Results 21 to 30 of about 489,634 (291)

Understanding the experience in the healthcare system of non-migrant and migrant frequent users of the emergency department in French-speaking Switzerland: a comparative qualitative study

open access: yesBMJ Open, 2023
Background Previous research revealed the vulnerability of frequent users of emergency department (FUED) because of concomitant medical, psychological and social issues.
Patrick Bodenmann   +5 more
doaj   +1 more source

Physical vulnerability to dynamic flooding: Vulnerability curves and vulnerability indices

open access: yesJournal of Hydrology, 2022
Vulnerability analysis is crucial to assess natural hazard risk. Methods for vulnerability assessment include indices as well as vulnerability curves. Vulnerability curves make use of empirical data to show the relationship between the process intensity and the resulting degree of loss on each affected building whereas vulnerability indices are based ...
Maria Papathoma-Köhle   +7 more
openaire   +1 more source

Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]

open access: yes, 2009
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive ...
Consoli, L., Pieters, W.
core   +12 more sources

Exercise and Physical Activity eHealth in COVID-19 Pandemic: A Cross-Sectional Study of Effects on Motivations, Behavior Change Mechanisms, and Behavior

open access: yesFrontiers in Psychology, 2021
ObjectivesThe aims of this research were (1) to compare the levels of physical activity of eHealth users and non-users, (2) to determine the effects of these technologies on motivations, and (3) to establish the relationship that could exist between ...
Gonzalo Marchant   +3 more
doaj   +1 more source

Methodologies to develop quantitative risk evaluation metrics [PDF]

open access: yes, 2012
The goal of this work is to advance a new methodology to measure a severity cost for each host using the Common Vulnerability Scoring System (CVSS) based on base, temporal and environmental metrics by combining related sub-scores to produce a unique ...
Hamid, Thaier K.A.   +2 more
core   +2 more sources

European Digital Libraries: Web Security Vulnerabilities [PDF]

open access: yes, 2010
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core   +2 more sources

Law’s Vulnerability, and Vulnerability in Law [PDF]

open access: yesFeminist Legal Studies, 2016
Vulnerability acts as a touchstone in this issue as we find our contributors reflecting on its intersection with gender and sexuality in different ways. Saeidzadeh draws out the significance of misrecognition in her consideration of responses to transsexuality in Iran, while Doonan highlights the potential pitfalls of relying on situational ...
Fletcher, R   +3 more
openaire   +2 more sources

Vulnerability, Vulnerable Populations, and Policy [PDF]

open access: yesKennedy Institute of Ethics Journal, 2004
[ 411 ] Kennedy Institute of Ethics Journal Vol. 14, No. 4, 411–425 © 2004 by the National Reference Center for Bioethics Literature Produced at the National Reference Center for Bioethics Literature, Kennedy Institute of Ethics, Georgetown University, Box 571212, Washington, DC 20057-1212. The Center operates on a contract with the National Library of
openaire   +2 more sources

Vulnerability and Entitlements

open access: yesInternational Journal for the Semiotics of Law - Revue internationale de Sémiotique juridique, 2022
AbstractThe article examines the merits of both human rights and citizenship as systems to protect vulnerable individuals. The idea of vulnerability is presented as a more reliable concept than the dignity of the individual in comparative research. The body is basic to vulnerability.
openaire   +4 more sources

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]

open access: yes, 2011
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core   +3 more sources

Home - About - Disclaimer - Privacy