Academic literature on the topic 'Personal vulnerability'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Personal vulnerability.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Personal vulnerability"

1

Azizah, Nuril Lutvi, Uce Indahyanti, and Cindy Cahyaning Astuti. "Prediksi Kerentanan Personal Terhadap Covid 19 dengan Menggunakan Pendekatan Graf." Jurnal Ilmiah Soulmath : Jurnal Edukasi Pendidikan Matematika 9, no. 1 (March 21, 2021): 47. http://dx.doi.org/10.25139/smj.v9i1.3328.

Full text
Abstract:
AbstractThe Covid 19 pandemic happened in arround the world include in Indonesia. It has impacts in many fileds. This research developed to solve the Covid 19 problem. This research requires complex variables based on the varying data in the field. Based on surveys and data, it found that there are 65% of personals know the status of their area in danger zone or safe zone for Covid 19. However, there are still many personals ignore the zone status that has been informed previously by the relevant goverment. The purpose of this study is to determine personal vulnerability to Covid-19 based on zones or regions. Moreover, prediction of vulnerability based on personal distance, the number of personal confirm Covid-19 arround the areas, and other variables such as immunity, and the accuracy of GPS applications. The methods is carried out by creating a vulnerabelity prediction model through GPS tracking based on the position or residence, then create to graph model in shortest path. Initial predictions are given a minimum distance between the personal and individuals confirms is one meter. The result of this research is percentage of personal vulnerability on the number of confirmed Covid 19 detections based on zones or regions. The prediction includes three models such as susceptible, quite susceptible, and safe. Personal susceptible in the percentage arround 90%-100%, quite susceptible in the percentage 75%-90%, and consideres safe in less that 75%.Keywords: prediction, vulnerability, graph
APA, Harvard, Vancouver, ISO, and other styles
2

Wise, Jorge A. "Perceived Vulnerability in Consumer Ethnocentrism." International Journal of Business and Social Research 7, no. 11 (December 3, 2017): 21. http://dx.doi.org/10.18533/ijbsr.v7i11.1083.

Full text
Abstract:
This research establishes that the consumers perceived vulnerability to a threat is a relevant variable that modifies the preference for domestic origin products. Many times, consumers balance their personal well-being with their sense of in-group identity, particularly when their preference for domestic products above foreign ones is expected. This study demonstrates that perceived vulnerability to a threat such as damaging one’s personal well-being is a relevant factor when consumers express their preference for domestic products.
APA, Harvard, Vancouver, ISO, and other styles
3

Johnson, Elisabeth. "Reconceptualizing Vulnerability in Personal Narrative Writing With Youths." Journal of Adolescent & Adult Literacy 57, no. 7 (March 31, 2014): 575–83. http://dx.doi.org/10.1002/jaal.287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brown, Daniel J., and Beverly A. Browne. "Vulnerability and Attitudes toward Intrusive Marketing." Psychological Reports 83, no. 3_suppl (December 1998): 1348–50. http://dx.doi.org/10.2466/pr0.1998.83.3f.1348.

Full text
Abstract:
An exploratory study of 138 young adults examined the relationship between personal vulnerability and attitudes toward intrusive direct marketing practices. Analyses indicated that perceived inability to prevent direct marketers from obtaining and using personal information was related to negative attitudes toward such solicitations. Resentment about intrusive marketing was positively related to the perceived need to protect vulnerable populations from such tactics.
APA, Harvard, Vancouver, ISO, and other styles
5

Briggs, Freda, and Russell M. F. Hawkins. "Children's Perceptions of Personal Safety Issues and their Vulnerability to Molestation." Children Australia 18, no. 3 (1993): 4–9. http://dx.doi.org/10.1017/s1035077200003485.

Full text
Abstract:
Interviews with children aged from 5 to 8 highlighted their vulnerability to molestation. This vulnerability is based in part on children's developmental levels. These include a limited capacity for abstract thought which renders some well intentioned attempts at child protection ineffective. Designers need to consider these developmental limitations when they develop child protection programs. Common parenting practices are also implicated in the perpetuation of children's vulnerability. These practices make it unlikely that a child would have the confidence to report adult-initiated sexual misbehaviour to a parent. Education is necessary to inform parents about ways in which they can reduce children's vulnerability by changing their own practices.
APA, Harvard, Vancouver, ISO, and other styles
6

NETTELBECK, TED, and CARLENE WILSON. "Personal Vulnerability to Victimization of People with Mental Retardation." Trauma, Violence, & Abuse 3, no. 4 (October 2002): 289–306. http://dx.doi.org/10.1177/1524838002237331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tifferet, Sigal, Orly Manor, Yoel Elizur, Orna Friedman, and Shlomi Constantini. "Maternal Adaptation to Pediatric Illness: A Personal Vulnerability Model." Children's Health Care 39, no. 2 (April 23, 2010): 91–107. http://dx.doi.org/10.1080/02739611003679840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Robertson, Lindsay, and Albert Munoz. "System Configuration Contributions to Vulnerability: Applications to Connected Personal Devices." IEEE Technology and Society Magazine 36, no. 1 (March 2017): 52–57. http://dx.doi.org/10.1109/mts.2017.2654289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pinsker, Donna M., Ken McFarland, and Nancy A. Pachana. "Exploitation in Older Adults: Social Vulnerability and Personal Competence Factors." Journal of Applied Gerontology 29, no. 6 (October 2009): 740–61. http://dx.doi.org/10.1177/0733464809346559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tuohy, Robyn, and Christine Stephens. "Exploring older adults' personal and social vulnerability in a disaster." International Journal of Emergency Management 8, no. 1 (2011): 60. http://dx.doi.org/10.1504/ijem.2011.040399.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Personal vulnerability"

1

Corlett, Sandra. "Professionals becoming managers : personal predicaments, vulnerability and identity work." Thesis, Northumbria University, 2009. http://nrl.northumbria.ac.uk/2690/.

Full text
Abstract:
This thesis explores identity work employed to secure stability and coherence of self-identity. This is achieved through an exploration of professionals becoming managers' experiences of vulnerability, conceived as personal predicaments, as they make a transition into and progress within management. This thesis takes up the invitation to dialogue with scholars from disparate philosophical orientations and epistemological commitments (Alvesson, Ashcraft and Thomas, 2008a; Smith and Sparkes, 2008) by reviewing critically the shared and contested views on self-identity. A theoretical framework is developed that conceptualises identity work within a fusion of symbolic interactionist positioning theory (Davies and Harr& 1990, 1999; Hart-6 and van Langenhove, 1991, 1999c) and relational social constructionist identity work processes (Beech and McInnes, 2006). This study's emergent focus on vulnerability, as experienced during role transitions (Hill, 1992, 2003; Watson and Harris, 1999) and ongoing personal predicaments (Schlenker, 1980), builds on the analytical importance of vulnerability (Sims, 2003), insecurity (Collinson, 2003), self-identity and identity work processes. Accounts of vulnerability as professionals make a transition into and progress within management are explored through a two-stage interview process with experienced public sector middle and senior managers from previously under-researched professional backgrounds (Cohen et al, 2002; Casey, 2008). Existing identity-related studies into professionals becoming managers (Hill, 1992, 2003; Ibarra, 1999; Watson and Harris, 1999) considered only the first year of transition into management. This research, therefore, adds to existing literature both through the type of participant and the extended nature of the study. The framework of self-identity presented is offered as a theoretical and methodological heuristic device. The thesis also offers refined conceptualisations of personal predicaments and of identity work processes, and insights into identity work strategies related to professional becoming managers' experiences of vulnerability.
APA, Harvard, Vancouver, ISO, and other styles
2

Grace, Jodi L. "Feeling at risk but fearing negative evaluation personal vulnerability and self-presentational concerns in medical settings /." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0006120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alim, Sophia. "Vulnerability in online social network profiles : a framework for measuring consequences of information disclosure in online social networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5507.

Full text
Abstract:
The increase in online social network (OSN) usage has led to personal details known as attributes being readily displayed in OSN profiles. This can lead to the profile owners being vulnerable to privacy and social engineering attacks which include identity theft, stalking and re identification by linking. Due to a need to address privacy in OSNs, this thesis presents a framework to quantify the vulnerability of a user's OSN profile. Vulnerability is defined as the likelihood that the personal details displayed on an OSN profile will spread due to the actions of the profile owner and their friends in regards to information disclosure. The vulnerability measure consists of three components. The individual vulnerability is calculated by allocating weights to profile attribute values disclosed and neighbourhood features which may contribute towards the personal vulnerability of the profile user. The relative vulnerability is the collective vulnerability of the profiles' friends. The absolute vulnerability is the overall profile vulnerability which considers the individual and relative vulnerabilities. The first part of the framework details a data retrieval approach to extract MySpace profile data to test the vulnerability algorithm using real cases. The profile structure presented significant extraction problems because of the dynamic nature of the OSN. Issues of the usability of a standard dataset including ethical concerns are discussed. Application of the vulnerability measure on extracted data emphasised how so called 'private profiles' are not immune to vulnerability issues. This is because some profile details can still be displayed on private profiles. The second part of the framework presents the normalisation of the measure, in the context of a formal approach which includes the development of axioms and validation of the measure but with a larger dataset of profiles. The axioms highlight that changes in the presented list of profile attributes, and the attributes' weights in making the profile vulnerable, affect the individual vulnerability of a profile. iii Validation of the measure showed that vulnerability involving OSN profiles does occur and this provides a good basis for other researchers to build on the measure further. The novelty of this vulnerability measure is that it takes into account not just the attributes presented on each individual profile but features of the profiles' neighbourhood.
APA, Harvard, Vancouver, ISO, and other styles
4

Nystedt, Jennie. "Are older individuals who live alone in Sweden at increased risk of vulnerability? : An investigation of personal and community factors." Thesis, Stockholms universitet, Institutionen för folkhälsovetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-157319.

Full text
Abstract:
Introduction: In Sweden today a third of all those 60+ live alone and the absolute number will continue to increase because of the aging population. The aim of this thesis was to identify if the subgroup, older individuals living alone, might be more disadvantaged in regard to the four key sources to vulnerability suggested by Mechanic and Tanner (2007): Poverty and low socioeconomic status, personal functions, low social network and lack of support, and physical location. Gender differences were also investigated.   Method: Data was from the Swedish Panel Study of Living Conditions of the Oldest Old (SWEOLD) collected in 2014. The total sample in this thesis includes 987 individuals with an age between 70-105. To estimate the current living conditions in regard to vulnerability among the subgroup, five dimensions of vulnerability were analyzed with multiple logistic and linear regressions.   Results: More disadvantages are found for those men and women living alone in all domains, except in social activity for women where living arrangement made no difference. Significant gender differences can be seen in depressive symptoms and social activity, but not for financial insecurity, mobility problems or living in a disorganized local community.   Conclusion: Men and women living alone are more disadvantaged compared to those living with a partner, according to the four key sources to vulnerability. With this deeper insight it is possible to obtain a greater understanding in where policies to support and strengthen this subgroup should be placed.
APA, Harvard, Vancouver, ISO, and other styles
5

Pugh, Dale Michelle, and com dalempugh@hotmail. "A Substantive Theory to Explain How Nurses Deal with an Allegation of Unprofessional Conduct." RMIT University. Health Sciences, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070523.120244.

Full text
Abstract:
As a social endeavour, the practice of nursing is expected to minimise risk of harm to patients. In reality, the risk of breaching or failing to meet a standard of practice, with resultant harm to patients is ever present. Such variations to the expected standard may result in harm to the patient and be viewed as unprofessional conduct within the legislative context. The phenomenon of unprofessional conduct can have significant and sometimes dire outcomes for patients and nurses and provides challenges to understand antecedents to its occurrence and the impact on the nurse. From this realisation, the significance of this study is twofold. Firstly, the literature revealed that an allegation of unprofessional conduct and the associated experience of being reported to a regulatory authority can have significant psycho-social and professional impact on the nurse. Secondly, the phenomenon has received little formal analysis. The purpose of this grounded theory study was to explore the phenomenon of alleged unprofessional conduct, and to develop a theory that provided understanding of the phenomenon and a framework for action. Data was obtained from in-depth interviews of a specialised sample of 21 nurses in any state or territory of Australia who had been the subject of notification by a nursing regulatory authority of alleged unprofessional conduct. Data analysis occurred simultaneously using the constant comparative method. This resulted in the generation of a substantive theory, explaining how nurses dealt with an allegation of unprofessional conduct. This study found that nurses experienced varying degrees and combinations of personal and professional vulnerability. This put them at risk of either making an error, breaching a practice standard, and/or at risk of being reported to a nurse regulatory authority for an allegation of unprofessional conduct. The core social process, a transformation of the personal and professional self is a process that the nurse both 'engages in' and 'goes through', in response to the social problem, being reported to a nurse regulatory authority for alleged unprofessional conduct, and its aftermath. The social process is made up of two categories: loss of the assumptive world: the experience of deconstruction and relearning the world. Loss of the assumptive world is comprised of being confronted, deconstruction of the personal self and deconstruction of the professional self. The category Relearning the world: the experience of reconstruction is constructed of the sub-categories, preserving the self: minimising the unravelling; reconstructing the personal self; reconstructing the professional self; and living within the world. Consequences of the category relearning the world are dynamic and influenced by a number of factors. The ability to transact the deconstructed self and move through the reconstructive processes and experience can be viewed in the following states, stymied, evolving or transacted. The personal and professional transformation of the individual nurse is influenced by the degree of deconstruction initially experienced, the interplay with the influencing factors internal and external support processes; resilience; time; and the constant of vulnerability. The findings of this study have implications for clinical, management, education and research practices in nursing. It also exposes problems with the use of nurse regulatory authorities as a punitive strategy for nurses who err. The uncovering of this substantive theory articulates a process whereby nurses are transformed personally and professionally in response to a traumatic or challenging life event. This substantive theory has value in providing a decision making framework for managing breaches of nursing standards, as a learning tool to identifying and managing risk in nursing and providing a framework for self and external support to nurses who may find themselves in this situation.
APA, Harvard, Vancouver, ISO, and other styles
6

Bentiri, Najat. "soutien au parentage (individuel ou en groupe) selon le genre et l'origine culturelle des parents en situation de vulnérabilité." Thesis, Montpellier 3, 2015. http://www.theses.fr/2015MON30100.

Full text
Abstract:
L'offre de soutien à la parentalité est aujourd'hui multiple. Pourtant nombre de parents en situation de vulnérabilité ne la sollicite pas. Outre les logiques de prévention de la délinquance ou de l'aide sociale à l'enfance, il est nécessaire en France de développer l'évaluation des programmes qui accompagnent et valorisent les compétences éducatives des parents (parentage). A la suite de l'étude de Steen et al. (2012), cette recherche-action évalue, auprès de 77 parents en situation de vulnérabilité, le programme « Etre Parent de Jeunes Enfants » (EPJE) conçu par Terrisse et Pithon (2008). Il s'agit plus particulièrement d'en cerner les effets sur l'évolution des connaissances et du sentiment de compétence parentale, selon la modalité d'accompagnement des parents (en entretien ou en groupe), leur genre ou leur origine culturelle (française ou maghrébine). Les résultats quantitatifs mettent en évidence une progression significative des connaissances et du sentiment de compétences en 15 heures de formation, mais ne dégagent pas de différences significatives selon le genre ou les origines culturelles étudiées. Les analyses qualitatives, par contre, soulignent certaines spécificités : l'entretien permet une meilleure prise en compte personnalisée de la singularité de chacun ; la formation en groupe favorise le lien de participation élective (Paugam, 2008).Les recherches menées sur ce programme confirment sa pertinence auprès de parents en situation de vulnérabilité. Les préconisations sur les modalités de formation à mettre en œuvre réserveraient plutôt l'entretien pour un soutien en prévention secondaire voire tertiaire et le groupe plutôt pour la prévention primaire.Mots clés : parentalité ; sentiment de compétence parental ; vulnérabilité; entretien ; groupe ; culture
The offer of support to parenthood is now multiple. Nevertheless many parents in situations of vulnerability do not solicit it. In addition to the logic of delinquency prevention or social assistance to childhood, France has to develop the evaluation of programs that help and enhance the skills of the parents in education (parenting). As a result of the study by Steen et al. (2012), this action-research evaluates, with 77 parents in situations of vulnerability, the "Being Parent of young children" (EPJE) program designed by Terrisse and Pithon (2008). This research tries to identify the evolution of knowledges and feeling of parental competence, according to the training modalities (personal interview or group training), their gender, or their cultural origins (French or North African). Quantitative results highlight a significant increase of the knowledge and feeling of parental competence after 15 hours training, but no significant differences depending of cultural origins. On the other hand, qualitative analyses emphasize some specificity such as: the personal interview allows a better social support of each one and the group fosters the elective participation link (Paugam, 2008). This research confirms the relevance of this program to parents in situations of vulnerability. The recommendations on the training modalities to implement this program would be to use the personal interview for secondary, or even tertiary prevention, and the group for primary prevention.Keys words: parenthood; feeling of parental compétence;vulnerability; personal interview; Group; culture
APA, Harvard, Vancouver, ISO, and other styles
7

Delouvee, Maxime. "Contributions à l’autonomie de la personne vulnérable." Thesis, Montpellier, 2017. http://www.theses.fr/2017MONTD030.

Full text
Abstract:
Le vieillissement de population rend inévitables les questionnements sur l’autonomie des personnes âgées. La vie en établissement rend inévitables les questionnements sur l'autonomie d’une personne accueillie ou accompagnée. La mission de protection de la personne rend inévitables les questionnements sur l’autonomie d’un majeur protégé. La liste est longue et peut parfaitement se poursuivre. Tous ces questionnements recoupent en réalité, la difficile conciliation entre l’autonomie et la protection, entre la liberté et la sécurité. Le Droit ne peut plus ignorer ces réalités. Il ne peut plus ignorer par exemple, l’existence d’un questionnement lorsqu’une personne âgée refuse son entrée en maison de retraite, mettant alors sa vie en danger. Il ne peut plus ignorer aussi la difficulté du consentement aux soins des majeurs sous mesure de protection. Cette étude ambitionne donc de revenir sur ces réalités pour envisager une protection de la personne, de son autonomie, conforme aux questions d’aujourd’hui
The ageing of population makes inevitable questionings on the autonomy of the elderly. The life in establishment makes inevitable questionings on the autonomy of the vulnerable person. The mission of protection makes inevitable questionings on the autonomy of major one protected. The list is long and can perfectly continue. The list is long and can continue. All these questionings recut in reality, the difficult conciliation between the autonomy and the protection, between the freedom and the safetyThe law cannot ignore any more these realities. It cannot ignore any more for example, the existence of a questioning when an elderly person refuses its entrance to retirement home, putting then its life in danger. He cannot ignore any more also the difficulty of the consent in the care of the vulnerable adults. This study aspires to return on these realities to envisage a protection of its autonomy, in compliance with the questions of today
APA, Harvard, Vancouver, ISO, and other styles
8

羅淑兒 and Suk-yee Lo. "Vulnerability and resilience to workplace violence among health care workers in public hospitals." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B41547822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lo, Suk-yee. "Vulnerability and resilience to workplace violence among health care workers in public hospitals." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B41547822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hartmann, Maike M. Verfasser], and Tania [Akademischer Betreuer] [Lincoln. "Einfluss von Stress- und Risikofaktoren auf paranoide Symptome bei Personen mit unterschiedlicher Vulnerabilität / Maike M. Hartmann. Betreuer: Tania Lincoln." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2014. http://d-nb.info/1059859807/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Personal vulnerability"

1

Herrick, Vanessa. Jesus wept: Reflections on vulnerability in leadership. London: Darton Longman and Todd, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Learning difficulties and sexual vulnerability: A social approach. London: Jessica Kingsley Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Harris, George W. Dignity and vulnerability: Strength and quality of character. Berkeley: University of California Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Eastin, Joshua, and Kendra Dupuy, eds. Gender, climate change and livelihoods: vulnerabilities and adaptations. Wallingford: CABI, 2021. http://dx.doi.org/10.1079/9781789247053.0000.

Full text
Abstract:
Abstract This book applies a gender lens to examine the implications of climate change for livelihoods in vulnerable states. The goals are to enhance awareness of climate change as a gender issue, and to highlight the importance of gender in identifying livelihood vulnerabilities and in designing more robust climate adaptation measures, especially in climate-sensitive industries such as agriculture. The contributions in this book examine how the consequences of climate change affect women and men in different ways, and address the implications of climate change for women's livelihoods and resource access. The book is organized into two main sections. The first section (Chapters 2-8) examines disparities in the vulnerability of women's and men's livelihoods to climate change. The chapters in this section address issues such as gender inequalities in the household distribution of labour; differential access to agricultural livelihood inputs and assets; gender-based threats to personal safety and security; and gendered vulnerability to and experiences with climate disasters, food insecurity, and infrastructure development. The second section (chapters 9-16) takes a gender-based view of various climate adaptation initiatives in areas that rely on agriculture for subsistence and production. The contributions in this section address gender-inclusive participation in climate policy planning and decision making, the role of gender in livelihood adaptation measures, and any successes, failures, or opportunities for improvement that emerge from these efforts.
APA, Harvard, Vancouver, ISO, and other styles
5

1944-, Doherty Joe, and Meert Henk, eds. Access to housing: Homelessness and vulnerability in Europe. Bristol: Policy Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Feminisms, HIV, and AIDS: Subverting power, reducing vulnerability. Basingstoke, Hampshire: Palgrave Macmillan, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vietnam. Quốc hội. Ủy ban về các vấn đề xã hội. Socio-economic impacts of HIV/AIDS on household vulnerability and poverty. Hanoi: Culture and Information Pub. House, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lewis, Duston Robert, Russell Karen S, and Bureau of National Affairs (Washington, D.C.), eds. Workplace privacy: Employee testing, surveillance, wrongful discharge, and other areas of vulnerability. 2nd ed. Washington, D.C: Bureau of National Affairs, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shepard, Ira Michael. Workplace privacy: Employee testing, surveillance, wrongful discharge, and other areas of vulnerability. 2nd ed. Washington, D.C: Bureau of National Affairs, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rashid, Syeda Rozana. A comparative study on vulnerability and coping mechanisms between Rohingya refugee and Chakma IDP women. Dhaka: Forum on Women in Security and International Affairs, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Personal vulnerability"

1

McLean, Sheila A. M. "Respect for Human Vulnerability and Personal Integrity." In Handbook of Global Bioethics, 105–17. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-2512-6_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hammen, Constance. "Vulnerability to Depression: Personal, Situational, and Family Aspects." In Contemporary Psychological Approaches to Depression, 59–69. Boston, MA: Springer US, 1990. http://dx.doi.org/10.1007/978-1-4613-0649-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nicolau, Lurdes. "Roma at School: A Look at the Past and the Present. The Case of Portugal." In Social and Economic Vulnerability of Roma People, 153–63. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-52588-0_10.

Full text
Abstract:
AbstractThe schooling process has become more widespread among the Portuguese Roma population since 1974, with the end of the Estado Novo dictatorship and the establishment of democracy. Nevertheless, the Roma nomadism or semi-nomadism, financial shortcomings and the absence of social/cultural/family stimuli are some of the reasons that explain their low school attendance rates. Only in the last decades has such attendance increased, as a result of the implementation of several public policies, particularly of the Social Integration Income. This social policy, implemented in 1996, introduced important changes in this population, especially in areas such as schooling, personal hygiene, housing, health, or sedentism.Recent research has shown an increase in the educational level of the Roma population, but school dropouts and failure remain high. This tendency was also studied in the northeast of Portugal, in a PhD thesis about the relationships between the Roma and school. In the present research work, a qualitative methodology was adopted, using direct and participant observation, as well as interviews to some Roma parents and non-Roma teachers. Both groups emphasize the main difficulties of Roma children at school.The conclusions show that several factors affect these students’ schooling nowadays, especially poor housing conditions, parents’ illiteracy or low schooling, lack of daily study monitoring at home, absence of models in their environment, non-attendance of pre-school, and discrimination against them.
APA, Harvard, Vancouver, ISO, and other styles
4

Eleuteri, Stefano, Arianna Caruso, and Ranjeev C. Pulle. "End of Life, Food, and Water: Ethical Standards of Care." In Perspectives in Nursing Management and Care for Older Adults, 261–71. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63892-4_21.

Full text
Abstract:
AbstractEnd-of-life care constitutes an important situation of extreme nutritional vulnerability for older adults. Feeding decisions in late-stage dementia often provoke moral and ethical questions for family members regarding whether or not to continue hand-feeding or opt for tube-feeding placement. Despite the knowledge that starvation and dehydration do not contribute to patient suffering at the end of life and in fact may contribute to a comfortable passage from life, the ethics of not providing artificial nutrition and hydration (ANH) continue to be hotly debated. However, in the past two decades, voluntary stopping of eating and drinking (VSED) has moved from a palliative option of last resort to being increasingly recognized as a valid means to intentionally hasten death for cognitively intact persons dealing with a serious illness. Across many settings globally, when oral intake is deemed unsafe, decisions to withhold oral feeding and to forgo artificial means of providing nutrition are deemed to be ethically and legally sanctioned when the decision is made by a capable patient or their legally recognized substitute decision-maker. Decision-making at the end of life involves knowledge of and consideration of the legal, ethical, cultural, religious, and personal values involved in the issue at hand. This chapter attempted to illustrate the unique complexities when considering nutrition therapy (by oral and artificial means) at the end of life.
APA, Harvard, Vancouver, ISO, and other styles
5

Hardon, Anita. "Chemical Supplementing." In Critical Studies in Risk and Uncertainty, 215–46. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57081-1_7.

Full text
Abstract:
Abstract This chapter, Chemical Supplementing, presents ethnographies of young people who use a variety of supplements in order to optimize their health. In the Philippines, boys take multivitamins with the hope of increasing their height, reflecting the importance of stature in their society, and young professionals take expensive supplements to improve their stamina for their demanding distribution jobs in a multilevel marketing company. In fitness centers, young women use proteins and fortified shakes to achieve an idealized, lean, and muscular body. In health and vitamin stores in Amsterdam, growing numbers of young people are buying, sharing, and promoting their personal concoctions of proteins and vitamins. These supplementing practices stem from young people’s various needs: to respond to the demands of service sector labor, to recover from the strain of night work, to indulge in the pleasure of weekend raves, and to manage growing concerns about environmental toxins. By zooming in on supplementing practices of these different groups of young people, we get a clearer understanding of their shared sense of vulnerability, and of the need for better regulation of the supplements industry.
APA, Harvard, Vancouver, ISO, and other styles
6

Baciu, Elena-Loreni, and Theofild-Andrei Lazar. "The Influence of Social Capital on the Educational Attainment of Roma Persons: Evidence from a Qualitative Study in Romania." In Social and Economic Vulnerability of Roma People, 183–99. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-52588-0_12.

Full text
Abstract:
AbstractAs the largest ethnic minority in Europe, Roma persons are among the groups with the lowest levels of educational attainment. In Romania, the country with the highest number of Roma persons of all the EU Members States, the situation is even worse, each higher level of education revealing an increasing gap between Roma persons and the general population.Positioned within the framework of Social Capital theory, the current chapter explores the influences of micro- and mezzo-level social networks on educational attainment of Roma persons, trying to explain some of the mechanisms that perpetuate the gap between them and the general population, in terms of educational attainment.Drawing on a qualitative bottom-up study of Roma persons’ experiences of belonging in society, we analysed the interlocking influences of bonding and bridging social capital on the interviewees’ educational attainment. The results of the study point out that both forms of social capital have an important impact on the educational attainment of persons in vulnerable groups, although in different ways, and sometimes they can be mutually reinforcing, depending on the prevailing social arrangements, in either keeping the persons engaged in education, or drawing them away from their educational paths. The results also show that in circumstances of intersecting vulnerabilities, a noticeable imbalance between agency and structure is produced, which corrodes the foundational principles of equity and affects the equality of opportunities.
APA, Harvard, Vancouver, ISO, and other styles
7

Keating, Norah, and Maria Cheshire-Allen. "Introduction: Policy to Reduce Late-Life Social Exclusion – From Aspirations to Action." In International Perspectives on Aging, 353–57. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-51406-8_27.

Full text
Abstract:
AbstractThis chapter, as with others in this section, was written prior to the COVID-19 pandemic and to the ways in which it placed older persons’ vulnerability to social exclusion in stark relief. Early in the pandemic we saw swift policy action focussed on older persons. In some countries, people over age 70 were held to stricter rules of self-isolation. In others, nursing homes were locked down. Such policies afford protection on one hand but remove agency on the other. COVID-19 highlighted the values stances that continue to place older people as conditional citizens.
APA, Harvard, Vancouver, ISO, and other styles
8

Ragusa, Kym. "On Vulnerability and Risk:." In Personal Effects, 105–10. Fordham University Press, 2014. http://dx.doi.org/10.2307/j.ctt13x0bjp.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ragusa, Kym. "On Vulnerability and Risk." In Personal Effects, 105–10. Fordham University Press, 2014. http://dx.doi.org/10.5422/fordham/9780823262274.003.0007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Decontamination Methods, Biocides, and Personal Protective Equipment." In Building Vulnerability Assessments, 337–54. CRC Press, 2009. http://dx.doi.org/10.1201/9781420078350-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Personal vulnerability"

1

Chesnokova, Lesya. "Privacy & Secrecy: The Right to Control of Personal Information." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-06.

Full text
Abstract:
The article considers the right for privacy and secrecy as an opportunity to have a life sphere hidden from the government, society and other individuals. The study is based on a holistic approach including logical, hermeneutical and comparative methods. The historical process of the origin of publicness triggered the development of legal guarantees, personal freedom, and political involvement. This was accompanied by the occurrence of the sphere of privacy where an actor is protected from state and public interventions. Whereas the public sphere is associated with openness, transparency, total accessibility, the private sphere is connoted with darkness, opacity, and closedness. The need for privacy and secrecy is determined by the human vulnerability. One of the critical components of privacy is the right of an individual for control his personal information. To protect one’s own private sphere, one puts on a social mask when speaking in public. In an intimate relationship, unlike in a public one, he voluntarily waives protection by allowing those closest to him access to personal information. The restricted private sphere is sometimes a source of apprehension and a desire to penetrate other people’s secrets, both from the totalitarian state, which seeks to suppress and unify the individual, and from curious members of society. For the purpose of retaining the social world, a person in the course of socialisation learns to respect other’s privacy, behaving discreetly and tactfully. The right for privacy and secrecy is related with freedom, dignity, and the autonomy of personality.
APA, Harvard, Vancouver, ISO, and other styles
2

Martyshkin, A. I. "On the Issue of Assessing the Possible Vulnerability of Users' Personal Data in Social Networks." In 2021 International Russian Automation Conference (RusAutoCon). IEEE, 2021. http://dx.doi.org/10.1109/rusautocon52004.2021.9537467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alhaidary, Mada, and SK Md Mizanur Rahman. "Security vulnerability analysis and corresponding mitigation for password-based authentication using an offline personal authentication device." In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2016. http://dx.doi.org/10.1109/wispnet.2016.7566251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Makovkina, Elizaveta, and Zinaida Nesterova. "The Privacy Paradox and Social Media: Why Users Disclose Their Personal Data." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-63.

Full text
Abstract:
With the development of the worldwide Internet, the security of private data in the online space has become an increasing concern. On the one hand, users post a lot of information about themselves; on the other hand, they are very concerned about the safety of this information. Thereby a privacy paradox emerges: the difference between attitudes to information privacy and actual user behaviour. This article examines different approaches to the interpretation of this phenomenon. The authors of the article identify the motives for using social media. A study was conducted to define the relation between these motives and the attitude of young people with regards to confidentiality, which directly influences the confidentiality paradox occurrence. The survey method and a statistical method for studying relationships and a correlation analysis were used to solve the problem. The authors found that offline privacy is important among most young people, yet more than half of those asked considered online security to be very important as well. Positive and negative correlations were found between reasons for using social media and users’ privacy behaviour. The results of the study identified a correlation between active and passive users’ security settings and motivations for using social media. The authors conclude that users are aware of the high vulnerability of personal data on the Internet, however, may consciously sacrifice their security for the benefits that influence their motives for using social media: online identity, fear of missing out, convenience, sharing, information consumption and communication.
APA, Harvard, Vancouver, ISO, and other styles
5

Ford, Matthew, Peter Matic, and Alan Leung. "Expanding Helmet Design Methodologies Through Brain Functional Area Representative Threat Models." In ASME 2013 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/imece2013-64959.

Full text
Abstract:
In combat zones, warfighters may be exposed to multiple threat types that can result in impacts to the head. These head impacts can lead to traumatic brain injury (TBI) or other functional or cognitive impairments, depending on the impact location, duration, and severity. Personal protective equipment mitigates the damage to the head, and current equipment design efforts focus on high-level protective metrics such as local helmet deformations and penetrations, as well as global accelerations or rotations of the head. Advances in brain imaging and mapping have made it possible to couple brain regions with specific functions, which could lead to higher resolution injury models and a more integrated helmet design process. The Naval Research Laboratory has developed a design tool to relate cognitive and functional brain regions from the literature to representative threat models for a head-helmet system. In this study, the philosophy and methods behind this augmented design tool and some of its applications are discussed. Through surveying detailed brain mappings and Brodmann functional areas, spatial coordinates for a coarse and a fine brain model were identified, scaled, and positioned within a three-dimensional model of the head. Projectile threats to the brain from all directions were simulated to evaluate the vulnerability of specific brain regions for a given protective helmet geometry. Using this platform, a variety of design tools were developed to investigate the functional effects of making geometric changes to the helmet.
APA, Harvard, Vancouver, ISO, and other styles
6

Passos, Valeria Maria de Azeredo, Luísa Campos Caldeira Brant, Paulo Roberto Lopes Corrêa, Pedro Cisalpino Pinheiro, Maria de Fátima Marinho de Souza, and Deborah Carvalho Malta. "SOCIAL INEQUALITY IN COVID-19 MORTALITY AMONG OLDER ADULTS IN BELO HORIZONTE: VACCINATION PRIORITY." In XXII Congresso Brasileiro de Geriatria e Gerontologia. Zeppelini Publishers, 2021. http://dx.doi.org/10.5327/z2447-21232021res02.

Full text
Abstract:
OBJECTIVE: To test the hypothesis that older adults (aged 60+ years) living in areas of greater social vulnerability were most affected by the COVID-19 pandemic in the city of Belo Horizonte between February and October 2020. METHODS: We conducted an ecological study with analysis of mortality rates by census tracts, classified as areas of low vulnerability (1330 tracts), medium vulnerability (1460 tracts), and high/very high vulnerability (1040 tracts) according to the health vulnerability index (consisting of indicators of sanitation, garbage collection, water supply, literacy level, and race). The number of deaths from COVID-19 was obtained from the Mortality Information System from 10th to 43rd epidemiological week. The rates were age-standardized for populations of the three areas of vulnerability, based on population estimates from the Brazilian Institute of Geography and Statistics. RESULTS: In Belo Horizonte, the mortality rate was 62.9 deaths per 100,000 population, ranging from 36.1 in areas of low social vulnerability to 76.6 and 101.9 in areas of medium and high/very high vulnerability, respectively. The mortality rate was 292.3 per 100,000 older persons, increasing from 179.2 in areas of low vulnerability to 353.6 and 472.6 in areas of medium and high/very high vulnerability, respectively. CONCLUSIONS: In this moment of organizing vaccination sessions for the population, social inequalities in mortality, even in the age group at highest risk, reinforce the principle of starting vaccination by prioritizing the most socially vulnerable areas. It is necessary to prioritize the most exposed older persons, as they usually live with on-site workers, have greater difficulty in complying with social distancing orders and with the hygiene preventive measures due to poor housing and transportation conditions, and experience limited access to health care services.
APA, Harvard, Vancouver, ISO, and other styles
7

Rittossa, Dalida. "THE INSTITUTE OF VULNERABILITY IN THE TIME OF COVID-19 PANDEMIC: ALL SHADES OF THE HUMAN RIGHTS SPECTRUM." In EU 2021 – The future of the EU in and after the pandemic. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2021. http://dx.doi.org/10.25234/eclic/18354.

Full text
Abstract:
The vulnerability thesis is one of the most important legal concepts in contemporary legal theory. Apart from being studied by legal scholars, the notion of vulnerability has been embodied in concrete legal rules and transferred to national case law allowing courts to set its boundaries by the power of judicial interpretation. Even though it would be hard to contest Schroeder and Gefenas’s statement that it is not necessary for an academic to say what vulnerability is because common sense dictates the existence of it, recent scholarly analysis clearly shows that the concept itself has become intolerably vague and slippery. More precisely, it is not quite clear what the essence of vulnerability is and what the effects of its gradation as well as repercussions are on other constitutional institutes across the human rights spectrum. The noted vagueness poses a great concern, particularly in the time of COVID-19, the greatest social stressor that humanity has faced in recent months. The COVID-19 crisis has had untold consequences on our health, mental well-being, educational growth, and economic stability. In order for the state to bear the COVID-19 social burden and adequately protect the vulnerable, it is of the utmost importance to set clear guidance for the interpretation and implementation of the vulnerability concept. Seeking to contribute to literature on these issues, the author brings light to constitutional and criminal legal standards on vulnerability set within the current jurisprudence and doctrine. Bearing in mind the influence of the European Court of Human Rights (hereinafter, the ECtHR or the Court) on developments in human rights law, 196 judgments related to vulnerability have been retrieved from the HUDOC database using a keywords search strategy. The quantitative analysis was supplemented with more in-depth qualitative linguistic research of the Court’s reasoning in cases concerning vulnerable children, persons suffering from mental illness and victims of family violence. Although the vulnerability reasoning has considerably expended their rights within the ambit of the Convention, the analysis has shown that inconsistencies and ambiguities emerge around the formulation of the applicant’s vulnerability and its gradation with respect to positive obligations. The full creative and transformative potential of the institute of vulnerability is yet to be realized.
APA, Harvard, Vancouver, ISO, and other styles
8

Bouniot, Quentin, Romaric Audigier, and Angelique Loesch. "Vulnerability of Person Re-Identification Models to Metric Adversarial Attacks." In 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 2020. http://dx.doi.org/10.1109/cvprw50498.2020.00405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fandiño, Laity Velásquez. "Vulnerability And Forcefully Displaced Persons In Colombia ¿Moral Friends Or Moral Strangers?" In EDUHEM 2018 - VIII International conference on intercultural education and International conference on transcultural health: The Value Of Education And Health For A Global,Transcultural World. Cognitive-Crcs, 2019. http://dx.doi.org/10.15405/epsbs.2019.04.02.126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Leir, Mark, Michael Reed, and Eugene Yaremko. "Field Inspection Module for Hydrotechnical Hazards." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0092.

Full text
Abstract:
Terasen Pipelines (Terasen) owns and operates an 1146 km low vapour pressure petroleum products pipeline between Edmonton, Alberta and Burnaby, British Columbia. Its right-of-way passes through some of the most geotechnically, hydrotechnically, and environmentally challenging terrain in Western Canada. This paper describes the latest advancement of a natural hazards and risk management database application that has supported a 6-year hazard management program to quantitatively assess and prioritize the geotechnical and hydrotechnical risk along the pipeline. This database was first reported at IPC 2002 in a paper entitled “Natural hazard database application — A tool for pipeline decision makers” [1]. This second paper describes the advancements since then, including the addition of the Hydrotechnical Field Inspection Module (FIM), an add-on tool that allows field inspection observations to adjust hazard and vulnerability. This paper discusses the challenges in building a methodology that is practical enough for field maintenance personnel to use yet sufficiently comprehensive to accurately describe improving or worsening hydrotechnical hazard conditions. Functionality to enter hazard inspection data, review inspection results in the office, and authorize changes to the hydrotechnical hazard probabilities are described in the paper and demonstrated in the conference presentation. The relationship between revised hazard, vulnerability, risk, and response thresholds (such as inspection frequency, monitoring, site surveys, or mitigation) are demonstrated using a river crossing with a dynamic hazard history. As in previous years, this paper is targeted to pipeline managers who are seeking a systematic hazard and risk management approach for their natural hazards.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Personal vulnerability"

1

Starks, Michael W. Improved Metrics for Personnel Vulnerability Analysis. Fort Belvoir, VA: Defense Technical Information Center, May 1991. http://dx.doi.org/10.21236/ada235610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography