallest administrative unit, namely at neighborhood scale, is proposed. The main motivation behind this approach is the inability to implement existing vulnerability assessment methodologies for countries like Turkey, where the required data are usually missing or inadequate and decision makers seek for prioritization of their limited resources in risk reduction in the administrative districts from which they are responsible. The methodology integrates socio

  13. Social Vulnerability and Ebola Virus Disease in Rural Liberia.

    Directory of Open Access Journals (Sweden)

    John A Stanturf

    Full Text Available The Ebola virus disease (EVD epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in <80 minutes. Our results illustrate how census and household survey data, when displayed spatially at a sub-county level, may help highlight the location of the most vulnerable households and populations. Our results can be used to identify vulnerability hotspots where development strategies and allocation of resources to address the underlying causes of vulnerability in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.

  14. Scenario-based Storm Surge Vulnerability Assessment of Catanduanes

    Science.gov (United States)

    Suarez, J. K. B.

    2015-12-01

    After the devastating storm surge effect of Typhoon Haiyan, the public recognized an improved communication about risks, vulnerabilities and what is threatened by storm surge. This can be provided by vulnerability maps which allow better visual presentations and understanding of the risks and vulnerabilities. Local implementers can direct the resources needed for protection of these areas. Moreover, vulnerability and hazard maps are relevant in all phases of disaster management designed by the National Disaster Risk Reduction Council (NDRRMC) - disaster preparedness, prevention and mitigation and response and recovery and rehabilitation. This paper aims to analyze the vulnerability of Catanduanes, a coastal province in the Philippines, to storm surges in terms of four parameters: population, built environment, natural environment and agricultural production. The vulnerability study relies on the storm surge inundation maps based on the Department of Science and Technology Nationwide Operational Assessment of Hazards' (DOST-Project NOAH) proposed four Storm Surge Advisory (SSA) scenarios (1-2, 3, 4, and 5 meters) for predicting storm surge heights. To determine total percent affected for each parameter elements, an overlay analysis was performed in ArcGIS Desktop. Moreover, vulnerability and hazard maps are generated as a final output and a tool for visualizing the impacts of storm surge event at different surge heights. The result of this study would help the selected province to know their present condition and adapt strategies to strengthen areas where they are found to be most vulnerable in order to prepare better for the future.

  15. Climate change vulnerability in Ethiopia : disaggregation of Tigray Region

    NARCIS (Netherlands)

    Gebrehiwot, T.G.; Veen, van der A.

    2013-01-01

    Climate change and variability severely affect rural livelihoods and agricultural productivity, yet they are causes of stress vulnerable rural households have to cope with. This paper investigated farming communities' vulnerability to climate change and climate variability across 34 agricultural-bas

  16. Categorisation of typical vulnerability patterns in global drylands

    NARCIS (Netherlands)

    Sietz, D.; Lûdeke, M.K.B.; Walther, C.

    2011-01-01

    Drylands display specific vulnerability-creating mechanisms which threaten ecosystems and human well-being. The upscaling of successful interventions to reduce vulnerability arises as an important, but challenging aim, since drylands are not homogenous. To support this aim, we present the first atte

  17. Cocoa farming households' vulnerability to climate variability in Ekiti ...

    African Journals Online (AJOL)

    BRO OKOJIE

    the degree of vulnerability of cocoa farmers in Ekiti State to climate variability hazards using the. Integrated Vulnerability ... All efforts should be in put in place by all relevant agencies to promote integrated ... internal processes within the climate system. (internal .... four Local Government Areas from each zone. This was ...

  18. Methodology for identifying vulnerable sections in a National Road Network

    NARCIS (Netherlands)

    Tampere, C.M.J.; Stada, J.; Immers, L.H.

    2007-01-01

    Under the authority of the Flemish Traffic Centre a study was carried out aiming at the identification of road sections that are vulnerable to major incidents. The primary objective of the study was to develop a methodology capable of rapidly scanning a large network for the most vulnerable sections

  19. Assessment of food fraud vulnerability in the spices chain

    NARCIS (Netherlands)

    Silvis, I.C.J.; Ruth, van S.M.; Fels, van der Ine; Luning, P.A.

    2017-01-01

    Recent scandals have increased the need to strengthen companies’ ability to combat fraud within their own organizations and across their supply chain. Vulnerability assessments are a first step towards the inventory of fraud vulnerability and fraud mitigation plans. Spices are reported frequently

  20. Assessing local vulnerability to climate change in Ecuador.

    Science.gov (United States)

    Fernandez, Mario Andres; Bucaram, Santiago J; Renteria, Willington

    2015-01-01

    Vulnerability assessments have become necessary to increase the understanding of climate-sensitive systems and inform resource allocation in developing countries. Challenges arise when poor economic and social development combines with heterogeneous climatic conditions. Thus, finding and harmonizing good-quality data at local scale may be a significant hurdle for vulnerability research. In this paper we assess vulnerability to climate change at a local level in Ecuador. We take Ecuador as a case study as socioeconomic data are readily available. To incorporate the spatial and temporal pattern of the climatic variables we use reanalysis datasets and empirical orthogonal functions. Our assessment strategy relies on the statistical behavior of climatic and socioeconomic indicators for the weighting and aggregation mechanism into a composite vulnerability indicator. Rather than assuming equal contribution to the formation of the composite indicator, we assume that the weights of the indicators vary inversely as the variance over the cantons (administrative division of Ecuador). This approach captures the multi-dimensionality of vulnerability in a comprehensive form. We find that the least vulnerable cantons concentrate around Ecuador's largest cities (e.g. Quito and Guayaquil); however, approximately 20 % of the national population lives in other cantons that are categorized as highly and very highly vulnerable to climate change. Results also show that the main determinants of high vulnerability are the lack of land tenure in agricultural areas and the nonexistence of government-funded programs directed to environmental and climate change management.

  1. Vulnerability Assessment Models to Drought: Toward a Conceptual Framework

    Directory of Open Access Journals (Sweden)

    Kiumars Zarafshani

    2016-06-01

    Full Text Available Drought is regarded as a slow-onset natural disaster that causes inevitable damage to water resources and to farm life. Currently, crisis management is the basis of drought mitigation plans, however, thus far studies indicate that effective drought management strategies are based on risk management. As a primary tool in mitigating the impact of drought, vulnerability assessment can be used as a benchmark in drought mitigation plans and to enhance farmers’ ability to cope with drought. Moreover, literature pertaining to drought has focused extensively on its impact, only awarding limited attention to vulnerability assessment as a tool. Therefore, the main purpose of this paper is to develop a conceptual framework for designing a vulnerability model in order to assess farmers’ level of vulnerability before, during and after the onset of drought. Use of this developed drought vulnerability model would aid disaster relief workers by enhancing the adaptive capacity of farmers when facing the impacts of drought. The paper starts with the definition of vulnerability and outlines different frameworks on vulnerability developed thus far. It then identifies various approaches of vulnerability assessment and finally offers the most appropriate model. The paper concludes that the introduced model can guide drought mitigation programs in countries that are impacted the most by drought.

  2. Economic vulnerability of timber resources to forest fires

    Science.gov (United States)

    Francisco Rodriguez y Silva; Juan Ramon Molina; Armando Gonzalez-Caban; Miguel Angel Herrera Machuca

    2012-01-01

    The temporal-spatial planning of activities for a territorial fire management program requires knowing the value of forest ecosystems. In this paper we extend to and apply the economic valuation principle to the concept of economic vulnerability and present a methodology for the economic valuation of the forest production ecosystems. The forest vulnerability is...

  3. Landslide vulnerability criteria: a case study from Umbria, central Italy.

    Science.gov (United States)

    Galli, Mirco; Guzzetti, Fausto

    2007-10-01

    Little is known about the vulnerability to landslides, despite landslides causing frequent and widespread damage to the population and the built-up environment in many areas of the world. Lack of information about vulnerability to landslides limits our ability to determine landslide risk. This paper provides information on the vulnerability of buildings and roads to landslides in Umbria, central Italy. Information on 103 landslides of the slide and slide-earth flow types that have resulted in damage to buildings and roads at 90 sites in Umbria is used to establish dependencies between the area of the landslide and the vulnerability to landslides. The dependencies obtained are applied in the hills surrounding the town of Collazzone, in central Umbria, an area for which a detailed landslide inventory map is available. By exploiting the landslide inventory and the established vulnerability curves, the geographical distribution of the vulnerability to landslides is mapped and statistics of the expected damage are calculated. Reliability and limits of the vulnerability thresholds and of the obtained vulnerability assessment are discussed.

  4. Households' vulnerability and responses to shocks: evidence from rural Kenya

    NARCIS (Netherlands)

    Ndirangu, L.

    2007-01-01

    Key words: Vulnerability, HIV/AIDS, weather shocks, risk management, coping strategies, rural households, gender.   Empirical investigation on household’s responses to sources of vulnerability is important for designing and implementation of social policies. The design of an effective re

  5. Vulnerabilities and responsibilities: dealing with monsters in computer security

    NARCIS (Netherlands)

    Pieters, W.; Consoli, L.

    2009-01-01

    Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities

  6. Direction Happiness. Improving well-being of vulnerable groups

    NARCIS (Netherlands)

    Weiss, Laura Anne

    2016-01-01

    In the PhD-thesis ‘Direction: Happiness. Improving well-being of vulnerable groups’, the effects of the Happiness Route, a positive psychology intervention, were examined. The intervention is directed at a vulnerable group with an accumulation of risk factors for a low well-being; lonely people wit

  7. Direction: happiness : improving well-being of vulnerable groups

    NARCIS (Netherlands)

    Weiss, Laura Anne

    2016-01-01

    In the PhD-thesis ‘Direction: Happiness. Improving well-being of vulnerable groups’, the effects of the Happiness Route, a positive psychology intervention, were examined. The intervention is directed at a vulnerable group with an accumulation of risk factors for a low well-being; lonely people wit

  8. How Leaders Communicate Their Vulnerability: Implications for Trust Building

    Science.gov (United States)

    Meyer, Frauke; Le Fevre, Deidre M.; Robinson, Viviane M. J.

    2017-01-01

    Purpose: The notion of vulnerability underlies relationships of trust. Trust between leaders and staff is needed to solve concerns that hinder equity and excellence in teaching and learning. The purpose of this paper is to examine whether and how leaders show vulnerability by disclosing own possible contributions to concerns they try to resolve.…

  9. Categorisation of typical vulnerability patterns in global drylands

    NARCIS (Netherlands)

    Sietz, D.; Lûdeke, M.K.B.; Walther, C.

    2011-01-01

    Drylands display specific vulnerability-creating mechanisms which threaten ecosystems and human well-being. The upscaling of successful interventions to reduce vulnerability arises as an important, but challenging aim, since drylands are not homogenous. To support this aim, we present the first atte

  10. Households' vulnerability and responses to shocks: evidence from rural Kenya

    NARCIS (Netherlands)

    Ndirangu, L.

    2007-01-01

    Key words: Vulnerability, HIV/AIDS, weather shocks, risk management, coping strategies, rural households, gender.   Empirical investigation on household’s responses to sources of vulnerability is important for designing and implementation of social policies. The design of an effective

  11. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  12. Using vulnerability performance indicators to attain food supply chain robustness

    NARCIS (Netherlands)

    Vlajic, J.V.; Lokven, van S.W.M.; Haijema, R.; Vorst, van der J.G.A.J.

    2013-01-01

    High effectiveness and leanness of modern supply chains (SCs) increase their vulnerability, i.e. susceptibility to disturbances reflected in non-robust SC performances. Both the SC management literature and SC professionals indicate the need for the development of SC vulnerability assessment tools.

  13. Workplace support after breast cancer treatment: recognition of vulnerability.

    Science.gov (United States)

    Tiedtke, Corine; Dierckx de Casterlé, Bernadette; Donceel, Peter; de Rijk, Angelique

    2015-01-01

    Support from the workplace seems to be a key element in addressing the poor return-to-work (RTW) rate of employees with breast cancer. We aim to acquire an in-depth understanding of how Flemish employees experience their RTW after breast cancer and the support from the workplace. Fourteen in-depth interviews of women who experienced breast cancer and returned to work (high school graduates, age range 42-55 years, mean age 48 at time of surgery) were analysed using the Qualitative Analysis Guide of Leuven (QUAGOL), based on a Grounded Theory approach. The key experiences were feeling vulnerable, feeling able to work and need for support. Although little diversity in RTW experiences was found, the background of the vulnerability varied. Women experienced support (which could be emotional or practical) only as adequate if it addressed their specific vulnerability. Employees felt particularly vulnerable. Vulnerability is not the same as low-work ability and as such it should be added as theoretical concept in RTW research. Adequate workplace support addresses the specific vulnerability of an individual woman. Our study offers a nuanced insight into the RTW process of breast cancer survivors. Upon actual return-to-work (RTW) after breast cancer treatment, women feel vulnerable but able to work and, hence, have a high need for workplace support. Support from the workplace during RTW after breast cancer treatment is experienced as adequate when it expresses genuine recognition of the individual woman's vulnerability.

  14. Vulnerability to Poverty in select Central Asian Countries

    Directory of Open Access Journals (Sweden)

    Raghbendra Jha

    2009-06-01

    Full Text Available In the extant literature either income or consumption expenditures as measured over short periods of time have been regarded as a proxy for the material well-being of households. However, economists have long recognized that a household's sense of well-being depends not just on its average income or expenditures, but also on the risks it faces and its ability to deal with these risks. Hence vulnerability is a more satisfactory measure of welfare. In this study we used the concept of vulnerability as expected poverty to assess the household vulnerability to poverty in four Central Asian countries: Azerbaijan, Kazakhstan, Kyrgyzstan, and Tajikistan. Except for Tajikistan, headcount poverty and vulnerability rates are significantly different. We also find that vulnerability differs significantly across households by location and selected household characteristics. In this paper we use a simple empirical measurement that allows estimating the headcount vulnerability to poverty using cross-section data. This measurement is based on the strong assumption that households have the same conditional distribution of consumption in a stationary environment. While this approach cannot capture all dimensions of vulnerability, it at least begins to raise the policy issue that vulnerability should be considered alongside poverty.

  15. Vulnerability analysis for design of bridge health monitoring system

    Science.gov (United States)

    Sun, L. M.; Yu, G.

    2010-03-01

    The recent engineering implementation of health monitoring system for long span bridges show difficulties for precisely assessing structural physical condition as well as for accurately alarming on structural damages, although hundreds of sensors were installed on a structure and a great amount of data were collected from the monitoring system. The allocation of sensors and the alarming algorithm are still two of the most important tasks to be considered when designing the structural health monitoring system. Vulnerability, in its original meaning, is the system susceptibility to local damage. For a structural system, the vulnerability can thus be regarded as structural performance susceptibility to local damage of structure. The purpose of this study is to propose concepts and methods of structural vulnerability for determining monitoring components which are more vulnerable than others and the corresponding warning threshold once the damages occur. The structural vulnerability performances to various damage scenarios depend upon structural geometrical topology, loading pattern on the structure and the degradation of component performance. A two-parameters structural vulnerability evaluation method is proposed in this paper. The parameters are the damage consequence and the relative magnitude of the damage scenarios to the structural system, respectively. Structural vulnerability to various damage scenarios can be regarded as the tradeoff between the two parameters. Based on the results of structural vulnerability analysis, the limited structural information from health monitoring can be utilized efficiently. The approach of the design of bridge health monitoring system is illustrated for a cable-stayed bridge.

  16. Transplanting supersites of HIV-1 vulnerability.

    Directory of Open Access Journals (Sweden)

    Tongqing Zhou

    Full Text Available One strategy for isolating or eliciting antibodies against a specific target region on the envelope glycoprotein trimer (Env of the human immunodeficiency virus type 1 (HIV-1 involves the creation of site transplants, which present the target region on a heterologous protein scaffold with preserved antibody-binding properties. If the target region is a supersite of HIV-1 vulnerability, recognized by a collection of broadly neutralizing antibodies, this strategy affords the creation of "supersite transplants", capable of binding (and potentially eliciting antibodies similar to the template collection of effective antibodies. Here we transplant three supersites of HIV-1 vulnerability, each targeted by effective neutralizing antibodies from multiple donors. To implement our strategy, we chose a single representative antibody against each of the target supersites: antibody 10E8, which recognizes the membrane-proximal external region (MPER on the HIV-1 gp41 glycoprotein; antibody PG9, which recognizes variable regions one and two (V1V2 on the HIV-1 gp120 glycoprotein; and antibody PGT128 which recognizes a glycopeptide supersite in variable region 3 (glycan V3 on gp120. We used a structural alignment algorithm to identify suitable acceptor proteins, and then designed, expressed, and tested antigenically over 100-supersite transplants in a 96-well microtiter-plate format. The majority of the supersite transplants failed to maintain the antigenic properties of their respective template supersite. However, seven of the glycan V3-supersite transplants exhibited nanomolar affinity to effective neutralizing antibodies from at least three donors and recapitulated the mannose9-N-linked glycan requirement of the template supersite. The binding of these transplants could be further enhanced by placement into self-assembling nanoparticles. Essential elements of the glycan V3 supersite, embodied by as few as 3 N-linked glycans and ∼ 25 Env residues, can be

  17. Regional vulnerability of longitudinal cortical association connectivity

    Directory of Open Access Journals (Sweden)

    Rafael Ceschin

    2015-01-01

    Full Text Available Preterm born children with spastic diplegia type of cerebral palsy and white matter injury or periventricular leukomalacia (PVL, are known to have motor, visual and cognitive impairments. Most diffusion tensor imaging (DTI studies performed in this group have demonstrated widespread abnormalities using averaged deterministic tractography and voxel-based DTI measurements. Little is known about structural network correlates of white matter topography and reorganization in preterm cerebral palsy, despite the availability of new therapies and the need for brain imaging biomarkers. Here, we combined novel post-processing methodology of probabilistic tractography data in this preterm cohort to improve spatial and regional delineation of longitudinal cortical association tract abnormalities using an along-tract approach, and compared these data to structural DTI cortical network topology analysis. DTI images were acquired on 16 preterm children with cerebral palsy (mean age 5.6 ± 4 and 75 healthy controls (mean age 5.7 ± 3.4. Despite mean tract analysis, Tract-Based Spatial Statistics (TBSS and voxel-based morphometry (VBM demonstrating diffusely reduced fractional anisotropy (FA reduction in all white matter tracts, the along-tract analysis improved the detection of regional tract vulnerability. The along-tract map-structural network topology correlates revealed two associations: (1 reduced regional posterior–anterior gradient in FA of the longitudinal visual cortical association tracts (inferior fronto-occipital fasciculus, inferior longitudinal fasciculus, optic radiation, posterior thalamic radiation correlated with reduced posterior–anterior gradient of intra-regional (nodal efficiency metrics with relative sparing of frontal and temporal regions; and (2 reduced regional FA within frontal–thalamic–striatal white matter pathways (anterior limb/anterior thalamic radiation, superior longitudinal fasciculus and cortical spinal tract

  18. Study on Sustainable Development in Vulnerable Eco-areas

    Institute of Scientific and Technical Information of China (English)

    Zhang Juntao; Li Jin

    2004-01-01

    The vulnerable eco-area is one of the important research targets in the field of sustainable development. It is the requirement of building a welloff society in an all-round way that we should study more on the vulnerable eco-areas, deal with the relationship between environmental protection and economic development, speed up the economic development in these areas and increase the living standard of the local people. This paper puts forward the countermeasures of environment-economy coordination, on the basis of the recognition of ecoenvironment features and social economic conditions in the vulnerable eco-areas of China, in view of the progress in sustainable development studies of the vulnerable ones, taking the transitional areas of farming and pasturing in northeast China as an example to study the regional environment vulnerability.

  19. [Assessment of eco-environmental vulnerability of Hainan Island, China].

    Science.gov (United States)

    Huang, Bao-rong; Ouyang, Zhi-yun; Zhang, Hui-zhi; Zhang, Li-hua; Zheng, Hua

    2009-03-01

    Based on the assessment method of environmental vulnerability constructed by SOPAC and UNEP, this paper constructed an indicator system from three sub-themes including hazard, resistance, and damage to assess the eco-environmental vulnerability of Hainan Island. The results showed that Hainan Island was suffering a middling level eco-environmental hazard, and the main hazards came from some intensive human activities such as intensive agriculture, mass tourism, mining, and a mass of solid wastes thrown by islanders and tourists. Some geographical characters such as larger land area, larger altitude range, integrated geographical form, and abundant habitat types endowed Hainan Island higher resistance to environmental hazards. However, disturbed by historical accumulative artificial and natural hazards, the Island ecosystem had showed serious ecological damage, such as soil degradation and biodiversity loss. Comprehensively considered hazard, resistance, damage, and degradation, the comprehensive environmental vulnerability of the Island was at a middling level. Some indicators showed lower vulnerability, but some showed higher vulnerability.

  20. The Unfair Commercial Practices Directive and Vulnerable Consumers

    DEFF Research Database (Denmark)

    Trzaskowski, Jan

    . The Directive’s Article 5(3) concerning vulnerable consumers protects only—and to a limited extent—groups who are vulnerable due to mental or physical infirmity, age or credulity. Even though consumers make many good choices, all consumers are vulnerable in certain situations—often due to time constraints......, cognitive limitations, and/or bounded rationality as convincingly demonstrated in behavioural economics. Those consumers who are vulnerable in the light of the Directive are those who are at risk of having their economic behaviour distorted by lawful commercial practices. In the article, the author suggests...... how the directive’s protection of vulnerable consumers may be improved through interpretation, revision, and new initiatives. It is not possible to protect all consumers from bad consumption, but welfare loss originating from certain commercial practices may be reduced....

  1. The Vulnerability of Some Networks including Cycles via Domination Parameters

    Directory of Open Access Journals (Sweden)

    Tufan Turaci

    2016-01-01

    Full Text Available Let G=(V(G,E(G be an undirected simple connected graph. A network is usually represented by an undirected simple graph where vertices represent processors and edges represent links between processors. Finding the vulnerability values of communication networks modeled by graphs is important for network designers. The vulnerability value of a communication network shows the resistance of the network after the disruption of some centers or connection lines until a communication breakdown. The domination number and its variations are the most important vulnerability parameters for network vulnerability. Some variations of domination numbers are the 2-domination number, the bondage number, the reinforcement number, the average lower domination number, the average lower 2-domination number, and so forth. In this paper, we study the vulnerability of cycles and related graphs, namely, fans, k-pyramids, and n-gon books, via domination parameters. Then, exact solutions of the domination parameters are obtained for the above-mentioned graphs.

  2. Psychological Vulnerability and Subjective Happiness: The Mediating Role of Hopelessness.

    Science.gov (United States)

    Satici, Seydi Ahmet; Uysal, Recep

    2017-04-01

    The current study examined the mediating role of hopelessness on the relationship between psychological vulnerability and subjective happiness. It was anticipated that hopelessness may act as a mediator in the relationship between psychological vulnerability and subjective happiness. Two hundred sixty-nine (150 women and 119 men) university students completed the Psychological Vulnerability Scale, the Subjective Happiness Scale and the Beck Hopelessness Scale. Data have been collected in the 2013-2014 academic year. The present study was designed as a cross-sectional study. Correlational results indicated that psychological vulnerability and hopelessness were significantly negatively associated with subjective happiness. Results using structural equation modelling showed that hopelessness fully mediated the relationship between psychological vulnerability and subjective happiness. Implications for future research and limitations of the present study are discussed. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  3. Vulnerable subjects? The case of nonhuman animals in experimentation.

    Science.gov (United States)

    Johnson, Jane

    2013-12-01

    The concept of vulnerability is deployed in bioethics to, amongst other things, identify and remedy harms to participants in research, yet although nonhuman animals in experimentation seem intuitively to be vulnerable, this concept and its attendant protections are rarely applied to research animals. I want to argue, however, that this concept is applicable to nonhuman animals and that a new taxonomy of vulnerability developed in the context of human bioethics can be applied to research animals. This taxonomy does useful explanatory work, helping to pinpoint the limitations of the 3Rs/welfare approach currently adopted in the context of animal experimentation. On this account, the 3Rs/welfare approach fails to deliver for nonhuman animals in experimentation because it effectively addresses only one element of their vulnerability (inherent) and paradoxically through the institution of Animal Ethics Committees intended to protect experimental animals in fact generates new vulnerabilities that exacerbate their already precarious situation.

  4. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  5. Relational vulnerabilities of incarcerated and reentry mothers: therapeutic implications.

    Science.gov (United States)

    Few-Demo, April L; Arditti, Joyce A

    2014-11-01

    A qualitative study involving a follow-up interview with 10 incarcerated and reentry mothers in rural southwest and central Virginia was conducted to explore the influence that women's close relationships have on their reentry experiences with their families. The Vulnerability Conceptual Model (VCM) was used to sensitize an examination of how incarcerated and reentry mothers negotiate relational vulnerabilities in the context of varying situational vulnerability. Grounded theory analysis revealed three themes that characterized relational vulnerabilities. Given our focus on close relationships and the potential of the VCM to identify opportunities for resilience and vulnerability, we highlighted the influence of ambiguous and ambivalent relationships and unresolved loss and grief due to relationship dissolution or the death of a parent, sibling, child, or intimate partner in the reentry process. The data revealed two types of reentry mothers with divergent trajectories for social reintegration. Implications of these types for therapeutic treatment approaches for reentry women are discussed. © The Author(s) 2013.

  6. Nutritional Vulnerability in Older Adults: A Continuum of Concerns.

    Science.gov (United States)

    Porter Starr, Kathryn N; McDonald, Shelley R; Bales, Connie W

    2015-06-01

    A nutritionally vulnerable older adult has a reduced physical reserve that limits the ability to mount a vigorous recovery in the face of an acute health threat or stressor. Often this vulnerability contributes to more medical complications, longer hospital stays, and increased likelihood of nursing home admission. We have characterized in this review the etiology of nutritional vulnerability across the continuum of the community, hospital, and long term care settings. Frail older adults may become less vulnerable with strong, consistent, and individualized nutritional care. Interventions for the vulnerable older adult must take their nutritional needs into account to optimize resiliency in the face of the acute and/or chronic health challenges they will surely face in their life course.

  7. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  8. Lived experience of vulnerability from a Gypsy Roma Traveller perspective.

    Science.gov (United States)

    Heaslip, Vanessa; Hean, Sarah; Parker, Jonathan

    2016-07-01

    To describe the lived experience of vulnerability of individuals within a Gypsy Roma Travelling community. People experience vulnerability whenever their health or usual functioning is compromised. This may increase when they enter unfamiliar surroundings, situations or relationships. One's experience of vulnerability can also be heightened through interactions between the individual and the society within which they live. Gypsy Roma Travellers are often identified as vulnerable owing to increased morbidity and mortality as well as their marginalised status within society. Yet little is known of the experiences of vulnerability by the individuals themselves. Without their stories and experiences, health professionals cannot effectively develop services that meet their needs. This descriptive phenomenological study sought to explore the lived experience of vulnerability in a Gypsy Roma Travelling community. Seventeen Gypsy Roma Travellers were interviewed in 2013-2014 about their experiences of feeling vulnerable. This paper reports on the findings from the depth phase in which 13 individuals were interviewed. The interviews were conducted and analysed using Giorgi's descriptive phenomenological approach. Six constituents of the phenomenon of vulnerability were identified as feeling: defined and homogenised as a group; pressurised to conform to live in a particular way; split in one's identity; a loss of one's heritage; discriminated, persecuted and threatened; and powerlessness. There is a wealth of evidence that Gypsy Roma Travellers experience high levels of morbidity and mortality, which has led to them being identified by health professionals and policy makers as a vulnerable community. Exploring their lived experience of vulnerability presents a different perspective regarding this concept and can help explain why they may experience poorer levels of physical and mental health. © 2016 John Wiley & Sons Ltd.

  9. The vulnerability of Australian rural communities to climate variability and change: Part I—Conceptualising and measuring vulnerability

    NARCIS (Netherlands)

    Nelson, R.; Kokic, P.; Crimp, S.; Meinke, H.B.; Howden, S.M.

    2010-01-01

    Vulnerability is a term frequently used to describe the potential threat to rural communities posed by climate variability and change. Despite growing use of the term, analytical measures of vulnerability that are useful for prioritising and evaluating policy responses are yet to evolve. Demand for

  10. Vulnerability of particularly valuable areas. Summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    This report is part of the scientific basis for the management plan for the North Sea and Skagerrak. The report focuses on the vulnerability of particularly valuable areas to petroleum activities, maritime transport, fisheries, land-based and coastal activities and long-range transboundary pollution. A working group with representatives from many different government agencies, headed by the Institute of Marine Research and the Directorate for Nature Management, has been responsible for drawing up the present report on behalf of the Expert Group for the North Sea and Skagerrak. The present report considers the 12 areas that were identified as particularly valuable during an earlier stage of the management plan process on the environment, natural resources and pollution. There are nine areas along the coast and three open sea areas in the North Sea that were identified according to the same predefined criteria as used for the management plans for the Barents Sea: Lofoten area and the Norwegian Sea. The most important criteria for particularly valuable areas are importance for biological production and importance for biodiversity.(Author)

  11. Vulnerable Plaques, Inflammation and Newer Imaging Modalities

    Directory of Open Access Journals (Sweden)

    Bhatia V

    2003-01-01

    Full Text Available Currently, inflammation is considered to be the central player in the pathogenesis of atherosclerosis. It leads to the formation of multiple plaques in the arterial beds including coronary vasculature. Recent studies using the latest imaging techniques have shown that in patients with acute coronary syndromes (ACS multiple plaques are ruptured and have thrombus formation on them. Various factors make these plaques unstable, these include structural components of plaque like thin fibrous cap, high lipid content of the plaque core and inflammation, both localized and generalized. It has been shown that most of the ACS are caused by plaques causing non-critical stenosis as seen on traditional X-ray angiography. Also, the phenomenon of remodelling makes angiography a poor technique for plaque visualization. Hence newer modalities are required to identify these 'vulnerable plaques'. Intravascular ultrasound (IVUS, thermography and Magnetic Resonance Imaging (MRI are a few such promising techniques. Here we review the invasive and non-invasive modalities that can be helpful in the identification of these plaques before they become unstable and cause ACS, and also the available therapies to stabilize these plaques.

  12. Hunger mapping: food insecurity and vulnerability information.

    Science.gov (United States)

    1997-12-01

    Save the Children Foundation (SCF), a nongovernmental organization (NGO), developed the "household food economy analysis" to assess the needs of an area or population facing acute food insecurity. This method considers all of the ways people secure access to food and illustrates the distribution of various food supplies in pie charts that allow comparison of the percentage contribution of each option during a normal year and a "bad" year. Data are gathered through the use of key informants, and the analysis permits identification of ways to support local initiatives and to target assistance. As a result of this work, SCF and another NGO, Helen Keller International, attended a March 1997 expert consultation organized by the UN Food and Agriculture Organization (FAO) to create a workplan for the Food Insecurity and Vulnerability Information and Mapping System (FIVIMS) called for in the World Food Summit Plan of Action. The consultation adopted use of the FAO's food and balance sheet approach, despite its limitations, and determined that indicators should be location- and time-specific as well as 1) simple and reliable, 2) readily available, 3) social and anthropometric, and 4) found at all levels. The consultation also recommended combination of the key informant and the indicator approach to data collection. Finally, the consultation identified appropriate actions that should be accomplished before the 1998 meeting of the FAO's Committee on World Food Security.

  13. Tracking Nile Delta vulnerability to Holocene change.

    Directory of Open Access Journals (Sweden)

    Nick Marriner

    Full Text Available Understanding deltaic resilience in the face of Holocene climate change and human impacts is an important challenge for the earth sciences in characterizing the full range of present and future wetland responses to global warming. Here, we report an 8000-year mass balance record from the Nile Delta to reconstruct when and how this sedimentary basin has responded to past hydrological shifts. In a global Holocene context, the long-term decrease in Nile Delta accretion rates is consistent with insolation-driven changes in the 'monsoon pacemaker', attested throughout the mid-latitude tropics. Following the early to mid-Holocene growth of the Nile's deltaic plain, sediment losses and pronounced erosion are first recorded after ~4000 years ago, the corollaries of falling sediment supply and an intensification of anthropogenic impacts from the Pharaonic period onwards. Against the backcloth of the Saharan 'depeopling', reduced river flow underpinned by a weakening of monsoonal precipitation appears to have been particularly conducive to the expansion of human activities on the delta by exposing productive floodplain lands for occupation and irrigation agriculture. The reconstruction suggests that the Nile Delta has a particularly long history of vulnerability to extreme events (e.g. floods and storms and sea-level rise, although the present sediment-starved system does not have a direct Holocene analogue. This study highlights the importance of the world's deltas as sensitive archives to investigate Holocene geosystem responses to climate change, risks and hazards, and societal interaction.

  14. An integrated approach to vulnerability assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Tidwell, Vincent Carroll; Jurado, Sariah Ruth (University of New Mexico, Albuquerque, NM); Silva, Consuelo Juanita

    2005-03-01

    How might the quality of a city's delivered water be compromised through natural or malevolent causes? What are the consequences of a contamination event? What water utility assets are at greatest risk to compromise? Utility managers have been scrambling to find answers to these questions since the events of 9/11. However, even before this date utility mangers were concerned with the potential for system contamination through natural or accidental causes. Unfortunately, an integrated tool for assessing both the threat of attack/failure and the subsequent consequence is lacking. To help with this problem we combine Markov Latent Effects modeling for performing threat assessment calculations with the widely used pipe hydraulics/transport code, EPANET, for consequences analysis. Together information from these models defines the risk posed to the public due to natural or malevolent contamination of a water utility system. Here, this risk assessment framework is introduced and demonstrated within the context of vulnerability assessment for water distribution systems.

  15. Bridging the digital divide: reaching vulnerable populations.

    Science.gov (United States)

    Chang, Betty L; Bakken, Suzanne; Brown, S Scott; Houston, Thomas K; Kreps, Gary L; Kukafka, Rita; Safran, Charles; Stavri, P Zoe

    2004-01-01

    The AMIA 2003 Spring Congress entitled "Bridging the Digital Divide: Informatics and Vulnerable Populations" convened 178 experts including medical informaticians, health care professionals, government leaders, policy makers, researchers, health care industry leaders, consumer advocates, and others specializing in health care provision to underserved populations. The primary objective of this working congress was to develop a framework for a national agenda in information and communication technology to enhance the health and health care of underserved populations. Discussions during four tracks addressed issues and trends in information and communication technologies for underserved populations, strategies learned from successful programs, evaluation methodologies for measuring the impact of informatics, and dissemination of information for replication of successful programs. Each track addressed current status, ideal state, barriers, strategies, and recommendations. Recommendations of the breakout sessions were summarized under the overarching themes of Policy, Funding, Research, and Education and Training. The general recommendations emphasized four key themes: revision in payment and reimbursement policies, integration of health care standards, partnerships as the key to success, and broad dissemination of findings including specific feedback to target populations and other key stakeholders.

  16. Quantum key distribution: vulnerable if imperfectly implemented

    Science.gov (United States)

    Leuchs, G.

    2013-10-01

    We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

  17. Carotid ultrasound phenotypes in vulnerable populations

    Directory of Open Access Journals (Sweden)

    Spence J David

    2006-11-01

    Full Text Available Abstract Background Biomarkers of carotid atherosclerosis range from those that are widely available and relatively simple to measure such as serum cholesterol levels, and B-mode Ultrasound measurement of intima media thickness (IMT to those that are more complex and technologically demanding but perhaps potentially more sensitive and specific to disease such as total plaque volume and total plaque area measured from 3-dimensional ultrasound images. In this study we measured and compared intima media thickness (IMT, total plaque volume (TPV and total plaque area (TPA in two separate populations, both vulnerable to carotid atherosclerosis. Methods In total, 88 subjects (mean age 72.8 with carotid stenosis of at least 60%, based on a peak Doppler flow, and 82 subjects (mean age 60.9 with diabetic nephropathy were assessed in a cross-sectional study. Conventional atherosclerotic risk factors were examined and the associations and correlations between these and carotid ultrasound phenotypes measured from B-mode and 3-dimensional ultrasound images were assessed. Results IMT and TPV were only modestly correlated in the two separate populations (r = .6, p Conclusion IMT and TPV were modestly correlated in a diabetic patient population and only TPV was associated with diabetes and the presence of plaque ulcerations in a diabetic population and carotid stenosis group. The 3-dimensional information provided by TPV can be critically important in unmasking association with risk factors not observed with less complex single-dimension assessments of carotid atherosclerosis such as those provided by IMT.

  18. VULNERABILITIES IN ACHIEVING AGRICULTURAL POTENTIAL OF ROMANIA

    Directory of Open Access Journals (Sweden)

    Cristian TEODOR

    2014-10-01

    Full Text Available The land fund of Romania represents a huge potential for agriculture. The potential has proved difficult to achieve, and among the main vulnerabilities researched lately, we have identified the decline in consumption of vegetable crops, fruit and meat, determined by the declining purchasing power in Romania and the European Union's common market. Therefore the degree of achievement of the agricultural potential is directly influenced by economic developments in Romania and EU Member States. The technical endowment of Romanian farmers is an old and still unresolved problem. Even though Romania has benefited from EU pre-accession funds and still benefits from it, they proved to be a poor solution for Romanian farmers with farm machinery equipment. Indicator analysis of the evolution of the number of tractors in Romania in the post-accession period, reveals that the actual number of tractors in the period under review increased overall, but even if the total number of tractors in Romania increased from 2007 until 2012, UAA (ha per a tractor is almost constant.

  19. Assessing the vulnerability of buildings to tsunami in Sydney

    Directory of Open Access Journals (Sweden)

    F. Dall'Osso

    2009-12-01

    Full Text Available Australia is vulnerable to the impacts of tsunamis and exposure along the SE coast of New South Wales is especially high. Significantly, this is the same area reported to have been affected by repeated large magnitude tsunamis during the Holocene. Efforts are under way to complete probabilistic risk assessments for the region but local government planners and emergency risk managers need information now about building vulnerability in order to develop appropriate risk management strategies. We use the newly revised PTVA-3 Model (Dall'Osso et al., 2009 to assess the relative vulnerability of buildings to damage from a "worst case tsunami" defined by our latest understanding of regional risk – something never before undertaken in Australia. We present selected results from an investigation of building vulnerability within the local government area of Manly – an iconic coastal area of Sydney. We show that a significant proportion of buildings (in particular, residential structures are classified as having "High" and "Very High" Relative Vulnerability Index scores. Furthermore, other important buildings (e.g., schools, nursing homes and transport structures are also vulnerable to damage. Our results have serious implications for immediate emergency risk management, longer-term land-use zoning and development, and building design and construction standards. Based on the work undertaken here, we recommend further detailed assessment of the vulnerability of coastal buildings in at risk areas, development of appropriate risk management strategies and a detailed program of community engagement to increase overall resilience.

  20. Groundwater vulnerability to pollution mapping of Ranchi district using GIS.

    Science.gov (United States)

    Krishna, R; Iqbal, J; Gorai, A K; Pathak, G; Tuluri, F; Tchounwou, P B

    2015-12-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table (D), net recharge (R), aquifer media (A), soil media (S), topography or slope (T), impact of vadose zone (I) and hydraulic Conductivity(C)] for generating the groundwater vulnerability to pollution map. The model was applied for assessing the groundwater vulnerability to pollution in Ranchi district, Jharkhand, India. The model was validated by comparing the model output (vulnerability indices) with the observed nitrate concentrations in groundwater in the study area. The reason behind the selection of nitrate is that the major sources of nitrate in groundwater are anthropogenic in nature. Groundwater samples were collected from 30 wells/tube wells distributed in the study area. The samples were analyzed in the laboratory for measuring the nitrate concentrations in groundwater. A sensitivity analysis of the integrated model was performed to evaluate the influence of single parameters on groundwater vulnerability index. New weights were computed for each input parameters to understand the influence of individual hydrogeological factors in vulnerability indices in the study area. Aquifer vulnerability maps generated in this study can be used for environmental planning and groundwater management.

  1. Population vulnerability to storm surge flooding in coastal Virginia, USA.

    Science.gov (United States)

    Liu, Hua; Behr, Joshua G; Diaz, Rafael

    2016-07-01

    This study aims to assess the vulnerability of populations to storm surge flooding in 12 coastal localities of Virginia, USA. Population vulnerability is assessed by way of 3 physical factors (elevation, slope, and storm surge category), 3 built-up components (road availability, access to hospitals, and access to shelters), and 3 household conditions (storm preparedness, financial constraints to recovering from severe weather events, and health fragility). Fuzzy analysis is used to generate maps illustrating variation in several types of population vulnerability across the region. When considering physical factors and household conditions, the most vulnerable neighborhoods to sea level rise and storm surge flooding are largely found in urban areas. However, when considering access to critical infrastructure, we find rural residents to be more vulnerable than nonrural residents. These detailed assessments can inform both local and state governments in catastrophic planning. In addition, the methodology may be generalized to assess vulnerability in other coastal corridors and communities. The originality is highlighted by evaluating socioeconomic conditions at refined scale, incorporating a broader range of human perceptions and predispositions, and employing a geoinformatics approach combining physical, built-up, and socioeconomic conditions for population vulnerability assessment. Integr Environ Assess Manag 2016;12:500-509. © 2015 SETAC. © 2015 SETAC.

  2. An Extreme-Value Approach to Anomaly Vulnerability Identification

    Science.gov (United States)

    Everett, Chris; Maggio, Gaspare; Groen, Frank

    2010-01-01

    The objective of this paper is to present a method for importance analysis in parametric probabilistic modeling where the result of interest is the identification of potential engineering vulnerabilities associated with postulated anomalies in system behavior. In the context of Accident Precursor Analysis (APA), under which this method has been developed, these vulnerabilities, designated as anomaly vulnerabilities, are conditions that produce high risk in the presence of anomalous system behavior. The method defines a parameter-specific Parameter Vulnerability Importance measure (PVI), which identifies anomaly risk-model parameter values that indicate the potential presence of anomaly vulnerabilities, and allows them to be prioritized for further investigation. This entails analyzing each uncertain risk-model parameter over its credible range of values to determine where it produces the maximum risk. A parameter that produces high system risk for a particular range of values suggests that the system is vulnerable to the modeled anomalous conditions, if indeed the true parameter value lies in that range. Thus, PVI analysis provides a means of identifying and prioritizing anomaly-related engineering issues that at the very least warrant improved understanding to reduce uncertainty, such that true vulnerabilities may be identified and proper corrective actions taken.

  3. Rural Nevada and climate change: vulnerability, beliefs, and risk perception.

    Science.gov (United States)

    Safi, Ahmad Saleh; Smith, William James; Liu, Zhnongwei

    2012-06-01

    In this article, we present the results of a study investigating the influence of vulnerability to climate change as a function of physical vulnerability, sensitivity, and adaptive capacity on climate change risk perception. In 2008/2009, we surveyed Nevada ranchers and farmers to assess their climate change-related beliefs, and risk perceptions, political orientations, and socioeconomic characteristics. Ranchers' and farmers' sensitivity to climate change was measured through estimating the proportion of their household income originating from highly scarce water-dependent agriculture to the total income. Adaptive capacity was measured as a combination of the Social Status Index and the Poverty Index. Utilizing water availability and use, and population distribution GIS databases; we assessed water resource vulnerability in Nevada by zip code as an indicator of physical vulnerability to climate change. We performed correlation tests and multiple regression analyses to examine the impact of vulnerability and its three distinct components on risk perception. We find that vulnerability is not a significant determinant of risk perception. Physical vulnerability alone also does not impact risk perception. Both sensitivity and adaptive capacity increase risk perception. While age is not a significant determinant of it, gender plays an important role in shaping risk perception. Yet, general beliefs such as political orientations and climate change-specific beliefs such as believing in the anthropogenic causes of climate change and connecting the locally observed impacts (in this case drought) to climate change are the most prominent determinants of risk perception. © 2012 Society for Risk Analysis.

  4. CURRENT COORDINATES OF ROMANIAN VULNERABLE GROUPS IN THE EUROPEAN CONTEXT

    Directory of Open Access Journals (Sweden)

    MARIANA BĂLAN

    2014-06-01

    Full Text Available Often, in European Union and Romanian legal documents or in research reports, the term ‘vulnerable group’ is used similarly to disadvantaged, marginalized, excluded or risk group; all these concepts are related to the broader phenomenon of poverty. The common sense for vulnerability is ‘weakness’, ‘lack of defense’, ‘lack of means’. Vulnerable groups are groups without support, which are often in a chronic state of poverty, being unable to take advantage of opportunities or to defend themselves against problems that may arise. This paper presents a brief analysis of the structure and size of vulnerable groups in the European Union and an analysis of their particularities for Romania. The paper also proposes a systematic treatment, but not of all the consequences of the global crisis on Romanian vulnerable groups. The main features of the Roma minority and vulnerable women from Romania, their demographic profile and spatial distribution, the employment policies for these vulnerable groups are highlighted.

  5. Educational disparities in the prevalence and consequence of physical vulnerability.

    Science.gov (United States)

    Clark, Daniel O; Stump, Timothy E; Miller, Douglas K; Long, J Scott

    2007-05-01

    The purpose of this study was to estimate educational differences in the prevalence and mortality consequence of physical vulnerability among older adults in the United States. Data came from the 1998 and 2000 waves of the Health and Retirement Study, a nationally representative cross-sectional and prospective cohort study of community-based adults aged 65 and older. We created a physical vulnerability score from age, gender, and self-reported disability measures and measured socioeconomic status via educational attainment. Mortality data came from the National Death Index. In the 1998 cohort, high physical vulnerability was more than 3 times more prevalent in individuals with less than 12 years of education compared to those with 16 or more years of education. Although less educated older adults had a higher probability of death overall, evidence of educational differences in the mortality consequence of high physical vulnerability was limited. In 2000, 2.16 million older adults had high physical vulnerability, and more than one half (53%) of these adults had less than 12 years of education. In persons 65 years of age or older, educational differences are more apparent in the prevalence of physical vulnerability than in the mortality consequence of that vulnerability.

  6. Soil compaction vulnerability at Organ Pipe Cactus National Monument, Arizona

    Science.gov (United States)

    Webb, Robert H.; Nussear, Kenneth E.; Carmichael, Shinji; Esque, Todd C.

    2014-01-01

    Compaction vulnerability of different types of soils by hikers and vehicles is poorly known, particularly for soils of arid and semiarid regions. Engineering analyses have long shown that poorly sorted soils (for example, sandy loams) compact to high densities, whereas well-sorted soils (for example, eolian sand) do not compact, and high gravel content may reduce compaction. Organ Pipe Cactus National Monument (ORPI) in southwestern Arizona, is affected greatly by illicit activities associated with the United States–Mexico border, and has many soils that resource managers consider to be highly vulnerable to compaction. Using geospatial soils data for ORPI, compaction vulnerability was estimated qualitatively based on the amount of gravel and the degree of sorting of sand and finer particles. To test this qualitative assessment, soil samples were collected from 48 sites across all soil map units, and undisturbed bulk densities were measured. A scoring system was used to create a vulnerability index for soils on the basis of particle-size sorting, soil properties derived from Proctor compaction analyses, and the field undisturbed bulk densities. The results of the laboratory analyses indicated that the qualitative assessments of soil compaction vulnerability underestimated the area of high vulnerability soils by 73 percent. The results showed that compaction vulnerability of desert soils, such as those at ORPI, can be quantified using laboratory tests and evaluated using geographic information system analyses, providing a management tool that managers potentially could use to inform decisions about activities that reduce this type of soil disruption in protected areas.

  7. Volcanic risk assessment: Quantifying physical vulnerability in the built environment

    Science.gov (United States)

    Jenkins, S. F.; Spence, R. J. S.; Fonseca, J. F. B. D.; Solidum, R. U.; Wilson, T. M.

    2014-04-01

    This paper presents structured and cost-effective methods for assessing the physical vulnerability of at-risk communities to the range of volcanic hazards, developed as part of the MIA-VITA project (2009-2012). An initial assessment of building and infrastructure vulnerability has been carried out for a set of broadly defined building types and infrastructure categories, with the likelihood of damage considered separately for projectile impact, ash fall loading, pyroclastic density current dynamic pressure and earthquake ground shaking intensities. In refining these estimates for two case study areas: Kanlaon volcano in the Philippines and Fogo volcano in Cape Verde, we have developed guidelines and methodologies for carrying out physical vulnerability assessments in the field. These include identifying primary building characteristics, such as construction material and method, as well as subsidiary characteristics, for example the size and prevalence of openings, that may be important in assessing eruption impacts. At-risk buildings around Kanlaon were found to be dominated by timber frame buildings that exhibit a high vulnerability to pyroclastic density currents, but a low vulnerability to failure from seismic shaking. Around Fogo, the predominance of unreinforced masonry buildings with reinforced concrete slab roofs suggests a high vulnerability to volcanic earthquake but a low vulnerability to ash fall loading. Given the importance of agriculture for local livelihoods around Kanlaon and Fogo, we discuss the potential impact of infrastructure vulnerability for local agricultural economies, with implications for volcanic areas worldwide. These methodologies and tools go some way towards offering a standardised approach to carrying out future vulnerability assessments for populated volcanic areas.

  8. Ultrasound Tissue Characterization of Vulnerable Atherosclerotic Plaque

    Directory of Open Access Journals (Sweden)

    Eugenio Picano

    2015-05-01

    Full Text Available A thrombotic occlusion of the vessel fed by ruptured coronary atherosclerotic plaque may result in unstable angina, myocardial infarction or death, whereas embolization from a plaque in carotid arteries may result in transient ischemic attack or stroke. The atherosclerotic plaque prone to such clinical events is termed high-risk or vulnerable plaque, and its identification in humans before it becomes symptomatic has been elusive to date. Ultrasonic tissue characterization of the atherosclerotic plaque is possible with different techniques—such as vascular, transesophageal, and intravascular ultrasound—on a variety of arterial segments, including carotid, aorta, and coronary districts. The image analysis can be based on visual, video-densitometric or radiofrequency methods and identifies three distinct textural patterns: hypo-echoic (corresponding to lipid- and hemorrhage-rich plaque, iso- or moderately hyper-echoic (fibrotic or fibro-fatty plaque, and markedly hyperechoic with shadowing (calcific plaque. Hypoechoic or dishomogeneous plaques, with spotty microcalcification and large plaque burden, with plaque neovascularization and surface irregularities by contrast-enhanced ultrasound, are more prone to clinical complications than hyperechoic, extensively calcified, homogeneous plaques with limited plaque burden, smooth luminal plaque surface and absence of neovascularization. Plaque ultrasound morphology is important, along with plaque geometry, in determining the atherosclerotic prognostic burden in the individual patient. New quantitative methods beyond backscatter (to include speed of sound, attenuation, strain, temperature, and high order statistics are under development to evaluate vascular tissues. Although not yet ready for widespread clinical use, tissue characterization is listed by the American Society of Echocardiography roadmap to 2020 as one of the most promising fields of application in cardiovascular ultrasound imaging

  9. Vulnerability of critical infrastructures : identifying critical nodes.

    Energy Technology Data Exchange (ETDEWEB)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  10. Migration in Vulnerable Deltas: A Research Strategy

    Science.gov (United States)

    Hutton, C.; Nicholls, R. J.; Allan, A.

    2015-12-01

    C. Hutton1, & R. J. Nicholls1, , 1 University of Southampton, University Road, Southampton, Hampshire, United Kingdom, SO17 1BJ. cwh@geodata. soton.ac.ukAbstractGlobally, deltas contain 500 million people and with rising sea levels often linked to large number of forced migrants are expected in the coming century. However, migration is already a major process in deltas, such as the growth of major cities such as Dhaka and Kolkata. Climate and environmental change interacts with a range of catchment and delta level drivers, which encompass a nexus of sea-level rise, storms, freshwater and sediment supply from the catchment, land degradation, subsidence, agricultural loss and socio-economic stresses. DECCMA (Deltas, Vulnerability and Climate Change: Migration and Adaptation/CARRIA) is investigating migration in the Ganges-Brahmaputra-Meghna (GBM), Mahanadi and Volta Deltas, including the influence of climate change. The research will explore migration from a range of perspectives including governance and stakeholder analysis, demographic analysis, household surveys of sending and receiving areas, macro-economic analysis, and hazards and hotspot analysis both historically and into the future. Migration under climate change will depend on other adaptation in the deltas and this will be examined. Collectively, integrated analysis will be developed to examine migration, other adaptation and development pathways with a particular focus on the implications for the poorest. This will require the development of input scenarios, including expert-derived exogenous scenarios (e.g., climate change) and endogenous scenarios of the delta developed in a participatory manner. This applied research will facilitate decision support methods for the development of deltas under climate change, with a focus on migration and other adaptation strategies.

  11. GIS Based Measurement and Regulatory Zoning of Urban Ecological Vulnerability

    Directory of Open Access Journals (Sweden)

    Xiaorui Zhang

    2015-07-01

    Full Text Available Urban ecological vulnerability is measured on the basis of ecological sensitivity and resilience based on the concept analysis of vulnerability. GIS-based multicriteria decision analysis (GIS-MCDA methods are used, supported by the spatial analysis tools of GIS, to define different levels of vulnerability for areas of the urban ecology. These areas are further classified into different types of regulatory zones. Taking the city of Hefei in China as the empirical research site, this study uses GIS-MCDA, including the index system, index weights and overlay rules, to measure the degree of its ecological vulnerability on the GIS platform. There are eight indices in the system. Raking and analytical hierarchy process (AHP methods are used to calculate index weights according to the characteristics of the index system. The integrated overlay rule, including selection of the maximum value, and weighted linear combination (WLC are applied as the overlay rules. In this way, five types of vulnerability areas have been classified as follows: very low vulnerability, low vulnerability, medium vulnerability, high vulnerability and very high vulnerability. They can be further grouped into three types of regulatory zone of ecological green line, ecological grey line and ecological red line. The study demonstrates that ecological green line areas are the largest (53.61% of the total study area and can be intensively developed; ecological grey line areas (19.59% of the total area can serve as the ecological buffer zone, and ecological red line areas (26.80% cannot be developed and must be protected. The results indicate that ecological green line areas may provide sufficient room for future urban development in Hefei city. Finally, the respective regulatory countermeasures are put forward. This research provides a scientific basis for decision-making around urban ecological protection, construction and sustainable development. It also provides theoretical method

  12. Visiting relatives and friends (VFR), pregnant, and other vulnerable travelers.

    Science.gov (United States)

    Matteelli, Alberto; Carvalho, Anna Cristina C; Bigoni, Sara

    2012-09-01

    With industrial development and expanding tourism, many people now have an opportunity to travel to many previously unreachable foreign destinations. Travelers with medical or physical conditions or who are vulnerable because of pregnancy or age (pediatric or elderly traveler), require specialist support and advice before traveling. Immigrants who return to their country of birth to visit relatives and friends should be classified as vulnerable travelers, as they have been shown to carry a disproportionate burden of travel-related morbidity. In this article, we explore the major risks to health and the main preventive strategies appropriate to the most vulnerable travelers.

  13. Indicators of hazard, vulnerability and risk in urban drainage

    DEFF Research Database (Denmark)

    Hauger, Mikkel Boye; Mouchel, J.-M.; Mikkelsen, Peter Steen

    2006-01-01

    An alternative definition of risk is proposed as risk being a function of the hazard, which is related to the risk source and the vulnerability, which is related to the risk object. The same hazard will not cause the same effect on all risk objects, Therefore, vulnerability is introduced...... as a system-dependent property to be the link between the hazard and the effect so that the combination of the occurrence of a hazard and the vulnerability of an object results in the effect. In risk communication indicators are helpful since they help to simplify the message that has to be communicated...

  14. Perfectionism and Depression: Vulnerabilities Nurses Need to Understand

    Directory of Open Access Journals (Sweden)

    Sherri Melrose

    2011-01-01

    Full Text Available Striving for excellence is an admirable goal. Adaptive or healthy perfectionism can drive ambition and lead to extraordinary accomplishments. High-achieving people often show signs of perfectionism. However, maladaptive, unhealthy, or neurotic perfectionism, where anything less than perfect is unacceptable, can leave individuals vulnerable to depression. In both personal and professional relationships, nurses need to understand how accepting only perfection in self and others is likely to lead to emotional distress. This paper reviews perfectionism as a personality style, comments on perfectionism and high achievement, discusses vulnerabilities to depression, identifies how to recognize perfectionists, and presents balancing strategies perfectionists can implement to lessen their vulnerability to depression.

  15. Exploring the plexus of context and consequences : An empirical test of a theory of disaster vulnerability

    NARCIS (Netherlands)

    Dückers, Michel; Frerks, Georg; Birkmann, Jörn

    2015-01-01

    What determines the disaster vulnerability of countries? In this study a theoretical model was tested, linking disaster vulnerability to physical hazards and cultural and historical factors. Associations between the World Vulnerability Index and Hofstede's cultural dimensions scores were explored us

  16. Blind Spots on Achilles’ Heel: The Limitations of Vulnerability and Resilience Mapping in Research

    NARCIS (Netherlands)

    Heesen, Jessica; Lorenz, Daniel F.; Nagenborg, Michael; Wenzel, Bettina; Voss, Martin

    2014-01-01

    The mapping of vulnerability and resilience has become an important tool for vulnerability and resilience research. By definition, maps are selective representations. However, the predominant methods of mapping also have constraints. When addressing vulnerability and resilience, these limitations, b

  17. 软件脆弱性分析%Software Vulnerability Analysis

    Institute of Scientific and Technical Information of China (English)

    李新明; 李艺; 徐晓梅; 韩存兵

    2003-01-01

    Software vulnerability is the root reason that cause computer system security problem. It' s a new researchtopic to analyze vulnerability based on the essence of software vulnerability. This paper analyzes the main definitionsand taxonomies of vulnerability,studies vulnerability database and tools for vulnerability analysis and detection,andgives the details about what caused the most common vnlnerabilities in the LINUX/UNIX operating systems.

  18. Spatial vulnerability units – expert-based spatial modelling of socio-economic vulnerability in the Salzach catchment, Austria

    Directory of Open Access Journals (Sweden)

    S. Kienberger

    2009-05-01

    Full Text Available The assessment of vulnerability has moved to centre-stage of the debate between different scientific disciplines related to climate change and disaster risk management. Composed by a combination of social, economical, physical and environmental factors the assessment implies combining different domains as well as quantitative with qualitative data and makes it therefore a challenge to identify an integrated metric for vulnerability. In this paper we define vulnerability in the context of climate change, targeting the hazard "flood". The developed methodology is being tested in the Salzach river catchment in Austria, which is largely prone to floods. The proposed methodology allows the spatial quantification of vulnerability and the identification of vulnerability units. These units build upon the geon concept which acts as a framework for the regionalization of continuous spatial information according to defined parameters of homogeneity. Using geons, we are capable of transforming singular domains of information on specific systemic components to policy-relevant, conditioned information. Considering the fact that vulnerability is not directly measurable and due to its complex dimension and social construction an expert-based approach has been chosen. Established methodologies such as Multicriteria Decision Analysis, Delphi exercises and regionalization approaches are being integrated. The method not only enables the assessment of vulnerability independent from administrative boundaries, but also applies an aggregation mode which reflects homogenous vulnerability units. This supports decision makers to reflect on complex issues such as vulnerability. Next to that, the advantage is to decompose the units to their underlying domains. Feedback from disaster management experts indicates that the approach helps to improve the design of measures aimed at strengthening preparedness and mitigation. From this point of view, we reach a step closer towards

  19. Spatial vulnerability units - expert-based spatial modelling of socio-economic vulnerability in the Salzach catchment, Austria

    Science.gov (United States)

    Kienberger, S.; Lang, S.; Zeil, P.

    2009-05-01

    The assessment of vulnerability has moved to centre-stage of the debate between different scientific disciplines related to climate change and disaster risk management. Composed by a combination of social, economical, physical and environmental factors the assessment implies combining different domains as well as quantitative with qualitative data and makes it therefore a challenge to identify an integrated metric for vulnerability. In this paper we define vulnerability in the context of climate change, targeting the hazard "flood". The developed methodology is being tested in the Salzach river catchment in Austria, which is largely prone to floods. The proposed methodology allows the spatial quantification of vulnerability and the identification of vulnerability units. These units build upon the geon concept which acts as a framework for the regionalization of continuous spatial information according to defined parameters of homogeneity. Using geons, we are capable of transforming singular domains of information on specific systemic components to policy-relevant, conditioned information. Considering the fact that vulnerability is not directly measurable and due to its complex dimension and social construction an expert-based approach has been chosen. Established methodologies such as Multicriteria Decision Analysis, Delphi exercises and regionalization approaches are being integrated. The method not only enables the assessment of vulnerability independent from administrative boundaries, but also applies an aggregation mode which reflects homogenous vulnerability units. This supports decision makers to reflect on complex issues such as vulnerability. Next to that, the advantage is to decompose the units to their underlying domains. Feedback from disaster management experts indicates that the approach helps to improve the design of measures aimed at strengthening preparedness and mitigation. From this point of view, we reach a step closer towards validation of the

  20. Soft Error Vulnerability of Iterative Linear Algebra Methods

    Energy Technology Data Exchange (ETDEWEB)

    Bronevetsky, G; de Supinski, B

    2008-01-19

    Devices are increasingly vulnerable to soft errors as their feature sizes shrink. Previously, soft error rates were significant primarily in space and high-atmospheric computing. Modern architectures now use features so small at sufficiently low voltages that soft errors are becoming important even at terrestrial altitudes. Due to their large number of components, supercomputers are particularly susceptible to soft errors. Since many large scale parallel scientific applications use iterative linear algebra methods, the soft error vulnerability of these methods constitutes a large fraction of the applications overall vulnerability. Many users consider these methods invulnerable to most soft errors since they converge from an imprecise solution to a precise one. However, we show in this paper that iterative methods are vulnerable to soft errors, exhibiting both silent data corruptions and poor ability to detect errors. Further, we evaluate a variety of soft error detection and tolerance techniques, including checkpointing, linear matrix encodings, and residual tracking techniques.

  1. Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems

    Directory of Open Access Journals (Sweden)

    Xiaming Ye

    2015-06-01

    Full Text Available The distribution automation system (DAS is vulnerable to cyber-attacks due to the widespread use of terminal devices and standard communication protocols. On account of the cost of defense, it is impossible to ensure the security of every device in the DAS. Given this background, a novel quantitative vulnerability assessment model of cyber security for DAS is developed in this paper. In the assessment model, the potential physical consequences of cyber-attacks are analyzed from two levels: terminal device level and control center server level. Then, the attack process is modeled based on game theory and the relationships among different vulnerabilities are analyzed by introducing a vulnerability adjacency matrix. Finally, the application process of the proposed methodology is illustrated through a case study based on bus 2 of the Roy Billinton Test System (RBTS. The results demonstrate the reasonability and effectiveness of the proposed methodology.

  2. Scientists ID Key Fetal Cells Vulnerable to Zika

    Science.gov (United States)

    ... html Scientists ID Key Fetal Cells Vulnerable to Zika Lab study suggests possible mechanism for birth defects ... 29, 2016 (HealthDay News) -- The devastating mosquito-borne Zika virus can infect cells that play a role ...

  3. Vulnerability to diffuse pollution of European soils and groundwater

    NARCIS (Netherlands)

    Meinardi CR; Beusen AHW; Bollen MJS; Klepper O; LBG; CWM

    1994-01-01

    From the Atlantic Ocean to the Ural Mountains, European soils and groundwater are threatened by diffuse pollution derived from various chemicals used in modern agriculture and by increased atmospheric deposition of pollutants. The investigated vulnerability of soils (including groundwater) to

  4. Population vulnerability of marine birds within the California Current System

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Six metrics were used to determine Population Vulnerability: global population size, annual occurrence in the California Current System (CCS), percent of the...

  5. Road Network Vulnerability Analysis Based on Improved Ant Colony Algorithm

    Directory of Open Access Journals (Sweden)

    Yunpeng Wang

    2014-01-01

    Full Text Available We present an improved ant colony algorithm-based approach to assess the vulnerability of a road network and identify the critical infrastructures. This approach improves computational efficiency and allows for its applications in large-scale road networks. This research involves defining the vulnerability conception, modeling the traffic utility index and the vulnerability of the road network, and identifying the critical infrastructures of the road network. We apply the approach to a simple test road network and a real road network to verify the methodology. The results show that vulnerability is directly related to traffic demand and increases significantly when the demand approaches capacity. The proposed approach reduces the computational burden and may be applied in large-scale road network analysis. It can be used as a decision-supporting tool for identifying critical infrastructures in transportation planning and management.

  6. Climate Change, Health, and Vulnerability in Canadian Northern Aboriginal Communities

    National Research Council Canada - National Science Library

    Christopher Furgal; Jacinthe Seguin

    2006-01-01

    Background: Canada has recognized that Aboriginal and northern communities in the country face unique challenges and that there is a need to expand the assessment of vulnerabilities to climate change to include these communities...

  7. Vulnerability to air pollution: To intervene or not to intervene

    CSIR Research Space (South Africa)

    John, J

    2008-11-01

    Full Text Available , specifically air pollution, exposure. A vulnerability framework, addressing issues of susceptibility, exposure and coping, was applied. A survey consisting of 377 household questionnaires was conducted in eMbalenhle, a low-income peri-urban settlement...

  8. Groundwater Vulnerability Assessment using Drastic Index and GIS ...

    African Journals Online (AJOL)

    Michael

    2016-06-01

    Jun 1, 2016 ... The assessment of groundwater vulnerability to contamination has become an important element for ... agriculture has considerably reduced the organic matter to very low levels in some areas. Soils ..... Natural attenuation.

  9. Assessment on Vulnerable Youths Integration to Dar es Salaam ...

    African Journals Online (AJOL)

    Abstract. The present study assessed the possibility of integrating vulnerable youths to ... crisis facing Dar es Salaam City using a case study of Kinondoni Municipality. ... Research methodology involved the use of quantitative method to collect ...

  10. Special and Vulnerable Groups on Access, Success and Equity on ...

    African Journals Online (AJOL)

    Special and Vulnerable Groups on Access, Success and Equity on Open and ... Open and Distance Learning (ODL) assisted by the use of ICT, has proven to ... for individual institutions to undertake; Inadequacy of personnel and especially ...

  11. Looming vulnerability to threat: a cognitive paradigm for anxiety.

    Science.gov (United States)

    Riskind, J H

    1997-08-01

    The concept that perceived threat or danger is a cognitive antecedent of anxiety is central in clinical psychology, personality psychology, and social psychology. The aim in the current article is to review this concept and present a new conception called the looming vulnerability model. Looming vulnerability is conceptualized as an important cognitive component of threat or danger that elicits anxiety, sensitizes the individual to signs of movement and threat, biases cognitive processing, and makes the anxiety more persistent and less likely to habituate. In addition, it is postulated as a principal theme that discriminates anxiety and focal fears from depression. The looming vulnerability model integrates a disparate collection of findings and integrates the conceptualization of anxiety and fear with ethological and developmental observations. The social-cognitive and evolutionary basis of the sense of looming vulnerability are discussed, as well as its roots in cognitive schemata (fear scripts), its state elicitation by several potential classes of antecedent conditions, and possible treatment implications.

  12. Vulnerability Analysis for Complex Networks Using Aggressive Abstraction

    CERN Document Server

    Colbaugh, Richard

    2010-01-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the prop...

  13. analysis and mapping of climate change risk and vulnerability in ...

    African Journals Online (AJOL)

    ACSS

    regarding vulnerability to climate change at the local scale. This study was ... prime contributor to food security (CEEPA, 2006). Climate ... developing world, home to half of the world's currently ... change impacts on the landscape to more.

  14. Psychosocial support for orphans and vulnerable children in public ...

    African Journals Online (AJOL)

    Hennie

    Keywords: challenges; interventions; life orientation skills; orphans and vulnerable children; training. Introduction ... poverty, limited access to services, physical, sexual and emotional abuse ... the psychological problems of children that lead to.

  15. Geography students learn more about risk and vulnerability

    CSIR Research Space (South Africa)

    Murambadoro, M

    2011-11-01

    Full Text Available As part of the outreach programme the South African Risk and Vulnerability Atlas (SARVA) was introduced to geography students of the Society of South African Geographers Students. The students were attending their annual conference hosted...

  16. Social Vulnerability Index, Arizona, 2011, US EPA Region 9

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Social Vulnerability Index is derived from the 2000 US Census data. The fields included are percent minority, median household income, age (under 18 and over...

  17. Social Vulnerability Index, Region 9, 2011, US EPA Region 9

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Social Vulnerability Index is derived from the 2000 US Census data. The fields included are percent minority, median household income, age (under 18 and over...

  18. USGS Map service: Coastal Vulnerability to Sea-Level Rise

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The coastal vulnerability index (CVI)provides a preliminary overview, at a National scale, of the relative susceptibility of the Nation's coast to sea-level rise....

  19. Assessment of the needs of vulnerable youth populations in post ...

    African Journals Online (AJOL)

    parenting, and community cohesion.4 In Liberia, a survey of households and clinics ... emotional, medical, psychological, and educational. These findings can be .... effective interventions for helping different vulnerable groups of young people ...

  20. FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

    CERN Document Server

    Fung, Adonis P H; Wong, T Y

    2012-01-01

    Modern HTML forms are designed to generate form controls dynamically and submit over AJAX as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we overcome a number of client-side challenges that used to make automated fuzzing of form submissions difficult and unfaithful. We build FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

  1. USGS Map service: Coastal Vulnerability to Sea-Level Rise

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The coastal vulnerability index (CVI)provides a preliminary overview, at a National scale, of the relative susceptibility of the Nation's coast to sea-level rise....

  2. Apoyo a colectivos vulnerables en la universidad. El proyecto ACCEDES

    OpenAIRE

    Castro, Diego; Rodríguez-Gómez, David; Silva, José Manuel

    2012-01-01

    Texto apresentado no XII CIOIE - Congreso Interuniversitario de Organización de Instituciones Educativas, Simposio 7 - Organización y atención a grupos vulnerables, coordenado por Joaquín Gairín.

  3. Displacement vulnerability of marine birds within the California Current System

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Two metrics were used to determine Collision Vulnerability: Macro-avoidance and habitat flexibility. Macro-avoidance (MA)—The macro-avoidance values for species...

  4. Collision vulnerability of marine birds within the California Current System

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Four metrics were used to determine Collision Vulnerability: Diurnal and nocturnal flight activity, flight-height (defined as time spent in rotor sweep zone), and...

  5. Population vulnerability of marine birds within the California Current System

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Six metrics were used to determine Population Vulnerability: global population size, annual occurrence in the California Current System (CCS), percent of the...

  6. Spectroscopy to improve identification of vulnerable plaques in cardiovascular disease.

    Science.gov (United States)

    Bruggink, Janneke L M; Meerwaldt, Robbert; van Dam, Gooitzen M; Lefrandt, Joop D; Slart, Riemer H J A; Tio, René A; Smit, Andries J; Zeebregts, Clark J

    2010-01-01

    Many apparent healthy persons die from cardiovascular disease, despite major advances in prevention and treatment of cardiovascular disease. Traditional cardiovascular risk factors are able to predict cardiovascular events in the long run, but fail to assess current disease activity or nearby cardiovascular events. There is a clear relation between the occurrence of cardiovascular events and the presence of so-called vulnerable plaques. These vulnerable plaques are characterized by active inflammation, a thin cap and a large lipid pool. Spectroscopy is an optical imaging technique which depicts the interaction between light and tissues, and thereby shows the biochemical composition of tissues. In recent years, impressive advances have been made in spectroscopy technology and intravascular spectroscopy is able to assess the composition of plaques of interest and thereby to identify and actually quantify plaque vulnerability. This review summarizes the current evidence for spectroscopy as a measure of plaque vulnerability and discusses the potential role of intravascular spectroscopic imaging techniques.

  7. An Integrated Method of Supply Chains Vulnerability Assessment

    Directory of Open Access Journals (Sweden)

    Jiaguo Liu

    2016-01-01

    Full Text Available Supply chain vulnerability identification and evaluation are extremely important to mitigate the supply chain risk. We present an integrated method to assess the supply chain vulnerability. The potential failure mode of the supply chain vulnerability is analyzed through the SCOR model. Combining the fuzzy theory and the gray theory, the correlation degree of each vulnerability indicator can be calculated and the target improvements can be carried out. In order to verify the effectiveness of the proposed method, we use Kendall’s tau coefficient to measure the effect of different methods. The result shows that the presented method has the highest consistency in the assessment compared with the other two methods.

  8. Collision vulnerability of marine birds within the California Current System

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Four metrics were used to determine Collision Vulnerability: Diurnal and nocturnal flight activity, flight-height (defined as time spent in rotor sweep zone), and...

  9. Displacement vulnerability of marine birds within the California Current System

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Two metrics were used to determine Collision Vulnerability: Macro-avoidance and habitat flexibility. Macro-avoidance (MA)—The macro-avoidance values for species...

  10. Vulnerability of permafrost carbon research coordination network

    Science.gov (United States)

    Schädel, C.; Schuur, E. A. G.; McGuire, A. D.; Canadell, J. G.; Harden, J.; Kuhry, P.; Romanovsky, V. E.; Turetsky, M. R.

    2012-04-01

    Approximately 1700 Pg of soil carbon are stored in the northern circumpolar permafrost zone, more than twice as much carbon than currently contained in the atmosphere. Permafrost thaw, and the microbial decomposition of previously frozen organic carbon, is considered one of the most likely positive feedbacks from terrestrial ecosystems to the atmosphere in a warmer world. Yet, the rate and form of release is highly uncertain but crucial for predicting the strength and timing of this carbon cycle feedback this century and beyond. Here we report on the first products of a new research coordination network (RCN) whose objective is to link biological C cycle research with well-developed networks in the physical sciences focused on the thermal state of permafrost. We found that published literature in the Science Citation Index identified with the search terms 'permafrost' and 'carbon' have increased dramatically in the last decade. Of total publications including those keywords, 86% were published since 2000, 65% since 2005, and 36% since 2008. The first RCN activity consisted of an expert elicitation that revealed the total effect of carbon release from permafrost zone soils in climate is expected to be up to 30-46 Pg C over the next three decades, reaching 242-324 Pg C by 2100 and potentially up to 551-710 Pg C over the next several centuries under the strongest warming scenario presented to the group. These values, expressed in billions of tons of C in CO2 equivalents, combine the effect of C released both as CO2 and as CH4 by accounting for the greater heat-trapping capacity of CH4. However, the higher global warming potential of CH4 means that almost half of the effect of future permafrost zone carbon emissions on climate forcing was expected by this group to be a result of CH4 emissions from wetlands, lakes, and other oxygen-limited environments where organic matter will be decomposing. These results demonstrate the vulnerability of organic C stored in near

  11. Strategies for expanding health insurance coverage in vulnerable populations

    OpenAIRE

    2014-01-01

    Background Health insurance has the potential to improve access to health care and protect people from the financial risks of diseases. However, health insurance coverage is often low, particularly for people most in need of protection, including children and other vulnerable populations. Objectives To assess the effectiveness of strategies for expanding health insurance coverage in vulnerable populations. Search methods We searched Cochrane Central Register of Controlled Trials (CENTRAL), pa...

  12. Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems

    OpenAIRE

    Singh, Dharmendra; Sinha, Rakhi; Songara, Pawan; Rathi, Dr. Rakesh

    2014-01-01

    Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these...

  13. Strengthening DoD Cyber Security with the Vulnerability Market

    Science.gov (United States)

    2014-01-01

    Strengthening DoD Cyber Security with the Vulnerability Market 472Defense ARJ, January 2014, Vol. 21 No. 1: 466–484 music piracy . This event was sanctioned by...keep any vulnerabilities secret and subsequently refuse to patch the products. For 3 weeks in 2000, the Secure Digital Music Initiative (SDMI...the music recording industry and required all participants to sign a nondisclosure agreement prior to accessing SDMI data files (Craver, 2001). Bug

  14. Population vulnerability to geomorphological hazards in Reghin Hills.

    Directory of Open Access Journals (Sweden)

    I. A. Irimus

    2017-05-01

    Full Text Available Vulnerability assessment of population to the actual geomorphological processes are an essential tool in disaster management planning, assessment and loss estimation, and is an important aspect in geomorphological risk reduction to the safety of the population, settlements and human activities. In this paper we propose an analysis of Reghin Hills′ population vulnerability to the current geomorphological processes through physical, spatial. and demographic indicators.

  15. Baltic Climate Vulnerability Assessment Framework : Introduction and Guidelines

    OpenAIRE

    Hjerpe, Mattias; Wilk, Julie

    2010-01-01

    This Vulnerability Assessment Framework was put together within the project Baltic Challenges and Chances for local and regional development generated by Climate Change financed by the European Regional Development Fund and the Baltic Sea Region Programme 2007-2013. The purpose of the framework is to guide and assist the Target Areas (TA) within the project in mapping and analysing the challenges and chances created by climate change. The Vulnerability exercises have originally been developed...

  16. The hack attack - Increasing computer system awareness of vulnerability threats

    Science.gov (United States)

    Quann, John; Belford, Peter

    1987-01-01

    The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).

  17. Ghera: A Repository of Android App Vulnerability Benchmarks

    OpenAIRE

    Mitra, Joydeep; Ranganath, Venkatesh-Prasad

    2017-01-01

    Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due to openness and ubiquitousness of the platform. Despite a slew of research efforts in this space, there is no comprehensive repository of up-to-date and lean benchmarks that contain most of the known Android app vulnerabilities and, consequent...

  18. Application of Fuzzy Cognitive Mapping in Livelihood Vulnerability Analysis

    OpenAIRE

    Eric M. A. Smaling; Andersson, Jens A.; Van Wijk, Mark T.; Chrispen Murungweni; Giller, Ken E.

    2011-01-01

    Feedback mechanisms are important in the analysis of vulnerability and resilience of social-ecological systems, as well as in the analysis of livelihoods, but how to evaluate systems with direct feedbacks has been a great challenge. We applied fuzzy cognitive mapping, a tool that allows analysis of both direct and indirect feedbacks and can be used to explore the vulnerabilities of livelihoods to identified hazards. We studied characteristics and drivers of rural livelihoods in the Great Limp...

  19. Regional Disparity of Vulnerability to Food Insecurity in China

    OpenAIRE

    Brasili, Cristina; Barone, Barbara; Bin, Peng

    2014-01-01

    Paraphrasing the 1996 World Food Summit definition, “food insecurity” exists when “not” all people, “not” at all times, have physical and economic access to sufficient safe and nutritious food. In this perspective, our study examines the relation between spatial inequality and vulnerability to food insecurity from a socioeconomic perspective. A longitudinal analysis is applied to estimate the regional food vulnerability at provincial and sub-provincial level and the rural and urban contributi...

  20. Vulnerability of mountain glaciers in China to climate change

    Institute of Scientific and Technical Information of China (English)

    YANG Jian-Ping; DING Yong-Jian; LIU Shi-Yin; TAN Chun-Ping

    2015-01-01

    Mountain glaciers in China are an important water source for both China and adjoining countries, and therefore their adaptation to glacier change is crucial in relation to maintaining populations. This study aims to improve our understanding of glacial vulnerability to climate change to establish adaptation strategies. A glacial numerical model is developed using spatial principle component analysis (SPCA) supported by remote sensing (RS) and geographical information system (GIS) technologies. The model contains nine factorsdslope, aspect, hillshade, elevation a.s.l., air temperature, precipitation, glacial area change percentage, glacial type and glacial area, describing topography, climate, and glacier characteristics. The vulnerability of glaciers to climate change is evaluated during the period of 1961e2007 on a regional scale, and in the 2030s and 2050s based on projections of air temperature and precipitation changes under the IPCC RCP6.0 scenario and of glacier change in the 21st century. Glacial vulnerability is graded into five levels:potential, light, medial, heavy, and very heavy, using natural breaks classification (NBC). The spatial distribution of glacial vulnerability and its temporal changes in the 21st century for the RCP6.0 scenario are analyzed, and the factors influencing vulnerability are discussed. Results show that mountain glaciers in China are very vulnerable to climate change, and 41.2% of glacial areas fall into the levels of heavy and very heavy vulnerability in the period 1961e2007. This is mainly explained by topographical exposure and the high sensitivity of glaciers to climate change. Trends of glacial vulnerability are projected to decline in the 2030s and 2050s, but a declining trend is still high in some regions. In addition to topographical factors, variation in precipitation in the 2030s and 2050s is found to be crucial.

  1. Social vulnerability to climate-induced natural disasters

    DEFF Research Database (Denmark)

    Rubin, Olivier

    2014-01-01

    This paper conducts an analysis of the socioeconomic determinants of Vietnam's cross-provincial variations in natural disaster vulnerability. The purpose is twofold: (i) to capture disaggregated vulnerability variations normally obscured by national statistics, thereby providing more nuanced...... on cross-national variations. The paper's analysis indicates that much of Vietnam's cross-provincial variations in natural disaster fatalities and economic costs can be explained by differences in key socioeconomic factors. High provincial rates of inequality, poverty and infant mortality, for instance...

  2. Vulnerability assessment of atmospheric environment driven by human impacts.

    Science.gov (United States)

    Zhang, Yang; Shen, Jing; Ding, Feng; Li, Yu; He, Li

    2016-11-15

    Atmospheric environment quality worsening is a substantial threat to public health worldwide, and in many places, air pollution due to the intensification of the human activity is increasing dramatically. However, no studies have been investigated the integration of vulnerability assessment and atmospheric environment driven by human impacts. The objective of this study was to identify and prioritize the undesirable environmental changes as an early warning system for environment managers and decision makers in term of human, atmospheric environment, and social economic elements. We conduct a vulnerability assessment method of atmospheric environment associated with human impact, this method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators under the Exposure-Sensitivity- Adaptive Capacity (ESA) framework. Decision makers can find out relevant vulnerability assessment results with different vulnerable attitudes. In the Beijing-Tianjin-Hebei (BTH) region, China, we further applied this developed method and proved it to be reliable and consistent with the China Environmental Status Bulletin. Results indicate that the vulnerability of atmospheric environment in the BTH region is not optimistic, and environment managers should do more about air pollution. Thus, the most appropriate strategic decision and development program of city or state can be picked out assisting by the vulnerable results. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. Investigation on Vulnerability of Tabriz-plain Unconfined Aquifer

    Directory of Open Access Journals (Sweden)

    M. Tabarmayeh

    2015-06-01

    Full Text Available It is more expensive to remove pollution from groundwater than to prevent it. Delineation areas that arevulnerable to surface pollutants is one of methods to prevent pollution of groundwater resources. Focusing on this issue, DRASTIC model was used for evaluation of vulnerability of Tabriz-plain aquifer to pollution and the aquifer vulnerability map was prepared. The study shows that main zone of the aquifer’s groundwater is low to modrate vulnerability to pollution (DRASTIC Index of 120-40 that consist of about 55.84% and areas with low, moderate to high, and high risk zones comprise 21.81,22.08.% and 0.26% of the studied area, respectively Two tests of sensitivity analyses were carried out: the map removal and the single-parameter sensitivity analyses. Based on the characteristics of the studied area, the results from both map removal and single-parameter sensitivity analyses showed that the depth to water table has the most significant impact on the vulnerability risk zone. By overlaying of the vulnerability and landuse maps the areas where are subjected to potential release of pollutants from the agricultural activities were determined .Nitrate ion concentration and SINTACS model confirms the results of the vulnerability assessment.

  4. Multimodal spectroscopy detects features of vulnerable atherosclerotic plaque

    Science.gov (United States)

    Šćepanović, Obrad R.; Fitzmaurice, Maryann; Miller, Arnold; Kong, Chae-Ryon; Volynskaya, Zoya; Dasari, Ramachandra R.; Kramer, John R.; Feld, Michael S.

    2011-01-01

    Early detection and treatment of rupture-prone vulnerable atherosclerotic plaques is critical to reducing patient mortality associated with cardiovascular disease. The combination of reflectance, fluorescence, and Raman spectroscopy-termed multimodal spectroscopy (MMS)-provides detailed biochemical information about tissue and can detect vulnerable plaque features: thin fibrous cap (TFC), necrotic core (NC), superficial foam cells (SFC), and thrombus. Ex vivo MMS spectra are collected from 12 patients that underwent carotid endarterectomy or femoral bypass surgery. Data are collected by means of a unitary MMS optical fiber probe and a portable clinical instrument. Blinded histopathological analysis is used to assess the vulnerability of each spectrally evaluated artery lesion. Modeling of the ex vivo MMS spectra produce objective parameters that correlate with the presence of vulnerable plaque features: TFC with fluorescence parameters indicative of collagen presence; NC/SFC with a combination of diffuse reflectance β-carotene/ceroid absorption and the Raman spectral signature of lipids; and thrombus with its Raman signature. Using these parameters, suspected vulnerable plaques can be detected with a sensitivity of 96% and specificity of 72%. These encouraging results warrant the continued development of MMS as a catheter-based clinical diagnostic technique for early detection of vulnerable plaques.

  5. Children without parental care as a vulnerable category

    Directory of Open Access Journals (Sweden)

    Kvrgić Svetlana T.

    2003-01-01

    Full Text Available Introduction Health protection and health promotion are the primary goals of modern medicine. Since children's health is the cornerstone of adult's health, it must be in the center of all social and health care strategies. Vulnerability concept Vulnerability means exposure to harmful influences, risks or stress, which increases disease probability. The most vulnerable are categories that are exposed to influence of many harmful factors, which have minimal chances for survival and lowest quality of life. Vulnerability of children without parental care Vulnerability of children without parental care is caused by lack and/or inadequate family environment. These children are usually emotionally unstable; they frequently develop conduct disorders and have low self-esteem. As adolescents, these children have tendency to risky behavior, which greatly decreases their health potentials. Health status and quality of life All three components of health are endangered with children without parental care. These children present with physical, psycho-motoric and intellectual impairments. There are no studies about quality of life regarding these children, but we can assume that their quality of life is lower than in children who experience protective family environment, since quality of psychosocial factors and family environment are very important predictors of quality of life. Conclusion Children without parental care are an extremely vulnerable category, because they are subjected to various risk factors. Therefore, in order to improve health potentials and quality of life, special measures are required in health care, psychological care and social welfare.

  6. Forest climate change Vulnerability and Adaptation Assessment in Himalayas

    Science.gov (United States)

    Chitale, V. S.; Shrestha, H. L.; Agarwal, N. K.; Choudhurya, D.; Gilani, H.; Dhonju, H. K.; Murthy, M. S. R.

    2014-11-01

    Forests offer an important basis for creating and safeguarding more climate-resilient communities over Hindu Kush Himalayan region. The forest ecosystem vulnerability assessment to climate change and developing knowledge base to identify and support relevant adaptation strategies is realized as an urgent need. The multi scale adaptation strategies portray increasing complexity with the increasing levels in terms of data requirements, vulnerability understanding and decision making to choose a particular adaptation strategy. We present here how such complexities could be addressed and adaptation decisions could be either directly supported by open source remote sensing based forestry products or geospatial analysis and modelled products. The forest vulnerability assessment under climate change scenario coupled with increasing forest social dependence was studied using IPCC Landscape scale Vulnerability framework in Chitwan-Annapurna Landscape (CHAL) situated in Nepal. Around twenty layers of geospatial information on climate, forest biophysical and forest social dependence data was used to assess forest vulnerability and associated adaptation needs using self-learning decision tree based approaches. The increase in forest fires, evapotranspiration and reduction in productivity over changing climate scenario was observed. The adaptation measures on enhancing productivity, improving resilience, reducing or avoiding pressure with spatial specificity are identified to support suitable decision making. The study provides spatial analytical framework to evaluate multitude of parameters to understand vulnerabilities and assess scope for alternative adaptation strategies with spatial explicitness.

  7. Narrative self-constitution and vulnerability to co-authoring.

    Science.gov (United States)

    McConnell, Doug

    2016-02-01

    All people are vulnerable to having their self-concepts shaped by others. This article investigates that vulnerability using a theory of narrative self-constitution. According to narrative self-constitution, people depend on others to develop and maintain skills of self-narration and they are vulnerable to having the content of their self-narratives co-authored by others. This theoretical framework highlights how vulnerability to co-authoring is essential to developing a self-narrative and, thus, the possibility of autonomy. However, this vulnerability equally entails that co-authors can undermine autonomy by contributing disvalued content to the agent's self-narrative and undermining her authorial skills. I illustrate these processes with the first-hand reports of several women who survived sexual abuse as children. Their narratives of survival and healing reveal the challenges involved in (re)developing the skills required to manage vulnerability to co-authoring and how others can help in this process. Finally, I discuss some of the implications of co-authoring for the healthcare professional and the therapeutic relationship.

  8. Vulnerability and the bioethics through the experiences of illness

    Directory of Open Access Journals (Sweden)

    Rolim-Neto Leite Modesto

    2012-03-01

    Full Text Available Background: Vulnerable people are relatively or absolutely incapable of protecting their own interests. Vulnerability is an anthropological attribute of human beings due to the simple fact of being alive. Brazilian society has long been established as a matter through the eyes of social scientists. In the name of it, the vulnerability in the doctor-patient context is now being a much-discussed issue. Purpose: This study aims to analyze the current studies regarding the insertion of vulnerability in the health issue, reflexively dealing with the ethical matters involved, as well as with the narratives’ insertion in this process. Methods: This article is based on data extracted from Scientific Electronic Library Online (Scielo and on secondary data from textbooks about vulnerability, ethics, physician-patient relationship and narratives. Results and discussion: Doctors are faced with dilemmas in clinical practice: moral, ethical, legal, social, religious and economic. On these occasions, question their own values. By listening carefully to the stories of patients, health professionals broaden their perspectives, organize and integrate complex situations, which assists in conducting these difficult situations. Conclusion: Reflect the concept of vulnerability raises (re think health practices, particularly in bringing to light the social experience of illness and hospitalization of the patient.

  9. Assessing vulnerability of forests to climate change in South Korea

    Institute of Scientific and Technical Information of China (English)

    Guishan Cui; Hanbin Kwak; Sungho Choi; Moonil Kim; Chul-Hee Lim; Woo-Kyun Lee; Joon-Soon Kim; Yeora Chae

    2016-01-01

    This study demonstrated a framework to assess vulnerability of forests to climate change. We focused on how alterations of temperature and precipitation might affect forest type distributions and carbon-related func-tions. In particular, our framework considered three sectors of forest type distribution, net primary production, and soil carbon storage. Future projections were derived from mechanistic models for South Korean forests under the A1B scenarios of the intergovernmental panel on climate change. Forest type distributions were simulated by the Hydrological and thermal analogy group model, while the MAPSS and CENTURY1 models estimated forest carbon flux/storage. We quantified normalized vulnerability indi-ces for each sector. Our results indicate that the overall vulnerability of forest type distribution is greater in the west central regions and southeastern inlands. The vul-nerabilities of carbon flux/storage show that net primary production of South Korean forests is relatively less sus-ceptible to climate change, but a highly vulnerable area of soil carbon storage mainly spreads from the west central to the south east region. The spatio-temporal vulnerability map with a synoptic overview from this study might be useful for policy makers in preparing adaptive measures and identifying management priorities.

  10. The Relationship between Grandiose and Vulnerable (Hypersensitive Narcissism

    Directory of Open Access Journals (Sweden)

    Emanuel Jauk

    2017-09-01

    Full Text Available Narcissistic grandiosity is characterized by overt expressions of feelings of superiority and entitlement, while narcissistic vulnerability reflects hypersensitivity and introversive self-absorbedness. Clinical evidence suggests that grandiosity is accompanied by vulnerable aspects, pointing to a common foundation. Subclinical personality research, however, views grandiose and vulnerable narcissism as independent traits. Grandiose narcissism displays substantial correlation with extraversion, while vulnerable narcissism correlates highly with introversion. We investigated if (1 controlling for intro-/extraversion might reveal a “common core” of grandiose and vulnerable narcissism, and if (2 the correlation between both aspects might be higher at higher levels of narcissism. Latent variable structural equation modeling and segmented regression analysis confirmed these hypotheses in a large non-clinical sample (N = 1,006. Interindividual differences in intro-/extraversion mask the common core of grandiose and vulnerable narcissism. The association between both aspects increases at high levels (upper 10% of grandiose narcissism, which suggests a possible transition to clinically relevant (pathological narcissism.

  11. Study on vulnerability assessment of cable-stayed bridges

    Science.gov (United States)

    Chang, C. C.; Yan, D.

    2006-03-01

    A structure is vulnerable if any small damage will trigger disproportionately large consequences, even leads to a cascade of failure events and progressive collapse. The structural vulnerability performance depends upon the properties, locations of damaged components and the way they are connected to the rest of the structure. In this paper, progressive failure analysis method is utilized for the vulnerability study of cable-stayed bridges. The goal of it is to identify various failure scenarios initiated from the sudden damage of some bridge components. Based on the analysis results, assuming that the behaviors of damaged components can be modeled using plastic hinges, the hybrid element model is introduced to derived the modified stiffness matrix considering both of the effects of bending moments and shear forces. Furthermore, the vulnerability index in terms of the nodal stiffness degradation can be analytically quantified, which could be regarded as an index to determine the bridge failure consequences, so that the vulnerability distribution graph for the whole bridge can be sketched to evaluate the bridge performances from vulnerability viewpoints. This quantitative approach is applicable for structural evaluation under unforeseen attack and illustrated on a typical long-span cable-stayed bridge.

  12. Energy Vulnerability and EU-Russia Energy Relations

    Directory of Open Access Journals (Sweden)

    Edward Hunter Christie

    2009-08-01

    Full Text Available The concept of energy vulnerability is reviewed and discussed with a focus on Russia’s foreign energy relations, in particular those with European countries. A definition and a conceptual framework for quantifying energy vulnerability are proposed in the context of a review of recent research on energy vulnerability indices. In particular it is suggested that source country diversification should be reflected using the expected shortfall measure used in financial economics, rather than the Herfindahl-Hirschman or Shannon-Wiener indices, and that the former should then enter a calibrated function in order to yield expected economic loss. The issues of asymmetric failure probabilities and accidental versus intentional supply disruptions are then discussed with examples of recent Russian actions. Energy vulnerability measurement and modelling should ultimately inform policy. In particular, member states should legislate that no energy infrastructure project by one or more member states may increase the energy vulnerability of another member state. Additionally, European environmental policies, notably the EU ETS, should be amended so as to account for induced changes in energy vulnerability. Finally, member states should increase the level of transparency and disclosure with respect to gas import statistics and gas supply contracts.

  13. 'Vulnerability is universal': considering the place of 'security' and 'vulnerability' within contemporary global health discourse.

    Science.gov (United States)

    Brown, Tim

    2011-02-01

    The question of global health has, at least since 9/11, (re)emerged as one of the world's key geopolitical issues and, as many scholars have noted, this increased attention to the state of world health is especially focused on questions of national security and vulnerability. Despite its prominence in political, health policy and scholarly circles, health geographers have tended to overlook this particular aspect of global health discourse. This paper seeks to redress this lacuna. It does so for three reasons. The first lies in the idea that this discourse is inherently geographical; after all, it is in essence concerned with the flows of human and non-human agents within and, more importantly here, across, national borders. It is also of interest because a focus on vulnerability allows for an analysis that goes beyond the current fixation with emerging and re-emerging infectious diseases. Although it is certainly true that the concern with such diseases dominates, and the recent focus upon H1N1 swine flu is testament to that, there is also a suggestion that the processes associated with the enhanced threat posed by these diseases are similar to those that have caused non-communicable diseases to become a global health problem too. A third reason for focussing on this aspect of the global health discourse is that the subsequent search for 'security' is highly problematic; especially if we consider the question of "who is to be protected, and from what". The aim of the paper is, then, to offer a critical review of the international discourse on global health and to highlight its relevance to scholars that self-identify as health and medical geographers.

  14. Coastal vulnerability: climate change and natural hazards perspectives

    Science.gov (United States)

    Romieu, E.; Vinchon, C.

    2009-04-01

    Introduction Studying coastal zones as a territorial concept (Integrated coastal zone management) is an essential issue for managers, as they have to consider many different topics (natural hazards, resources management, tourism, climate change…). The recent approach in terms of "coastal vulnerability" studies (since the 90's) is the main tool used nowadays to help them in evaluating impacts of natural hazards on coastal zones, specially considering climate change. This present communication aims to highlight the difficulties in integrating this concept in risk analysis as it is usually practiced in natural hazards sciences. 1) Coastal vulnerability as a recent issue The concept of coastal vulnerability mainly appears in the International panel on climate change works of 1992 (IPCC. 2001), where it is presented as essential for climate change adaptation. The concept has been defined by a common methodology which proposes the assessment of seven indicators, in regards to a sea level rise of 1m in 2100: people affected, people at risk, capital value at loss, land at loss, wetland at loss, potential adaptation costs, people at risk assuming this adaptation. Many national assessments have been implemented (Nicholls, et al. 1995) and a global assessment was proposed for three indicators (Nicholls, et al. 1999). The DINAS-Coast project reuses this methodology to produce the DIVA-tool for coastal managers (Vafeidis, et al. 2004). Besides, many other methodologies for national or regional coastal vulnerability assessments have been developed (review by (UNFCCC. 2008). The use of aggregated vulnerability indicators (including geomorphology, hydrodynamics, climate change…) is widespread: the USGS coastal vulnerability index is used worldwide and was completed by a social vulnerability index (Boruff, et al. 2005). Those index-based methods propose a vulnerability mapping which visualise indicators of erosion, submersion and/or socio economic sensibility in coastal zones

  15. Resilience, Vulnerability and Residual Threat: An Assessment from Indian Sundarban

    Science.gov (United States)

    Ghosh, T.

    2016-12-01

    The estuarine islands within Indian Sundarban are extremely vulnerable due to climate change, erosion, flooding and increasing population pressure. Around 4.6 million people are living under constant threat of climatic shocks, affecting their farm based economy and dependency on forest resources for their livelihood. This paper attempts to focus on the dynamics of system's resilience in the backdrop of higher level of vulnerability. Globally the assessment of island vulnerability is generally more focused towards the climate change impacts, rather than taking into account other determining drivers with proper weightage. Three estuarine islands namely Sagar, Ghoramara and Mousani at the western part of Indian Sundarban Delta (ISD) have been chosen for this study to derive the indicator based scoring method using the household survey data from twenty seven (27) sampled `Mouza' (lowest administrative boundary; village) with cluster random sampling. Vulnerability and resilience of these islands have been calculated using the indicators like housing condition, electrification, population density, accretion, adult secondary education level, percentage of people `Below Poverty Line' (BPL) based on per capita income. Residual threats for these islands have been obtained by subtracting the score of resilience and vulnerability of the system. Result suggests that all these islands are in less resilient condition to combat the negative impact of the influencing factors. Sapkhali, Ghoramara, Bankimnagar, Shibpur and Baliara are becoming sensitive from excess residual threats. This study is an initiation for identifying the thrust areas need to address with effective policy adaptation, necessary to minimize the existing vulnerable conditions in these islands. Key words: Vulnerability, Resilience, Residual threat, Indian Sundarban

  16. Anxiety vulnerability in women: a two-hit hypothesis.

    Science.gov (United States)

    Catuzzi, Jennifer E; Beck, Kevin D

    2014-09-01

    Females are twice as likely to develop an anxiety disorder compared to males, and thus, are believed to possess an innate vulnerability that increases their susceptibility to develop an anxiety disorder. However, studies using aversive learning paradigms to model anxiety disorders in humans and animals have revealed contradictory results. While females exhibit the ability to rapidly acquire stimulus-response associations, which may result from a greater attentional bias towards threat, females are also capable to readily extinguish these associations. Thus, there is little evidence to suggest that the female sex represents a vulnerability factor of anxiety, per se. However, if females are to possess a second vulnerability factor that increases the inflexibility of stimulus-response associations, then an anxiety disorder may be more likely to develop. Behavioral inhibition (BI) is a vulnerability factor associated with the formation of inflexible stimulus-response associations. In this "two hit" model of anxiety vulnerability, females possessing a BI temperament will rapidly acquire stimulus-response associations that are resistant to extinction, resulting in the development of an anxiety disorder. In this review we explore evidence for a "two-hit" hypothesis underlying anxiety vulnerability in females. We explore the literature for evidence of a sex difference in attentional bias towards threat that may lead to the facilitated acquisition of stimulus-response associations in females. We also provide evidence that BI is associated with inflexible stimulus-response association formation. We conclude with data generated from our laboratory that highlights the additive effect of the female sex and behavioral inhibition vulnerabilities using a model behavior for anxiety disorder-susceptibility, active avoidance.

  17. Vulnerability to climate change: people, place and exposure to hazard

    Science.gov (United States)

    Hutton, C. W.; Kienberger, S.; Amoako Johnson, F.; Allan, A.; Giannini, V.; Allen, R.

    2011-04-01

    The Human Dimension of the Twinning European and South Asian River Basins to Enhance Capacity and Implement Adaptive Management Approaches Project (EC-Project BRAHMATWINN) is aimed at developing socio-economic tools and context for the effective inclusion of the "Human Dimension" or socio-economic vulnerability into the overall assessment of climate risk in the twinned basins of the Upper Brahmaputra River Basin (UBRB), and the Upper Danube River Basin (UDRB) . This work is conducted in the light of stakeholder/actor analysis and the prevailing legal framework. In order to effectively achieve this end, four key research and associated activities were defined: 1. Identifying stakeholders and actors including: implement an approach to ensure a broad spread of appropriate stakeholder input to the assessment of vulnerability undertaken in Asia and Europe within the research activities of the project. 2. Contextualising legal framework: to provide an assessment of the governance framework relating to socio-environmental policy development within the study site administrative areas leading to the specific identification of related policy and legal recommendations. 3. Spatial analysis and mapping of vulnerability: providing a spatial assessment of the variation of vulnerability to pre-determined environmental stressors across the study areas with an additional specific focus on gender. 4. Inclusion of findings with the broader context of the BRAHMATWINN risk of climate change study through scenarios of hazard and vulnerability (subsequent chapters). This study utilises stakeholder inputs to effectively identify and map relative weightings of vulnerability domains, such as health and education in the context of pre-specified hazards such as flood. The process is underpinned by an adaptation of the IPCC (2001) which characterizes Risk as having the components of Hazard (physiographic component) and Vulnerability (socio-economic component).

  18. Potential of 3D City Models to assess flood vulnerability

    Science.gov (United States)

    Schröter, Kai; Bochow, Mathias; Schüttig, Martin; Nagel, Claus; Ross, Lutz; Kreibich, Heidi

    2016-04-01

    Vulnerability, as the product of exposure and susceptibility, is a key factor of the flood risk equation. Furthermore, the estimation of flood loss is very sensitive to the choice of the vulnerability model. Still, in contrast to elaborate hazard simulations, vulnerability is often considered in a simplified manner concerning the spatial resolution and geo-location of exposed objects as well as the susceptibility of these objects at risk. Usually, area specific potential flood loss is quantified on the level of aggregated land-use classes, and both hazard intensity and resistance characteristics of affected objects are represented in highly simplified terms. We investigate the potential of 3D City Models and spatial features derived from remote sensing data to improve the differentiation of vulnerability in flood risk assessment. 3D City Models are based on CityGML, an application scheme of the Geography Markup Language (GML), which represents the 3D geometry, 3D topology, semantics and appearance of objects on different levels of detail. As such, 3D City Models offer detailed spatial information which is useful to describe the exposure and to characterize the susceptibility of residential buildings at risk. This information is further consolidated with spatial features of the building stock derived from remote sensing data. Using this database a spatially detailed flood vulnerability model is developed by means of data-mining. Empirical flood damage data are used to derive and to validate flood susceptibility models for individual objects. We present first results from a prototype application in the city of Dresden, Germany. The vulnerability modeling based on 3D City Models and remote sensing data is compared i) to the generally accepted good engineering practice based on area specific loss potential and ii) to a highly detailed representation of flood vulnerability based on a building typology using urban structure types. Comparisons are drawn in terms of

  19. Vulnerability of European freshwater catchments to climate change.

    Science.gov (United States)

    Markovic, Danijela; Carrizo, Savrina F; Kärcher, Oskar; Walz, Ariane; David, Jonathan N W

    2017-02-10

    Climate change is expected to exacerbate the current threats to freshwater ecosystems, yet multifaceted studies on the potential impacts of climate change on freshwater biodiversity at scales that inform management planning are lacking. The aim of this study was to fill this void through the development of a novel framework for assessing climate change vulnerability tailored to freshwater ecosystems. The three dimensions of climate change vulnerability are as follows: (i) exposure to climate change, (ii) sensitivity to altered environmental conditions and (iii) resilience potential. Our vulnerability framework includes 1685 freshwater species of plants, fishes, molluscs, odonates, amphibians, crayfish and turtles alongside key features within and between catchments, such as topography and connectivity. Several methodologies were used to combine these dimensions across a variety of future climate change models and scenarios. The resulting indices were overlaid to assess the vulnerability of European freshwater ecosystems at the catchment scale (18 783 catchments). The Balkan Lakes Ohrid and Prespa and Mediterranean islands emerge as most vulnerable to climate change. For the 2030s, we showed a consensus among the applied methods whereby up to 573 lake and river catchments are highly vulnerable to climate change. The anthropogenic disruption of hydrological habitat connectivity by dams is the major factor reducing climate change resilience. A gap analysis demonstrated that the current European protected area network covers climate change. Priority should be placed on enhancing stakeholder cooperation at the major basin scale towards preventing further degradation of freshwater ecosystems and maintaining connectivity among catchments. The catchments identified as most vulnerable to climate change provide preliminary targets for development of climate change conservation management and mitigation strategies.

  20. Defining and Measuring Coastal Vulnerability and Resilience to Natural Hazards

    Science.gov (United States)

    Becker, M. K.; Hoagland, P.

    2014-12-01

    Accounting for an estimated 23 percent of the world's population, coastal communities face many types of natural hazards. In particular, they may be vulnerable to the effects of tropical cyclones, flooding due to tsunamis or storm surges, erosion, saltwater intrusion, and subsidence. These coastal hazards are further exacerbated by population growth and climate change. There is a lack of consensus in the literature about what constitutes vulnerability (negative impacts) and resilience (recovery from negative impacts) and how to measure these phenomena. While some important work has focused on the long-term effects of coastal hazards on economic growth, little has been done to understand, in quantitative terms, the extent to which coastal communities may be vulnerable to such hazards and, if so, whether they can be resilient. We surveyed nine indicators of human well-being in order to determine their potential suitability as measures of coastal vulnerability or resilience. Some measures, such as the Gross Domestic Product, the Human Development Index, and the Gini coefficient, comprise economic or distributional indicators of human welfare; others, such as the Social Vulnerability Index, are more complex and difficult to interpret. We selected per capita personal income as the most viable indicator, due largely to its simplicity and its availability over several decades. We used it to examine human community vulnerability and resilience to a specific coastal hazard—significant storm surges from major coastal hurricanes—in several US coastal metropolitan areas. We compiled data on per capita personal income from the US Bureau of Economic Analysis for 15 to 20 years prior and subsequent to four major hurricanes: Hugo, which hit the Charleston, South Carolina, metropolitan area in 1989; Bob, Cape Cod, Massachusetts, in 1991; Andrew, Miami, Florida, in 1992; and Opal, Pensacola, Florida, in 1995. Intervention analysis using linear regression suggests that these

  1. Development of AHPDST Vulnerability Indexing Model for Groundwater Vulnerability Assessment Using Hydrogeophysical Derived Parameters and GIS Application

    Science.gov (United States)

    Mogaji, K. A.

    2017-04-01

    Producing a bias-free vulnerability assessment map model is significantly needed for planning a scheme of groundwater quality protection. This study developed a GIS-based AHPDST vulnerability index model for producing groundwater vulnerability model map in the hard rock terrain, Nigeria by exploiting the potentials of analytic hierarchy process (AHP) and Dempster-Shafer theory (DST) data mining models. The acquired borehole and geophysical data in the study area were processed to derive five groundwater vulnerability conditioning factors (GVCFs), namely recharge rate, aquifer transmissivity, hydraulic conductivity, transverse resistance and longitudinal conductance. The produced GVCFs' thematic maps were multi-criterially analyzed by employing the mechanisms of AHP and DST models to determine the normalized weight ( W) parameter for the GVCFs and mass function factors (MFFs) parameter for the GVCFs' thematic maps' class boundaries, respectively. Based on the application of the weighted linear average technique, the determined W and MFFs parameters were synthesized to develop groundwater vulnerability potential index (GVPI)-based AHPDST model algorithm. The developed model was applied to establish four GVPI mass/belief function indices. The estimates based on the applied GVPI belief function indices were processed in GIS environment to create prospective groundwater vulnerability potential index maps. The most representative of the resulting vulnerability maps (the GVPIBel map) was considered for producing the groundwater vulnerability potential zones (GVPZ) map for the area. The produced GVPZ map established 48 and 52% of the areal extent to be covered by the lows/moderate and highs vulnerable zones, respectively. The success and the prediction rates of the produced GVPZ map were determined using the relative operating characteristics technique to give 82.3 and 77.7%, respectively. The analyzed results reveal that the developed GVPI-based AHPDST model algorithm is

  2. Development of AHPDST Vulnerability Indexing Model for Groundwater Vulnerability Assessment Using Hydrogeophysical Derived Parameters and GIS Application

    Science.gov (United States)

    Mogaji, K. A.

    2017-02-01

    Producing a bias-free vulnerability assessment map model is significantly needed for planning a scheme of groundwater quality protection. This study developed a GIS-based AHPDST vulnerability index model for producing groundwater vulnerability model map in the hard rock terrain, Nigeria by exploiting the potentials of analytic hierarchy process (AHP) and Dempster-Shafer theory (DST) data mining models. The acquired borehole and geophysical data in the study area were processed to derive five groundwater vulnerability conditioning factors (GVCFs), namely recharge rate, aquifer transmissivity, hydraulic conductivity, transverse resistance and longitudinal conductance. The produced GVCFs' thematic maps were multi-criterially analyzed by employing the mechanisms of AHP and DST models to determine the normalized weight (W) parameter for the GVCFs and mass function factors (MFFs) parameter for the GVCFs' thematic maps' class boundaries, respectively. Based on the application of the weighted linear average technique, the determined W and MFFs parameters were synthesized to develop groundwater vulnerability potential index (GVPI)-based AHPDST model algorithm. The developed model was applied to establish four GVPI mass/belief function indices. The estimates based on the applied GVPI belief function indices were processed in GIS environment to create prospective groundwater vulnerability potential index maps. The most representative of the resulting vulnerability maps (the GVPIBel map) was considered for producing the groundwater vulnerability potential zones (GVPZ) map for the area. The produced GVPZ map established 48 and 52% of the areal extent to be covered by the lows/moderate and highs vulnerable zones, respectively. The success and the prediction rates of the produced GVPZ map were determined using the relative operating characteristics technique to give 82.3 and 77.7%, respectively. The analyzed results reveal that the developed GVPI-based AHPDST model algorithm is

  3. Vulnerability of ground water to contamination, northern Bexar County, Texas

    Science.gov (United States)

    Clark, Amy R.

    2003-01-01

    The Trinity aquifer, composed of Lower Cretaceous carbonate rocks, largely controls the ground-water hydrology in the study area of northern Bexar County, Texas. Discharge from the Trinity aquifer recharges the downgradient, hydraulically connected Edwards aquifer one of the most permeable and productive aquifers in the Nation and the sole source of water for more than a million people in south-central Texas. The unconfined, karstic outcrop of the Edwards aquifer makes it particularly vulnerable to contamination resulting from urbanization that is spreading rapidly northward across an "environmentally sensitive" recharge zone of the Edwards aquifer and its upgradient "catchment area," composed mostly of the less permeable Trinity aquifer.A better understanding of the Trinity aquifer is needed to evaluate water-management decisions affecting the quality of water in both the Trinity and Edwards aquifers. A study was made, therefore, in cooperation with the San Antonio Water System to assess northern Bexar County's vulnerability to ground-water contamination. The vulnerability of ground water to contamination in this area varies with the effects of five categories of natural features (hydrogeologic units, faults, caves and (or) sinkholes, slopes, and soils) that occur on the outcrop and in the shallow subcrop of the Glen Rose Limestone.Where faults affect the rates of recharge or discharge or the patterns of ground-water flow in the Glen Rose Limestone, they likewise affect the risk of water-quality degradation. Caves and sinkholes generally increase the vulnerability of ground water to contamination, especially where their occurrences are concentrated. The slope of land surface can affect the vulnerability of ground water by controlling where and how long a potential contaminant remains on the surface. Disregarding the exception of steep slopes which are assumed to have no soil cover the greater the slope, the less the risk of ground-water contamination. Because most

  4. A Preliminary Tsunami Vulnerability Analysis for Yenikapi Region in Istanbul

    Science.gov (United States)

    Ceren Cankaya, Zeynep; Suzen, Lutfi; Cevdet Yalciner, Ahmet; Kolat, Cagil; Aytore, Betul; Zaytsev, Andrey

    2015-04-01

    One of the main requirements during post disaster recovery operations is to maintain proper transportation and fluent communication at the disaster areas. Ports and harbors are the main transportation hubs which must work with proper performance at all times especially after the disasters. Resilience of coastal utilities after earthquakes and tsunamis have major importance for efficient and proper rescue and recovery operations soon after the disasters. Istanbul is a mega city with its various coastal utilities located at the north coast of the Sea of Marmara. At Yenikapi region of Istanbul, there are critical coastal utilities and vulnerable coastal structures and critical activities occur daily. Fishery ports, commercial ports, small craft harbors, passenger terminals of intercity maritime transportation, water front commercial and/or recreational structures are some of the examples of coastal utilization which are vulnerable against marine disasters. Therefore their vulnerability under tsunami or any other marine hazard to Yenikapi region of Istanbul is an important issue. In this study, a methodology of vulnerability analysis under tsunami attack is proposed with the applications to Yenikapi region. In the study, high resolution (1m) GIS database of Istanbul Metropolitan Municipality (IMM) is used and analyzed by using GIS implementation. The bathymetry and topography database and the vector dataset containing all buildings/structures/infrastructures in the study area are obtained for tsunami numerical modeling for the study area. GIS based tsunami vulnerability assessment is conducted by applying the Multi-criteria Decision Making Analysis (MCDA). The tsunami parameters from deterministically defined worst case scenarios are computed from the simulations using tsunami numerical model NAMI DANCE. The vulnerability parameters in the region due to two different classifications i) vulnerability of buildings/structures and ii) vulnerability of (human) evacuation

  5. Probabilistic seismic vulnerability and risk assessment of stone masonry structures

    Science.gov (United States)

    Abo El Ezz, Ahmad

    Earthquakes represent major natural hazards that regularly impact the built environment in seismic prone areas worldwide and cause considerable social and economic losses. The high losses incurred following the past destructive earthquakes promoted the need for assessment of the seismic vulnerability and risk of the existing buildings. Many historic buildings in the old urban centers in Eastern Canada such as Old Quebec City are built of stone masonry and represent un-measurable architectural and cultural heritage. These buildings were built to resist gravity loads only and generally offer poor resistance to lateral seismic loads. Seismic vulnerability assessment of stone masonry buildings is therefore the first necessary step in developing seismic retrofitting and pre-disaster mitigation plans. The objective of this study is to develop a set of probability-based analytical tools for efficient seismic vulnerability and uncertainty analysis of stone masonry buildings. A simplified probabilistic analytical methodology for vulnerability modelling of stone masonry building with systematic treatment of uncertainties throughout the modelling process is developed in the first part of this study. Building capacity curves are developed using a simplified mechanical model. A displacement based procedure is used to develop damage state fragility functions in terms of spectral displacement response based on drift thresholds of stone masonry walls. A simplified probabilistic seismic demand analysis is proposed to capture the combined uncertainty in capacity and demand on fragility functions. In the second part, a robust analytical procedure for the development of seismic hazard compatible fragility and vulnerability functions is proposed. The results are given by sets of seismic hazard compatible vulnerability functions in terms of structure-independent intensity measure (e.g. spectral acceleration) that can be used for seismic risk analysis. The procedure is very efficient for

  6. Climate variability and climate change vulnerability and adaptation. Workshop summary

    Energy Technology Data Exchange (ETDEWEB)

    Bhatti, N.; Cirillo, R.R. [Argonne National Lab., IL (United States); Dixon, R.K. [U.S. Country Studies Program, Washington, DC (United States)] [and others

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  7. Assessing the Agricultural Vulnerability for India under Changing Climate

    Science.gov (United States)

    Sharma, Tarul; Vardhan Murari, Harsha; Karmakar, Subhankar; Ghosh, Subimal; Singh, Jitendra

    2016-04-01

    Global climate change has proven to show majorly negative impacts for the far future. These negative impacts adversely affect almost all the fields including agriculture, water resources, tourism, and marine ecosystem. Among these, the effects on agriculture are considered to be of prime importance since its regional impacts can directly affect the global food security. Under such lines, it becomes essential to understand how climate change directs agricultural production for a region along with its vulnerability. In India, rice and wheat are considered as major staple diet and hence understanding its production loss/gain due to regional vulnerability to climate change becomes necessary. Here, an attempt has been made to understand the agricultural vulnerability for rice and wheat, considering yield as a function of temperature and precipitation during growing period. In order to accomplish this objective, the ratio of actual to potential evapo-transpiration has been considered which serves as a reliable indicator; with more this ratio towards unity, less vulnerable will be the region. The current objective needs an integration of climatic, hydrological and agricultural parameters; that can be achieved by simulating a climate data driven hydrologic (Variable Infiltration Capacity, VIC) model and a crop (Decision Support System for Agrotechnology Transfer, DSSAT) model. The proposed framework is an attempt to derive a crop vulnerability map that can facilitate in strategizing adaption practices which can reduce the adverse impacts of climate change in future.

  8. Flood vulnerability of critical infrastructure in Cork, Ireland

    Directory of Open Access Journals (Sweden)

    de Bruijn Karin M.

    2016-01-01

    Full Text Available Recent flood events in Ireland and particularly in County Cork have caused significant disruption to health service provisions, interruption of water and power supplies, and damage to roads and other transportation infrastructure, affecting the lives of hundreds of thousands of people over a prolonged period of weeks. These events clearly reveal- the vulnerability of the critical infrastructure to flooding and the dependence of society on critical infrastructure. In order to reduce the flood vulnerability and increase the resilience of the critical infrastructure networks in the future, detailed evidence-based analysis and assessment is essential. To this end a case study has been carried out on Cork City which analyses this vulnerability as it was in 2009, and as it is currently, and identifies adaptation options to reduce the future vulnerability of critical infrastructure to flooding and to build a more resilient society. This paper describes the storyline approach and CIrcle tool and their application to Cork City which focused on the analysis of the flood vulnerability of critical infrastructure and the impacts of failure of the infrastructure for other critical functions and on society.

  9. Formal Vulnerability Assessment of a maritime transportation system

    Energy Technology Data Exchange (ETDEWEB)

    Berle, Oyvind, E-mail: berle@ntnu.n [Norwegian University of Science and Technology, Department of Marine Technology, Trondheim (Norway); Asbjornslett, Bjorn Egil [Norwegian University of Science and Technology, Department of Marine Technology, Trondheim (Norway); Rice, James B. [Massachusetts Institute of Technology, Center for Transportation and Logistics, Cambridge (United States)

    2011-06-15

    World trade increasingly relies on longer, larger and more complex supply chains, where maritime transportation is a vital backbone of such operations. Long and complex supply chain systems are more prone to being vulnerable, though through reviews, no specific methods have been found to assess vulnerabilities of a maritime transportation system. Most existing supply chain risk assessment frameworks require risks to be foreseen to be mitigated, rather than giving transportation systems the ability to cope with unforeseen threats and hazards. In assessing cost-efficiency, societal vulnerability versus industrial cost of measures should be included. This conceptual paper presents a structured Formal Vulnerability Assessment (FVA) methodology, seeking to transfer the safety-oriented Formal Safety Assessment (FSA) framework into the domain of maritime supply chain vulnerability. To do so, the following two alterations are made: (1) The focus of the assessment is defined to ensure the ability of the transportation to serve as a throughput mechanism of goods, and to survive and recover from disruptive events. (2) To cope with low-frequency high-impact disruptive scenarios that were not necessarily foreseen, two parallel tracks of risk assessments need to be pursued-the cause-focused risk assessment as in the FSA, and a consequence-focused failure mode approach.

  10. Vulnerability to depression: from brain neuroplasticity to identification of biomarkers.

    Science.gov (United States)

    Blugeot, Aurélie; Rivat, Cyril; Bouvier, Elodie; Molet, Jenny; Mouchard, Amandine; Zeau, Brigitte; Bernard, Christophe; Benoliel, Jean-Jacques; Becker, Chrystel

    2011-09-07

    A stressful event increases the risk of developing depression later in life, but the possible predisposing factors remain unknown. Our study aims to characterize latent vulnerability traits underlying the development of depressive disorders in adult animals. Four weeks after a priming stressful event, serum corticosterone concentration returned to control values in all animals, whereas the other biological parameters returned to basal level in only 58% of animals (called nonvulnerable). In contrast, 42% of animals displayed persistent decreased serum and hippocampus BDNF concentrations, reduced hippocampal volume and neurogenesis, CA3 dendritic retraction and decrease in spine density, as well as amygdala neuron hypertrophy, constituting latent vulnerability traits to depression. In this group, called vulnerable, a subsequent mild stress evoked a rise of serum corticosterone levels and a "depressive" phenotype, in contrast to nonvulnerable animals. Intracerebroventricular administration of 7,8-dihydroxyflavone, a selective TrkB receptor agonist, dampened the development of the "depressive" phenotype. Our results thus characterize the presence of latent vulnerability traits that underlie the emergence of depression and identify the association of low BDNF with normal corticosterone serum concentrations as a predictive biomarker of vulnerability to depression.

  11. Vulnerability of families with children with intestinal stomas

    Directory of Open Access Journals (Sweden)

    Clara Ferraz Lazarini Zacarin

    2014-06-01

    Full Text Available Intestinal stomas cause transformations in the body and create specific and continuous needs for care that imply in hospitalization and surgeries. In this context, we applied the concept of family vulnerability in order to identify the vulnerability of the family living with a child who has intestinal stoma. It is a qualitative study which interviewed the mothers of children with this chronic condition. We used narrative analysis based on the concept of family vulnerability. The results display that the family has gone through previous noteworthy experiences associated with the child’s condition. The family cares for the child on their own and seeks ways to control the situation and regain autonomy, hoping for stoma reversal. Based on the concept of vulnerability, we observed that these families can be considered vulnerable, for they experience threats to their autonomy, but are moved by the hope of reversal and intestinal tract reconstruction. doi: 10.5216/ree.v16i2.26639.

  12. Cascade vulnerability for risk analysis of water infrastructure.

    Science.gov (United States)

    Sitzenfrei, R; Mair, M; Möderl, M; Rauch, W

    2011-01-01

    One of the major tasks in urban water management is failure-free operation for at least most of the time. Accordingly, the reliability of the network systems in urban water management has a crucial role. The failure of a component in these systems impacts potable water distribution and urban drainage. Therefore, water distribution and urban drainage systems are categorized as critical infrastructure. Vulnerability is the degree to which a system is likely to experience harm induced by perturbation or stress. However, for risk assessment, we usually assume that events and failures are singular and independent, i.e. several simultaneous events and cascading events are unconsidered. Although failures can be causally linked, a simultaneous consideration in risk analysis is hardly considered. To close this gap, this work introduces the term cascade vulnerability for water infrastructure. Cascade vulnerability accounts for cascading and simultaneous events. Following this definition, cascade risk maps are a merger of hazard and cascade vulnerability maps. In this work cascade vulnerability maps for water distribution systems and urban drainage systems based on the 'Achilles-Approach' are introduced and discussed. It is shown, that neglecting cascading effects results in significant underestimation of risk scenarios.

  13. Physical vulnerability modelling in natural hazard risk assessment

    Science.gov (United States)

    Douglas, J.

    2007-04-01

    An evaluation of the risk to an exposed element from a hazardous event requires a consideration of the element's vulnerability, which expresses its propensity to suffer damage. This concept allows the assessed level of hazard to be translated to an estimated level of risk and is often used to evaluate the risk from earthquakes and cyclones. However, for other natural perils, such as mass movements, coastal erosion and volcanoes, the incorporation of vulnerability within risk assessment is not well established and consequently quantitative risk estimations are not often made. This impedes the study of the relative contributions from different hazards to the overall risk at a site. Physical vulnerability is poorly modelled for many reasons: the cause of human casualties (from the event itself rather than by building damage); lack of observational data on the hazard, the elements at risk and the induced damage; the complexity of the structural damage mechanisms; the temporal and geographical scales; and the ability to modify the hazard level. Many of these causes are related to the nature of the peril therefore for some hazards, such as coastal erosion, the benefits of considering an element's physical vulnerability may be limited. However, for hazards such as volcanoes and mass movements the modelling of vulnerability should be improved by, for example, following the efforts made in earthquake risk assessment. For example, additional observational data on induced building damage and the hazardous event should be routinely collected and correlated and also numerical modelling of building behaviour during a damaging event should be attempted.

  14. Climate change vulnerability for species-Assessing the assessments.

    Science.gov (United States)

    Wheatley, Christopher J; Beale, Colin M; Bradbury, Richard B; Pearce-Higgins, James W; Critchlow, Rob; Thomas, Chris D

    2017-09-01

    Climate change vulnerability assessments are commonly used to identify species at risk from global climate change, but the wide range of methodologies available makes it difficult for end users, such as conservation practitioners or policymakers, to decide which method to use as a basis for decision-making. In this study, we evaluate whether different assessments consistently assign species to the same risk categories and whether any of the existing methodologies perform well at identifying climate-threatened species. We compare the outputs of 12 climate change vulnerability assessment methodologies, using both real and simulated species, and validate the methods using historic data for British birds and butterflies (i.e. using historical data to assign risks and more recent data for validation). Our results show that the different vulnerability assessment methods are not consistent with one another; different risk categories are assigned for both the real and simulated sets of species. Validation of the different vulnerability assessments suggests that methods incorporating historic trend data into the assessment perform best at predicting distribution trends in subsequent time periods. This study demonstrates that climate change vulnerability assessments should not be used interchangeably due to the poor overall agreement between methods when considering the same species. The results of our validation provide more support for the use of trend-based rather than purely trait-based approaches, although further validation will be required as data become available. © 2017 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.

  15. Deriving vulnerability indicators for crop production regions in Indonesia

    Science.gov (United States)

    Perdinan; Atmaja, Tri; Sehabuddin, Ujang; Sugiarto, Yon; Febrianti, Lina; Farysca Adi, Ryco

    2017-01-01

    Food supply is considered as one of the most vulnerable to the effects of climate change. Higher temperature and changes in rainfall patterns and intensity may adversely impact crop production, which will eventually affect the food supply. Consequently, adaptation strategies should be devised to minimize the potential adverse impacts and maximize its potential benefits. The adaptation strategies should be devised by considering factors contributed to causing vulnerability following the concept of food supply chain, starting from production to consumption. This study focuses on identifying the contributed factors to vulnerability of crop production regions in Indonesia. The contributed factors were identified by defining indicators for each component of the food supply chain using an example of crop production centers in Indonesia, the West Java Province. The identification considers existing issues of the food supply chain, covering aspects of production, post-harvest and storage, distribution, and consumption, based on the field surveys conducted in Indramayu district of the West Java, the main grower of paddy production, and Garut district of the West Java, the main grower of corn production. The selection of the vulnerability indicators was also considered the data availability for the study area. The analysis proposed a list of indicators classified into production, post-harvest and storage, distribution and consumption that are proposed to assess the regional vulnerability of crop production regions in Indonesia. This result is expected to contribute in understanding the process of devising climate change adaptation intended for enhancing food supply resilience to climate change.

  16. Grandiose and Vulnerable Narcissism, Materialism, Money Attitudes, and Consumption Preferences.

    Science.gov (United States)

    Pilch, Irena; Górnik-Durose, Małgorzata E

    2017-02-17

    Narcissism is increasingly being investigated in the context of consumer attitudes and behavior. Previous research showed that narcissism is reflected in materialistic tendencies and money-related attitudes. However, almost all of these studies concerned the grandiose type of narcissism. We examined relationships of both grandiose and vulnerable narcissism with materialism, money attitudes, and consumption preferences in a nonstudent sample. The results showed that the two types of narcissism are equally associated with materialism and a tendency to conspicuous (public) consumption. Differences between grandiose and vulnerable narcissism with regard to money attitudes were observed. Materialism mediated most of the relationships between narcissism, money attitudes, and consumption preferences, but the patterns of mediation were different for grandiose and vulnerable subtypes. Mutual suppression occurred when grandiose narcissism and materialism predicted anxiety associated with money and when vulnerable narcissism and materialism predicted money perceived as a source of evil. The results suggested that not only grandiose, but also vulnerable narcissists may be prone to excessive consumption and that this can be explained by their materialistic tendencies.

  17. Vulnerability of Maize Yields to Droughts in Uganda

    Directory of Open Access Journals (Sweden)

    Terence Epule Epule

    2017-03-01

    Full Text Available Climate projections in Sub-Saharan Africa (SSA forecast an increase in the intensity and frequency of droughts with implications for maize production. While studies have examined how maize might be affected at the continental level, there have been few national or sub-national studies of vulnerability. We develop a vulnerability index that combines sensitivity, exposure and adaptive capacity and that integrates agroecological, climatic and socio-economic variables to evaluate the national and spatial pattern of maize yield vulnerability to droughts in Uganda. The results show that maize yields in the north of Uganda are more vulnerable to droughts than in the south and nationally. Adaptive capacity is higher in the south of the country than in the north. Maize yields also record higher levels of sensitivity and exposure in the north of Uganda than in the south. Latitudinally, it is observed that maize yields in Uganda tend to record higher levels of vulnerability, exposure and sensitivity towards higher latitudes, while in contrast, the adaptive capacity of maize yields is higher towards the lower latitudes. In addition to lower precipitation levels in the north of the country, these observations can also be explained by poor soil quality in most of the north and socio-economic proxies, such as, higher poverty and lower literacy rates in the north of Uganda.

  18. Soft Error Vulnerability of Iterative Linear Algebra Methods

    Energy Technology Data Exchange (ETDEWEB)

    Bronevetsky, G; de Supinski, B

    2007-12-15

    Devices become increasingly vulnerable to soft errors as their feature sizes shrink. Previously, soft errors primarily caused problems for space and high-atmospheric computing applications. Modern architectures now use features so small at sufficiently low voltages that soft errors are becoming significant even at terrestrial altitudes. The soft error vulnerability of iterative linear algebra methods, which many scientific applications use, is a critical aspect of the overall application vulnerability. These methods are often considered invulnerable to many soft errors because they converge from an imprecise solution to a precise one. However, we show that iterative methods can be vulnerable to soft errors, with a high rate of silent data corruptions. We quantify this vulnerability, with algorithms generating up to 8.5% erroneous results when subjected to a single bit-flip. Further, we show that detecting soft errors in an iterative method depends on its detailed convergence properties and requires more complex mechanisms than simply checking the residual. Finally, we explore inexpensive techniques to tolerate soft errors in these methods.

  19. Site-specific Vulnerability Assessment for Debris Flows: Two Case Studies

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Here the vulnerability is defined as the potential total maximum losses due to a debris flow damaging event for a specific debris flow fan. The vulnerability is classified into property vulnerability and population vulnerability. Assessment indexes include the assets of buildings, traffic facilities, lifeline works, personal properties, and land resources for property vulnerability; age, education, and wealth of the inhabitants, natural population growth rate, and population density for population vulnerability. The vulnerability is expressed as the sum of the transformed values of the losses of property and population. Two study cases with post-fact damages by historic debris flow events in Sichuan of SW China are presented.

  20. THE VULNERABILITY TO WATER HAZARDS OF URBAN AREA TURDA– CÂMPIA TURZII

    Directory of Open Access Journals (Sweden)

    IOANA URCAN

    2012-12-01

    Full Text Available The vulnerability to water hazards of urban area Turda – Câmpia Turzii. The risk was defined as a social object whose primary component is vulnerability. This paper examines the way in which vulnerability was defined by highlighting its three aspects: physical, technical and social. The vulnerability involves a complex systematic approach especially when cities are analyzed. The economic, social heritage, the environmental elements can all become factors of vulnerability. In this paper the urban areas vulnerable towaterborne hazards, especially floods were mentioned. The means to reduce urban vulnerability were analyzed, highlighting the measures taken by the local communities to mitigate the crisis.

  1. Urban flood risk mitigation: from vulnerability assessment to resilient city

    Science.gov (United States)

    Serre, D.; Barroca, B.

    2009-04-01

    Urban flood risk mitigation: from vulnerability assessment to resilient city Bruno Barroca1, Damien Serre2 1Laboratory of Urban Engineering, Environment and Building (L G U E H) - Université de Marne-la-Vallée - Pôle Ville, 5, Bd Descartes - Bâtiment Lavoisier - 77454 Marne la Vallée Cedex 2 - France 2City of Paris Engineering School, Construction - Environment Department, 15 rue Fénelon, 75010 Paris, France In France, as in Europe and more generally throughout the world, river floods have been increasing in frequency and severity over the last ten years, and there are more instances of rivers bursting their banks, aggravating the impact of the flooding of areas supposedly protected by flood defenses. Despite efforts made to well maintain the flood defense assets, we often observe flood defense failures leading to finally increase flood risk in protected area during major flood events. Furthermore, flood forecasting models, although they benefit continuous improvements, remain partly inaccurate due to uncertainties populated all along data calculation processes. These circumstances obliged stakeholders and the scientific communities to manage flood risk by integrating new concepts like stakes management, vulnerability assessments and more recently urban resilience development. Definitively, the goal is to reduce flood risk by managing of course flood defenses and improving flood forecasting models, but also stakes and vulnerability of flooded areas to achieve urban resilience face to flood events. Vulnerability to flood is essentially concentrated in urban areas. Assessing vulnerability of a city is very difficult. Indeed, urban area is a complex system composed by a sum of technical sub-systems as complex as the urban area itself. Assessing city vulnerability consists in talking into account each sub system vulnerability and integrating all direct and indirect impacts generally depending from city shape and city spatial organization. At this time, although

  2. Chemical and radiological vulnerability assessment in urban areas

    Directory of Open Access Journals (Sweden)

    Stojanović Božidar

    2006-01-01

    Full Text Available Cities and towns are faced with various types of threat from the extraordinary events involving chemical and radiological materials as exemplified by major chemical accidents, radiological incidents, fires, explosions, traffic accidents, terrorist attacks, etc. On the other hand, many sensitive or vulnerable assets exist within cities, such as: settlements, infrastructures, hospitals, schools, churches, businesses, government, and others. Besides emergency planning, the land use planning also represents an important tool for prevention or reduction of damages on people and other assets due to unwanted events. This paper considers development of method for inclusion vulnerability assessment in land use planning with objective to assess and limit the consequences in cities of likely accidents involving hazardous materials. We made preliminary assessment of criticality and vulnerability of the assets within Belgrade city area in respect to chemical sites and transportation roads that can be exposed to chemical accidents, or terrorist attacks.

  3. Power Transmission System Vulnerability Assessment Using Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    E. Karimi

    2012-11-01

    Full Text Available Recent blackouts in power systems have shown the necessity of vulnerability assessment. Among all factors, transmission system components have a more important role. Power system vulnerability assessment could capture cascading outages which result in large blackouts and is an effective tool for power system engineers for defining power system bottlenecks and weak points. In this paper a new method based on fault chains concept is developed which uses new measures. Genetic algorithm with an effective structure is used for finding vulnerable branches in a practical power transmission system. Analytic hierarchy process is a technique used to determine the weighting factors in fitness function of genetic algorithm. Finally, the numerical results for Isfahan Regional Electric Company are presented which verifies the effectiveness and precision of the proposed method according to the practical expriments.

  4. The brain norepinephrine system, stress and cardiovascular vulnerability.

    Science.gov (United States)

    Wood, Susan K; Valentino, Rita J

    2017-03-01

    Chronic exposure to psychosocial stress has adverse effects on cardiovascular health, however the stress-sensitive neurocircuitry involved remains to be elucidated. The anatomical and physiological characteristics of the locus coeruleus (LC)-norepinephrine (NE) system position it to contribute to stress-induced cardiovascular disease. This review focuses on cardiovascular dysfunction produced by social stress and a major theme highlighted is that differences in coping strategy determine individual differences in social stress-induced cardiovascular vulnerability. The establishment of different coping strategies and cardiovascular vulnerability during repeated social stress has recently been shown to parallel a unique plasticity in LC afferent regulation, resulting in either excitatory or inhibitory input to the LC. This contrasting regulation of the LC would translate to differences in cardiovascular regulation and may serve as the basis for individual differences in the cardiopathological consequences of social stress. The advances described suggest new directions for developing treatments and/or strategies for decreasing stress-induced cardiovascular vulnerability.

  5. Reducing Soft-error Vulnerability of Caches using Data Compression

    Energy Technology Data Exchange (ETDEWEB)

    Mittal, Sparsh [ORNL; Vetter, Jeffrey S [ORNL

    2016-01-01

    With ongoing chip miniaturization and voltage scaling, particle strike-induced soft errors present increasingly severe threat to the reliability of on-chip caches. In this paper, we present a technique to reduce the vulnerability of caches to soft-errors. Our technique uses data compression to reduce the number of vulnerable data bits in the cache and performs selective duplication of more critical data-bits to provide extra protection to them. Microarchitectural simulations have shown that our technique is effective in reducing architectural vulnerability factor (AVF) of the cache and outperforms another technique. For single and dual-core system configuration, the average reduction in AVF is 5.59X and 8.44X, respectively. Also, the implementation and performance overheads of our technique are minimal and it is useful for a broad range of workloads.

  6. Detecting Network Vulnerabilities Through Graph TheoreticalMethods

    Energy Technology Data Exchange (ETDEWEB)

    Cesarz, Patrick; Pomann, Gina-Maria; Torre, Luis de la; Villarosa, Greta; Flournoy, Tamara; Pinar, Ali; Meza Juan

    2007-09-30

    Identifying vulnerabilities in power networks is an important problem, as even a small number of vulnerable connections can cause billions of dollars in damage to a network. In this paper, we investigate a graph theoretical formulation for identifying vulnerabilities of a network. We first try to find the most critical components in a network by finding an optimal solution for each possible cutsize constraint for the relaxed version of the inhibiting bisection problem, which aims to find loosely coupled subgraphs with significant demand/supply mismatch. Then we investigate finding critical components by finding a flow assignment that minimizes the maximum among flow assignments on all edges. We also report experiments on IEEE 30, IEEE 118, and WSCC 179 benchmark power networks.

  7. Wi-Fi Protocol Vulnerability Discovery Based on Fuzzy Testing

    Directory of Open Access Journals (Sweden)

    Kunhua Zhu

    2013-08-01

    Full Text Available To detect the wireless network equipment whether there is protocol vulnerability, using the method of modular design and implementation of a new suitable for Wi-Fi protocol vulnerability discovery fuzzy test framework. It can be independent of its transmission medium, produce deformity packet and implementation of the attack on the target system. The author firstly describes the wireless network protocol vulnerability discovery and fuzzy test in this paper,then focused on the test frame technical scheme, detailed technical realization and so on, and its application are analyzed. In the experimental stage the fuzzy test is applied to a wireless networks gateway, the test results show that the fuzzy test framework can be well applied to the wireless network equipment agreement loophole mining work.  

  8. Regional Hazard Analysis For Use In Vulnerability And Risk Assessment

    Directory of Open Access Journals (Sweden)

    Maris Fotios

    2015-09-01

    Full Text Available A method for supporting an operational regional risk and vulnerability analysis for hydrological hazards is suggested and applied in the Island of Cyprus. The method aggregates the output of a hydrological flow model forced by observed temperatures and precipitations, with observed discharge data. A scheme supported by observed discharge is applied for model calibration. A comparison of different calibration schemes indicated that the same model parameters can be used for the entire country. In addition, it was demonstrated that, for operational purposes, it is sufficient to rely on a few stations. Model parameters were adjusted to account for land use and thus for vulnerability of elements at risk by comparing observed and simulated flow patterns, using all components of the hydrological model. The results can be used for regional risk and vulnerability analysis in order to increase the resilience of the affected population.

  9. Coronary spasm, a pathogenic trigger of vulnerable plaque rupture

    Institute of Scientific and Technical Information of China (English)

    WANG Li-xin; L(U) Shu-zheng; ZHANG Wei-jun; SONG Xian-tao; CHEN Hui; ZHANG Li-jie

    2011-01-01

    Objective This coronary artery spasm review aimed to explore the most possible pathogenic trigger mechanism of vulnerable plaque rupture.Data sources Data used in this coronary artery spasm review were mainly from Medline and Pubmed in English.Study selection These reports from major review on coronary artery spasm.and these research included coronary artery conception,pathogenesis of spasm,mechanisms of plaque rupture,epidemiological evidence,clinical manifestation and the relationship between coronary artery spasm and vulnerable plaque rupture.Results Coronary artery spasm is somehow related to the presence of atherosclerotic intima disease in the coronary artery.However,chronic low-grade inflammation causes coronary vessel smooth muscle cell hypersensitivity,which can directely cause coronary artery spasm.Myocardial infarction and sudden cardiac death may be initiated by a sudden intense localized contraction of coronary artery smooth muscle.Conclusion Coronary artery spasm may be one trigger that can initiate and exacerbate vulnerable plaque rupture.

  10. The Implementation of a Vulnerability Topology Analysis Method for ICS

    Directory of Open Access Journals (Sweden)

    Yang Yi Lin

    2016-01-01

    Full Text Available Nowadays Industrial Control System (ICS is becoming more and more important in significant fields. However, the using of the general facilities in these systems makes lots of security issues exposed. Because there are a number of differences between the original IT systems and ICSs. At the same time, the traditional vulnerability scan technology lacks the ability to recognize the interactions between vulnerabilities in the network. ICSs are always in a high risk state. So, this paper focuses on the vertex polymerization of the topological vulnerability analysis. We realized a topological analysis method oriented ICSs on the basis of achievements at home and abroad. The result shows that this method can solve the problem of the complex fragility correlation among industrial control networks.

  11. Vulnerability Analysis and Evaluation of Urban Road System in Tianjin

    Science.gov (United States)

    Liu, Y. Q.; Wu, X.

    In recent years, with the development of economy, the road construction of our country has entered into a period of rapid growth. The road transportation network has been expanding and the risk of disasters is increasing. In this paper we study the vulnerability of urban road system in Tianjin. After analyzed many risk factors of the urban road system security, including road construction, road traffic and the natural environment, we proposed an evaluation index of vulnerability of urban road system and established the corresponding evaluation index system. Based on the results of analysis and comprehensive evaluation, appropriate improvement measures and suggestions which may reduce the vulnerability of the road system and improve the safety and reliability of the road system are proposed.

  12. [Volunteers and their vulnerability to stress: the impact of personality].

    Science.gov (United States)

    Nunes, Madalena; Afonso, Anabela; Castanheira, Cláudia; Ferreira, Dora; Fernandes, Liliana

    2005-01-01

    Volunteerism assumes a growing importance in the context of health, due to the significant number of practitioners and to the contribution given by the volunteers in the humanization of health care. However, as the continued interaction with the sick person might also originate negative emotions, we looked up in this article to describe the main results about vulnerability to stress in volunteers. The results revealed that 30.00% of volunteers were vulnerable to stress. We also observed that the civil state, socio-economic level and familiar functionality variables revealed to be protectors of the occurrence of stress. On the other side, the predominance of neuroticism as a personality trace was associated to a higher vulnerability to stress.

  13. Betweenness as a Tool of Vulnerability Analysis of Power System

    Science.gov (United States)

    Rout, Gyanendra Kumar; Chowdhury, Tamalika; Chanda, Chandan Kumar

    2016-12-01

    Complex network theory finds its application in analysis of power grid as both share some common characteristics. By using this theory finding critical elements in power network can be achieved. As vulnerabilities of elements of the network decide the vulnerability of the total network, in this paper, vulnerability of each element is studied using two complex network models—betweenness centrality and extended betweenness. The betweenness centrality considers only topological structure of power system whereas extended betweenness is based on both topological and physical properties of the system. In the latter case, some of the electrical properties such as electrical distance, line flow limits, transmission capacities of lines and PTDF matrix are included. The standard IEEE 57 bus system has been studied based upon the above mentioned indices and following conclusions have been discussed.

  14. Urban vulnerability and climate change in Africa a multidisciplinary approach

    CERN Document Server

    Coly, Adrien; Fohlmeister, Sandra; Gasparini, Paolo; Jørgensen, Gertrud; Kabisch, Sigrun; Kombe, Wilbard; Lindley, Sarah; Simonis, Ingo; Yeshitela, Kumelachew

    2015-01-01

    The book presents results of CLUVA (CLimate Change and Urban Vulnerability in Africa), a large European Commission funded research project (2010-2013). The project aimed to develop a better understanding of the risks and impacts of climate change related hazards to African cities, assess their vulnerability to these risks, and identify innovative strategies for planning and governance to increase their resilience. For the first time, a systematic and groundbreaking study of this kind was applied in an inter- and trans-disciplinary approach. CLUVA was unique in that it combined: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences and qualitative approaches of the social sciences; a novel multi-risk modeling methodology; strategic approaches to urban and green infrastructure planning with neighborhood perspectives of adaptation. The book broadly follows the approach taken in the CLUVA project. First, the co...

  15. Vulnerability Resilience in the Major Watersheds of the Korean Peninsula

    Directory of Open Access Journals (Sweden)

    Yong Jung

    2014-01-01

    Full Text Available Water resources management requires policy enforcement in a changing environment. Climate change must be considered in major watershed river restorations in Korea. The aim of river restorations is to provide better water resource control - now and in the future. To aid in policy making in the government sector, ¡§vulnerability-resilience indexes¡¨ (VRIs with a Delphi survey method have been adopted to provide a possible reference. The Delphi survey offers prioritized vulnerability proxy variables based on expert opinions regarding the changing environment in terms of climate change and river restorations. The VRIs of watersheds were improved after river restorations, with the exception of some locations. However, when climate change was taken into consideration in the analysis of conditions after the restorations were completed, the results showed that governments need to provide better mitigation strategies to increase vulnerability resilience in the face of climate change.

  16. Analyzing precipitationsheds to understand the vulnerability of rainfall dependent regions

    Directory of Open Access Journals (Sweden)

    P. W. Keys

    2011-10-01

    Full Text Available It is well known that rivers connect upstream and downstream ecosystems within watersheds. Here we describe the concept of precipitationsheds to show how upwind terrestrial evaporation source areas contribute moisture for precipitation in downwind sink regions. We illustrate the importance of upwind land cover in precipitationsheds to sustain precipitation in critically water stressed downwind areas, i.e. dryland agricultural areas. We first identify seven regions where rainfed agriculture is particularly vulnerable to reductions in precipitation, and then map their precipitationsheds. We further develop a framework for qualitatively assessing the vulnerability of precipitation for these seven agricultural regions. We illustrate that the sink regions have varying degrees of vulnerability to changes in upwind evaporation rates depending on the extent of the precipitationshed, source region land use intensity and expected land cover changes in the source region.

  17. Spatially integrative metrics reveal hidden vulnerability of microtidal salt marshes

    Science.gov (United States)

    Ganju, Neil K.; Defne, Zafer; Kirwan, Matthew L.; Fagherazzi, Sergio; D'Alpaos, Andrea; Carniello, Luca

    2017-01-01

    Salt marshes are valued for their ecosystem services, and their vulnerability is typically assessed through biotic and abiotic measurements at individual points on the landscape. However, lateral erosion can lead to rapid marsh loss as marshes build vertically. Marsh sediment budgets represent a spatially integrated measure of competing constructive and destructive forces: a sediment surplus may result in vertical growth and/or lateral expansion, while a sediment deficit may result in drowning and/or lateral contraction. Here we show that sediment budgets of eight microtidal marsh complexes consistently scale with areal unvegetated/vegetated marsh ratios (UVVR) suggesting these metrics are broadly applicable indicators of microtidal marsh vulnerability. All sites are exhibiting a sediment deficit, with half the sites having projected lifespans of less than 350 years at current rates of sea-level rise and sediment availability. These results demonstrate that open-water conversion and sediment deficits are holistic and sensitive indicators of salt marsh vulnerability.

  18. Automated Detection of Client-State Manipulation Vulnerabilities

    DEFF Research Database (Denmark)

    Møller, Anders; Schwarz, Mathias

    2012-01-01

    automated tools that can assist the programmers in the application development process by detecting weaknesses. Many vulnerabilities are related to web application code that stores references to application state in the generated HTML documents to work around the statelessness of the HTTP protocol....... In this paper, we show that such client-state manipulation vulnerabilities are amenable to tool supported detection. We present a static analysis for the widely used frameworks Java Servlets, JSP, and Struts. Given a web application archive as input, the analysis identifies occurrences of client state...... produced by the tool help the application programmer identify vulnerabilities. Moreover, the inferred information can be applied to configure a security filter that automatically guards against attacks. Experiments on a collection of open source web applications indicate that the static analysis is able...

  19. Assessing and managing freshwater ecosystems vulnerable to environmental change.

    Science.gov (United States)

    Angeler, David G; Allen, Craig R; Birgé, Hannah E; Drakare, Stina; McKie, Brendan G; Johnson, Richard K

    2014-01-01

    Freshwater ecosystems are important for global biodiversity and provide essential ecosystem services. There is consensus in the scientific literature that freshwater ecosystems are vulnerable to the impacts of environmental change, which may trigger irreversible regime shifts upon which biodiversity and ecosystem services may be lost. There are profound uncertainties regarding the management and assessment of the vulnerability of freshwater ecosystems to environmental change. Quantitative approaches are needed to reduce this uncertainty. We describe available statistical and modeling approaches along with case studies that demonstrate how resilience theory can be applied to aid decision-making in natural resources management. We highlight especially how long-term monitoring efforts combined with ecological theory can provide a novel nexus between ecological impact assessment and management, and the quantification of systemic vulnerability and thus the resilience of ecosystems to environmental change.

  20. Associations Between Social Vulnerabilities and Dietary Patterns in European Children

    DEFF Research Database (Denmark)

    Iguacel, Isabel; Fernandez-Alvira, Juan M.; Bammann, Karin

    2016-01-01

    Socio-economic inequalities in childhood can determine dietary patterns, and therefore future health. This study aimed to explore associations between social vulnerabilities and dietary patterns assessed at two time points, and to investigate the association between accumulation of vulnerabilities...... and dietary patterns. A total of 9301 children aged 2–9 years participated at baseline and 2-year follow-up examinations of the Identification and prevention of Dietary- and lifestyle-induced health EFfects In Children and infantS study. In all, three dietary patterns were identified at baseline and follow...... single-parent families, children of migrant origin and children with unemployed parents. Multinomial mixed models were used to assess the associations between social vulnerabilities and children’s dietary patterns at baseline and follow-up. Children whose parents lacked a social network (OR 1·31; 99 % CI...

  1. Europe's vulnerability to energy crises

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-01-15

    The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.

  2. Climate volatility deepens poverty vulnerability in developing countries

    Science.gov (United States)

    Ahmed, Syud A.; Diffenbaugh, Noah S.; Hertel, Thomas W.

    2009-07-01

    Extreme climate events could influence poverty by affecting agricultural productivity and raising prices of staple foods that are important to poor households in developing countries. With the frequency and intensity of extreme climate events predicted to change in the future, informed policy design and analysis requires an understanding of which countries and groups are going to be most vulnerable to increasing poverty. Using a novel economic-climate analysis framework, we assess the poverty impacts of climate volatility for seven socio-economic groups in 16 developing countries. We find that extremes under present climate volatility increase poverty across our developing country sample—particularly in Bangladesh, Mexico, Indonesia, and Africa—with urban wage earners the most vulnerable group. We also find that global warming exacerbates poverty vulnerability in many nations.

  3. Climate volatility deepens poverty vulnerability in developing countries

    Energy Technology Data Exchange (ETDEWEB)

    Ahmed, Syud A [Development Research Group, World Bank, Washington, DC (United States); Diffenbaugh, Noah S; Hertel, Thomas W, E-mail: sahmed20@worldbank.or [Purdue Climate Change Research Center, Purdue University, IN (United States)

    2009-07-15

    Extreme climate events could influence poverty by affecting agricultural productivity and raising prices of staple foods that are important to poor households in developing countries. With the frequency and intensity of extreme climate events predicted to change in the future, informed policy design and analysis requires an understanding of which countries and groups are going to be most vulnerable to increasing poverty. Using a novel economic-climate analysis framework, we assess the poverty impacts of climate volatility for seven socio-economic groups in 16 developing countries. We find that extremes under present climate volatility increase poverty across our developing country sample-particularly in Bangladesh, Mexico, Indonesia, and Africa-with urban wage earners the most vulnerable group. We also find that global warming exacerbates poverty vulnerability in many nations.

  4. An holistic approach to beach erosion vulnerability assessment.

    Science.gov (United States)

    Alexandrakis, George; Poulos, Serafim Ε

    2014-08-15

    Erosion is a major threat for coasts worldwide, beaches in particular, which constitute one of the most valuable coastal landforms. Vulnerability assessments related to beach erosion may contribute to planning measures to counteract erosion by identifying, quantifying and ranking vulnerability. Herein, we present a new index, the Beach Vulnerability Index (BVI), which combines simplicity in calculations, easily obtainable data and low processing capacity. This approach provides results not only for different beaches, but also for different sectors of the same beach and enables the identification of the relative significance of the processes involved. It functions through the numerical approximation of indicators that correspond to the mechanisms related to the processes that control beach evolution, such as sediment availability, wave climate, beach morhodynamics and sea level change. The BVI is also intended to be used as a managerial tool for beach sustainability, including resilience to climate change impact on beach erosion.

  5. Reducing US oil vulnerability: Energy policy for the 1980's

    Science.gov (United States)

    1980-11-01

    Current Federal energy policies and programs are asked in light of recent events and in light of what are believed to be the most reliable available projections of the future. Additional steps are outlined that could reduce our vulnerability to an oil import disruption during the next decade. Specifically, the study seeks to answer three questions: as a base case, what levels of US energy consumption, production, and imports might we anticipate for 1985 and 1990 under existing statutes, policies, and programs; considering both our own and our allies dependence on oil imports, how vulnerable does this leave the United States to foreign supply disruptions; considering the likely effects of government policies and programs which already exist to reduce our vulnerability (through reduction of US oil imports or by any other means), are there additional initiatives that could be undertaken to give us greater protection - especially between now and 1990.

  6. Chemical Safety Vulnerability Working Group report. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  7. Properties of ecosystems that are vulnerable during eco-fusion.

    Science.gov (United States)

    Yoshida, Katsuhiko; Tokita, Kei

    2015-01-29

    When two ecosystems with separate evolutionary histories come into contact (eco-fusion), reciprocal invasions occur during their fusion. Asymmetries in the migration direction or extinction rate then occur (e.g., during the Great American Biotic Interchange, GABI). Hypotheses have been proposed to describe this process, but the ecosystem properties have not been adequately discussed. To identify the ecosystem properties that create vulnerability to species loss during eco-fusion, we conducted computer simulations of the fusion of ecosystems with independent evolutionary histories. With asymmetrical species extinction rates, the ecosystem with a higher extinction rate had a shorter food chain, a higher ratio of animal species to plant species, and a lower ratio of carnivores to herbivores. Most ecosystems that have undergone isolated evolution are vulnerable. These results may explain the vulnerability of South America's ecosystem during the GABI and that of modern Australia.

  8. Web Application Scanning and Identification of Vulnerabilities for Different Attacks

    Directory of Open Access Journals (Sweden)

    Haridas V.Kanure,

    2014-05-01

    Full Text Available Now days there are lots of websites present in internet. And providing different services to the client is not only important task for website owner but also protecting their website from different attacks. Now days Identification of vulnerabilities in web application is becoming serious issue. Protecting website by identifying vulnerabilities and taking important attack prevention steps is very much important task.Different vulnerabilities identification is based on different test cases which we have and which we are going to build by use of this tool. Those test cases come from combination of some effective code. SQL injection test case can work with effective database query. And Cross site scripting can works with some java script code or other scripting language code etc.

  9. Selective neuronal vulnerability to oxidative stress in the brain

    Directory of Open Access Journals (Sweden)

    Xinkun Wang

    2010-03-01

    Full Text Available Oxidative stress (OS, caused by the imbalance between the generation and detoxification of reactive oxygen and nitrogen species (ROS/RNS, plays an important role in brain aging, neurodegenerative diseases, and other related adverse conditions, such as ischemia. While ROS/RNS serve as signaling molecules at physiological levels, an excessive amount of these molecules leads to oxidative modification and, therefore, dysfunction of proteins, nucleic acids, and lipids. The response of neurons to this pervasive stress, however, is not uniform in the brain. While many brain neurons can cope with a rise in OS, there are select populations of neurons in the brain that are vulnerable. Because of their selective vulnerability, these neurons are usually the first to exhibit functional decline and cell death during normal aging, or in age-associated neurodegenerative diseases, such as Alzheimer’s disease. Understanding the molecular and cellular mechanisms of selective neuronal vulnerability (SNV to OS is important in the development of future intervention approaches to protect such vulnerable neurons from the stresses of the aging process and the pathological states that lead to neurodegeneration. In this review, the currently known molecular and cellular factors that contribute to SNV to OS are summarized. Included among the major underlying factors are high intrinsic OS, high demand for ROS/RNS-based signaling, low ATP production, mitochondrial dysfunction, and high inflammatory response in vulnerable neurons. The contribution to the selective vulnerability of neurons to OS by other intrinsic or extrinsic factors, such as deficient DNA damage repair, low calcium-buffering capacity, and glutamate excitotoxicity, are also discussed.

  10. Forecasting Urban Forest Ecosystem Structure, Function, and Vulnerability

    Science.gov (United States)

    Steenberg, James W. N.; Millward, Andrew A.; Nowak, David J.; Robinson, Pamela J.; Ellis, Alexis

    2017-03-01

    The benefits derived from urban forest ecosystems are garnering increasing attention in ecological research and municipal planning. However, because of their location in heterogeneous and highly-altered urban landscapes, urban forests are vulnerable and commonly suffer disproportionate and varying levels of stress and disturbance. The objective of this study is to assess and analyze the spatial and temporal changes, and potential vulnerability, of the urban forest resource in Toronto, Canada. This research was conducted using a spatially-explicit, indicator-based assessment of vulnerability and i-Tree Forecast modeling of temporal changes in forest structure and function. Nine scenarios were simulated for 45 years and model output was analyzed at the ecosystem and municipal scale. Substantial mismatches in ecological processes between spatial scales were found, which can translate into unanticipated loss of function and social inequities if not accounted for in planning and management. At the municipal scale, the effects of Asian longhorned beetle and ice storm disturbance were far less influential on structure and function than changes in management actions. The strategic goals of removing invasive species and increasing tree planting resulted in a decline in carbon storage and leaf biomass. Introducing vulnerability parameters in the modeling increased the spatial heterogeneity in structure and function while expanding the disparities of resident access to ecosystem services. There was often a variable and uncertain relationship between vulnerability and ecosystem structure and function. Vulnerability assessment and analysis can provide strategic planning initiatives with valuable insight into the processes of structural and functional change resulting from management intervention.

  11. Forecasting Urban Forest Ecosystem Structure, Function, and Vulnerability.

    Science.gov (United States)

    Steenberg, James W N; Millward, Andrew A; Nowak, David J; Robinson, Pamela J; Ellis, Alexis

    2017-03-01

    The benefits derived from urban forest ecosystems are garnering increasing attention in ecological research and municipal planning. However, because of their location in heterogeneous and highly-altered urban landscapes, urban forests are vulnerable and commonly suffer disproportionate and varying levels of stress and disturbance. The objective of this study is to assess and analyze the spatial and temporal changes, and potential vulnerability, of the urban forest resource in Toronto, Canada. This research was conducted using a spatially-explicit, indicator-based assessment of vulnerability and i-Tree Forecast modeling of temporal changes in forest structure and function. Nine scenarios were simulated for 45 years and model output was analyzed at the ecosystem and municipal scale. Substantial mismatches in ecological processes between spatial scales were found, which can translate into unanticipated loss of function and social inequities if not accounted for in planning and management. At the municipal scale, the effects of Asian longhorned beetle and ice storm disturbance were far less influential on structure and function than changes in management actions. The strategic goals of removing invasive species and increasing tree planting resulted in a decline in carbon storage and leaf biomass. Introducing vulnerability parameters in the modeling increased the spatial heterogeneity in structure and function while expanding the disparities of resident access to ecosystem services. There was often a variable and uncertain relationship between vulnerability and ecosystem structure and function. Vulnerability assessment and analysis can provide strategic planning initiatives with valuable insight into the processes of structural and functional change resulting from management intervention.

  12. Europe's vulnerability to energy crises

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-07-01

    The study focuses on vulnerability as it relates to energy security, stating that many identify vulnerability simply with import dependency. WEC makes a useful distinction between the two, highlighting that it is possible to be dependent without being vulnerable: 'A country that imports the majority of its energy at a sustainable cost and ensures the security of its supply by means of well diversified sources will be dependent but not vulnerable. While a country which produces the majority of its energy at prohibitive cost or uses obsolete technologies will be vulnerable, even if independent of external suppliers'. WEC identifies a number of indicators to define vulnerability: Macro-economic level - energy dependence/energy independence, energy intensity, net energy import bill, carbon content of total primary energy supply (TPES), currency exchange rate; Micro and technological level - distribution, obsolete technology; Social level - fuel poverty and access to grid; and Geopolitical level. WEC states that Europe is particularly poor in terms of energy resources and hence heavily dependent on imports. WEC states that: 'coal has a much lower supply disruption risk compared to oil and gas. In addition, coal prices have been stable'. Coal deposits are much less concentrated in the world compared to crude oil. Hard coal production capacities are operated by many companies, in different regions. The global coal market is open and, in contrast to the markets for petroleum and gas, is relatively free of political influence and the effects of cartels. With the so-called zero emission coal-fired power plants, coal will be able to hold and even strengthen its role as a key, low-cost source of energy, in particular for power generation. 48 refs., 22 figs., 15 tabs.

  13. Designing a Web Application and Detecting Vulnerabilities Using Vega Vulnerabilities Scanner

    Directory of Open Access Journals (Sweden)

    Korra Manasa

    2016-08-01

    Full Text Available Web applications are popular due to the ubiquity of web browsers and the conveniences if using a web browser as a client to update and maintain web applications. Every day a variety of newly web applications are raised on the internet of public use and it needs high security. Vega is a tool that can make an observation of the web that can help the developer to find vulnerabilities in web and fix the holes before developer online the website. Application testing is very important for success and quality of the web application. In this project we developed a web application and explain about testing the website using the scanner and the result will be analyzed towards the relevance results on each scanner. Now a day’s workshops, conference, paper presentations are very important. Event organizing in different colleges is big task to let everyone know. Students are facing difficulties in finding the resources to learn practical knowledge. Developing an application which will allow students to find the right resources for their needs. On using this application anyone can share knowledge and at the same time they can learn new things.

  14. NORADAPT. Community Adaptation and Vulnerability in Norway; NORADAPT. Community Adaptation and Vulnerability in Norway. Sluttrapport

    Energy Technology Data Exchange (ETDEWEB)

    Oort, Bob van; Hovelsrud, Grete K.; Dannevig, Halvor; Bybraaten, Stine

    2012-10-15

    In NORADAPT, researchers from CICERO Center for Climate Research, Western Norway Research Institute, Eastern Norway Research Institute and the Norwegian Meteorological Institute worked in close cooperation with 8 selected municipalities, with the aim to help municipalities assess their vulnerability to climate change and develop adaptation strategies in collaboration with the research group. This report presents climate scenarios for all project municipalities and interprets the expected changes from the figures produced for each municipality. The report refers to socioeconomic scenarios which were developed as part of the project, describes progress throughout the project period and summarizes the main findings of the project through a summary of the final conference at Losby Gods 24-25 October 2011. The project has shown that municipalities are able to put climate change on the agenda, utilize scientific knowledge and implement adaptation measures, but that this depends on several factors, such as capacity, knowledge and involvement in local government, access to relevant knowledge and policy measures, and clear guidance and supervision from regional and national authorities. (Author)

  15. Life on the edge: vulnerability in the Sahel

    Energy Technology Data Exchange (ETDEWEB)

    Rubin, Vanessa [Africa Hunger Advisor, Care International UK (United Kingdom)

    2007-07-15

    Locusts, drought, crops crumbling into dust: in 2005, the Sahel was hit by a catastrophic food crisis. Eight million people were affected. Two years on, drought has eased in this arid strip south of the Sahara, but its people still live in the grip of extreme vulnerability. Their condition is a crisis in itself and a near-guarantee of more humanitarian disasters in the region, whatever the force or frequency of future shocks. Aid donors need to recognise this vulnerability as the root cause of the Sahel's rolling crises.

  16. Security Vulnerabilities in Web Application - An Attack Perspective.

    Directory of Open Access Journals (Sweden)

    S.Mirdula

    2013-04-01

    Full Text Available Security is the essential and important topic in web applications. The choice of communication made the web technology a essential one in the environment. The importance of web application and its securityincreasing day by day, but traditional networks fails to provide security for web application. This paper discuss about some of the vulnerable online attacks commonly occurs in web applications and providing solution for preventing such attacks by using penetration tool BACKTRACK. The testing aspect of vulnerabilities is carried out for SQL injection. The various methodologies are also discussed.

  17. Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material

    Energy Technology Data Exchange (ETDEWEB)

    Nicholson, Lary G.; Purvis, James W.

    1999-07-21

    The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

  18. POPULATION TRANSITIONS AND VULNERABILITY TO CLIMATE CHANGE IN BRAZIL

    Directory of Open Access Journals (Sweden)

    Alisson Flávio Barbieri

    2013-06-01

    Full Text Available The paper initially discusses how population issues have been incorporated in environmental and climate change analysis. It discusses the role of socioeconomic development and structural transformations in Brazil in shaping specific population vulnerability characteristics. These characteristics are further discussed in the context of demographic transition (and its impact on changing age structure and population mobility and urban concentration; and how these changes will help to define the epidemiological profile of the population. In conclusion, the paper discusses the need for building strategies of regional planning which eliminates or minimizes vulnerabilities and their reproduction given the climate change and population transitions in the coming decades.

  19. Mental vulnerability as a predictor of early mortality

    DEFF Research Database (Denmark)

    Eplov, Lene Falgaard; Jørgensen, Torben; Birket-Smith, Morten

    2005-01-01

    pressure, lipid levels), and lifestyle factors. We determined vital status of the study sample through linkage to the Civil Registration System until 2001 and to the Cause of Death Registry until 1998. The mean follow-up time was 15.9 years for analysis of total mortality and 13.6 years for analysis...... of the mental vulnerability score as a continuous variable gave similar results. CONCLUSIONS: Mental vulnerability may be an independent risk factor for premature mortality. The biologic mechanisms that may underlie this association need further exploration....

  20. Impact Assessment of Its Applications for Vulnerable Road Users

    NARCIS (Netherlands)

    Scholliers, J.; Noort, M. van; Johansson, C.; Mans, D.; Silla, A.; Bell, D.; Hancox, G.; Leden, L.; Giannelos, I.; Bax, B.; Malone, K.

    2016-01-01

    The EU-sponsored VRUITS project has prioritized ITS applications which have a potential to improve the safety, mobility and comfort of vulnerable road users (VRUs) and performed a quantitative safety, mobility and comfort assessment for the 10 most promising systems. The assessment methodology

  1. Impact assessment of ITS applications for vulnerable road users.

    NARCIS (Netherlands)

    Scholliers, J. Noort, M. van Johansson, C. Mans, D. Silla, A. Bell, D. Hancox, G. Leden, L. Giannelos, I. Bax, B. & Malone, K.

    2017-01-01

    The EU-sponsored VRUITS project has prioritized ITS applications which have a potential to improve the safety, mobility and comfort of vulnerable road users (VRUs) and performed a quantitative safety, mobility and comfort assessment for the 10 most promising systems. The assessment methodology

  2. Vulnerability to diffuse pollution of European soils and groundwater

    NARCIS (Netherlands)

    Meinardi CR; Beusen AHW; Bollen MJS; Klepper O; LBG; CWM

    1994-01-01

    From the Atlantic Ocean to the Ural Mountains, European soils and groundwater are threatened by diffuse pollution derived from various chemicals used in modern agriculture and by increased atmospheric deposition of pollutants. The investigated vulnerability of soils (including groundwater) to diffus

  3. the case of orphans and vulnerable children in South Africa

    African Journals Online (AJOL)

    2006-08-02

    Aug 2, 2006 ... of the Orphans and Vulnerable Children project in South Africa. It further ... and head of the Health Systems, Management and Policy at the National School of Public Health at MEDUNSA. .... identify key issues of importance to policy makers and ... what the factors responsible for success as well as what.

  4. Early Markers of Vulnerable Language Skill Development in Galactosaemia

    Science.gov (United States)

    Lewis, Fiona M.; Coman, David J.; Syrmis, Maryanne

    2014-01-01

    There are no known biomedical or genetic markers to identify which infants with galactosaemia (GAL) are most at risk of poor language skill development, yet pre-linguistic communicative "red flag" behaviours are recognised as early identifiers of heightened vulnerability to impaired language development. We report on pre-linguistic…

  5. Regulatory Guide on Conducting a Security Vulnerability Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  6. Early Markers of Vulnerable Language Skill Development in Galactosaemia

    Science.gov (United States)

    Lewis, Fiona M.; Coman, David J.; Syrmis, Maryanne

    2014-01-01

    There are no known biomedical or genetic markers to identify which infants with galactosaemia (GAL) are most at risk of poor language skill development, yet pre-linguistic communicative "red flag" behaviours are recognised as early identifiers of heightened vulnerability to impaired language development. We report on pre-linguistic…

  7. Using breast cancer quality indicators in a vulnerable population.

    NARCIS (Netherlands)

    Chen, F.; Puig, M.; Yermilov, I.; Malin, J.; Schneider, E.C.; Epstein, A.M.; Kahn, K.L.; Ganz, P.A.; Gibbons, M.M.

    2011-01-01

    BACKGROUND: Adherence to quality indicators may be especially important to disease-specific outcomes for uninsured, vulnerable patients. The objective of this study was to measure adherence to National Initiative for Cancer Care Quality (NICCQ) breast cancer quality indicators in a public hospital

  8. American Indian Adolescent Girls: Vulnerability to Sex Trafficking, Intervention Strategies

    Science.gov (United States)

    Pierce, Alexandra

    2012-01-01

    The Minnesota Indian Women's Resource Center offers harm reduction programming to at-risk adolescent American Indian girls, including outreach, case management, advocacy, healthy sexuality education, and support groups. To evaluate program impact, participants are assessed at intake and every 6 months afterward for current vulnerability to…

  9. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  10. Vulnerability Assessment of Selected Buildings Designated as Shelters: Anguilla.

    Science.gov (United States)

    Gibbs, Tony

    Educational facilities in the Caribbean often serve roles as shelters during natural hazards, but they often sustain as much damage as other buildings. This study investigated the physical vulnerability of schools located on Anguilla to wind forces, torrential rain, and seismic forces in order to provide relevant local agencies with some of the…

  11. Vulnerability Assessment of Selected Buildings Designated as Shelters: Grenada.

    Science.gov (United States)

    Gibbs, Tony

    Educational facilities in the Caribbean often serve as shelters during natural hazards, but they often sustain as much damage as other buildings. This study investigated the physical vulnerability of schools, located in Grenada, to wind forces, torrential rain, and seismic forces in order to provide relevant local agencies with some of the input…

  12. Air pollution and vulnerability: solving the puzzle of prioritization

    CSIR Research Space (South Africa)

    Wright, CY

    2011-01-01

    Full Text Available -determined risk threshold values to ascertain at-risk communities. While those urban wards located in a known air pollution hotspot had the highest air pollution levels, a periurban ward with moderate exposure levels was most vulnerable. This framework will prove...

  13. Vulnerability for cocaine dependence / Involvement of µ-opioid receptors

    NARCIS (Netherlands)

    Lesscher, Heidi Maria Bonifacio

    2004-01-01

    Drug dependence is a major health issue worldwide, which is characterised by its persistence and high rates of relapse. Individual differences exist in the vulnerability for drug dependence after first exposure to drugs of abuse like cocaine. A likely risk factor for drug dependence is the

  14. High impulsivity predicting vulnerability to cocaine addiction in rats

    DEFF Research Database (Denmark)

    Molander, Anna C; Mar, Adam; Norbury, Agnes

    2011-01-01

    RATIONALE: Impulsivity is a vulnerability marker for drug addiction in which other behavioural traits such as anxiety and novelty seeking ('sensation seeking') are also widely present. However, inter-relationships between impulsivity, novelty seeking and anxiety traits are poorly understood. OBJE...

  15. Methodology for the identification of vulnerable asylum seekers.

    Science.gov (United States)

    Visentin, Sindi; Pelletti, Guido; Bajanowski, Thomas; Ferrara, Santo Davide

    2017-07-26

    Asylum seekers often experience situations of vulnerability, being frequently exposed to a heightened risk of harm, and thus require special care, support and protection. The categories of "vulnerable persons", identified by International Legislation, and an individual's classification as a "vulnerable asylum seeker", have important implications in the reception procedures, in the decision-making phase and in the definition of therapeutic needs and rehabilitation. The Istanbul Protocol, the first international guideline approved by the United Nations and applied in different contexts, is not applicable for the assessment of the totality of the conditions (medical and otherwise), and therefore, the identification and assessment of conditions of vulnerability is largely delegated to questionnaires administered by non-medical personnel. The proposed methodology, based on the modificatory reworking of the Guidelines of the International Academy of Legal Medicine concerning the "medicolegal ascertainment of personal injury and damage on the living person", takes into consideration all the medical issues relevant for the decision concerning the applicant, both in the reception procedures and in the outcome of the asylum application.

  16. PET/SPECT imaging : From carotid vulnerability to brain viability

    NARCIS (Netherlands)

    Meerwaldt, Robbert; Slart, Riemer H. J. A.; van Dam, Gooitzen M.; Luijckx, Gert-Jan; Tio, Rene A.; Zeebregts, Clark J.

    2010-01-01

    Background: Current key issues in ischemic stroke are related to carotid plaque vulnerability, brain viability, and timing of intervention. The treatment of ischemic stroke has evolved into urgent active interventions, as 'time is brain'. Functional imaging such as positron emission tomography (PET)

  17. Vulnerability for cocaine dependence / Involvement of µ-opioid receptors

    NARCIS (Netherlands)

    Lesscher, Heidi Maria Bonifacio

    2004-01-01

    Drug dependence is a major health issue worldwide, which is characterised by its persistence and high rates of relapse. Individual differences exist in the vulnerability for drug dependence after first exposure to drugs of abuse like cocaine. A likely risk factor for drug dependence is the sensitivi

  18. Our Shared Future: Social Media, Leadership, Vulnerability, and Digital Identity

    Science.gov (United States)

    Stoller, Eric

    2013-01-01

    Social media have challenged us in our journey to support our students. Administrators have entered into new web-based conversations with one another and with their students. Personal branding has created a sense of performativity that conflicts with a growing trend towards online vulnerability. Our leaders have increasingly been engaged in…

  19. Vulnerability and feedbacks of permafrost to climate change

    Science.gov (United States)

    Guido Grosse; Vladimir Romanovsky; Torre Jorgenson; Katey Walter Anthony; Jerry Brown; Pier Paul Overduin; Alfred. Wegener

    2011-01-01

    The effects of permafrost degradation on terrestrial and offshore environments in polar regions and on the Earth's atmosphere are significant. Field-based observations, remote sensing, and modeling document regional warming and thawing of permafrost. However, major research questions regarding vulnerability of permafrost to thawing, the projected decline in...

  20. Resilience and vulnerability of permafrost to climate change

    Science.gov (United States)

    M.Torre Jorgenson; Vladimir Romanovsky; Jennifer Harden; Yuri Shur; Jonathan O' Donnell; Edward A.G. Schuur; Mikhail Kanevskiy; Sergei. Marchenko

    2010-01-01

    The resilience and vulnerability of permafrost to climate change depends on complex interactions among topography, water, soil, vegetation, and snow, which allow permafrost to persist at mean annual air temperatures (MAATs) as high as +2 °C and degrade at MAATs as low as -20°C. To assess these interactions, we compiled existing data and tested effects of varying...

  1. Application of Fuzzy Cognitive Mapping in Livelihood Vulnerability Analysis

    NARCIS (Netherlands)

    Murungweni, C.; Wijk, van M.T.; Andersson, J.A.; Smaling, E.M.A.; Giller, K.E.

    2011-01-01

    Feedback mechanisms are important in the analysis of vulnerability and resilience of social-ecological systems, as well as in the analysis of livelihoods, but how to evaluate systems with direct feedbacks has been a great challenge. We applied fuzzy cognitive mapping, a tool that allows analysis of

  2. Earthquake Vulnerability Assessment of House Constructions in Himalayas

    Directory of Open Access Journals (Sweden)

    Ila Gupta,

    2007-12-01

    Full Text Available The entire Himalayan range is highly prone to earthquake s and the latest Kashmir earthquake (October 08, 2005 has once again drawn our attention to the highly vulnerable Himalayan settlements. Narcndranagar block of the Himalayan state of Uttaranchal lies in seismic zone IV of the seismic zoning map of India. Like in other hilly areas Narendranagar block also witnessed the traditional practice of house construction being replaced by modern construction materials and practices without the knowledge of earthquake resistant techniques rendering the present buildings more vulnerable to earthquakes. The objective of this paper is to assess the vulnerability of the buildings so that corrective measures can be taken to minimize the destruction during future earthquakes. Types of buildings observed in the entire block with different combinations of materials and their earthquake behaviours are explained. The existing structures are grouped into vulnerability categories Vl , V2 and V3 as per the descriptions provided in the MSK (Medvedev - Sponheaer - Karnik Intensity Scale. Damage estimation for a hypothetical earthquake is carried out for the Narcndranagar block. Conclusions and recommendations suggesting use of such studies in all earth quake prone areas of the Trans Himalayan region arc provided.

  3. A physical approach on flood risk vulnerability of buildings

    Science.gov (United States)

    Mazzorana, B.; Simoni, S.; Scherer, C.; Gems, B.; Fuchs, S.; Keiler, M.

    2014-09-01

    The design of efficient hydrological risk mitigation strategies and their subsequent implementation relies on a careful vulnerability analysis of the elements exposed. Recently, extensive research efforts were undertaken to develop and refine empirical relationships linking the structural vulnerability of buildings to the impact forces of the hazard processes. These empirical vulnerability functions allow estimating the expected direct losses as a result of the hazard scenario based on spatially explicit representation of the process patterns and the elements at risk classified into defined typological categories. However, due to the underlying empiricism of such vulnerability functions, the physics of the damage-generating mechanisms for a well-defined element at risk with its peculiar geometry and structural characteristics remain unveiled, and, as such, the applicability of the empirical approach for planning hazard-proof residential buildings is limited. Therefore, we propose a conceptual assessment scheme to close this gap. This assessment scheme encompasses distinct analytical steps: modelling (a) the process intensity, (b) the impact on the element at risk exposed and (c) the physical response of the building envelope. Furthermore, these results provide the input data for the subsequent damage evaluation and economic damage valuation. This dynamic assessment supports all relevant planning activities with respect to a minimisation of losses, and can be implemented in the operational risk assessment procedure.

  4. International Student-Workers in Australia: A New Vulnerable Workforce

    Science.gov (United States)

    Nyland, Chris; Forbes-Mewett, Helen; Marginson, Simon; Ramia, Gaby; Sawir, Erlenawati; Smith, Sharon

    2009-01-01

    In the period immediately preceding the 2007 Australian election, much attention was accorded to the impact of the nation's labour laws on vulnerable employees. This debate centred on specific groups including women, youth, migrants and workers on individual employment contracts. International students, by contrast, were ignored in the debate.…

  5. Vulnerability Assessment of Open Source Wireshark and Chrome Browser

    Science.gov (United States)

    2013-08-01

    and, when available, the developers. While FPVA is certainly a labor -intensive approach to vulnerability assessment, it is effective in real systems...Elisa Heymann, Eduardo Cesar and Barton P. Miller, “Automating Threat Modeling through the Software Development Life-Cycle”, XXIII Jornadas de

  6. Psychological Distress and Mortality: Are Women More Vulnerable?

    Science.gov (United States)

    Ferraro, Kenneth F.; Nuriddin, Tariqah A.

    2006-01-01

    Does psychological distress increase mortality risk? If it does, are women more vulnerable than men to the effect of distress on mortality? Drawing from cumulative disadvantage theory, these questions are addressed with data from a 20-year follow-up of a national sample of adults ages 25-74. Event history analyses were performed to examine…

  7. Towards a holistic perspective on city-level vulnerability assessment

    DEFF Research Database (Denmark)

    Karlsson Nyed, Patrik; Herslund, Lise Byskov

    The deliverable introduces a map of the vulnerability to flooding in Dar es Salaam at the resolution of the finest administrative level (the subward/mtaa; comprising approx. 5-15 000 residents). Overlaying a hydrological model, representing the areas of the city most likely to become flooded, the...

  8. Assessing landscape vulnerability to wildfire in the USA

    Science.gov (United States)

    Nicole M. Vaillant; Crystal A. Kolden; Alistair M. S. Smith

    2016-01-01

    Wildfire is an ever present, natural process shaping landscapes. Having the ability to accurately measure and predict wildfire occurrence and impacts to ecosystem goods and services, both retrospectively and prospectively, is critical for adaptive management of landscapes. Landscape vulnerability is a concept widely utilized in the ecosystem management literature that...

  9. Development of hazard-compatible building fragility and vulnerability models

    Science.gov (United States)

    Karaca, E.; Luco, N.

    2008-01-01

    We present a methodology for transforming the structural and non-structural fragility functions in HAZUS into a format that is compatible with conventional seismic hazard analysis information. The methodology makes use of the building capacity (or pushover) curves and related building parameters provided in HAZUS. Instead of the capacity spectrum method applied in HAZUS, building response is estimated by inelastic response history analysis of corresponding single-degree-of-freedom systems under a large number of earthquake records. Statistics of the building response are used with the damage state definitions from HAZUS to derive fragility models conditioned on spectral acceleration values. Using the developed fragility models for structural and nonstructural building components, with corresponding damage state loss ratios from HAZUS, we also derive building vulnerability models relating spectral acceleration to repair costs. Whereas in HAZUS the structural and nonstructural damage states are treated as if they are independent, our vulnerability models are derived assuming "complete" nonstructural damage whenever the structural damage state is complete. We show the effects of considering this dependence on the final vulnerability models. The use of spectral acceleration (at selected vibration periods) as the ground motion intensity parameter, coupled with the careful treatment of uncertainty, makes the new fragility and vulnerability models compatible with conventional seismic hazard curves and hence useful for extensions to probabilistic damage and loss assessment.

  10. Mental vulnerability--a risk factor for ischemic heart disease

    DEFF Research Database (Denmark)

    Eplov, Lene Falgaard; Jørgensen, Torben; Birket-Smith, Morten

    2006-01-01

    OBJECTIVE: The purpose of this study is to examine whether mental vulnerability is a risk factor for the development of ischemic heart disease (IHD) after adjustment for well-established risk factors. METHODS: In three prospective cohort studies in Copenhagen County, Denmark, we recorded the leve...

  11. Stressful Segregation Housing and Psychosocial Vulnerability in Prison Suicide Ideators

    Science.gov (United States)

    Bonner, Ronald L.

    2006-01-01

    Psychosocially vulnerable prisoners under stressful conditions of confinement are ill prepared to cope and at risk for developing suicide intention. The present study examined the relationships of depression, hopelessness, reasons for living, mental health problem history, suicide attempt lethality history, and stressful segregation housing with…

  12. Mental Illness May Make Teens Vulnerable to Drugs, Alcohol

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_160284.html Mental Illness May Make Teens Vulnerable to Drugs, Alcohol Brazilian study found half of those who smoked, drank, did pot had symptoms of psychological ... -- Teens who are struggling with mental health disorders are more likely to smoke cigarettes, ...

  13. Antidepressive interventions : On state and vulnerability of the brain

    NARCIS (Netherlands)

    Korf, J

    1996-01-01

    An attempt is made to relate drug and non-drug antidepressive interventions to brain processes. In the present context two concepts are proposed: vulnerability towards depressogenic factors and depression as a state of the brain. Accordingly, it is assumed that the current antidepressants make the b

  14. Youth Work with Vulnerable Young People. Interchange No. 51.

    Science.gov (United States)

    Powney, Janet; Furlong, Andy; Cartmel, Fred; Hall, Stuart

    Research was conducted in Scotland to evaluate the effectiveness of youth work with vulnerable young people, primarily between the ages of 13 and 16. Four complementary methods were adopted: (1) a survey of secondary school students; (2) a series of focus group interviews with young people with experience of youth work; (3) interviews with…

  15. A physical approach on flood risk vulnerability of buildings

    Directory of Open Access Journals (Sweden)

    B. Mazzorana

    2014-02-01

    Full Text Available The design of efficient hydrological risk mitigation strategies and their subsequent implementation relies on a careful vulnerability analysis of the elements exposed. Recently, extensive research efforts were undertaken to develop and refine empirical relationships linking the structural vulnerability of buildings to the impact forces of the hazard processes. These empirical vulnerability functions allow estimating the expected direct losses as a result of the hazard scenario based on spatially explicit representation of the process patterns and the elements at risk classified into defined typological categories. However, due to the underlying empiricism of such vulnerability functions, the physics of the damage generating mechanisms for a well-defined element at risk with its peculiar geometry and structural characteristics remain unveiled, and, as such, the applicability of the empirical approach for planning hazard-proof residential buildings is limited. Therefore, we propose a conceptual assessment scheme to close this gap. This assessment scheme encompasses distinct analytical steps: modelling (a the process intensity, (b the impact on the element at risk exposed and (c the physical response of the building envelope. Furthermore, these results provide the input data for the subsequent damage evaluation and economic damage valuation. This dynamic assessment supports all relevant planning activities with respect to a minimisation of losses, and can be implemented in the operational risk assessment procedure.

  16. A pragmatist approach to the governance of vulnerability

    NARCIS (Netherlands)

    Keulartz, J.; Schermer, M.

    2014-01-01

    Novel technologies and scientific advancements offer not only opportunities but risks. Technological systems are vulnerable to human error and technical malfunctioning that have far-reaching consequences: one flipped switch can cause a cascading power failure across a networked electric grid. Yet, o

  17. Vulnerability in Technological Culture: New directions in research and governance

    NARCIS (Netherlands)

    Hommels, A.M.; Mesman, J.; Bijker, W.E.

    2014-01-01

    Novel technologies and scientific advancements offer not only opportunities but risks. Technological systems are vulnerable to human error and technical malfunctioning that have far-reaching consequences: one flipped switch can cause a cascading power failure across a networked electric grid. Yet, o

  18. Patterns of Vulnerability to Aids Impacts in Zambian Households

    NARCIS (Netherlands)

    Wiegers, E.S.; Curry, J.; Garbero, G.; Hourihan, J.

    2006-01-01

    Using household data from Northern Zambia, this article looks at HIV/AIDS impacts on different aspects of people's access to food. The findings draw particular attention to the variances in vulnerability among households burdened by illness and orphans that are headed by men, women and the elderly.

  19. Anxious attachment may be a vulnerability factor for developing embitterment

    NARCIS (Netherlands)

    Blom, D.; Middendorp, H. van; Geenen, R.

    2012-01-01

    By predisposing to ego-defensive strategies in social situations, a negative attachment history may promote embitterment. The present study identified attachment anxiety - more than attachment avoidance - as a possible vulnerability factor for the development and maintenance of embitterment. This fa

  20. Integration of vulnerable road users in cooperative ITS systems

    NARCIS (Netherlands)

    Scholliers, J.; Sambeek, M. van; Moerman, K.

    2017-01-01

    Introduction: This paper describes the development of an architecture for the integration of Vulnerable Road Users (VRUs), i.e. pedestrians, cyclists and powered two-wheelers (PTWs) in Cooperative ITS (C-ITS) systems, and the requirements for VRU devices. Methods: This paper starts with a literature

  1. Personality and cognitive vulnerability in remitted recurrently depressed patients

    NARCIS (Netherlands)

    van Rijsbergen, Gerard D; Kok, Gemma D; Elgersma, Hermien J; Hollon, Steven D; Bockting, Claudi L H

    2015-01-01

    INTRODUCTION: Personality disorders (PDs) have been associated with a poor prognosis of Major Depressive Disorder (MDD). The aim of the current study was to examine cognitive vulnerability (i.e., dysfunctional beliefs, extremity of beliefs, cognitive reactivity, and rumination) that might contribute

  2. Critiquing War in the Classroom: Professor Positionality, Vulnerability, and Possibility

    Science.gov (United States)

    Taber, Nancy

    2014-01-01

    This article describes an analytic autoethnographical research study focusing on my experiences developing, delivering, and evaluating course content critiquing war from a feminist anti-militarist perspective as a pre-tenured faculty member. Themes include: professional vulnerability, student resistance, pedagogical possibility, and scholarly…

  3. Vulnerability to shocks in the global seafood trade network

    Science.gov (United States)

    Gephart, Jessica A.; Rovenskaya, Elena; Dieckmann, Ulf; Pace, Michael L.; Brännström, Åke

    2016-03-01

    Trade can allow countries to overcome local or regional losses (shocks) to their food supply, but reliance on international food trade also exposes countries to risks from external perturbations. Countries that are nutritionally or economically dependent on international trade of a commodity may be adversely affected by such shocks. While exposure to shocks has been studied in financial markets, communication networks, and some infrastructure systems, it has received less attention in food-trade networks. Here, we develop a forward shock-propagation model to quantify how trade flows are redistributed under a range of shock scenarios and assess the food-security outcomes by comparing changes in national fish supplies to indices of each country’s nutritional fish dependency. Shock propagation and distribution among regions are modeled on a network of historical bilateral seafood trade data from UN Comtrade using 205 reporting territories grouped into 18 regions. In our model exposure to shocks increases with total imports and the number of import partners. We find that Central and West Africa are the most vulnerable to shocks, with their vulnerability increasing when a willingness-to-pay proxy is included. These findings suggest that countries can reduce their overall vulnerability to shocks by reducing reliance on imports and diversifying food sources. As international seafood trade grows, identifying these types of potential risks and vulnerabilities is important to build a more resilient food system.

  4. Family and social vulnerability: a study with octogenarians.

    Science.gov (United States)

    Pavarini, Sofia Cristina Iost; Barha, Elizabeth Joan; Mendiondo, Marisa Silvana Zazzetta de; Filizola, Carmen Lucia Alves; Petrilli Filho, José Fernando; Santos, Ariene Angelini Dos

    2009-01-01

    In order to guide the development of dementia-related public policies for the elderly, it is important to identify factors that vary together with the social vulnerability of this population. This study aimed to identify the relationship between the São Paulo Social Vulnerability Index (IPVS) and various indicators of family support for elderly people over 80 years of age, who presented cognitive alterations (N=49). All ethical guidelines were followed. Data were collected at the homes of the elderly people. A large majority of the respondents lived with family members (88%). In half of the cases, the respondents lived with one (41%) or two (9%) other elderly persons. On average, there was one more non-elderly person living in the high vulnerability family context (M = 3.6, sd = 1.70) than in contexts of very low vulnerability (M = 2.4, sd = 1.07), F(2.43) = 3.364, p < 0.05. However, the functionality of the support provided by these family members needs to be verified, in each of these contexts.

  5. Disaster Governance and Vulnerability: The Case of Chile

    Directory of Open Access Journals (Sweden)

    Vicente Sandoval

    2016-12-01

    Full Text Available This exploratory work seeks to shed light on disaster governance by looking into potential linkages between the production of vulnerability and disaster governance in Chile. Our point of investigation is the case of post-disaster Chaitén and the Chilean model of Disaster Risk Management. The work begins by situating disaster governance and the production of vulnerability in a broader context of existing governance system that includes a multiplicity of actors and socio-economic, socio-ecological, and political processes. Coming from a multi-scalar perspective, we use the disaster Pressure and Release (PAR model to enable a differentiated analysis of the multiplicity of actors, rules, and processes related to DRM that participate in the production of disaster vulnerability in the current Chaitén. With this we address the questions as to ‘why’ the Chilean model of DRM is prominently centralised and ‘what’ are the effects on the production of disaster vulnerability for the case of post-disaster Chaitén.

  6. Vulnerability of Smallholder Farmers to Climate Change in the ...

    African Journals Online (AJOL)

    Yitayal A.

    small-scale rain-fed mixed crop-and-livestock production with very low ... essential to tackle the differential effect of climate change (Bohle et al., 1994) .... The formal media, radio and Bureau of Agriculture (BoA) extension provide information .... Model estimates of income vulnerability of smallholder farmers ... Adj R-Squared.

  7. Hidden Connectivity in Networks with Vulnerable Classes of Nodes

    Science.gov (United States)

    Krause, Sebastian M.; Danziger, Michael M.; Zlatić, Vinko

    2016-10-01

    In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a "color-avoiding" percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.

  8. Classification of aquifer vulnerability using K-means cluster analysis

    Science.gov (United States)

    Javadi, S.; Hashemy, S. M.; Mohammadi, K.; Howard, K. W. F.; Neshat, A.

    2017-06-01

    Groundwater is one of the main sources of drinking and agricultural water in arid and semi-arid regions but is becoming increasingly threatened by contamination. Vulnerability mapping has been used for many years as an effective tool for assessing the potential for aquifer pollution and the most common method of intrinsic vulnerability assessment is DRASTIC (Depth to water table, net Recharge, Aquifer media, Soil media, Topography, Impact of vadose zone and hydraulic Conductivity). An underlying problem with the DRASTIC approach relates to the subjectivity involved in selecting relative weightings for each of the DRASTIC factors and assigning rating values to ranges or media types within each factor. In this study, a clustering technique is introduced that removes some of the subjectivity associated with the indexing method. It creates a vulnerability map that does not rely on fixed weights and ratings and, thereby provides a more objective representation of the system's physical characteristics. This methodology was applied to an aquifer in Iran and compared with the standard DRASTIC approach using the water quality parameters nitrate, chloride and total dissolved solids (TDS) as surrogate indicators of aquifer vulnerability. The proposed method required only four of DRASTIC's seven factors - depth to groundwater, hydraulic conductivity, recharge value and the nature of the vadose zone, to produce a superior result. For nitrate, chloride, and TDS, respectively, the clustering approach delivered Pearson correlation coefficients that were 15, 22 and 5 percentage points higher than those obtained for the DRASTIC method.

  9. An awareness-culture for openhearted connectedness: resilience and vulnerability

    DEFF Research Database (Denmark)

    Nielsen, Anne Maj

    and a total of 9 interviews. The experienced competences to be aware of and manage states of mind seem to produce resilience as well as vulnerability as they intersect with other contexts and awareness-cultures such as the schools where the participating teachers work. The method combines sensory experiences...

  10. Our Shared Future: Social Media, Leadership, Vulnerability, and Digital Identity

    Science.gov (United States)

    Stoller, Eric

    2013-01-01

    Social media have challenged us in our journey to support our students. Administrators have entered into new web-based conversations with one another and with their students. Personal branding has created a sense of performativity that conflicts with a growing trend towards online vulnerability. Our leaders have increasingly been engaged in…

  11. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    Science.gov (United States)

    2005-09-01

    vulnerability assessment capability within the Marine Corps. 15. NUMBER OF PAGES 177 14. SUBJECT TERMS Wireless Local Area Network (WLAN), WiFi ... WiFi Protected Access xviii THIS PAGE INTENTIONALLY LEFT BLANK xix...intelligence officers in how to hack into U.S. computers2. Government networks, proprietary commercial information, and scientific research are all

  12. Linking degradation status with ecosystem vulnerability to environmental change

    Science.gov (United States)

    Angeler, David G.; Baho, Didier L.; Allen, Craig R.; Johnson, Richard K.

    2015-01-01

    Environmental change can cause regime shifts in ecosystems, potentially threatening ecosystem services. It is unclear if the degradation status of ecosystems correlates with their vulnerability to environmental change, and thus the risk of future regime shifts. We assessed resilience in acidified (degraded) and circumneutral (undegraded) lakes with long-term data (1988–2012), using time series modeling. We identified temporal frequencies in invertebrate assemblages, which identifies groups of species whose population dynamics vary at particular temporal scales. We also assessed species with stochastic dynamics, those whose population dynamics vary irregularly and unpredictably over time. We determined the distribution of functional feeding groups of invertebrates within and across the temporal scales identified, and in those species with stochastic dynamics, and assessed attributes hypothesized to contribute to resilience. Three patterns of temporal dynamics, consistent across study lakes, were identified in the invertebrates. The first pattern was one of monotonic change associated with changing abiotic lake conditions. The second and third patterns appeared unrelated to the environmental changes we monitored. Acidified and the circumneutral lakes shared similar levels and patterns of functional richness, evenness, diversity, and redundancy for species within and across the observed temporal scales and for stochastic species groups. These similar resilience characteristics suggest that both lake types did not differ in vulnerability to the environmental changes observed here. Although both lake types appeared equally vulnerable in this study, our approach demonstrates how assessing systemic vulnerability by quantifying ecological resilience can help address uncertainty in predicting ecosystem responses to environmental change across ecosystems.

  13. Vulnerabilities, Precautions and Preparedness in the View of Disciplinary Discourse

    DEFF Research Database (Denmark)

    Jørgensen, Ulrik; Hoffmann, Birgitte

    and its population. Not least the continued expansion of a modern (Danish) way of life and its priorities concerning health, housing, social welfare, and economic politics have in different periods of time framed the kinds of vulnerabilities that have been identified based on changing professional...

  14. Livelihoods and vulnerability of smallholder farmers in Samia District, Kenya

    NARCIS (Netherlands)

    Pouw, N.; Schreij, A.; Odame, H.; Ogombe, E.

    2012-01-01

    In many sub-Saharan African countries smallholder farmers are vulnerable to food and income insecurity. Population growth, pressure on land, climatic change, and migration affect agricultural production. Transformation of the agricultural sector is seen as crucial to growth in the sector and Kenyan

  15. A Study on web Applications & Protection against Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Padmaja K

    2012-11-01

    Full Text Available Web applications are widely adopted and their correct functioning is mission critical for many businesses. Online banking, emails, eshopping, has become an integral part of today’s life. Vulnerabilities in web application can lead to a variety of erroneous behavior at dynamic run time. We encounter the problem of forceful browsing in many web applications, username enumeration can help an attacker who attempts to use guessable passwords, such as test/test, admin/admin, guest/guest, and so on. These accounts are often created by developers for testing purposes, and many times the accounts are never disabled or the developer forgets to change the password, hacking reduces the performance or function of the application, further more, the modified system itself becomes a constraint to counter newer types of vulnerabilities that may crop up from time to time. Hence, the best solution would be to finds the steps to solve that are web-based (firewall independent for protecting against vulnerabilities in web applications. In our work algorithm is to analyze vulnerabilities that are caused by breaking of the data dependency using problem which work efficient with existing one.

  16. Vulnerability management tools for COTS software - A comparison

    NARCIS (Netherlands)

    Welberg, S.M.

    2008-01-01

    In this paper, we compare vulnerability management tools in two stages. In the first stage, we perform a global comparison involving thirty tools available in the market. A framework composed of several criteria based on scope and analysis is used for this comparison. From this global view of the to

  17. Does Aquaculture Support the Needs of Nutritionally Vulnerable Nations?

    Directory of Open Access Journals (Sweden)

    Christopher D. Golden

    2017-05-01

    Full Text Available Aquaculture now supplies half of the fish consumed directly by humans. We evaluate whether aquaculture, given current patterns of production and distribution, supports the needs of poor and food-insecure populations throughout the world. We begin by identifying 41 seafood-reliant nutritionally vulnerable nations (NVNs, and ask whether aquaculture meets human nutritional demand directly via domestic production or trade, or indirectly via purchase of nutritionally rich dietary substitutes. We find that a limited number of NVNs have domestically farmed seafood, and of those, only specific aquaculture approaches (e.g., freshwater in some locations have the potential to benefit nutritionally vulnerable populations. While assessment of aquaculture's direct contribution via trade is constrained by data limitations, we find that it is unlikely to contribute substantially to human nutrition in vulnerable groups, as most exported aquaculture consists of high-value species for international markets. We also determine that subpopulations who benefit from aquaculture profits are likely not the same subpopulations who are nutritionally vulnerable, and more research is needed to understand the impacts of aquaculture income gains. Finally, we discuss the relationship of aquaculture to existing trends in capture fisheries in NVNs, and suggest strategies to create lasting solutions to nutritional security, without exacerbating existing challenges in access to food and land resources.

  18. Vulnerability Assessment Using a Fuzzy Logic Based Method

    Science.gov (United States)

    1993-12-01

    Statistics for Engineers" by Scheaffer and McClave (Scheaffer86: 1). For each vulnerability, eight values are given. The first value, ’vuln-inf luence...and Zadeh, L. A. ed. Approximate Reasoning in Intelligent Systems. Decision and Control. Oxford, England: Pergamon Press, 1987. Scheaffer , Richard L

  19. Dyadic Vulnerability and Risk Profiling for Elder Neglect

    Science.gov (United States)

    Fulmer, Terry; Paveza, Gregory; VandeWeerd, Carla; Fairchild, Susan; Guadagno, Lisa; Bolton-Blatt, Marguarette; Norman, Robert

    2005-01-01

    Purpose: Neglect of older adults accounts for 60% to 70% of all elder-mistreatment reports made to adult protective services. The purpose of this article is to report data from research, using a risk-and-vulnerability model, that captures the independent contributions of both the elder and the caregiver as they relate to the outcome of neglect.…

  20. Women and vulnerability to depression: some personality and clinical factors.

    Science.gov (United States)

    Carrillo, Jesús M; Rojo, Nieves; Staats, Arthur W

    2004-05-01

    The purpose of this study is to explore the role of sex differences and personality in vulnerability to depression. Sex differences in personality and some clinical variables are described. We also assess the value of the variables that revealed significant sex differences as predictors of vulnerability to depression. In a group of adult participants (N = 112), 50% males and 50% females (mean age = 41.30; SD = 15.09; range 17-67), we studied sex differences in the three-factor personality model, using the Eysenck Personality Questionnaire, Form A (EPQ-A; Eysenck & Eysenck, 1975), and in the Five-Factor Personality Model, with the NEO Personality Inventory (NEO-PI; Costa & McCrae, 1985). The following clinical scales were used: the Beck Depression Inventory (BDI; Beck, Rush, Shaw, & Emery, 1979), the Schizotypy Questionnaire (STQ; Claridge & Broks, 1984; Spanish version, Carrillo & Rojo, 1999), the THARL Scales (Dua, 1989, 1990; Spanish version, Dua & Carrillo, 1994) and the Adjustment Inventory (Bell, 1937; Spanish version, Cerdá, 1980). Subsequently, simple linear regression analysis, with BDI scores as criterion, were performed to estimate the value of the variables as predictors of vulnerability to depression. The results indicate that a series of personality variables cause women to be more vulnerable to depression than men and that these variables could be explained by a negative emotion main factor. Results are discussed within the framework of the psychological behaviorism theory of depression.

  1. Mitigating Intrusion and Vulnerabilities in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    I. Ohaeri

    Full Text Available The deployment of Cognitive Radio Networks has been greatly hindered in spite of its potentials by the rate at which intrusions and vulnerabilities replicate within every domain of the network. Cognitive Radio Network is expected to drive the next generat ...

  2. Data Integration for Climate Vulnerability Mapping in West Africa

    Directory of Open Access Journals (Sweden)

    Alex de Sherbinin

    2015-11-01

    Full Text Available Vulnerability mapping reveals areas that are likely to be at greater risk of climate-related disasters in the future. Through integration of climate, biophysical, and socioeconomic data in an overall vulnerability framework, so-called “hotspots” of vulnerability can be identified. These maps can be used as an aid to targeting adaptation and disaster risk management interventions. This paper reviews vulnerability mapping efforts in West Africa conducted under the USAID-funded African and Latin American Resilience to Climate Change (ARCC project. The focus is on the integration of remotely sensed and socioeconomic data. Data inputs included a range of sensor data (e.g., MODIS NDVI, Landsat, SRTM elevation, DMSP-OLS night-time lights as well as high-resolution poverty, conflict, and infrastructure data. Two basic methods were used, one in which each layer was transformed into standardized indicators in an additive approach, and another in which remote sensing data were used to contextualize the results of composite indicators. We assess the benefits and challenges of data integration, and the lessons learned from these mapping exercises.

  3. Critiquing War in the Classroom: Professor Positionality, Vulnerability, and Possibility

    Science.gov (United States)

    Taber, Nancy

    2014-01-01

    This article describes an analytic autoethnographical research study focusing on my experiences developing, delivering, and evaluating course content critiquing war from a feminist anti-militarist perspective as a pre-tenured faculty member. Themes include: professional vulnerability, student resistance, pedagogical possibility, and scholarly…

  4. Opportunities to promote health to vulnerable male teenagers.

    Science.gov (United States)

    Wildbore, Amanda

    Forty years ago an increase in 'juvenile delinquency' led to a large prison-building programme for young offenders. Today, the emphasis is on community sentencing and a reduction in prison places. The secondment of nurses into youth offending teams makes it possible to offer primary health services to a group of mainly male, vulnerable people.

  5. Unipolar Depression, Life Context Vulnerabilities, and Drinking to Cope

    Science.gov (United States)

    Holahan, Charles J.; Moos, Rudolf H.; Holahan, Carole K.; Cronkite, Ruth C.; Randall, Patrick K.

    2004-01-01

    This study followed baseline samples of 424 unipolar depressed patients and 424 community controls across 10 years to investigate the association between depression and alcohol-related coping and to examine how life context vulnerabilities underlie the risk for depressed individuals to rely on drinking to cope. Findings supported all hypotheses.…

  6. Assessment of climate vulnerability in the Norwegian built environment

    Science.gov (United States)

    Hygen, H. O.; Øyen, C. F.; Almâs, A. J.

    2010-09-01

    The main trends expected for the change of Norwegian climate for this century are increasing temperatures, precipitation and wind. This indicates a probable increase of climate related risks to the Norwegian built environment. Previous assessments of climate vulnerability of the built environment have been based on general terms and experiences. The report "Climate and vulnerability analysis for Norwegian built environment; Basis elucidation for the Official Norwegian Report (NOU) on climate adaptation (in Norwegian only)" has used previously defined indexes to quantify the future vulnerability and thus estimated the impact of future climate strain to the existing built environment. The method used to do this assessment has been to create national geolocated maps of relevant climate indexes. Climate indexes for this analysis are: * Wood decay, * Temperature and heating degree days, * Snow load and wet winter precipitation, * Precipitation, flood and extreme precipitation * Wind and wind-driven rain * Frost decay * Frost amount * Perma frost Most of these indexes have been established both for the normal period 1961 - 1990 and projected climate of 2071 - 2100. To compensate for uncertainties in the projection, a set of three projections has been used. These indexes have been combined with geolocated information for Norway's 3.9 million buildings, by imposing GIS digitalized building information to the geolocated maps. The result of this combination is a synopsis of the number of buildings in Norway vulnerable to the displayed present climate parameters and to the projected changes. Consequenses for the Norwegian buildings stock and actions to be taken by the government are also discussed.

  7. Perspectives on social vulnerability and ways to improve community resilience

    Directory of Open Access Journals (Sweden)

    Chicoș Alina

    2017-06-01

    Full Text Available Scientific recognition of the resilience concept is becoming compelling in extending the way contemporary spatial systems are analysed as well as in defining a new approach in establishing spatial planning principles and policies. In this view, our study emphasises the issue of spatial development in areas prone to earthquakes, floods and landslides. Therefore, resilience requires the assessment of vulnerable spatial components. Local governance interventions are more or less focused on risk management measures. Moreover, building safer communities through risk governance relies on different variables. Making a distinction between risk components and the predictors of increased resilience could shed light on the local decision-making process. In this paper, vulnerability addresses the lack of safety in terms of individual, household and community wellbeing when the issue of environmental restrictions emerge. In order to reduce the vulnerability of communities living in natural risk prone areas, spatial planning often turns to interdisciplinary analysis methods that allow an in-depth perspective on the interplay between social and natural elements. As such, spatial planning stands as the first step in reducing social vulnerability and should approach the less explored advantages of participatory mapping and local knowledge systems.

  8. Communicating effectively with vulnerable populations during water contamination events.

    Science.gov (United States)

    Nsiah-Kumi, Phyllis A

    2008-01-01

    Water contamination events are a public health concern worldwide with significant potential to impact the global community. When communicating with the public during these crisis situations, it is vital to consider the multiple audiences who receive the messages. Before developing or delivering messages to a particular community, it is essential to be familiar with the community's characteristics, needs, concerns, and who is considered credible to that community. Vulnerable populations are those with difficulties in comprehension or accessibility that may limit their full understanding of risks and may mitigate the effectiveness of public health strategies. Vulnerable populations include, but are not limited to, the urban/rural poor, those who are mentally ill, intellectually disabled, medically vulnerable, at the extremes of age (children and the elderly), racial/ethnic minorities, and those with low literacy or limited English proficiency.A water contamination event poses a unique opportunity to work with diverse populations to effectively convey important health messages. Each population needs to receive appropriate public health messages. Becoming familiar with vulnerable populations and their needs prior to a water contamination event will help in identifying barriers and developing and refining effective messages in such a crisis. In water contamination crises, our publics' health depends on effective, targeted crisis communication.

  9. Vulnerabilities of Electronics Communication: solution mechanism through script

    Directory of Open Access Journals (Sweden)

    Arun Kumar Singh

    2011-05-01

    Full Text Available World trade and related business ventures are more or less dependent on communication. Information content of communication is to be protected as mis-communication or incorrect information may ruin any business prospect. Communication using Internet or any other electronic communication is having various kinds of threat and vulnerability. Information should be packaged for communication in such a way that these vulnerabilities are reduced to a minimum. With the increased use of networked computers for critical systems, network security is attracting increasing attention. This paper focuses on the most common attacks to paralyze computer and network resources, in order to stop essential communication services. The paper provides methods, ways and means for obtaining network traces of malicious traffic and strategies for providing countermeasures. Analysis of packet captured in a network traffic is a common method of deletion of countermeasure of communication based vulnerabilities. Analysis of http based network traffic allows to intercept sensitive information such as the user's name and password. The ideal approach for secured communication is to remove all security flaws from individual hosts. A tradeoff between overheads (computational and business and efficiency of securing mechanism of communication may be achieved by using the script based solutions. This paper presents the communication based vulnerabilities and their script based solution.

  10. Node vulnerability under finite perturbations in complex networks.

    Directory of Open Access Journals (Sweden)

    Ricardo Gutiérrez

    Full Text Available A measure to quantify vulnerability under perturbations (attacks, failures, large fluctuations in ensembles (networks of coupled dynamical systems is proposed. Rather than addressing the issue of how the network properties change upon removal of elements of the graph (the strategy followed by most of the existing methods for studying the vulnerability of a network based on its topology, here a dynamical definition of vulnerability is introduced, referring to the robustness of a collective dynamical state to perturbing events occurring over a fixed topology. In particular, we study how the collective (synchronized dynamics of a network of chaotic units is disrupted under the action of a finite size perturbation on one of its nodes. Illustrative examples are provided for three systems of identical chaotic oscillators coupled according to three distinct well-known network topologies. A quantitative comparison between the obtained vulnerability rankings and the classical connectivity/centrality rankings is made that yields conclusive results. Possible applications of the proposed strategy and conclusions are also discussed.

  11. Node vulnerability under finite perturbations in complex networks.

    Science.gov (United States)

    Gutiérrez, Ricardo; Del-Pozo, Francisco; Boccaletti, Stefano

    2011-01-01

    A measure to quantify vulnerability under perturbations (attacks, failures, large fluctuations) in ensembles (networks) of coupled dynamical systems is proposed. Rather than addressing the issue of how the network properties change upon removal of elements of the graph (the strategy followed by most of the existing methods for studying the vulnerability of a network based on its topology), here a dynamical definition of vulnerability is introduced, referring to the robustness of a collective dynamical state to perturbing events occurring over a fixed topology. In particular, we study how the collective (synchronized) dynamics of a network of chaotic units is disrupted under the action of a finite size perturbation on one of its nodes. Illustrative examples are provided for three systems of identical chaotic oscillators coupled according to three distinct well-known network topologies. A quantitative comparison between the obtained vulnerability rankings and the classical connectivity/centrality rankings is made that yields conclusive results. Possible applications of the proposed strategy and conclusions are also discussed.

  12. Improving satellite vulnerability assessment to untrackable orbital debris

    Science.gov (United States)

    Welty, Nathan; Schaefer, Frank; Rudolph, Martin; Destefanis, Roberto; Grassi, Lilith

    2012-07-01

    The projected growth in the untrackable orbital debris population will place an increased emphasis on satellite vulnerability assessments during both design and mission operations. This study presents an enhanced method for assessing satellite vulnerability to untrackable orbital debris that expands on traditional practices. By looking beyond structural penetration of the spacecraft, the method predicts the survivability of individual components and the associated degradation of system functionality resulting from untrackable debris impacts. A new risk assessment tool, the Particle Impact Risk and Vulnerability Assessment Tool (PIRAT), has been developed based on this method and is also presented here. It interfaces with both the NASA ORDEM2000 and ESA MASTER-2009 debris models and has been validated against the benchmark test cases from the Inter-Agency Space Debris Coordination Committee (IADC). This study concludes with an example vulnerability assessment using PIRAT for a generic Earth observation satellite in a Sun-synchronous low-Earth orbit. The results illustrate the additional insight provided by this method that can be used to improve the robustness of future satellite designs and mitigate the overall mission risk posed by untrackable orbital debris.

  13. Hidden Connectivity in Networks with Vulnerable Classes of Nodes

    Directory of Open Access Journals (Sweden)

    Sebastian M. Krause

    2016-10-01

    Full Text Available In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a “color-avoiding” percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.

  14. Coastal vulnerability index for the Tabasco State coast, Mexico

    Directory of Open Access Journals (Sweden)

    Juan Carlos Nuñez Gómez

    2016-11-01

    Full Text Available Sea level rise is one of the most serious events that will impact low-lying lands, as is the case of most of Tabasco State. Historically, the State of Tabasco has been repeatedly impacted by extreme floods, the most recent one occurring in 2007. However, recent studies have shown that coastal erosion is the effect that most directly has impacted the Tabasco’s coastline, as this has even modified soil strata; this is also related to extreme hydrometeorological events associated with environmental changes and changes in the salinity gradient off the coast. In such a situation, future changes in the coastline are almost certain. Tabasco’s coastline has been recognized as one of the most vulnerable zones in the country since Mexico’s first national communication to the UNFCCC in 1997. Therefore, it is important to evaluate the vulnerability of this zone. The purpose of this study was to estimate the vulnerability of the Tabasco’s coastline by applying the coastal vulnerability index method (IVM using a geographic information system (GIS. This method has been successfully applied in several different places around the world including Canada, the United State, Spain and Indonesia. This model is suitable for the local conditions of Tabasco coast, as the input variables it requires (including waves, tides, sea level, coastal slope, erosion rates and geomorphology are available for the study area, thus allowing the possibility of estimating the coast’s vulnerability based on local data. Results from map algebra operations showed that the zones of very high or high vulnerability encompass a six-kilometer stretch around the Sánchez Magallanes community, near the del Carmen lagoon in the municipality of H. Cárdenas, Tabasco. This is due to the high-waves regime and other conditions associated to the coastal dune geomorphology as well as the unconsolidated fine sediments prevailing therein. Other high vulnerability zones are found just in front

  15. Assessing tsunami vulnerability, an example from Herakleio, Crete

    Science.gov (United States)

    Papathoma, M.; Dominey-Howes, D.; Zong, Y.; Smith, D.

    Recent tsunami have caused massive loss of life, destruction of coastal infrastructures and disruption to economic activity. To date, tsunami hazard studies have concentrated on determining the frequency and magnitude of events and in the production of simplistic flood maps. In general, such maps appear to have assumed a uniform vulnerability of population, infrastructure and business. In reality however, a complex set of factors interact to produce a pattern of vulnerability that varies spatially and temporally. A new vulnerability assessment approach is described, that incorporates multiple factors (e.g. parameters relating to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. The new methodology is applied on a coastal segment in Greece and, in particular, in Crete, westof the city of Herakleio. The results are presented within a Geographic Information System (GIS). The application of GIS ensures the approach is novel for tsunami studies, since it permits interrogation of the primary database by several different end-users. For example, the GIS may be used: (1) to determine immediate post-tsunami disaster response needs by the emergency services; (2) to preplan tsunami mitigation measures by disaster planners; (3) as a tool for local planning by the municipal authorities or; (4) as a basis for catastrophe modelling by insurance companies. We show that population density varies markedly with the time of the year and that 30% of buildings within the inundation zone are only single story thus increasing the vulnerability of their occupants. Within the high inundation depth zone, 11% of buildings are identified as in need of reinforcement and this figure rises to 50% within the medium inundation depth zone. 10% of businesses are located within the high inundation depth zone and these may need to consider their level of insurance cover to protect against primary building damage, contents loss and business interruption

  16. Patterns of Freshwater Species Richness, Endemism, and Vulnerability in California.

    Directory of Open Access Journals (Sweden)

    Jeanette K Howard

    Full Text Available The ranges and abundances of species that depend on freshwater habitats are declining worldwide. Efforts to counteract those trends are often hampered by a lack of information about species distribution and conservation status and are often strongly biased toward a few well-studied groups. We identified the 3,906 vascular plants, macroinvertebrates, and vertebrates native to California, USA, that depend on fresh water for at least one stage of their life history. We evaluated the conservation status for these taxa using existing government and non-governmental organization assessments (e.g., endangered species act, NatureServe, created a spatial database of locality observations or distribution information from ~400 data sources, and mapped patterns of richness, endemism, and vulnerability. Although nearly half of all taxa with conservation status (n = 1,939 are vulnerable to extinction, only 114 (6% of those vulnerable taxa have a legal mandate for protection in the form of formal inclusion on a state or federal endangered species list. Endemic taxa are at greater risk than non-endemics, with 90% of the 927 endemic taxa vulnerable to extinction. Records with spatial data were available for a total of 2,276 species (61%. The patterns of species richness differ depending on the taxonomic group analyzed, but are similar across taxonomic level. No particular taxonomic group represents an umbrella for all species, but hotspots of high richness for listed species cover 40% of the hotspots for all other species and 58% of the hotspots for vulnerable freshwater species. By mapping freshwater species hotspots we show locations that represent the top priority for conservation action in the state. This study identifies opportunities to fill gaps in the evaluation of conservation status for freshwater taxa in California, to address the lack of occurrence information for nearly 40% of freshwater taxa and nearly 40% of watersheds in the state, and to

  17. [Neurocognitive markers of suicide vulnerability in the elderly: a review].

    Science.gov (United States)

    Richard-Devantoy, Stéphane; Jollant, Fabrice; Deguigne, Florence; Letourneau, Geneviève

    2013-12-01

    a comprehensive literature review suggests that suicidal behaviour results from a complex interplay between stressful events and vulnerability factors including cognitive deficits. The aim of this systematic literature review was to identify the neurocognitive markers associated with suicide vulnerability in elderly people. a systematic English Medline literature search of cohort studies, case-control studies and cross-sectional studies published between January 1960 and December 2012 was performed, combining the MeSH terms "Suicide", "Neuropsychology", "Neuropsychological Tests", "Executive Function", "Magnetic Resonance Imaging", "Diffusion Magnetic Resonance Imaging", "Positron-Emission Tomography", "Prefrontal Cortex", "Tomography, Emission-Computed, Single-Photon", and "Diffusion Tensor Imaging". The abstract selection was based on the Strobe checklist for observational studies. of the 446 original articles, 10 neuropsychological and 4 brain imaging studies were selected. The number of suicidal subjects ranged from 10 to 29 (mean age=66.8 to 79.1 years old, 0-85% women). Executive functions, in particular decision-making and cognitive inhibition, were more impaired in the depressed elderly with a history of suicide attempts compared to those without such a history. fMRI data, which need to be confirmed in further details, showed abnormalities of fronto-limbic circuits which are involved in suicide vulnerability in the elderly independently of any associated psychopathological conditions including depression. this literature review confirms the existence of neurocognitive markers of suicide vulnerability in elderly people. A neuropsychological assessment could thus help to identify the suicide vulnerability of a depressed elderly person, a first step for both pharmacological and psychotherapeutic cares.

  18. Food Poisioning Typicality in Food Safety Vulnerable Area of Indonesis

    Institute of Scientific and Technical Information of China (English)

    AdilBasukiAhza

    2001-01-01

    Food poisoning characteristics and patterns were studied in six vulnerable provinces of Indonesia to identify the typicality of food poisonings.Units of analysis were district level,gender,type of food,and place of events,using the data of incidence of food poisoning from 1987to 1998 period(ten year),Multivariate analysis and bi-plot technique were used to characterize the vulnerability of the areas based on the following variables:(1) time of symptom perceived,(2) number of cases for each kind of poison,(3) incidence of chemicals poisoning,and (4)incidence the microbial poisonings,It was found that the three provinces most vulnerable to food poisoning are Central Java,West Java and Jogyakarta.The causes of food poisoning incidence are microbial poisonings(49.36%),chemicals(24.50%),natural toxicant(4.66%),and other causes or indications(21.37%),The poisoning symptoms were perceived within 1.0-144 hrs with incubation time of 0.08 to 33.00 hrs after food intake,depedn on the type of poison.The type of foods that caused poisoning are family prepared foods(30.57%),preserved food(industrial products) (29.94%),food from catering services(21.66%),traditional foods(10.83%) and street foods(7.00%),WOmen are more vulnerable(67.84)than men(32.16%),The most vulnerable places for food poisoning are respectively at home(family)(44.16%),at workplaces (16.23%),party venue(14.29%),school(12.99%),and in public places(12.34%).The results lead to the urgent needs of a better formulation,more stringent food control policy and regulation at district levels,the use of different approach towards a more locally oriented food poisoning safety measures and actions.

  19. Vulnerability Assessment of Rainfall-Induced Debris Flow

    Science.gov (United States)

    Lu, G. Y.; Wong, D. W.; Chiu, L. S.

    2006-05-01

    Debris flow is a common hazard triggered by large amount of rainfall over mountainous areas. A debris flow event results from a complex interaction between rainfall and topographical properties of watersheds. Heavy rainfall facilitates this process by increasing pore water pressure, seepage force and reducing effective stress of soils (normal stress carried by soil particles at the points of contact). Since debris flow events are closely related to topography and rainfall, the goal of this research is to assess debris flow vulnerability related to these two factors. Objectives of this research are to: (1) examine new spatial interpolation techniques to estimate high spatial rainfall data relevant to debris flows. (2) develop topographical factors using Geography Information System (GIS) and remote sensing (RS) approaches and (3) combine the estimated rainfall and topographical factors to assess the vulnerability of debris flow. We examined three spatial interpolation techniques: adaptive inversed distance weight (AIDW), simple kriging and spatial disaggregation using wind induced-topographic effect that incorporates gauge measurements, satellite remote sensing data (TRMM). The topographical factors are derived from high resolution digital elevation model (DEM), and adopt fuzzy-based topographical models proposed by Tseng (2004). Estimated rainfall and topographical factors are processed by self-organizing maps (SOM) to provide vulnerability assessment. To demonstrate our technique, rainfall data collected by 39 rain gauges in the central part of Taiwan during the passage of Typhoon Tori-Ji around July 29, 2001 were used. Results indicate that the proposed spatial interpolation methods outperform existing methods (i.e. kriging, inverse distance weight, and co-kriging methods). The vulnerability assessment of 187 debris flows watersheds in the study area will be presented. Keyword: Debris flow, spatial interpolation, adaptive inverse distance weight, TRMM, self

  20. Respect for Human Vulnerability: The Emergence of a New Principle in Bioethics.

    Science.gov (United States)

    ten Have, Henk

    2015-09-01

    Vulnerability has become a popular though controversial topic in bioethics, notably since 2000. As a result, a common body of knowledge has emerged (1) distinguishing between different types of vulnerability, (2) criticizing the categorization of populations as vulnerable, and (3) questioning the practical implications. It is argued that two perspectives on vulnerability, i.e., the philosophical and political, pose challenges to contemporary bioethics discourse: they re-examine the significance of human agency, the primacy of the individual person, and the negativity of vulnerability. As a phenomenon of globalization, vulnerability can only be properly addressed in a global bioethics that takes the social dimension of human existence seriously.