Search results for "Vulnerability."

showing 10 items of 397 documents

Professionals’ views on children’s service user involvement

2021

Purpose Children are gradually attaining recognition as service users and their involvement in service development has been advanced in recent years. This study draws on empirical research in social and health-care services designed for children and families. The purpose of this paper is to analyse how professionals understand children’s involvement as experts by experience. The focus is on professionals’ views and intergenerational relations. Design/methodology/approach The research data comprise 25 individual and 10 group interviews with managers and professionals working in social and health-care services in one Finnish province. The data were analysed using qualitative thematic analysi…

Value (ethics)terveyspalvelutHealth (social science)Sociology and Political Sciencesosiaalipalvelutmedia_common.quotation_subjecteducationcollective participationexpert by experienceVulnerabilitylapset (ikäryhmät)Social WelfareEducationEmpirical researchylisukupolvisuusDevelopmental and Educational PsychologyService userosallistuminenmedia_commonbusiness.industryintergenerational relationslapsen asemakollektiivinen toimintaPublic relationseettisyysservice user involvementchildren’s participationethical reflectionkokemusasiantuntijatPosition (finance)businessPsychologyLawWelfareService developmentJournal of Children's Services
researchProduct

An accurate and efficient collaborative intrusion detection framework to secure vehicular networks

2015

Display Omitted We design and implement an accurate and lightweight intrusion detection framework, called AECFV.AECFV aims to protect the vehicular ad hoc networks (VANETs) against the most dangerous attacks that could occurred on this network.AECFV take into account the VANET's characteristics such as high node's mobility and rapid topology change.AECFV exhibits a high detection rate, low false positive rate, faster attack detection, and lower communication overhead. The advancement of wireless communication leads researchers to develop and conceive the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). Security in such network is mandatory due to a vital informa…

Vehicular ad hoc networksEngineeringVehicular ad hoc networkOverheadGeneral Computer Sciencebusiness.industryWireless ad hoc networkIntrusion detection systemNode (networking)Detection rateIntrusion detection system[SPI]Engineering Sciences [physics]Control and Systems EngineeringWirelessOverhead (computing)False positive rateElectrical and Electronic EngineeringDetection timebusinessCluster analysisComputer networkVulnerability (computing)Computers & Electrical Engineering
researchProduct

IMAGE PROCESSING IN POLLUTION VULNERABILITY ASSESSMENT OF SICILY AQUIFERS

2009

It is generally acknowledged that vulnerability mapping represents an essential tool for territory management. Intrinsic vulnerability can be generally described as “the susceptibility of the aquifer systems, in their different components and in different geometric and hydrodynamics situations, to swallow and diffuse, also mitigating the effects, a fluid or water-transported pollutant, in such a way to produce impact on the groundwater quality, in space and time”. Assessment procedures of vulnerability consider a number of parameters, the estimation of which is usually difficult and very often insufficient to correctly represent aquifer’s features. As aquifers are closely influenced by nume…

VulnerabilityAquiferSicilySINTACSMatrix correlation.
researchProduct

La violencia contra las menores que inician su trayectoria vital en situación de vulnerabilidad social

2016

Este artículo desvela los tipos de violencia que sufrieron las mujeres institucionalizadas cuando eran menores de edad. Las técnicas de investigación utilizadas han sido de índole cualitativa. Se ha realizado observación participante y, a través de informes sociales, documentos personales, entrevistas informales y en profundidad, se han elaborado quince historias de vida de las mujeres que han residido en los centros de protección de la Comunidad Valenciana entre los años 1999 y 2012. Esta aproximación se centra en las ocho que iniciaron su trayectoria vital en la situación de vulnerabilidad. Los resultados muestran que las menores han sufrido distintos tipos de violencia. Una de las princi…

VulnerabilityGeneral Earth and Planetary SciencesSocial exclusionSociologyParticipant observationSocial psychologyValencian communityGeneral Environmental ScienceBarataria. Revista Castellano-Manchega de Ciencias Sociales
researchProduct

SY29-3SOCIAL DEFEAT IN ADOLESCENT MICE INCREASES VULNERABILITY TO ALCOHOL CONSUMPTION

2015

Background. Stressful life situations have been widely linked to drug-seeking. Several studies in humans and animal models have demonstrated that exposure to different kinds of stress increases abuse and relapse to abuse of certain drugs such as alcohol. Methods. This study employs an oral operant conditioning paradigm to evaluate the …

VulnerabilityGeneral MedicinePsychologyAlcohol consumptionDevelopmental psychologyAlcohol and Alcoholism
researchProduct

Human Trafficking: The Viscous Link Between Vulnerability and Proximity Violence

2020

The definition of “human trafficking”, adopted by the United Nations Protocol, clearly describes how the international community has outlined the concepts of victim and perpetrator. Despite the definitive effort made by this Protocol, the present chapter seeks to throw light on the fuzzy area existing within the rapport between vulnerability and proximity violence which makes the consensual exploitation of the victim by the trafficker possible as well as making it difficult to outline its contours in the courtrooms.

VulnerabilityInternational communityHuman traffickingContext (language use)SociologyLink (knot theory)Computer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

Silent say, saying effective and discourse mask

2021

In communication, every speaker must choose meticulously the aptness in the word, the gesture, the smile, the look or even the silence. The being-speaker hides and beyond protects himself behind his discursive mask which provides him with a linguistic security. While many disciplines - social psychology, psychoanalysis and philosophy – have seized the notion of the mask in their frame of reference, this concept still remains absent today in the language sciences. However, the game of masks substitution is fundamental in language activity. This game is so usual that we do not even notice it anymore, except in situations where we are explicitly asked to make an effort to adapt to the rule of …

Vulnérabilité linguistiqueL'être-LocuteurIdentityLinguistic silenceLinguistic securityIdentitéSilence linguistiqueLinguistic vulnerabilityThe being-SpeakerMasque discursifDiscursive maskSécurité linguistique[SHS.LANGUE] Humanities and Social Sciences/Linguistics
researchProduct

Security Standards Applied to Drinking Water

2021

This chapter presents security standards as applied to drinking water, based on the assumption that freshwater sources face huge threats for humankind both qualitatively and quantitatively due to uncertain global changes, namely population growth, rapid urbanization, and climate change. The study investigates whether the International Featured Standards (IFS—Food), which are complementary to HACCP (Hazard analysis and critical control point), can be used as a system of indicators to measure water security. The case study focuses on bottled water, by identifying structural and contingent risk factors for water as essential food and investigates the suitability of the IFS instrument as an ind…

Water resourcesWater securityFood securitybusiness.industryCritical control pointBusinessHazard analysisBottled waterEnvironmental economicsFood safetyVulnerability (computing)
researchProduct

Ethnographic context and spatial coherence of climate indicators for farming communities : a multi-regional comparative assessment

2015

Accurate seasonal predictions of rainfall may reduce climatic risks that farmers are usually faced with across the tropical and subtropical zones. However, although regional-scale seasonal amounts have regularly been forecasted since 1997/98, the practical use of these seasonal predictions is still limited by myriad factors. This paper synthesizes the main resultsof a multi-disciplinary ethnographic and climatic project (PICREVAT). Its main objective was to seek the climatic information ? beyond the seasonal amounts ? critical for crops, both as an actual constraint to crop yields and as identified by the current and past practices and perceptions of farmers. A second goal was to confront t…

Wet seasonAtmospheric ScienceP40 - Météorologie et climatologieCash cropGeography Planning and DevelopmentVulnerabilityContext (language use)SubtropicsSeasonal prediction;Tropical rainfall;Regional scale;Crop systems;Vulnerability;EthnoclimatologyManagement Monitoring Policy and Lawlcsh:QC851-999//purl.org/becyt/ford/5.4 [https]REGIONAL SCALECropCIENCIAS SOCIALESOtras SociologíaRegional scaleTropical rainfall2. Zero hungerClimatologyGlobal and Planetary Change//purl.org/becyt/ford/5 [https]business.industryAgroforestryCrop yieldSEASONAL PREDICTIONEnvironmental and SocietyTROPICAL RAINFALLA01 - Agriculture - Considérations générales15. Life on land[SDE.ES]Environmental Sciences/Environmental and SocietyEthnoclimatologyGeography13. Climate actionAgriculture[SDU.STU.CL]Sciences of the Universe [physics]/Earth Sciences/ClimatologyCrop systemslcsh:Meteorology. ClimatologyClimatologieMonocultureEnvironnement et SociétéSeasonal predictionbusinessCROP SYSTEMSSociología
researchProduct

Security Implications of Using Third-Party Resources in the World Wide Web

2018

Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…

World Wide WebScripting languageComputer scienceCross-site scriptingWeb pageMalwareAttack surfaceContent Security Policycomputer.software_genreSecurity policycomputerVulnerability (computing)2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct