Search results for "Vulnerability."
showing 10 items of 397 documents
Professionals’ views on children’s service user involvement
2021
Purpose Children are gradually attaining recognition as service users and their involvement in service development has been advanced in recent years. This study draws on empirical research in social and health-care services designed for children and families. The purpose of this paper is to analyse how professionals understand children’s involvement as experts by experience. The focus is on professionals’ views and intergenerational relations. Design/methodology/approach The research data comprise 25 individual and 10 group interviews with managers and professionals working in social and health-care services in one Finnish province. The data were analysed using qualitative thematic analysi…
An accurate and efficient collaborative intrusion detection framework to secure vehicular networks
2015
Display Omitted We design and implement an accurate and lightweight intrusion detection framework, called AECFV.AECFV aims to protect the vehicular ad hoc networks (VANETs) against the most dangerous attacks that could occurred on this network.AECFV take into account the VANET's characteristics such as high node's mobility and rapid topology change.AECFV exhibits a high detection rate, low false positive rate, faster attack detection, and lower communication overhead. The advancement of wireless communication leads researchers to develop and conceive the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). Security in such network is mandatory due to a vital informa…
IMAGE PROCESSING IN POLLUTION VULNERABILITY ASSESSMENT OF SICILY AQUIFERS
2009
It is generally acknowledged that vulnerability mapping represents an essential tool for territory management. Intrinsic vulnerability can be generally described as “the susceptibility of the aquifer systems, in their different components and in different geometric and hydrodynamics situations, to swallow and diffuse, also mitigating the effects, a fluid or water-transported pollutant, in such a way to produce impact on the groundwater quality, in space and time”. Assessment procedures of vulnerability consider a number of parameters, the estimation of which is usually difficult and very often insufficient to correctly represent aquifer’s features. As aquifers are closely influenced by nume…
La violencia contra las menores que inician su trayectoria vital en situación de vulnerabilidad social
2016
Este artículo desvela los tipos de violencia que sufrieron las mujeres institucionalizadas cuando eran menores de edad. Las técnicas de investigación utilizadas han sido de índole cualitativa. Se ha realizado observación participante y, a través de informes sociales, documentos personales, entrevistas informales y en profundidad, se han elaborado quince historias de vida de las mujeres que han residido en los centros de protección de la Comunidad Valenciana entre los años 1999 y 2012. Esta aproximación se centra en las ocho que iniciaron su trayectoria vital en la situación de vulnerabilidad. Los resultados muestran que las menores han sufrido distintos tipos de violencia. Una de las princi…
SY29-3SOCIAL DEFEAT IN ADOLESCENT MICE INCREASES VULNERABILITY TO ALCOHOL CONSUMPTION
2015
Background. Stressful life situations have been widely linked to drug-seeking. Several studies in humans and animal models have demonstrated that exposure to different kinds of stress increases abuse and relapse to abuse of certain drugs such as alcohol. Methods. This study employs an oral operant conditioning paradigm to evaluate the …
Human Trafficking: The Viscous Link Between Vulnerability and Proximity Violence
2020
The definition of “human trafficking”, adopted by the United Nations Protocol, clearly describes how the international community has outlined the concepts of victim and perpetrator. Despite the definitive effort made by this Protocol, the present chapter seeks to throw light on the fuzzy area existing within the rapport between vulnerability and proximity violence which makes the consensual exploitation of the victim by the trafficker possible as well as making it difficult to outline its contours in the courtrooms.
Silent say, saying effective and discourse mask
2021
In communication, every speaker must choose meticulously the aptness in the word, the gesture, the smile, the look or even the silence. The being-speaker hides and beyond protects himself behind his discursive mask which provides him with a linguistic security. While many disciplines - social psychology, psychoanalysis and philosophy – have seized the notion of the mask in their frame of reference, this concept still remains absent today in the language sciences. However, the game of masks substitution is fundamental in language activity. This game is so usual that we do not even notice it anymore, except in situations where we are explicitly asked to make an effort to adapt to the rule of …
Security Standards Applied to Drinking Water
2021
This chapter presents security standards as applied to drinking water, based on the assumption that freshwater sources face huge threats for humankind both qualitatively and quantitatively due to uncertain global changes, namely population growth, rapid urbanization, and climate change. The study investigates whether the International Featured Standards (IFS—Food), which are complementary to HACCP (Hazard analysis and critical control point), can be used as a system of indicators to measure water security. The case study focuses on bottled water, by identifying structural and contingent risk factors for water as essential food and investigates the suitability of the IFS instrument as an ind…
Ethnographic context and spatial coherence of climate indicators for farming communities : a multi-regional comparative assessment
2015
Accurate seasonal predictions of rainfall may reduce climatic risks that farmers are usually faced with across the tropical and subtropical zones. However, although regional-scale seasonal amounts have regularly been forecasted since 1997/98, the practical use of these seasonal predictions is still limited by myriad factors. This paper synthesizes the main resultsof a multi-disciplinary ethnographic and climatic project (PICREVAT). Its main objective was to seek the climatic information ? beyond the seasonal amounts ? critical for crops, both as an actual constraint to crop yields and as identified by the current and past practices and perceptions of farmers. A second goal was to confront t…
Security Implications of Using Third-Party Resources in the World Wide Web
2018
Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…