Results 21 to 30 of about 489,634 (291)
Background Previous research revealed the vulnerability of frequent users of emergency department (FUED) because of concomitant medical, psychological and social issues.
Patrick Bodenmann +5 more
doaj +1 more source
Physical vulnerability to dynamic flooding: Vulnerability curves and vulnerability indices
Vulnerability analysis is crucial to assess natural hazard risk. Methods for vulnerability assessment include indices as well as vulnerability curves. Vulnerability curves make use of empirical data to show the relationship between the process intensity and the resulting degree of loss on each affected building whereas vulnerability indices are based ...
Maria Papathoma-Köhle +7 more
openaire +1 more source
Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive ...
Consoli, L., Pieters, W.
core +12 more sources
ObjectivesThe aims of this research were (1) to compare the levels of physical activity of eHealth users and non-users, (2) to determine the effects of these technologies on motivations, and (3) to establish the relationship that could exist between ...
Gonzalo Marchant +3 more
doaj +1 more source
Methodologies to develop quantitative risk evaluation metrics [PDF]
The goal of this work is to advance a new methodology to measure a severity cost for each host using the Common Vulnerability Scoring System (CVSS) based on base, temporal and environmental metrics by combining related sub-scores to produce a unique ...
Hamid, Thaier K.A. +2 more
core +2 more sources
European Digital Libraries: Web Security Vulnerabilities [PDF]
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core +2 more sources
Law’s Vulnerability, and Vulnerability in Law [PDF]
Vulnerability acts as a touchstone in this issue as we find our contributors reflecting on its intersection with gender and sexuality in different ways. Saeidzadeh draws out the significance of misrecognition in her consideration of responses to transsexuality in Iran, while Doonan highlights the potential pitfalls of relying on situational ...
Fletcher, R +3 more
openaire +2 more sources
Vulnerability, Vulnerable Populations, and Policy [PDF]
[ 411 ] Kennedy Institute of Ethics Journal Vol. 14, No. 4, 411–425 © 2004 by the National Reference Center for Bioethics Literature Produced at the National Reference Center for Bioethics Literature, Kennedy Institute of Ethics, Georgetown University, Box 571212, Washington, DC 20057-1212. The Center operates on a contract with the National Library of
openaire +2 more sources
Vulnerability and Entitlements
AbstractThe article examines the merits of both human rights and citizenship as systems to protect vulnerable individuals. The idea of vulnerability is presented as a more reliable concept than the dignity of the individual in comparative research. The body is basic to vulnerability.
openaire +4 more sources
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core +3 more sources

