Search results for "ULN"

showing 10 items of 1078 documents

El consumidor especialmente vulnerable: de la protección class-based a la protección state-based

2022

El presente estudio centra su atención en la regulación, desde un punto de vista sustantivo, de la figura del consumidor especialmente vulnerable y de su protección. El legislador español ha querido dar un paso adelante mediante la introducción de dicha figura en el Texto Refundido de la Ley General para la Defensa de los Consumidores y Usuarios (TRLGDCU). Así, la opción escogida ha sido la de incorporar un concepto dinámico del consumidor vulnerable (protección “state-based”), alejado de la concepción tradicional caracterizada por una perspectiva basada exclusivamente en las características individuales (protección “class-based”), que no consideraba factores externos relativos a la situaci…

vulnerabilidad class-basedparte débil del contratoconsumidor especialmente vulnerablevulnerabilidad state-based:CIENCIAS JURÍDICAS Y DERECHO [UNESCO]UNESCO::CIENCIAS JURÍDICAS Y DERECHOdirectiva de contenidos digitales
researchProduct

Territorio, vulnerabiliadd social y trayectoria delictiva en adolescentes de la ciudad de Valencia

2012

Se trata de una aproximación a los espacios de exclusión de la ciudad de Valencia a partir de la información sobre delincuencia juvenil y la provisión de servicios sociales. El territorio, en particular en el interior de las ciudades, es desigual. Dicha desigualdad es resultado de las características socioeconómicas de su población pero también de la oferta de servicios y equipamientos públicos. El resultado de esta compleja combinación es la existencia de espacios vulnerables y de población en riesgo de exclusión social. La delincuencia juvenil es uno de los factores que caracterizan estos territorios que, además, adolecen de galta de infraestructuras sólidas de apoyo a la población que fa…

vulnerabilidad socialUNESCO::SOCIOLOGÍAadolescentesValenciadelincuenciaespacios de exclusiónUNESCO::GEOGRAFÍA
researchProduct

Maltrato y enfermedad mental. Estudio de personas con enfermedad mental, víctimas de maltrato

2011

Se realiza un trabajo de investigación sobre la victimización de personas con enfermedad mental, desde la perspectiva de que este colectivo es con frecuencia víctima de maltrato, a pesar de los prejuicios y el estigma que pende sobre él. Dada su especial vulnerabilidad social, los y las profesionales que atienden a esta población tienen la responsabilidad de visibilizar este fenómeno, y validar los instrumentos de diagnóstico que utilizan como útiles para detectar maltrato. The thesis involved research on the victimization of people with mental illness from the angle of this group often being the victim of abuse, despite the prejudice and stigma that hangs over it. Given its special social …

vulnerabilidad socialvalidar instrumentospersonas con enfermedad mentalvalidating instruments:SOCIOLOGÍA::Cambio y desarrollo social [UNESCO]Victimización ; personas con enfermedad mental ; estigma ; vulnerabilidad social ; validar instrumentos ; detección Victimization ; people with mental illness ; stigma ; social vulnerability ; validating instruments ; detection ArtículoVictimizaciónstigmaestigmapeople with mental illnessUNESCO::SOCIOLOGÍA::Cambio y desarrollo socialdetección Victimizationsocial vulnerabilitydetection Artículo
researchProduct

Trabalho inclusivo e digno de pessoas em situação de vulnerabilidade: das políticas às metodologias de acompanhamento em organizações da economia soc…

2022

En un contexto de transición justa e inclusiva, este estudio analiza el ámbito de la inserción sociolaboral de las personas en situación de vulnerabilidad, a partir de las políticas que lo configuran y de las metodologías de seguimiento en las organizaciones de la economía social (OES). Aunque el derecho al trabajo está consagrado legalmente como un derecho universal, para una amplia gama de grupos clasificados como vulnerables, desfavorecidos o en situación de desventaja, este derecho no está garantizado. Esta investigación se centra en las OES tanto por su idoneidad en cuanto a la finalidad y los principios que guían su funcionamiento como por su tradición e importancia en cuanto a la int…

vulnerabilidadacompañamientotrabajo digno e inclusivoUNESCO::CIENCIAS ECONÓMICASinserción sociolaboralagente de inserción
researchProduct

Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures

2022

Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in the ADS-B architecture. In this paper, we demonstrate and evaluate the impact of multiple cyberattacks on ADS-B via remote radio frequency links that affected various network, processing, and display subsystems used within the ADS-B ecosystem. Overall we implemented and tested 12 cyberattacks on ADS-B in a controlled environment, out of which 5 attacks were presented or implemented for the first time. For all these attacks, we developed a unique testbed that consisted of 1…

vulnerabilitiesATCcybersecurity1090MHzlentoliikenneAerospace Engineeringcountermeasuresavionics978MHzdatalinkATMpentestingaviationexperimental platformElectrical and Electronic EngineeringUATlennonjohtoEFBkyberturvallisuusverkkohyökkäyksetlennonvarmistusADS-B1090ESIEEE Transactions on Aerospace and Electronic Systems
researchProduct

E-health systems in digital environments

2019

As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manu…

vulnerabilitiescyber threathealthcare systemsterveysalaetäpalvelutcyber-attackstelemedicineteleterveydenhuoltokyberturvallisuusdigitalisaatioverkkohyökkäyksethaavoittuvuus
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Measuring Vulnerability of Asylum Seekers and Refugees in Italy

2019

In recent years, a growing number of forced migrants have travelled to Italy across the Mediterranean Sea. While the number of new arrivals has diminished since 2017, the Italian reception system still struggles to process the high number of applications for international protection. A significant proportion of forced migrants who arrive in Italy end up living in informal settlements, such as occupied buildings, shacks, containers and tented camps. In this study, we assess the vulnerability of asylum seekers and refugees living in informal settlements in Italy, using data from the first nationally representative survey of this population. We compare a count measure of vulnerability with a n…

vulnerability assessment latent trait model indicators survey data informal settlementRefugee05 social sciences0507 social and economic geographyVulnerabilitySettore SECS-S/04 - Demografia0506 political scienceMediterranean seaArts and Humanities (miscellaneous)Vulnerability assessment050602 political science & public administrationSurvey data collectionSettore SECS-S/05 - Statistica SocialeSocioeconomics050703 geographyDemography
researchProduct

Beyond early: Decision support for improved typhoon warning systems

2015

International audience; Warnings can help prevent damage and harm if they are issued timely and provide information that help responders and population to adequately prepare for the disaster to come. Today, there are many indicator and sensor systems that are designed to reduce disaster risks, or issue early warnings. In this paper we analyze the different systems in the light of the initial decisions that need to be made in the response to sudden onset disasters. We outline challenges of current practices and methods, and provide an agenda for future research.To illustrate our approach, we present a case study of Typhoon Haiyan. Although meteorological services had issued warnings; relief …

vulnerability assessmentdisaster responsedecision supportCrisis managementTyphoon Haiyanindicator framework[INFO]Computer Science [cs]Early warning systems
researchProduct

Vulnerabilità sulla scena. Temi etici e soluzioni drammaturgiche nella "Medea" di Seneca

2018

La Medea di Seneca racconta una storia di vulnerabilità? Questo saggio propone una lettura della tragedia usando il concetto di vulnerabilità non come criterio per verificare la correttezza degli assunti stoici in materia di condotta morale, ma quale paradigma di relazione tra soggetti che, per definirsi, si consegnano gli uni agli altri, esponendosi, e su tale esposizione mettono alla prova l’identità personale e la fallibilità dell’autonomia morale. In questa idea di vulnerabilità non si trova solo una lente per formulare domande di natura etica, ma anche un utile strumento di analisi del meccanismo drammaturgico senecano. Is Seneca’s Medea a story of vulnerability? This paper aims to rea…

vulnerability Seneca's Medea self-other relations autonomy ethical questionsSettore L-FIL-LET/04 - Lingua E Letteratura Latina
researchProduct