Search results for "Vulnerability"

showing 10 items of 407 documents

Encountering ethics in studying challenging family relations

2013

This article focuses on ethical considerations in the study of challenging family relations. Our perspective derives from multidisciplinary family studies, including social sciences, psychology and educational sciences. Our concerns include why and how to apply a sensitive approach in studying challenging family relations, and what the key ethical issues are in studies of this kind. We examine questions of multiplicity in family relations, the particularity of vulnerable family relations and the roles of researchers and gatekeepers in the research process. The article is based on a research project where informants were both children and adults, and both qualitative and quantitative data we…

Sociology and Political ScienceEthical issuesVulnerabilityta5142tutkimuskäytännöteettiset kysymyksetresearch practicesFamily relationsperhesuhteetta5141ethical issuesta516Engineering ethicsSociologySocial psychologyhaavoittuvuusta515Families, Relationships and Societies
researchProduct

The contested concept of vulnerability – a literature review

2018

The concept of vulnerability is widely used in the social sciences as well as in policy making, health and social care services and in social work, referring to a variety of groups or individuals, ...

Sociology and Political ScienceSocial workPolicy makingbusiness.industry05 social sciencesVulnerabilityPublic relations0506 political scienceVariety (cybernetics)050602 political science & public administration0501 psychology and cognitive sciencesSocial careSociologyInformationSystems_MISCELLANEOUSbusinessSocial Sciences (miscellaneous)050104 developmental & child psychologyEuropean Journal of Social Work
researchProduct

Narrating ambivalence of maternal responsibility

2007

Early motherhood and caring for the infant involve a moral ambiguity that is related to the questions of responsibility and vulnerability. By means of the ethics of care, motherhood can be understood as belonging to the moral domain, as relational, and as linked with everyday social situations. The culturally dominant narratives of ‘good mothering’ easily naturalise and normatise maternal agency. This study illustrates the process of adopting responsibility for the infant and the moral ambivalence that is inscribed in early maternal care. The data consist of four interview sessions with each of seven first-time mothers conducted during pregnancy and the first post-natal year. The interview…

Sociology and Political Sciencemedia_common.quotation_subject05 social sciencesVulnerabilityAmbiguityCare Cultural Narratives Ethics of Care Morality Motherhood Narrative Research Pleasure VulnerabilityAmbivalenceMorality0506 political scienceNarrative inquiryPleasure050903 gender studiesEthics of care050602 political science & public administration0509 other social sciencesPsychologySocial psychologymedia_common
researchProduct

Implementation of strategies and tools of sociosanitary coordination in a health department

2018

RESUMEN Es objetivo de este artículo mostrar una experiencia de práctica novedosa implementada por la dirección de un departamento de salud. Se expone un modelo organizativo de coordinación sociosanitaria entre los diferentes niveles asistenciales y sectores, estableciendo sinergias de los recursos sociales y sanitarios comunes del Departamento de Salud Clínico-Malvarrosa (Valencia). Tras un año, se han constituido cinco consejos de salud de zona básica en atención primaria y una comisión de coordinación sociosanitaria integrada por tres subcomisiones: 1) de atención asistencial social y sanitaria, 2) de asociacionismo y voluntariado hospitalario, y 3) de acción comunitaria y participación …

Sociosanitary coordinationCoordinación sociosanitariaVulnerabilityAcción comunitariaVulnerabilidadCommunity action
researchProduct

Learning temporal patterns for anomaly intrusion detection

2002

For the last decade an explosive spread of computer systems and computer networks has resulted in a society that is increasingly dependent on information stored on these systems. A computer system connected to the network is accessible from another computer in this network regardless of its geographical position. Along with providing many benefits for legitimate users this technology creates almost unlimited opportunities for malicious persons, which using software vulnerabilities may successfully penetrate the networked computer systems. In order to eliminate potential devastating consequences caused by breaches in computer systems, more and more attention is drawn to the information secur…

SoftwareOrder (exchange)Network securitybusiness.industryComputer scienceVulnerabilityPattern matchingIntrusion detection systemInformation securityComputer securitycomputer.software_genrebusinesscomputerProceedings of the 2002 ACM symposium on Applied computing
researchProduct

Network-Based Computational Techniques to Determine the Risk Drivers of Bank Failures During a Systemic Banking Crisis

2018

This paper employs a computational model of solvency and liquidity contagion assessing the vulnerability of banks to systemic risk. We find that the main risk drivers relate to the financial connections a bank has and the market concentration, apart from the size of the bank triggering the contagion, while balance sheets play only a minor role. We also find that market concentration might facilitate banks to withstand liquidity shocks better while exposing them to larger solvency chocks. Our results are validated through an out-of-sample forecasting that shows that both type I and type II prediction errors are reduced if we include network characteristics in our prediction model.

Solvencyinterbank loansliquidityControl and OptimizationVulnerabilitybank failureMonetary economicsMarket concentrationNetwork topologynetwork topologySolvencyComputer Science ApplicationsMarket liquidityComputational Mathematicsbanking crisesArtificial Intelligencesystemic crisissystemic riskSystemic riskBalance sheetBusinessBank failureIEEE Transactions on Emerging Topics in Computational Intelligence
researchProduct

Contrasting age-specific recruitment and survival at different spatial scales: A case study with the European storm petrel

2009

Evolutionary studies on optimal decisions or conservation guidelines are often derived by generalising patterns from a single population, while inter-population variability in life-history traits is seldom considered. We investigated here how survival and recruitment probabilities changed with age at different geographical scales using the encounter histories of 5523 European storm petrels from three Mediterranean colonies, and also how our estimates of these parameters might be expected to affect population growth rates using population matrix models. We recorded similar patterns among colonies, but also important biological differences. Local survival, recruitment and breeding success inc…

Southern EuropeConservation managementSurvivalPopulationSettore BIO/05 - ZoologiaVulnerabilityPredationAge structurePredationLife history theoryBenidormPopulation modelingbiology.animalLife history theoryPopulation growthPopulation growthMortalityeducationEcology Evolution Behavior and SystematicsSpecies conservationeducation.field_of_studybiologyReproductive successGrowth rateEcologySpatial analysisReproductive successSeabirdSpatial heterogeneitySpainHydrobates pelagicus Recruitment Mediterranean populationsLife history traitSeabirdVital ratesComunidad ValencianaRecruitment (population dynamics)
researchProduct

Vulnerability matrix of the food system : operationalizing vulnerability and addressing food security

2016

Food security is the major desired outcome of any food system, but its realization may be prevented by vulnerabilities in a food system. By shifting the focus of their vulnerability analysis from the discrete components of the food system to the food system as a whole, the authors of this article were able to develop a qualitative food system vulnerability matrix. The objective of the research was to make the concept of food system vulnerability operational by identifying vulnerability drivers, vulnerable systems and vulnerable subclasses in light of food security. The vulnerability matrix was set up with five classes of vulnerable systems (‘Vulnerability of what?’) on the horizontal axis a…

Strategy and ManagementVulnerability010501 environmental sciences01 natural sciencesIndustrial and Manufacturing EngineeringruokaturvaDocumentationVulnerability assessmentvulnerability drivers0502 economics and businessta512Environmental planningComputingMilieux_MISCELLANEOUSFinland0105 earth and related environmental sciencesGeneral Environmental Science2. Zero hungervulnerable systemsSupply chain managementFood securityOperationalizationvulnerability matrixRenewable Energy Sustainability and the Environmentbusiness.industry05 social sciencesEnvironmental resource managementta5142food securityBuilding and Constructionlanguage.human_languageFood policylanguageFood systemsoperationalizationBusiness050203 business & management
researchProduct

DON’T GET CAUGHT ON THE WRONG FOOT: A RESOURCE-BASED PERSPECTIVE ON IMITATION THREATS IN INNOVATION PARTNERSHIPS

2017

Innovation partnerships can be a double-edged sword. While they are important vehicles for learning and value creation, such partnerships also increase a firm’s vulnerability to unintended knowledge leakage and imitation by others. In this study, we go beyond previous research by studying the imitation threats induced by innovation partnership portfolios rather than individual alliances. Drawing on the resource-based view, we develop and test a model that links salient structural attributes of partnership portfolios and distinct forms of imitation. Results from our analysis of 803 German manufacturing firms support our prediction that a firm’s probability of being imitated increases with t…

Strategy and Managementmedia_common.quotation_subject05 social sciencesVulnerabilityAppropriationResource (project management)Management of Technology and InnovationGeneral partnership0502 economics and businessResource-based viewEconomicsPortfolio050211 marketingBusiness and International ManagementMarketingImitation050203 business & managementOpen innovationmedia_commonInternational Journal of Innovation Management
researchProduct

On the improvement of monumental structure safety: a case study

2006

The present paper deals with the problem of the preservation of the monumental patrimony and discusses a practical application. The analysis methodology based on modern dynamic identification techniques was used for a monumental church in the historic area of Catania (Italy). The dynamic response of the church was measured in terms of accelerations, by means of vibration tests in situ. The numerical analyses highlighted the vulnerability of the drum dome system. Hence interest focused on this part of the building. A reduced scale model of the above system was built to be subjected to dynamic tests on a shaking table at the ENEA laboratory at Casaccia (Rome). Different kinds of reversible de…

Structure (mathematical logic)Engineeringbusiness.industryStiffnessStructural engineeringDrumCivil engineeringIdentification (information)medicineEarthquake shaking tablemedicine.symptombusinessScale modelDynamic testingVulnerability (computing)
researchProduct