Search results for "Vulnerability"
showing 10 items of 407 documents
Introducción al monográfico: infancia y adolescencia. Factores de protección y vulnerabilidad
2016
Resumen El monografico que presentamos se centra en la ultima etapa de la infancia y la adolescencia. Pretende abordar desde diferentes estudios empiricos el importante rol de las emociones y la competencia emocional en la conducta adaptada y desadaptada de ninos y adolescentes, asi como los contextos mas representativos en el proceso de socializacion, como es la familia, especialmente a traves de los estilos parentales. Los estudios empiricos que se presentan estan realizados en diferentes paises y aportan una perspectiva transcultural a las variables objeto de estudio y a los resultados obtenidos. La infancia y la adolescencia son etapas clave en el desarrollo. Las emociones, el clima fam…
Pre-conceptional and Peri-Gestational Maternal Binge Alcohol Drinking Produces Inheritance of Mood Disturbances and Alcohol Vulnerability in the Adol…
2018
Although binge drinking is on the rise in women of reproductive age and during pregnancy, the consequences in the offspring, in particular the inheritance of alcohol-related mood disturbances and alcohol abuse vulnerability, are still poorly investigated. In this study, we modeled both Habitual- and Binge Alcohol Drinking (HAD and BAD) in female rats by employing a two-bottle choice paradigm, with 20% alcohol and water. The exposure started 12 weeks before pregnancy and continued during gestation and lactation. The consequences induced by the two alcohol drinking patterns in female rats were assessed before conception in terms of behavioral reactivity, anxiety- and depressive-like behavior.…
On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication
2022
Apache Log4j2 is a prevalent logging library for Java-based applications. In December 2021, several critical and high-impact software vulnerabilities, including CVE-2021-44228, were publicly disclosed, enabling remote code execution (RCE) and denial of service (DoS) attacks. To date, these vulnerabilities are considered critical and the consequences of their disclosure far-reaching. The vulnerabilities potentially affect a wide range of internet of things (IoT) devices, embedded devices, critical infrastructure (CI), and cyber-physical systems (CPSs). In this paper, we study the effects and feasibility of exploiting these vulnerabilities in mission-critical aviation and maritime environment…
Me, Myself, and My Thoughts : The Influence of Brooding and Reflective Rumination on Depressive Symptoms in Athletes in the United Kingdom
2020
Individual differences in vulnerability to depression are still underexplored in athletes. We tested the influence of different brooding and reflective rumination profiles (i.e., repetitive thought processes in response to low/depressed mood) on the odds of experiencing clinically relevant depressive symptoms in competitive athletes (N = 286). The Patient Health Questionnaire–9 and the Ruminative Responses Scale– short form were utilized to measure depression and rumination, respectively. Compared to athletes with a low brooding/reflection profile, athletes with a high brooding/reflection profile had significantly higher odds of experiencing clinical levels of depressive symptoms (OR = 13.4…
Islands of vulnerability and resilience: Manufactured stereotypes?
2018
This paper interrogates the aspects of islandness labelled ‘vulnerability’ and ‘resilience’ through analysing the concepts’ definitions from a development perspective. The investigation is conducted through the lens of four assumed islandness aspects: boundedness, smallness, isolation, and littorality. Discussion examines how and why core concepts of vulnerability and resilience have emerged from island studies, demonstrating how these two aspects of islandness are socially and culturally constructed, can influence development approaches taken, and are enhanced by island geographies. Drawing on insights from island geographies around the world, while comparing island and non-island perspect…
Protection and Victim’s Assistance
2020
Identification of a human trafficking victim is a herculean task, not only due to the complexity of the definition of human trafficking, but also due to the perception of victimhood and vulnerability. The last chapter of this book is written after the increase of the migration flows in Italy in the last years, where IOM declared that 80% of the Nigerian women arriving in Italy were potential human trafficking victims. In an era of a continuous overlap of categories, such as human trafficking victims, non-accompanied minors, refugees, and asylum seekers, legal frameworks can hinder the adequate protection of a human trafficking victim. This chapter profoundly analyses the hybrid category of …
Maintaining dignity in vulnerability: A qualitative study of the residents' perspective on dignity in nursing homes
2016
Postprint tilgjengelig 20.03.17. Background Older people, living in nursing homes, are exposed to diverse situations, which may be associated with loss of dignity. To help them maintain their dignity, it is important to explore, how dignity is preserved in such context. Views of dignity and factors influencing dignity have been studied from both the residents’ and the care providers’ perspective. However, most of these studies pertain to experiences in the dying or the illness context. Knowledge is scarce about how older people experience their dignity within their everyday lives in nursing homes. Aim To illuminate the meaning of maintaining dignity from the perspective of older people livi…
Data from: Wood-inhabiting fungi with tight associations with other species have declined as a response to forest management
2016
Research on mutualistic and antagonistic networks, such as plant–pollinator and host–parasite networks, has shown that species interactions can influence and be influenced by the responses of species to environmental perturbations. Here we examine whether results obtained for directly observable networks generalize to more complex networks in which species interactions cannot be observed directly. As a case study, we consider data on the occurrences of 98 wood-inhabiting fungal species in managed and natural forests. We specifically ask if and how much the positions of wood-inhabiting fungal species within the interaction networks influence their responses to forest management. For this, we…
The Association Between Quantitative Flow Ratio and Intravascular Imaging-defined Vulnerable Plaque Characteristics in Patients With Stable Angina an…
2021
Background: This study aimed to examine whether quantitative flow ratio (QFR), an angiography-based computation of fractional flow reserve, was associated with intravascular imaging-defined vulnerable plaque features, such as thin cap fibroatheroma (TCFA) in patients with stable angina, and non-ST-segment elevation acute coronary syndrome.Methods: Patients undergoing optical coherence tomography (OCT) or intravascular ultrasound (IVUS) examinations were identified from two prospective studies and their interrogated vessels were assessed with QFR. Lesions in the OCT cohort were classified into tertiles: QFR-T1 (QFR ≤ 0.85), QFR-T2 (0.85 < QFR ≤ 0.93), and QFR-T3 (QFR > 0.93). L…
Parameters for coronary plaque vulnerability assessed with multidetector computed tomography and intracoronary ultrasound correlation
2009
In the absence of a fixed relationship between plaque vulnerability and flow-limiting stenosis, alternative morphological expressions exist that could predict the liability of coronary lesions to rapidly progress or rupture, causing acute coronary syndromes. Modern multidetector computed tomography technology is capable of noninvasively detecting lesion location, attenuation, remodeling and calcification pattern, which may be considered as surrogate morphological markers of vulnerability and could contribute to increase the prognostic value of individual coronary plaque burden. J Cardiovasc Med 10:821 -826 (C) 2009 Italian Federation of Cardiology.