Supporting secure programming in web applications through interactive static analysis.
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2014-07-01
Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.
Supporting secure programming in web applications through interactive static analysis
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2013-01-01
Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513
Han, Kyu-Tae; Kim, Sun Jung; Lee, Seo Yoon; Park, Eun-Cheol
2014-01-01
After the WHO recommended HPV vaccination of the general population in 2009, government support of HPV vaccination programs was increased in many countries. However, this policy was not implemented in Korea due to perceived low cost-effectiveness. Thus, the aim of this study was to analyze the cost-utility of HPV vaccination programs targeted to high risk populations as compared to vaccination programs for the general population. Each study population was set to 100,000 people in a simulation study to determine the incremental cost-utility ratio (ICUR), then standard prevalence rates, cost, vaccination rates, vaccine efficacy, and the Quality-Adjusted Life-Years (QALYs) were applied to the analysis. In addition, sensitivity analysis was performed by assuming discounted vaccination cost. In the socially vulnerable population, QALYs gained through HPV vaccination were higher than that of the general population (General population: 1,019, Socially vulnerable population: 5,582). The results of ICUR showed that the cost of HPV vaccination was higher for the general population than the socially vulnerable population. (General population: 52,279,255 KRW, Socially vulnerable population: 9,547,347 KRW). Compared with 24 million KRW/QALYs as the social threshold, vaccination of the general population was not cost-effective. In contrast, vaccination of the socially vulnerable population was strongly cost-effective. The results suggest the importance and necessity of government support of HPV vaccination programs targeted to socially vulnerable populations because a targeted approach is much more cost-effective. The implementation of government support for such vaccination programs is a critical strategy for decreasing the burden of HPV infection in Korea.
The Regional Vulnerability Assessment (ReV A) Program is an applied research program t,1at is focusing on using spatial information and model results to support environmental decision-making at regional- down to local-scales. Re VA has developed analysis and assessment methods to...
Nursing Student Birth Doulas' Influence On the Childbearing Outcomes of Vulnerable Populations.
Van Zandt, Shirley E; Kim, Soohyun; Erickson, Amanda
2016-01-01
Of 1,511 women served by nursing student birth doulas (Birth Companions) between 1998 and 2014, 34.5% were identified as vulnerable (refugees, non-English speakers, teens, low income, low education). This retrospective evaluation of the Birth Companions Program showed that vulnerable mothers had more epidurals and smaller babies, and attempted breastfeeding less frequently than nonvulnerable. There was no difference in the frequency of caesarean births, pitocin induction/augmentation, low birth weight, or preterm newborns among the vulnerable women. Birth Companion interventions may have a role in influencing these outcomes. The Birth Companions program will use this analysis to identify additional services for these populations.
Herens, Marion; Wagemakers, Annemarie; Vaandrager, Lenneke; van Ophem, Johan; Koelen, Maria
2017-09-01
This article presents a practitioner-based approach to identify key combinations of contextual factors (C) and mechanisms (M) that trigger outcomes (O) in Dutch community-based health-enhancing physical activity (CBHEPA) programs targeting socially vulnerable groups. Data were collected in six programs using semi-structured interviews and focus groups using a timeline technique. Sessions were recorded, anonymized, and transcribed. A realist synthesis protocol was used for data-driven and thematic analysis of CMO configurations. CMO configurations related to community outreach, program sustainability, intersectoral collaboration, and enhancing participants' active lifestyles. We have refined the CBHEPA program theory by showing that actors' passion for, and past experiences with, physical activity programs trigger outcomes, alongside their commitment to socially vulnerable target groups. Project discontinuity, limited access to resources, and a trainer's stand-alone position were negative configurations. The authors conclude that local governance structures appear often to lack adaptive capacity to accommodate multilevel processes to sustain programs.
A Case Study of a Combat Helicopter’s Single Unit Vulnerability.
1987-03-01
22 2.6 Generic Fault Tree Diagram ----------------------- 24 2.7 Example Kill Diagram ----------------------------- 25 2.8 Example EEA Summary...that of the vulnerability program, a susceptibility program is subdivided into three major tasks. First is an essential elements analysis ( EEA ...which leads to the 27 i final undesired event in much the same manner as a FTA. An example EEA is provided in Figure 2.8. [Ref.l:p226] The
The vulnerabilities in childhood and adolescence and the Brazilian public policy intervention.
Fonseca, Franciele Fagundes; Sena, Ramony Kris R; dos Santos, Rocky Lane A; Dias, Orlene Veloso; Costa, Simone de Melo
2013-06-01
To review and discuss childhood and adolescence vulnerabilities, as well as Brazilian public policies of intervention. A narrative review was performed, considering studies published between 1990 and 2012, found in the Virtual Health Library databases (Biblioteca Virtual em Saúde - BVS). A combination of the following descriptors was used in the search strategy: "Adolescent Health", "Child Health", "Health Public Politics" and "Vulnerability". In addition, Brazilian official documents, the Statute of the Child and the Adolescent, Guardianship Council, Bolsa Família and Saúde na Escola Programs were evaluated. The results were divided into five categories of analysis: Vulnerability of Children and Adolescents in Brazil, Public Politics of Intervention to Risk Factors in Childhood and Adolescence, the Statute of the Child and the Adolescent and Guardianship Council, Bolsa Família Program and Saúde na Escola Program. The studies show that children and adolescents are vulnerable to environmental and social situations. Vulnerabilities are exhibited in daily violence within families and schools, which results in the premature entrance of children and adolescents in the work environment and/or in the drug traffic. To deal with these problems, the Brazilian Government established the Statute of the Child and the Adolescent as well as social programs. Literature exposes the risks experienced by children and adolescents in Brazil. In the other hand, a Government endeavor was identified to eliminate or minimize the suffering of those in vulnerable situations through public policies targeted to this population group.
Analysis and Defense of Vulnerabilities in Binary Code
2008-09-29
language . We demonstrate our techniques by automatically generating input filters from vulnerable binary programs. vi Acknowledgments I thank my wife, family...21 2.2 The Vine Intermediate Language . . . . . . . . . . . . . . . . . . . . . . 21 ix 2.2.1 Normalized Memory...The Traditional Weakest Precondition Semantics . . . . . . . . . . . . . 44 3.2.1 The Guarded Command Language . . . . . . . . . . . . . . . . . 44
Space Station Program threat and vulnerability analysis
NASA Technical Reports Server (NTRS)
Van Meter, Steven D.; Veatch, John D.
1987-01-01
An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.
JAVA CLASSES FOR NONPROCEDURAL VARIOGRAM MONITORING
A set of Java classes was written for variogram modeling to support research for US EPA's Regional Vulnerability Assessment Program (ReVA). The modeling objectives of this research program are to use conceptual programming tools for numerical analysis for regional risk assessm...
Runtime Speculative Software-Only Fault Tolerance
2012-06-01
reliability of RSFT, a in-depth analysis on its window of vulnerability is also discussed and measured via simulated fault injection. The performance...propagation of faults through the entire program. For optimal performance, these techniques have to use herotic alias analysis to find the minimum set of...affect program output. No program source code or alias analysis is needed to analyze the fault propagation ahead of time. 2.3 Limitations of Existing
The Gap Analysis Program (GAP) is a national interagency program that maps the distribution of plant communities and selected animal species and compares these distributions with land stewardship to identify biotic elements at potential risk of endangerment. Acquisition of primar...
EPA's Regional Vulnerability Assessment (ReVA) program is an applied research program that is focused on the synthesis and presentation of existing environmental data and model results to inform multicriteria environmental decision-making through a comprehensive analysis of infor...
Development of a security vulnerability assessment process for the RAMCAP chemical sector.
Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William
2007-04-11
The Department of Homeland Security (DHS), Directorate of Information Analysis & Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors: Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing sector. This method was developed through the cooperation of the many organizations and the individuals involved from the chemical sector RAMCAP development activities. The RAMCAP SVA method is intended to provide a common basis for making vulnerability assessments and risk-based decisions for homeland security. Mr. Moore serves as the coordinator for the chemical manufacturing, petroleum refining, and LNG sectors for the RAMCAP project and Dr. Jones is the chief technology officer for ASME-ITI, LLC for RAMCAP.
African American adolescent perceptions of vulnerability and resilience to HIV.
Glenn, Betty L; Wilson, Kathleen P
2008-07-01
HIV/AIDS is growing at a disproportional rate among African American adolescents. This trend has occurred despite the fact that 89% of schools have educational programs on HIV/AIDS. Barriers to effective HIV prevention may be related to a failure to develop educational programs based on the cultural competencies of vulnerable populations such as adolescents who are at risk for HIV. The purpose of this qualitative study was to explore African American adolescent perceptions of vulnerability and resilience to HIV/AIDS within a cultural competency paradigm. A group of 8 adolescents at an African American church participated in a focus group to discuss vulnerability and resilience to HIV. To facilitate discussion, the adolescents developed collages from pictures in African American magazines. Content analysis was used to identify themes. The themes revealed were confidence, safe social activities, innocence, image, music/drug culture, and peer pressure.
Statistics of software vulnerability detection in certification testing
NASA Astrophysics Data System (ADS)
Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.
2018-05-01
The paper discusses practical aspects of introduction of the methods to detect software vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the approval results of the vulnerability detection methods as part of the study of the open source software and the software that is a test object of the certification tests under information security requirements, including software for communication networks. Results of the study showing the allocation of identified vulnerabilities by types of attacks, country of origin, programming languages used in the development, methods for detecting vulnerability, etc. are given. The experience of foreign information security certification systems related to the detection of certified software vulnerabilities is analyzed. The main conclusion based on the study is the need to implement practices for developing secure software in the development life cycle processes. The conclusions and recommendations for the testing laboratories on the implementation of the vulnerability analysis methods are laid down.
ERIC Educational Resources Information Center
Bourke, Alan; Jayman, Alison Jenkins
2011-01-01
This article utilizes interview data to explore how notions of risk operate in a school-university partnership program. Our analysis traces the divergence between conceptualizations of "at-risk" in scholarship, its use in policy, and students' responses to this terminology. Although students targeted in such programs are often…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.
2009-10-14
The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators ofmore » the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It also needs to address important security/vulnerability topics, such as physical security, cyber security, systems analysis, and dependencies and interdependencies. This report provides an overview of the approach being developed to estimate vulnerability and provide vulnerability comparisons for sectors and subsectors. the information will be used to assist DHS in analyzing existing protective measures and vulnerability at facilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator receives an analysis of the data collected for a specific asset, showing a comparison between the facility's protection posture/vulnerability index and those of DHS sector/subsector sites visited. This comparison gives the owner/operator an indication of the asset's security strengths and weaknesses that may be contributing factors to its vulnerability and protection posture. The information provided to the owner/operator shows how the asset compares to other similar assets within the asset's sector or subsector. A 'dashboard' display is used to illustrate the results in a convenient format. The dashboard allows the owner/operator to analyze the implementation of additional protective measures and to illustrate how such actions would impact the asset's Protective Measures Index (PMI) or Vulnerability Index (VI).« less
Illustrating the coupled human-environment system for vulnerability analysis: three case studies.
Turner, B L; Matson, Pamela A; McCarthy, James J; Corell, Robert W; Christensen, Lindsey; Eckley, Noelle; Hovelsrud-Broda, Grete K; Kasperson, Jeanne X; Kasperson, Roger E; Luers, Amy; Martello, Marybeth L; Mathiesen, Svein; Naylor, Rosamond; Polsky, Colin; Pulsipher, Alexander; Schiller, Andrew; Selin, Henrik; Tyler, Nicholas
2003-07-08
The vulnerability framework of the Research and Assessment Systems for Sustainability Program explicitly recognizes the coupled human-environment system and accounts for interactions in the coupling affecting the system's responses to hazards and its vulnerability. This paper illustrates the usefulness of the vulnerability framework through three case studies: the tropical southern Yucatán, the arid Yaqui Valley of northwest Mexico, and the pan-Arctic. Together, these examples illustrate the role of external forces in reshaping the systems in question and their vulnerability to environmental hazards, as well as the different capacities of stakeholders, based on their access to social and biophysical capital, to respond to the changes and hazards. The framework proves useful in directing attention to the interacting parts of the coupled system and helps identify gaps in information and understanding relevant to reducing vulnerability in the systems as a whole.
NASA Astrophysics Data System (ADS)
Formisano, Antonio; Ciccone, Giuseppe; Mele, Annalisa
2017-11-01
This paper investigates about the seismic vulnerability and risk of fifteen masonry churches located in the historical centre of Naples. The used analysis method is derived from a procedure already implemented by the University of Basilicata on the churches of Matera. In order to evaluate for the study area the seismic vulnerability and hazard indexes of selected churches, the use of appropriate technical survey forms is done. Data obtained from applying the employed procedure allow for both plotting of vulnerability maps and providing seismic risk indicators of all churches. The comparison among the indexes achieved allows for the evaluation of the health state of inspected churches so to program a priority scale in performing future retrofitting interventions.
US Industrial Base Dependence/Vulnerability. Phase 2. Analysis
1987-11-01
widest range of prospec- tive bidders on his program--ino IudIng Japanese, Israeli, Korean, Brazilian, et cetera. The program manager clearly cannot...nuclear weapons did not do away with the previous force structure), or 2) a major war (we did get rid of the horse cavalry in WWII). However, it is...ion arrangements with NATO Allies. a program manager would seek the bidders on his program--I no Iuding Mian, et cetera. The program
The USEPA's Regional Vulnerability Assessment (ReVA) program was created to advance the scientific basis for protecting vulnerable ecosystems at a regional scale. As a first step, the ReVa program will coordinate, communicate and perform complex research that will identify vulner...
Moodie, Marjory L; Fisher, Jane
2009-01-30
The Big Brothers Big Sisters (BBBS) program matches vulnerable young people with a trained, supervised adult volunteer as mentor. The young people are typically seriously disadvantaged, with multiple psychosocial problems. Threshold analysis was undertaken to determine whether investment in the program was a worthwhile use of limited public funds. The potential cost savings were based on US estimates of life-time costs associated with high-risk youth who drop out-of-school and become adult criminals. The intervention was modelled for children aged 10-14 years residing in Melbourne in 2004. If the program serviced 2,208 of the most vulnerable young people, it would cost AUD 39.5 M. Assuming 50% were high-risk, the associated costs of their adult criminality would be AUD 3.3 billion. To break even, the program would need to avert high-risk behaviours in only 1.3% (14/1,104) of participants. This indicative evaluation suggests that the BBBS program represents excellent 'value for money'.
MID-ATLANTIC REGIONAL VULNERABILITY ASSESSMENT
ORD's Regional Vulnerability Assessment (REVA) Program is developing and demonstrating approaches to assess current and future environmental vulnerabilities so that risk management activities can be targeted. The sister program to EMA.P (Environmental Monitoring Assessment Progr...
Montenegro, Diego; Cunha, Ana Paula da; Ladeia-Andrade, Simone; Vera, Mauricio; Pedroso, Marcel; Junqueira, Angela
2017-10-01
Chagas disease (CD), caused by the protozoan Trypanosoma cruzi, is a neglected human disease. It is endemic to the Americas and is estimated to have an economic impact, including lost productivity and disability, of 7 billion dollars per year on average. To assess vulnerability to vector-borne transmission of T. cruzi in domiciliary environments within an area undergoing domiciliary vector interruption of T. cruzi in Colombia. Multi-criteria decision analysis [preference ranking method for enrichment evaluation (PROMETHEE) and geometrical analysis for interactive assistance (GAIA) methods] and spatial statistics were performed on data from a socio-environmental questionnaire and an entomological survey. In the construction of multi-criteria descriptors, decision-making processes and indicators of five determinants of the CD vector pathway were summarily defined, including: (1) house indicator (HI); (2) triatominae indicator (TI); (3) host/reservoir indicator (Ho/RoI); (4) ecotope indicator (EI); and (5) socio-cultural indicator (S-CI). Determination of vulnerability to CD is mostly influenced by TI, with 44.96% of the total weight in the model, while the lowest contribution was from S-CI, with 7.15%. The five indicators comprise 17 indices, and include 78 of the original 104 priority criteria and variables. The PROMETHEE and GAIA methods proved very efficient for prioritisation and quantitative categorisation of socio-environmental determinants and for better determining which criteria should be considered for interrupting the man-T. cruzi-vector relationship in endemic areas of the Americas. Through the analysis of spatial autocorrelation it is clear that there is a spatial dependence in establishing categories of vulnerability, therefore, the effect of neighbors' setting (border areas) on local values should be incorporated into disease management for establishing programs of surveillance and control of CD via vector. The study model proposed here is flexible and can be adapted to various eco-epidemiological profiles and is suitable for focusing anti-T. cruzi serological surveillance programs in vulnerable human populations.
Beletsky, Leo; Thomas, Rachel; Smelyanskaya, Marina; Artamonova, Irina; Shumskaya, Natalya; Dooronbekova, Aijan; Mukambetov, Aibek; Doyle, Heather; Tolson, Rebecca
2012-12-15
Police activities shape behavior and health outcomes among drug users, sex workers, and other vulnerable groups. Interventions to change the policing of drug consumption and sex work in ways that facilitate public health programming and respect for human rights have included policy reforms, education, and litigation. In 2009, the Kyrgyz government promulgated "Instruction 417," prohibiting police interference with "harm reduction" programs, re-enforcing citizen rights, addressing police occupational safety concerns, and institutionalizing police-public health collaboration. Although ample evidence points to gaps between intended and actual impact of policy and other structural interventions, there is little research on the impact of initiatives designed to align policing, health, and human rights. We conducted a police officer survey to assess links between Instruction 417 knowledge and legal and public health knowledge, attitudes towards harm reduction programs, and intended practices targeting vulnerable groups. In a 319-officer sample, 79% understood key due process regulations, 71.1% correctly characterized law on sex work, 54.3% understood syringe possession law, while only 44.4% reported familiarity with Instruction 417. Most (72.9%) expressed positive attitudes toward condom distribution, while only 56% viewed syringe access favorably. Almost half (44%) agreed that police should refer vulnerable groups to disease prevention programs, but only 20% reported doing so. In multivariate analysis, knowledge of Instruction 417 was associated with significantly better knowledge about (aOR=1.84, 95%CI: 1.12-3.00) and attitudes towards harm reduction programs (aOR=3.81, 95%CI:1.35-10.75), and knowledge of due process for the detention of sex workers (aOR=2.53, 95%CI:1.33-4.80). Younger, junior officers and those in rural areas may not be well-informed about the policy. While reflecting positively on Instruction 417 as a structural approach to aligning policing and public health, this analysis highlights gaps in policy dissemination and calls for further research to assess street-level impact of interventions on the health and human rights environment for vulnerable groups. Copyright © 2012 Beletsky et al. This is an open access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
What Climate Information Do Water Managers Need to Make Robust, Long-Term Plans?
NASA Astrophysics Data System (ADS)
Duran, R.; Lempert, R.; Groves, D.
2008-12-01
What climate information do water managers need to respond to threat of climate change? Southern California's Inland Empire Utilities Agency (IEUA) completed a long-range water resource management plan in 2005 that addressed expected economic and population growth in their service region, but did not consider the potential impacts of climate change. Using a robust decision making (RDM) approach for policy under deep uncertainty, we recently worked with IEUA to conduct a climate-change vulnerability and response options analysis of the agency's long-range plans. This analysis suggests that IEUA is vulnerable to future climate change, but can significantly reduce this vulnerability by increasing their near-term conservation programs and careful monitoring and updating to adjust their plan in the years ahead. In addition to helping IEUA, this analysis provides important guidance on the types of climate and other information that can be most useful for water managers as they attempt to take robust, near-term actions to increaase their resilience to climate change.
Mapping the groundwater vulnerability for pollution at the pan African scale.
Ouedraogo, Issoufou; Defourny, Pierre; Vanclooster, Marnik
2016-02-15
We estimated vulnerability and pollution risk of groundwater at the pan-African scale. We therefore compiled the most recent continental scale information on soil, land use, geology, hydrogeology and climate in a Geographical Information System (GIS) at a resolution of 15 km × 15 km and at the scale of 1:60,000,000. The groundwater vulnerability map was constructed by means of the DRASTIC method. The map reveals that groundwater is highly vulnerable in Central and West Africa, where the watertable is very low. In addition, very low vulnerability is found in the large sedimentary basins of the African deserts where groundwater is situated in very deep aquifers. The groundwater pollution risk map is obtained by overlaying the DRASTIC vulnerability map with land use. The northern, central and western part of the African continent is dominated by high pollution risk classes and this is very strongly related to shallow groundwater systems and the development of agricultural activities. Subsequently, we performed a sensitivity analysis to evaluate the relative importance of each parameter on groundwater vulnerability and pollution risk. The sensitivity analysis indicated that the removal of the impact of vadose zone, the depth of the groundwater, the hydraulic conductivity and the net recharge causes a large variation in the mapped vulnerability and pollution risk. The mapping model was validated using nitrate concentration data of groundwater as a proxy of pollution risk. Pan-African concentration data were inferred from a meta-analysis of literature data. Results shows a good match between nitrate concentration and the groundwater pollution risk classes. The pan African assessment of groundwater vulnerability and pollution risk is expected to be of particular value for water policy and for designing groundwater resources management programs. We expect, however, that this assessment can be strongly improved when better pan African monitoring data related to groundwater pollution will be integrated in the assessment methodology. Copyright © 2015 Elsevier B.V. All rights reserved.
Failure Modes and Effects Analysis (FMEA): A Bibliography
NASA Technical Reports Server (NTRS)
2000-01-01
Failure modes and effects analysis (FMEA) is a bottom-up analytical process that identifies process hazards, which helps managers understand vulnerabilities of systems, as well as assess and mitigate risk. It is one of several engineering tools and techniques available to program and project managers aimed at increasing the likelihood of safe and successful NASA programs and missions. This bibliography references 465 documents in the NASA STI Database that contain the major concepts, failure modes or failure analysis, in either the basic index of the major subject terms.
Ranebennur, Virupax; Gaikwad, Sanjeevsingh; Ramesh, Sowmya; Bhende, Amrita
2014-01-01
It is important for targeted interventions to consider vulnerabilities of female sex workers (FSWs) such as poverty, work-related mobility, and literacy, for effective human immunodeficiency virus (HIV) prevention. This paper describes and examines the association of the Aastha HIV/sexually transmitted infection (STI) prevention project in Mumbai and Thane, India, on the relationship between vulnerability and behavioral outcomes. Data were drawn from the Behavioural Tracking Survey, a cross-sectional behavioral study conducted in 2010 with 2,431 FSWs recruited in Mumbai and Thane. The key independent measures used were program exposure and "vulnerability index", a composite index of literacy, factors of dependence (alternative livelihood options, current debt, and children), and aspects of sex work (mobility and duration in sex work). Dependent measures included service uptake, self-confidence, self-identity, and individual agency. Logistic regression analysis was used to examine the study objectives. Of the analytical sample of 2,431 FSWs, 1,295 (53.3%) were categorized as highly vulnerable. Highly vulnerable FSWs who were associated with the Aastha program for more than a year were more likely to have accessed crisis-response services in the past 6 months (adjusted odds ratio [AOR] 2.2, 95% confidence interval [CI] 1.4-3.6; P<0.001), to have visited a clinic to get a checkup for STI symptoms (AOR 2.4, 95% CI 1.2-4.8; P<0.015), not to be ashamed to disclose identity as an FSW to health workers (AOR 2.1, 95% CI 1.2-3.5; P<0.008), and to be confident in supporting a fellow FSW in crisis (AOR 1.7, 95% CI 1.0-2.8, P<0.033) compared to those less vulnerable with similar exposure to the Aastha program. It is critical for HIV/STI interventions to consider vulnerabilities of FSWs at project inception and address them with focused strategies, including a segmented service-delivery model and community involvement, in order to strengthen the structural response to HIV prevention.
Ranebennur, Virupax; Gaikwad, Sanjeevsingh; Ramesh, Sowmya; Bhende, Amrita
2014-01-01
Background It is important for targeted interventions to consider vulnerabilities of female sex workers (FSWs) such as poverty, work-related mobility, and literacy, for effective human immunodeficiency virus (HIV) prevention. This paper describes and examines the association of the Aastha HIV/sexually transmitted infection (STI) prevention project in Mumbai and Thane, India, on the relationship between vulnerability and behavioral outcomes. Materials and methods Data were drawn from the Behavioural Tracking Survey, a cross-sectional behavioral study conducted in 2010 with 2,431 FSWs recruited in Mumbai and Thane. The key independent measures used were program exposure and “vulnerability index”, a composite index of literacy, factors of dependence (alternative livelihood options, current debt, and children), and aspects of sex work (mobility and duration in sex work). Dependent measures included service uptake, self-confidence, self-identity, and individual agency. Logistic regression analysis was used to examine the study objectives. Results Of the analytical sample of 2,431 FSWs, 1,295 (53.3%) were categorized as highly vulnerable. Highly vulnerable FSWs who were associated with the Aastha program for more than a year were more likely to have accessed crisis-response services in the past 6 months (adjusted odds ratio [AOR] 2.2, 95% confidence interval [CI] 1.4–3.6; P<0.001), to have visited a clinic to get a checkup for STI symptoms (AOR 2.4, 95% CI 1.2–4.8; P<0.015), not to be ashamed to disclose identity as an FSW to health workers (AOR 2.1, 95% CI 1.2–3.5; P<0.008), and to be confident in supporting a fellow FSW in crisis (AOR 1.7, 95% CI 1.0–2.8, P<0.033) compared to those less vulnerable with similar exposure to the Aastha program. Conclusion It is critical for HIV/STI interventions to consider vulnerabilities of FSWs at project inception and address them with focused strategies, including a segmented service-delivery model and community involvement, in order to strengthen the structural response to HIV prevention. PMID:24600249
59th Medical Wing Protection of Vulnerable Populations: Ombudsman Program
2018-04-20
REPORT TYPE 20/04/2018 poster 4. TITLE AND SUBTITLE 59th Medical Wing Protection of Vulnerable Populations: Ombudsman Program 6. AUTHOR(S...requirements that build upon protections provided by the common rule. The purpose of this poster is to 1) describe DoD vulnerable populations-BMT, students
THE US EPA'S REGIONAL VULNERABILITY ASSESSMENT PROGRAM: A RESEARCH STRATEGY FOR 2001-2006
The goal of ORD's Regional Vulnerability Assessment (ReVA) Program is to develop all
approach to quantifying regional ecological vulnerabilities so that risk management activities can be targeted and prioritized. ReVA's focus is, to develop a set of methods that are applica...
Vulnerabilities in snakebites in Sao Paulo, Brazil.
Bertolozzi, Maria Rita; Scatena, Camila Morato da Conceição; França, Francisco Oscar de Siqueira
2015-01-01
To describe elements of vulnerability of victims of snakebite. This qualitative, descriptive, cross-sectional study had, as theoretical framework, the concept of vulnerability in individual, social, and programmatic dimensions. We interviewed 21 patients admitted into a hospital specialized in the care of accidents caused by venomous animals. The interviews were analyzed according to a discourse analysis technique. Patients were mainly young men, living in remote countryside areas, where health services frequently have limited resources. We found social and individual conditions of vulnerability, such as precarious schooling, low professional qualification, housing without access to piped water, no sewage treated, and no regular garbage collection, and lack of knowledge on this health problem. Regarding the programmatic dimension, we found limited accessibility to the health services that could affect the prognosis and the frequency of sequelae and deaths. Considering such vulnerabilities evoke the need to improve the program for control the Accidents by Venomous Animals and the training of health workers, we highlight the potential use of the concept of vulnerability, which may amplify the understanding and the recommendations for the practice and education related to snakebites.
Vulnerabilities in snakebites in Sao Paulo, Brazil
Bertolozzi, Maria Rita; Scatena, Camila Morato da Conceição; França, Francisco Oscar de Siqueira
2015-01-01
ABSTRACT OBJECTIVE To describe elements of vulnerability of victims of snakebite. METHODS This qualitative, descriptive, cross-sectional study had, as theoretical framework, the concept of vulnerability in individual, social, and programmatic dimensions. We interviewed 21 patients admitted into a hospital specialized in the care of accidents caused by venomous animals. The interviews were analyzed according to a discourse analysis technique. RESULTS Patients were mainly young men, living in remote countryside areas, where health services frequently have limited resources. We found social and individual conditions of vulnerability, such as precarious schooling, low professional qualification, housing without access to piped water, no sewage treated, and no regular garbage collection, and lack of knowledge on this health problem. Regarding the programmatic dimension, we found limited accessibility to the health services that could affect the prognosis and the frequency of sequelae and deaths. CONCLUSIONS Considering such vulnerabilities evoke the need to improve the program for control the Accidents by Venomous Animals and the training of health workers, we highlight the potential use of the concept of vulnerability, which may amplify the understanding and the recommendations for the practice and education related to snakebites. PMID:26603351
Augmenting Traditional Static Analysis With Commonly Available Metadata
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cook, Devin
Developers and security analysts have been using static analysis for a long time to analyze programs for defects and vulnerabilities with some success. Generally a static analysis tool is run on the source code for a given program, flagging areas of code that need to be further inspected by a human analyst. These areas may be obvious bugs like potential bu er over flows, information leakage flaws, or the use of uninitialized variables. These tools tend to work fairly well - every year they find many important bugs. These tools are more impressive considering the fact that they only examinemore » the source code, which may be very complex. Now consider the amount of data available that these tools do not analyze. There are many pieces of information that would prove invaluable for finding bugs in code, things such as a history of bug reports, a history of all changes to the code, information about committers, etc. By leveraging all this additional data, it is possible to nd more bugs with less user interaction, as well as track useful metrics such as number and type of defects injected by committer. This dissertation provides a method for leveraging development metadata to find bugs that would otherwise be difficult to find using standard static analysis tools. We showcase two case studies that demonstrate the ability to find 0day vulnerabilities in large and small software projects by finding new vulnerabilities in the cpython and Roundup open source projects.« less
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...-risk, the facility must complete a Security Vulnerability Assessment. A Security Vulnerability...
Montenegro, Diego; da Cunha, Ana Paula; Ladeia-Andrade, Simone; Vera, Mauricio; Pedroso, Marcel; Junqueira, Angela
2017-01-01
BACKGROUND Chagas disease (CD), caused by the protozoan Trypanosoma cruzi, is a neglected human disease. It is endemic to the Americas and is estimated to have an economic impact, including lost productivity and disability, of 7 billion dollars per year on average. OBJECTIVES To assess vulnerability to vector-borne transmission of T. cruzi in domiciliary environments within an area undergoing domiciliary vector interruption of T. cruzi in Colombia. METHODS Multi-criteria decision analysis [preference ranking method for enrichment evaluation (PROMETHEE) and geometrical analysis for interactive assistance (GAIA) methods] and spatial statistics were performed on data from a socio-environmental questionnaire and an entomological survey. In the construction of multi-criteria descriptors, decision-making processes and indicators of five determinants of the CD vector pathway were summarily defined, including: (1) house indicator (HI); (2) triatominae indicator (TI); (3) host/reservoir indicator (Ho/RoI); (4) ecotope indicator (EI); and (5) socio-cultural indicator (S-CI). FINDINGS Determination of vulnerability to CD is mostly influenced by TI, with 44.96% of the total weight in the model, while the lowest contribution was from S-CI, with 7.15%. The five indicators comprise 17 indices, and include 78 of the original 104 priority criteria and variables. The PROMETHEE and GAIA methods proved very efficient for prioritisation and quantitative categorisation of socio-environmental determinants and for better determining which criteria should be considered for interrupting the man-T. cruzi-vector relationship in endemic areas of the Americas. Through the analysis of spatial autocorrelation it is clear that there is a spatial dependence in establishing categories of vulnerability, therefore, the effect of neighbors’ setting (border areas) on local values should be incorporated into disease management for establishing programs of surveillance and control of CD via vector. CONCLUSIONS The study model proposed here is flexible and can be adapted to various eco-epidemiological profiles and is suitable for focusing anti-T. cruzi serological surveillance programs in vulnerable human populations. PMID:28953999
Impact of the Social Café Meals program: a qualitative investigation.
Allen, Louise; O'Connor, Jacklin; Amezdroz, Emily; Bucello, Pieta; Mitchell, Hannah; Thomas, Arabella; Kleve, Sue; Bernardi, Anthony; Wallis, Liza; Palermo, Claire
2014-01-01
Social Café Meals Programs aim to reduce food insecurity and social exclusion by providing participants access to subsidised meals in mainstream local cafés. This study aimed to explore the program's ability to address social exclusion and food insecurity and the impact of the program on the community. A qualitative evaluation approach was utilised whereby in-depth interviews were conducted with café owners, café staff and current program members of two Social Café Meals Programs operating in the south-eastern suburbs of Melbourne. Twelve program members and six café staff completed an in-depth interview at the local cafés. Data were analysed using a thematic analysis approach focusing on the lived experience of the café owners, staff and program members. Four key themes were identified. The program (i) improved food access for vulnerable groups and (ii) created community cohesiveness. (iii) The café environment was important in facilitating program use by community members. (iv) Café owners felt rewarded for their community contribution via the program. Social Café Meals Programs may provide a solution to improving food security and reducing social exclusion and may be considered as a strategy for improving nutrition and social health for at-risk and vulnerable groups.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, R.C.
1983-01-13
This report is a compilation of abstracts resulting from a literature search of reports relevant to Sentry Ballistic missile system C3 vulnerability and hardness. Primary sources consulted were the DOD Nuclear Information Analysis Center (DASIAC) and the Defense Technical Information Center (DTIC). Approximately 175 reports were reviewed and abstracted, including several related to computer programs for estimating nuclear effects on electromagnetic propagation. The reports surveyed were ranked in terms of their importance for Sentry C3 VandH issues.
Moret, Whitney M
2018-03-21
Economic strengthening practitioners are increasingly seeking data collection tools that will help them target households vulnerable to HIV and poor child well-being outcomes, match households to appropriate interventions, monitor their status, and determine readiness for graduation from project support. This article discusses efforts in 3 countries to develop simple, valid tools to quantify and classify economic vulnerability status. In Côte d'Ivoire, we conducted a cross-sectional survey with 3,749 households to develop a scale based on the definition of HIV-related economic vulnerability from the U.S. President's Emergency Plan for AIDS Relief (PEPFAR) for the purpose of targeting vulnerable households for PEPFAR-funded programs for orphans and vulnerable children. The vulnerability measures examined did not cluster in ways that would allow for the creation of a small number of composite measures, and thus we were unable to develop a scale. In Uganda, we assessed the validity of a vulnerability index developed to classify households according to donor classifications of economic status by measuring its association with a validated poverty measure, finding only a modest correlation. In South Africa, we developed monitoring and evaluation tools to assess economic status of individual adolescent girls and their households. We found no significant correlation with our validation measures, which included a validated measure of girls' vulnerability to HIV, a validated poverty measure, and subjective classifications generated by the community, data collector, and respondent. Overall, none of the measures of economic vulnerability used in the 3 countries varied significantly with their proposed validation items. Our findings suggest that broad constructs of economic vulnerability cannot be readily captured using simple scales to classify households and individuals in a way that accounts for a substantial amount of variance at locally defined vulnerability levels. We recommend that researchers and implementers design monitoring and evaluation instruments to capture narrower definitions of vulnerability based on characteristics programs intend to affect. We also recommend using separate tools for targeting based on context-specific indicators with evidence-based links to negative outcomes. Policy makers and donors should avoid reliance on simplified metrics of economic vulnerability in the programs they support. © Moret.
Usability of a Novel Mobile Health iPad App by Vulnerable Populations.
Miller, David P; Weaver, Kathryn E; Case, L Doug; Babcock, Donald; Lawler, Donna; Denizard-Thompson, Nancy; Pignone, Michael P; Spangler, John G
2017-04-11
Recent advances in mobile technologies have created new opportunities to reach broadly into populations that are vulnerable to health disparities. However, mobile health (mHealth) strategies could paradoxically increase health disparities, if low socioeconomic status individuals lack the technical or literacy skills needed to navigate mHealth programs. The aim of this study was to determine whether patients from vulnerable populations could successfully navigate and complete an mHealth patient decision aid. We analyzed usability data from a randomized controlled trial of an iPad program designed to promote colorectal cancer (CRC) screening. The trial was conducted in six primary care practices and enrolled 450 patients, aged 50-74 years, who were due for CRC screening. The iPad program included a self-survey and randomly displayed either a screening decision aid or a video about diet and exercise. We measured participant ability to complete the program without assistance and participant-rated program usability. Two-thirds of the participants (305/450) were members of a vulnerable population (limited health literacy, annual income < US $20,000, or black race). Over 92% (417/450) of the participants rated the program highly on all three usability items (90.8% for vulnerable participants vs 96.6% for nonvulnerable participants, P=.006). Only 6.9% (31/450) of the participants needed some assistance to complete the program. In multivariable logistic regression, being a member of a vulnerable population was not associated with needing assistance. Only older age, less use of text messaging (short message service, SMS), and lack of Internet use predicted needing assistance. Individuals who are vulnerable to health disparities can successfully use well-designed mHealth programs. Future research should investigate whether mHealth interventions can reduce health disparities. ©David P Miller Jr, Kathryn E Weaver, L Doug Case, Donald Babcock, Donna Lawler, Nancy Denizard-Thompson, Michael P Pignone, John G Spangler. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 11.04.2017.
Loue, Sana; Loff, Bebe
2014-01-01
Vulnerability of participants in research and the provision of special protections for vulnerable research participants are key concepts in research ethics. Despite international consensus requiring special protections for vulnerable research participants, both the concept of vulnerability and the nature and adequacy of strategies to reduce vulnerability remain vague and, consequently, are subject to varying interpretations. We report on observations of the challenges faced in understanding this key concept by 20 Russian and Romanian trainees participating in a one-year M.A. training program in research ethics from 2000 through 2011. We describe how trainees’ understanding of and appreciation for the need for special protections of vulnerable research participants was nurtured. This paper is part of a collection of papers analyzing the Fogarty International Center's International Research Ethics Education and Curriculum Development program. PMID:24384513
ERIC Educational Resources Information Center
Hermens, Niels; Super, Sabina; Verkooijen, Kirsten T.; Koelen, Maria A.
2017-01-01
Purpose: Despite the strong belief in sports programs as a setting in which socially vulnerable youth can develop life skills, no overview exists of life skill development in sports programs serving this youth group. Therefore, the present systematic review provides an overview of the evidence on life skill development in sports programs serving…
Vulnerability assessment of atmospheric environment driven by human impacts.
Zhang, Yang; Shen, Jing; Ding, Feng; Li, Yu; He, Li
2016-11-15
Atmospheric environment quality worsening is a substantial threat to public health worldwide, and in many places, air pollution due to the intensification of the human activity is increasing dramatically. However, no studies have been investigated the integration of vulnerability assessment and atmospheric environment driven by human impacts. The objective of this study was to identify and prioritize the undesirable environmental changes as an early warning system for environment managers and decision makers in term of human, atmospheric environment, and social economic elements. We conduct a vulnerability assessment method of atmospheric environment associated with human impact, this method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators under the Exposure-Sensitivity- Adaptive Capacity (ESA) framework. Decision makers can find out relevant vulnerability assessment results with different vulnerable attitudes. In the Beijing-Tianjin-Hebei (BTH) region, China, we further applied this developed method and proved it to be reliable and consistent with the China Environmental Status Bulletin. Results indicate that the vulnerability of atmospheric environment in the BTH region is not optimistic, and environment managers should do more about air pollution. Thus, the most appropriate strategic decision and development program of city or state can be picked out assisting by the vulnerable results. Copyright © 2016 Elsevier B.V. All rights reserved.
Rethinking vulnerability analysis and governance with emphasis on a participatory approach.
Rossignol, Nicolas; Delvenne, Pierre; Turcanu, Catrinel
2015-01-01
This article draws on vulnerability analysis as it emerged as a complement to classical risk analysis, and it aims at exploring its ability for nurturing risk and vulnerability governance actions. An analysis of the literature on vulnerability analysis allows us to formulate a three-fold critique: first, vulnerability analysis has been treated separately in the natural and the technological hazards fields. This separation prevents vulnerability from unleashing the full range of its potential, as it constrains appraisals into artificial categories and thus already closes down the outcomes of the analysis. Second, vulnerability analysis focused on assessment tools that are mainly quantitative, whereas qualitative appraisal is a key to assessing vulnerability in a comprehensive way and to informing policy making. Third, a systematic literature review of case studies reporting on participatory approaches to vulnerability analysis allows us to argue that participation has been important to address the above, but it remains too closed down in its approach and would benefit from embracing a more open, encompassing perspective. Therefore, we suggest rethinking vulnerability analysis as one part of a dynamic process between opening-up and closing-down strategies, in order to support a vulnerability governance framework. © 2014 Society for Risk Analysis.
Hermens, Niels; Super, Sabina; Verkooijen, Kirsten T; Koelen, Maria A
2017-12-01
Despite the strong belief in sports programs as a setting in which socially vulnerable youth can develop life skills, no overview exists of life skill development in sports programs serving this youth group. Therefore, the present systematic review provides an overview of the evidence on life skill development in sports programs serving socially vulnerable youth and, insofar as it was investigated in the included studies, of the conditions conducive to life skill development in these sports programs. Potentially relevant studies published during 1990 to 2014 were identified by a search in 7 electronic databases. The search combined terms relating to (a) sport, (b) youth AND socially vulnerable, and (c) life skills. Eighteen of the 2,076 unique studies met the inclusion criteria. Each included study reported that at least 1 life skill improved in youth who participated in the studied sports program. Improvements in cognitive and social life skills were more frequently reported than were improvements in emotional life skills. Only a few of the included studies investigated the conditions in the studied sports programs that made these programs conducive to life skill development. Sports programs have the potential to make a difference in the life skill development of socially vulnerable youth. This conclusion needs to be treated with some caution, because the studies experienced many challenges in reducing the risk for bias. Several alternative research strategies are suggested for future studies in this field.
SOCIAL STABILITY AND HIV RISK BEHAVIOR: EVALUATING THE ROLE OF ACCUMULATED VULNERABILITY
German, Danielle; Latkin, Carl A.
2011-01-01
This study evaluated a cumulative and syndromic relationship among commonly co-occurring vulnerabilites (homelessness, incarceration, low-income, residential transition) in association with HIV-related risk behaviors among 635 low-income women in Baltimore. Analysis included descriptive statistics, logistic regression, latent class analysis and latent class regression. Both methods of assessing multidimensional instability showed significant associations with risk indicators. Risk of multiple partners, sex exchange, and drug use decreased significantly with each additional domain. Higher stability class membership (77%) was associated with decreased likelihood of multiple partners, exchange partners, recent drug use, and recent STI. Multidimensional social vulnerabilities were cumulatively and synergistically linked to HIV risk behavior. Independent instability measures may miss important contextual determinants of risk. Social stability offers a useful framework to understand the synergy of social vulnerabilities that shape sexual risk behavior. Social policies and programs aiming to enhance housing and overall social stability are likely to be beneficial for HIV prevention. PMID:21259043
Boroumandfar, Zahra; Kianpour, Masoud; Zargham, Ali; Abdoli, Samereh; Tayeri, Katayoun; Salehi, Mehrdad; Momeni, Godratollah; Khorvash, Farzin
2017-01-01
The first step in health education is awareness of the people and their acceptance to change their behavior. Therefore, the aim of this study was to investigate the effects of empowerment program towards the concept of self-care and prevention of sexually transmitted diseases (STDs) in women at risk of STDs. The present study was conducted as a qualitative approach (step of action and observation of an action) by using conventional content analysis method. An empowerment program regarding STDs (Action) was performed among 32 (with convenient sample) drug user women with addicted husbands referring to the counseling center for vulnerable women (drop in enter) in Isfahan in 2015. The knowledge of quiddity, transmission, and prevention of STDs, as well as some items of life skills such as self-awareness, interpersonal communication, and assertive behavior were taught in an educational program. Teaching methods were lectures, group, and individual training and role play. The impact of the program on modified belief and behavior change regarding STDs was evaluated with structured interviews. Analysis of the obtained results yielded three categories. The categories were awareness of STD, believing in being at risk, and decision and change. Promoting self-care and prevention through education programs based on action research can make a significant reduction in the incidence of problems and cause a behavior change in women with the disease or those at risk for STDs.
Multiple perspective vulnerability analysis of the power network
NASA Astrophysics Data System (ADS)
Wang, Shuliang; Zhang, Jianhua; Duan, Na
2018-02-01
To understand the vulnerability of the power network from multiple perspectives, multi-angle and multi-dimensional vulnerability analysis as well as community based vulnerability analysis are proposed in this paper. Taking into account of central China power grid as an example, correlation analysis of different vulnerability models is discussed. Then, vulnerabilities produced by different vulnerability metrics under the given vulnerability models and failure scenarios are analyzed. At last, applying the community detecting approach, critical areas of central China power grid are identified, Vulnerable and robust communities on both topological and functional perspective are acquired and analyzed. The approach introduced in this paper can be used to help decision makers develop optimal protection strategies. It will be also useful to give a multiple vulnerability analysis of the other infrastructure systems.
NASA Astrophysics Data System (ADS)
Hung, Hung-Chih; Liu, Yi-Chung; Chien, Sung-Ying
2015-04-01
1. Background Major portions of areas in Asia are expected to increase exposure and vulnerability to climate change and weather extremes due to rapid urbanization and overdevelopment in hazard-prone areas. To prepare and confront the potential impacts of climate change and related hazard risk, many countries have implemented programs of integrated river basin management. This has led to an impending challenge for the police-makers in many developing countries to build effective mechanism to assess how the vulnerability distributes over river basins, and to understand how the local vulnerability links to climatic (climate-related) hazard damages and risks. However, the related studies have received relatively little attention. This study aims to examine whether geographic localities characterized by high vulnerability experience significantly more damages owing to onset weather extreme events at the river basin level, and to explain what vulnerability factors influence these damages or losses. 2. Methods and data An indicator-based assessment framework is constructed with the goal of identifying composite indicators (including exposure, biophysical, socioeconomic, land-use and adaptive capacity factors) that could serve as proxies for attributes of local vulnerability. This framework is applied by combining geographical information system (GIS) techniques with multicriteria decision analysis (MCDA) to evaluate and map integrated vulnerability to climatic hazards across river basins. Furthermore, to explain the relationship between vulnerability factors and disaster damages, we develop a disaster damage model (DDM) based on existing disaster impact theory. We then synthesize a Zero-Inflated Poisson regression model with a Tobit regression analysis to identify and examine how the disaster impacts and vulnerability factors connect to typhoon disaster damages and losses. To illustrate the proposed methodology, the study collects data on the vulnerability attributes of the Kaoping, Tsengwen, and Taimali River basins in southern Taiwan, and on the disaster impacts and damages in these river basins due to Typhoon Morakot in 2009. The data was offered by the National Science and Technology Center for Disaster Reduction, Taiwan, as well as collected from the National Land Use Investigation, official census statistics and questionnaire surveys. 3. Results We use an MCDA to create a composite vulnerability index, and this index is incorporated into a GIS analysis to demonstrate the results of integrated vulnerability assessment throughout the river basins. Results of the vulnerability assessment indicate that the most vulnerable areas are almost all situated in the regions of middle and upper reaches of the river basins. Through the examining of DDM, it shows that the vulnerability factors play a critical role in determining disaster damages. Findings also present that the losses and casualties caused by Typhoon Morakot increase with elevation, urban and agricultural developments, proximity to rivers, and decrease with levels of income and adaptive capacity. Finally, we propose the adaptive options for minimizing vulnerability and risk, as well as for integrated river basin governance.
NASA Astrophysics Data System (ADS)
Scaini, C.; Felpeto, A.; Martí, J.; Carniel, R.
2014-05-01
This paper presents a GIS-based methodology to estimate damages produced by volcanic eruptions. The methodology is constituted by four parts: definition and simulation of eruptive scenarios, exposure analysis, vulnerability assessment and estimation of expected damages. Multi-hazard eruptive scenarios are defined for the Teide-Pico Viejo active volcanic complex, and simulated through the VORIS tool. The exposure analysis identifies the elements exposed to the hazard at stake and focuses on the relevant assets for the study area. The vulnerability analysis is based on previous studies on the built environment and complemented with the analysis of transportation and urban infrastructures. Damage assessment is performed associating a qualitative damage rating to each combination of hazard and vulnerability. This operation consists in a GIS-based overlap, performed for each hazardous phenomenon considered and for each element. The methodology is then automated into a GIS-based tool using an ArcGIS® program. Given the eruptive scenarios and the characteristics of the exposed elements, the tool produces expected damage maps. The tool is applied to the Icod Valley (North of Tenerife Island) which is likely to be affected by volcanic phenomena in case of eruption from both the Teide-Pico Viejo volcanic complex and North-West basaltic rift. Results are thematic maps of vulnerability and damage that can be displayed at different levels of detail, depending on the user preferences. The aim of the tool is to facilitate territorial planning and risk management in active volcanic areas.
Moret, Whitney M
2018-01-01
Introduction: Economic strengthening practitioners are increasingly seeking data collection tools that will help them target households vulnerable to HIV and poor child well-being outcomes, match households to appropriate interventions, monitor their status, and determine readiness for graduation from project support. This article discusses efforts in 3 countries to develop simple, valid tools to quantify and classify economic vulnerability status. Methods and Findings: In Côte d'Ivoire, we conducted a cross-sectional survey with 3,749 households to develop a scale based on the definition of HIV-related economic vulnerability from the U.S. President's Emergency Plan for AIDS Relief (PEPFAR) for the purpose of targeting vulnerable households for PEPFAR-funded programs for orphans and vulnerable children. The vulnerability measures examined did not cluster in ways that would allow for the creation of a small number of composite measures, and thus we were unable to develop a scale. In Uganda, we assessed the validity of a vulnerability index developed to classify households according to donor classifications of economic status by measuring its association with a validated poverty measure, finding only a modest correlation. In South Africa, we developed monitoring and evaluation tools to assess economic status of individual adolescent girls and their households. We found no significant correlation with our validation measures, which included a validated measure of girls' vulnerability to HIV, a validated poverty measure, and subjective classifications generated by the community, data collector, and respondent. Overall, none of the measures of economic vulnerability used in the 3 countries varied significantly with their proposed validation items. Conclusion: Our findings suggest that broad constructs of economic vulnerability cannot be readily captured using simple scales to classify households and individuals in a way that accounts for a substantial amount of variance at locally defined vulnerability levels. We recommend that researchers and implementers design monitoring and evaluation instruments to capture narrower definitions of vulnerability based on characteristics programs intend to affect. We also recommend using separate tools for targeting based on context-specific indicators with evidence-based links to negative outcomes. Policy makers and donors should avoid reliance on simplified metrics of economic vulnerability in the programs they support. PMID:29496734
ERIC Educational Resources Information Center
Hughes, Marcia; Joslyn, Allison; Wojton, Morella; O'Reilly, Mairead; Dworkin, Paul H.
2016-01-01
We employed principles from a nationally recognized prevention model on family support to investigate whether connecting vulnerable children to community-based programs and services through a statewide intervention system, the "Help Me Grow" program, strengthens parents' perceptions of protective factors. We used a parent survey modeled…
Southwest principal aquifers regional ground-water quality assessment
Anning, D.W.; Thiros, Susan A.; Bexfield, L.M.; McKinney, T.S.; Green, J.M.
2009-01-01
The National Water-Quality Assessment (NAWQA) Program of the U.S. Geological Survey is conducting a regional analysis of water quality in the principal aquifers in the southwestern United States. The Southwest Principal Aquifers (SWPA) study is building a better understanding of the susceptibility and vulnerability of basin-fill aquifers in the region to ground-water contamination by synthesizing the baseline knowledge of ground-water quality conditions in 15 basins previously studied by the NAWQA Program. The improved understanding of aquifer susceptibility and vulnerability to contamination is assisting in the development of tools that water managers can use to assess and protect the quality of ground-water resources. This fact sheet provides an overview of the basin-fill aquifers in the southwestern United States and description of the completed and planned regional analyses of ground-water quality being performed by the SWPA study.
A Shotline Method for Modeling Projectile Geometry
1986-06-01
by block number) GIFT Target Description Vulnerability Analysis COMGEOM Shotlining Warhead Lethality MISFIR 20. ABSTRACT fConfteue an r»r»r«» eUm It rt...target interaction is centered upon the program MISFIR, written in CDC Fortran 5. MISFIR is built on the formalisms of the GIFT (Geometric...a ray-tracing subroutine added to GIFT (viz. SHOTCYL); MISFIR itself, together with its subprograms; and an application program, called FUZES, which
Extensions and Adjuncts to the BRL-COMGEOM Program
1974-08-01
m MAGIC Code, GIFT Code, Computer Simulation, Target Description, Geometric Modeling Techniques, Vulnerability Analysis 20...Arbitrary Quadric Surf ace.. 0Oo „<>. 7 III. BRITL: A GEOMETRY PREPROCESSOR PROGRAM FOR INPUT TO THE GIFT SYSTEM „ 0 18 A. Introduction <, „. ° 18 B...the BRL- GIFT code. The tasks completed under this contract and described in the report are: Ao The addition to the list of available body types
Metrics for the National SCADA Test Bed Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.
2008-12-05
The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.
NASA Astrophysics Data System (ADS)
Najihah, R.; Effendi, D. M.; Hairunnisa, M. A.; Masiri, K.
2014-02-01
The catastrophic Indian Ocean tsunami of 26 December 2004 raised a number of questions for scientist and politicians on how to deal with the tsunami risk and assessment in coastal regions. This paper discusses the challenges in tsunami vulnerability assessment and presents the result of tsunami disaster mapping and vulnerability assessment study for West Coast of Peninsular Malaysia. The spatial analysis was carried out using Geographical Information System (GIS) technology to demarcate spatially the tsunami affected village's boundary and suitable disaster management program can be quickly and easily developed. In combination with other thematic maps such as road maps, rail maps, school maps, and topographic map sheets it was possible to plan the accessibility and shelter to the affected people. The tsunami vulnerability map was used to identify the vulnerability of villages/village population to tsunami. In the tsunami vulnerability map, the intensity of the tsunami was classified as hazard zones based on the inundation level in meter (contour). The approach produced a tsunami vulnerability assessment map consists of considering scenarios of plausible extreme, tsunami-generating events, computing the tsunami inundation levels caused by different events and scenarios and estimating the possible range of casualties for computing inundation levels. The study provides an interactive means to identify the tsunami affected areas after the disaster and mapping the tsunami vulnerable village before for planning purpose were the essential exercises for managing future disasters.
Food security and nutritional outcomes among urban poor orphans in Nairobi, Kenya.
Kimani-Murage, Elizabeth W; Holding, Penny A; Fotso, Jean-Christophe; Ezeh, Alex C; Madise, Nyovani J; Kahurani, Elizabeth N; Zulu, Eliya M
2011-06-01
The study examines the relationship between orphanhood status and nutritional status and food security among children living in the rapidly growing and uniquely vulnerable slum settlements in Nairobi, Kenya. The study was conducted between January and June 2007 among children aged 6-14 years, living in informal settlements of Nairobi, Kenya. Anthropometric measurements were taken using standard procedures and z scores generated using the NCHS/WHO reference. Data on food security were collected through separate interviews with children and their caregivers, and used to generate a composite food security score. Multiple regression analysis was done to determine factors related to vulnerability with regards to food security and nutritional outcomes. The results show that orphans were more vulnerable to food insecurity than non-orphans and that paternal orphans were the most vulnerable orphan group. However, these effects were not significant for nutritional status, which measures long-term food deficiencies. The results also show that the most vulnerable children are boys, those living in households with lowest socioeconomic status, with many dependants, and female-headed and headed by adults with low human capital (low education). This study provides useful insights to inform policies and practice to identify target groups and intervention programs to improve the welfare of orphans and vulnerable children living in urban poor communities.
EPA's Regional Vulnerability Assessment (ReVA) program is developing and testing approaches to conducting comparative environmental risk assessments at the regional scale, considering impacts to ecological human, and fiscal health endpoints. It seeks an objective and quantifiable...
Hindhede, Anette Lykke; Aagaard-Hansen, Jens
2017-03-01
This article provides an example of the application of social network analysis method to assess community participation thereby strengthening planning and implementation of health promotion programming. Community health promotion often takes the form of services that reach out to or are located within communities. The concept of community reflects the idea that people's behavior and well-being are influenced by interaction with others, and here, health promotion requires participation and local leadership to facilitate transmission and uptake of interventions for the overall community to achieve social change. However, considerable uncertainty exists over exact levels of participation in these interventions. The article draws on a mixed methods research within a community development project in a vulnerable neighborhood of a town in Denmark. It presents a detailed analysis of the way in which social network analysis can be used as a tool to display participation and nonparticipation in community development and health promotion activities, to help identify capacities and assets, mobilize resources, and finally to evaluate the achievements. The article concludes that identification of interpersonal ties among people who know one another well as well as more tenuous relationships in networks can be used by community development workers to foster greater cohesion and cooperation within an area.
Which Procedural Parts of the IEP Process Are the Most Judicially Vulnerable?
ERIC Educational Resources Information Center
Zirkel, Perry A.; Hetrick, Allyse
2017-01-01
To provide a missing piece to the legal foundation of professional development and practice for the individualized education program (IEP) process, the authors report the results of a comprehensive systematic analysis of court decisions specific to IEP-related procedural violations after the 2004 amendments of the Individuals With Disabilities…
Joel Ralston; David I. King; William V. DeLuca; Gerald J. Niemi; Michale J. Glennon; Judith C. Scarl; J. Daniel Lambert
2015-01-01
Continental-scale monitoring programs with standardized survey protocols play an important role in conservation science by identifying species in decline and prioritizing conservation action. However, rare, inaccessible, or spatially fragmented communities may be underrepresented in continental-scale surveys. Data on these communities often come from decentralized,...
Programmatic management of multidrug-resistant tuberculosis: models from three countries.
Furin, J; Bayona, J; Becerra, M; Farmer, P; Golubkov, A; Hurtado, R; Joseph, J K; Keshavjee, S; Ponomarenko, O; Rich, M; Shin, S
2011-10-01
Although multidrug-resistant tuberculosis (MDR-TB) is a major global health problem, there is a gap in programmatic treatment implementation. This study describes MDR-TB treatment models in three countries--Peru, Russia and Lesotho-- using qualitative data collected over a 13-year period. A program analysis is presented for each country focusing on baseline medical care, initial implementation and program evolution. A pattern analysis revealed six overarching themes common to all three programs: 1) importance of baseline assessments, 2) early identification of key collaborators, 3) identification of initial locus of care, 4) minimization of patient-incurred costs, 5) targeted interventions for vulnerable populations and 6) importance of technical assistance and funding. Site commonalities and differences in each of these areas were analyzed. It is recommended that all programs providing MDR-TB treatment address these six areas during program development and implementation.
Herens, Marion; Bakker, Evert Jan; van Ophem, Johan; Wagemakers, Annemarie; Koelen, Maria
2016-01-01
Physical inactivity is most commonly found in socially vulnerable groups. Dutch policies target these groups through community-based health-enhancing physical activity (CBHEPA) programs. As robust evidence on the effectiveness of this approach is limited, this study investigated whether CBHEPA programs contribute to an increase in and the maintenance of physical activity in socially vulnerable groups. In four successive cohorts, starting at a six-month interval, 268 participants from 19 groups were monitored for twelve months in seven CBHEPA programs. Data collection was based on repeated questionnaires. Socio-economic indicators, program participation and coping ability were measured at baseline. Physical activity, health-related quality of life and on-going program participation were measured three times. Self-efficacy and enjoyment were measured at baseline and at twelve months. Statistical analyses were based on a quasi-RCT design (independent t-tests), a comparison of participants and dropouts (Mann-Whitney test), and multilevel modelling to assess change in individual physical activity, including group level characteristics. Participants of CBHEPA programs are socially vulnerable in terms of low education (48.6%), low income (52.4%), non-Dutch origin (64.6%) and health-related quality of life outcomes. Physical activity levels were not below the Dutch average. No increase in physical activity levels over time was observed. The multilevel models showed significant positive associations between health-related quality of life, self-efficacy and enjoyment, and leisure-time physical activity over time. Short CBHEPA programs (10–13 weeks) with multiple trainers and gender-homogeneous groups were associated with lower physical activity levels over time. At twelve months, dropouts' leisure-time physical activity levels were significantly lower compared to continuing participants, as were health-related quality of life, self-efficacy and enjoyment outcomes. BMI and care consumption scored significantly higher among dropouts. In conclusion, Dutch CBHEPA programs reach socially vulnerable, but not necessarily inactive, groups in terms of socio-economic and health-related quality of life outcomes. Our findings suggest that CBHEPA programs particularly contribute to physical activity maintenance in socially vulnerable groups, rather than to an increase in physical activity behaviour over time. PMID:26909696
Herens, Marion; Bakker, Evert Jan; van Ophem, Johan; Wagemakers, Annemarie; Koelen, Maria
2016-01-01
Physical inactivity is most commonly found in socially vulnerable groups. Dutch policies target these groups through community-based health-enhancing physical activity (CBHEPA) programs. As robust evidence on the effectiveness of this approach is limited, this study investigated whether CBHEPA programs contribute to an increase in and the maintenance of physical activity in socially vulnerable groups. In four successive cohorts, starting at a six-month interval, 268 participants from 19 groups were monitored for twelve months in seven CBHEPA programs. Data collection was based on repeated questionnaires. Socio-economic indicators, program participation and coping ability were measured at baseline. Physical activity, health-related quality of life and on-going program participation were measured three times. Self-efficacy and enjoyment were measured at baseline and at twelve months. Statistical analyses were based on a quasi-RCT design (independent t-tests), a comparison of participants and dropouts (Mann-Whitney test), and multilevel modelling to assess change in individual physical activity, including group level characteristics. Participants of CBHEPA programs are socially vulnerable in terms of low education (48.6%), low income (52.4%), non-Dutch origin (64.6%) and health-related quality of life outcomes. Physical activity levels were not below the Dutch average. No increase in physical activity levels over time was observed. The multilevel models showed significant positive associations between health-related quality of life, self-efficacy and enjoyment, and leisure-time physical activity over time. Short CBHEPA programs (10-13 weeks) with multiple trainers and gender-homogeneous groups were associated with lower physical activity levels over time. At twelve months, dropouts' leisure-time physical activity levels were significantly lower compared to continuing participants, as were health-related quality of life, self-efficacy and enjoyment outcomes. BMI and care consumption scored significantly higher among dropouts. In conclusion, Dutch CBHEPA programs reach socially vulnerable, but not necessarily inactive, groups in terms of socio-economic and health-related quality of life outcomes. Our findings suggest that CBHEPA programs particularly contribute to physical activity maintenance in socially vulnerable groups, rather than to an increase in physical activity behaviour over time.
Robertson, Laura; Mushati, Phyllis; Skovdal, Morten; Eaton, Jeffrey W.; Makoni, Jeremiah C.; Crea, Tom; Mavise, Gideon; Dumba, Lovemore; Schumacher, Christina; Sherr, Lorraine; Nyamukapa, Constance; Gregson, Simon
2014-01-01
Summary We used baseline data, collected in July–September 2009, from a randomized controlled trial of a cash transfer program for vulnerable children in eastern Zimbabwe to investigate the effectiveness, coverage, and efficiency of census- and community-based targeting methods for reaching vulnerable children. Focus group discussions and in-depth interviews with beneficiaries and other stakeholders were used to explore community perspectives on targeting. Community members reported that their participation improved ownership and reduced conflict and jealousy. However, all the methods failed to target a large proportion of vulnerable children and there was poor agreement between the community- and census-based methods. PMID:24748713
INTEGRATION OF SPATIAL DATA: METHODS EVALUATION WITH REGARD TO DATA ISSUES AND ASSESSMENT QUESTIONS
EPA's Regional Vulnerability Assessment (REVA) Program is developing and demonstrating approaches to assess current and future environmental vulnerabilities at a regional scale. An initial effort within this research program has been to develop and evaluate methods to synthesize ...
EPA'S REGIONAL VULNERABILITY ASSESSMENT PROGRAM (REVA) DEMONSTRATING RESULTS THROUGH PARTNERSHIPS
EPA's Regional Vulnerability Assessment (ReVA) program, a regional-scale comparative risk research effort, has been under development since 1998 with a pilot study focused on the Mid- Atlantic region. ReVA is part of the interagency Integrated Science for Ecosystem Challenges ini...
A preliminary analysis of quantifying computer security vulnerability data in "the wild"
NASA Astrophysics Data System (ADS)
Farris, Katheryn A.; McNamara, Sean R.; Goldstein, Adam; Cybenko, George
2016-05-01
A system of computers, networks and software has some level of vulnerability exposure that puts it at risk to criminal hackers. Presently, most vulnerability research uses data from software vendors, and the National Vulnerability Database (NVD). We propose an alternative path forward through grounding our analysis in data from the operational information security community, i.e. vulnerability data from "the wild". In this paper, we propose a vulnerability data parsing algorithm and an in-depth univariate and multivariate analysis of the vulnerability arrival and deletion process (also referred to as the vulnerability birth-death process). We find that vulnerability arrivals are best characterized by the log-normal distribution and vulnerability deletions are best characterized by the exponential distribution. These distributions can serve as prior probabilities for future Bayesian analysis. We also find that over 22% of the deleted vulnerability data have a rate of zero, and that the arrival vulnerability data is always greater than zero. Finally, we quantify and visualize the dependencies between vulnerability arrivals and deletions through a bivariate scatterplot and statistical observations.
User's Manual for Space Debris Surfaces (SD_SURF)
NASA Technical Reports Server (NTRS)
Elfer, N. C.
1996-01-01
A unique collection of computer codes, Space Debris Surfaces (SD_SURF), have been developed to assist in the design and analysis of space debris protection systems. SD_SURF calculates and summarizes a vehicle's vulnerability to space debris as a function of impact velocity and obliquity. An SD_SURF analysis will show which velocities and obliquities are the most probable to cause a penetration. This determination can help the analyst select a shield design which is best suited to the predominant penetration mechanism. The analysis also indicates the most suitable parameters for development or verification testing. The SD_SURF programs offer the option of either FORTRAN programs and Microsoft EXCEL spreadsheets and macros. The FORTRAN programs work with BUMPERII version 1.2a or 1.3 (Cosmic released). The EXCEL spreadsheets and macros can be used independently or with selected output from the SD_SURF FORTRAN programs.
Aaron, Grant J; Friesen, Valerie M; Jungjohann, Svenja; Garrett, Greg S; Myatt, Mark
2017-01-01
Background: Large-scale food fortification (LSFF) of commonly consumed food vehicles is widely implemented in low- and middle-income countries. Many programs have monitoring information gaps and most countries fail to assess program coverage. Objective: The aim of this work was to present LSFF coverage survey findings (overall and in vulnerable populations) from 18 programs (7 wheat flour, 4 maize flour, and 7 edible oil programs) conducted in 8 countries between 2013 and 2015. Methods: A Fortification Assessment Coverage Toolkit (FACT) was developed to standardize the assessments. Three indicators were used to assess the relations between coverage and vulnerability: 1) poverty, 2) poor dietary diversity, and 3) rural residence. Three measures of coverage were assessed: 1) consumption of the vehicle, 2) consumption of a fortifiable vehicle, and 3) consumption of a fortified vehicle. Individual program performance was assessed based on the following: 1) achieving overall coverage ≥50%, 2) achieving coverage of ≥75% in ≥1 vulnerable group, and 3) achieving equity in coverage for ≥1 vulnerable group. Results: Coverage varied widely by food vehicle and country. Only 2 of the 18 LSFF programs assessed met all 3 program performance criteria. The 2 main program bottlenecks were a poor choice of vehicle and failure to fortify a fortifiable vehicle (i.e., absence of fortification). Conclusions: The results highlight the importance of sound program design and routine monitoring and evaluation. There is strong evidence of the impact and cost-effectiveness of LSFF; however, impact can only be achieved when the necessary activities and processes during program design and implementation are followed. The FACT approach fills an important gap in the availability of standardized tools. The LSFF programs assessed here need to be re-evaluated to determine whether to further invest in the programs, whether other vehicles are appropriate, and whether other approaches are needed. PMID:28404836
Aaron, Grant J; Friesen, Valerie M; Jungjohann, Svenja; Garrett, Greg S; Neufeld, Lynnette M; Myatt, Mark
2017-05-01
Background: Large-scale food fortification (LSFF) of commonly consumed food vehicles is widely implemented in low- and middle-income countries. Many programs have monitoring information gaps and most countries fail to assess program coverage. Objective: The aim of this work was to present LSFF coverage survey findings (overall and in vulnerable populations) from 18 programs (7 wheat flour, 4 maize flour, and 7 edible oil programs) conducted in 8 countries between 2013 and 2015. Methods: A Fortification Assessment Coverage Toolkit (FACT) was developed to standardize the assessments. Three indicators were used to assess the relations between coverage and vulnerability: 1 ) poverty, 2 ) poor dietary diversity, and 3 ) rural residence. Three measures of coverage were assessed: 1 ) consumption of the vehicle, 2 ) consumption of a fortifiable vehicle, and 3 ) consumption of a fortified vehicle. Individual program performance was assessed based on the following: 1 ) achieving overall coverage ≥50%, 2) achieving coverage of ≥75% in ≥1 vulnerable group, and 3 ) achieving equity in coverage for ≥1 vulnerable group. Results: Coverage varied widely by food vehicle and country. Only 2 of the 18 LSFF programs assessed met all 3 program performance criteria. The 2 main program bottlenecks were a poor choice of vehicle and failure to fortify a fortifiable vehicle (i.e., absence of fortification). Conclusions: The results highlight the importance of sound program design and routine monitoring and evaluation. There is strong evidence of the impact and cost-effectiveness of LSFF; however, impact can only be achieved when the necessary activities and processes during program design and implementation are followed. The FACT approach fills an important gap in the availability of standardized tools. The LSFF programs assessed here need to be re-evaluated to determine whether to further invest in the programs, whether other vehicles are appropriate, and whether other approaches are needed.
Should body image programs be inclusive? A focus group study of college students.
Ciao, Anna C; Ohls, Olivia C; Pringle, Kevin D
2018-01-01
Most evidence-based body image programs for college students (e.g., the Body Project) are designed for female-only audiences, although body dissatisfaction is not limited to female-identified individuals. Furthermore, programs do not explicitly discuss diversity, although individuals with marginalized gender, racial, and sexual identities may be particularly vulnerable to body image disturbances. Making programs more inclusive may increase their disseminability. This qualitative study examined the feasibility of adapting the Body Project for universal and inclusive use with college students. Participants (N = 36; M age = 21.66 years; 73% female-identified; 20% sexual minority; 23% racial minority) attended one of five semi-structured focus groups to explore the inclusivity of appearance-based cultural norms using adapted Body Project activities and discuss the feasibility of universal and inclusive interventions. Inductive qualitative content analysis with three-rater consensus identified focus group themes. There was consensus that inclusive interventions could have a positive impact (broadening perspectives, normalizing body image concerns, increasing awareness) despite potential barriers (poor diversity representation, vulnerability). There was strong consensus regarding advice for facilitating inclusive interventions (e.g., skilled facilitation, education, increasing diversity). Results suggest that inclusive body image programs are desirable and provide a framework for creating the EVERYbody Project, a program for more universal audiences. © 2017 Wiley Periodicals, Inc.
GUIDED TOUR OF A WEB-BASED ENVIRONMENTAL DECISION TOOLKIT
Decision-making regarding the targeting of vulnerable resources and prioritization of actions requires synthesis of data on condition, vulnerability, and feasibility of risk management alternatives. EP A's Regional Vulnerability Assessment (ReV A) Program has evaluated existing a...
Topological Vulnerability Analysis
NASA Astrophysics Data System (ADS)
Jajodia, Sushil; Noel, Steven
Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires a great deal of expertise, and is error prone because of the complexity of networks and associated security data. The interdependencies of network vulnerabilities make traditional point-wise vulnerability analysis inadequate. We describe a Topological Vulnerability Analysis (TVA) approach that analyzes vulnerability dependencies and shows all possible attack paths into a network. From models of the network vulnerabilities and potential attacker exploits, we compute attack graphs that convey the impact of individual and combined vulnerabilities on overall security. TVA finds potential paths of vulnerability through a network, showing exactly how attackers may penetrate a network. From this, we identify key vulnerabilities and provide strategies for protection of critical network assets.
2017-11-01
The Under-body Blast Methodology (UBM) for the Test and Evaluation (T&E) program was established to provide a capability for the US Army Test and... Evaluation Command to assess the vulnerability of vehicles to under-body blast. Finite element (FE) models are part of the current UBM for T&E methodology...Methodology (UBM) for the Test and Evaluation (T&E) program was established to provide a capability for the US Army Test and Evaluation Command
American Indian Adolescent Girls: Vulnerability to Sex Trafficking, Intervention Strategies
ERIC Educational Resources Information Center
Pierce, Alexandra
2012-01-01
The Minnesota Indian Women's Resource Center offers harm reduction programming to at-risk adolescent American Indian girls, including outreach, case management, advocacy, healthy sexuality education, and support groups. To evaluate program impact, participants are assessed at intake and every 6 months afterward for current vulnerability to…
Berkowitz, Seth A; Aragon, Katherine; Hines, Jonas; Seligman, Hilary; Lee, Sei; Sarkar, Urmimala
2013-01-01
Objective To determine whether diabetes clinical standards consider increased hypoglycemia risk in vulnerable patients. Data Sources MEDLINE, the National Guidelines Clearinghouse, the National Quality Measures Clearinghouse, and supplemental sources. Study Design Systematic review of clinical standards (guidelines, quality metrics, or pay-for-performance programs) for glycemic control in adult diabetes patients. The primary outcome was discussion of increased risk for hypoglycemia in vulnerable populations. Data Collection/Extraction Methods Manuscripts identified were abstracted by two independent reviewers using prespecified inclusion/exclusion criteria and a standardized abstraction form. Principal Findings We screened 1,166 titles, and reviewed 220 manuscripts in full text. Forty-four guidelines, 17 quality metrics, and 8 pay-for-performance programs were included. Five (11 percent) guidelines and no quality metrics or pay-for-performance programs met the primary outcome. Conclusions Clinical standards do not substantively incorporate evidence about increased risk for hypoglycemia in vulnerable populations. PMID:23445498
Berkowitz, Seth A; Aragon, Katherine; Hines, Jonas; Seligman, Hilary; Lee, Sei; Sarkar, Urmimala
2013-08-01
To determine whether diabetes clinical standards consider increased hypoglycemia risk in vulnerable patients. MEDLINE, the National Guidelines Clearinghouse, the National Quality Measures Clearinghouse, and supplemental sources. Systematic review of clinical standards (guidelines, quality metrics, or pay-for-performance programs) for glycemic control in adult diabetes patients. The primary outcome was discussion of increased risk for hypoglycemia in vulnerable populations. Manuscripts identified were abstracted by two independent reviewers using prespecified inclusion/exclusion criteria and a standardized abstraction form. We screened 1,166 titles, and reviewed 220 manuscripts in full text. Forty-four guidelines, 17 quality metrics, and 8 pay-for-performance programs were included. Five (11 percent) guidelines and no quality metrics or pay-for-performance programs met the primary outcome. Clinical standards do not substantively incorporate evidence about increased risk for hypoglycemia in vulnerable populations. © Health Research and Educational Trust.
Zhang, Zhaohua; Luo, Yuxi; Robinson, Derrick
2018-06-13
Vulnerability to food poverty is the probability of an individual falling below the food poverty line in the near future, which provides a forward-looking welfare analysis. Applying a nationally representative survey dataset, this study investigates the role of the New Rural Pension Scheme (NRPS) in reducing food poverty and vulnerability among the rural elderly with chronic diseases. By designing province-specific food poverty lines to account for variations in the elderly’s needs, as well as the prices across provinces using a least-cost linear programming approach, the food poverty incidences among the elderly with chronic diseases are calculated. Applying a three-stage feasible generalized least squares (FGLS) procedure, the vulnerability to food poverty is estimated. Our results show that food poverty incidence and vulnerability of the elderly with chronic diseases in rural China is 41.9% and 35% respectively, which is 8% and 6% higher, respectively, than the elderly that are in good health. To address the potential endogeneity of pension payment, a fuzzy regression discontinuity (RD) regression is employed to investigate the effects of pension income on food poverty and vulnerability for different population groups. We found that pension income decreases the probability of being food poor and the vulnerability to food poverty among the elderly with chronic diseases by 12.9% and 16.8% respectively, while it has no significant effect on the elderly in good health.
Culture, social networks and HIV vulnerability among men who have sex with men in Indonesia.
Fauk, Nelsensius Klau; Merry, Maria Silvia; Sigilipoe, Mitra Andhini; Putra, Sukma; Mwanri, Lillian
2017-01-01
The current study aimed to explore cultural and social network influence on HIV vulnerability among Men who have Sex with Men (MSM) population in Yogyakarta, Indonesia. A qualitative inquiry employing in-depth one-on-one interviews was carried out with 24 MSM participants in July 2015. Data were analysed using a framework analysis and guided by the Social Networks Theory (SNT) as a conceptual framework. Findings indicated that prohibitive cultural perspectives and norms against same-sex marriage made them to conceal their sexual orientation and thus secretively engaging in unprotected sex that increased their predisposition to HIV transmission. The prohibitive cultures were also instrumental in the formation of MSM sexual networks that provided supportive environment for HIV-risky sexual practices among network partners. These findings provide information that can be used to improve HIV/AIDS service practices and policies. However, further studies with large numbers of MSM would be needed to improve the understanding of other HIV vulnerability determinants, the unique needs of MSM, and what and how programs could be conducted to reduce HIV vulnerability among MSM population.
Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 3. Natural Disasters.
ERIC Educational Resources Information Center
Defense Civil Preparedness Agency (DOD), Battle Creek, MI.
The effects of natural disasters and the implications which those effects have for community emergency preparedness are discussed. Major topics include: (1) Similarities and differences in types of responses required by a nuclear and natural disasters, (2) The civil defense function in natural disasters, (3) Vulnerability analysis, (4) Warning…
NASA Astrophysics Data System (ADS)
Weigel, A. M.; Griffin, R.; Gallagher, D.
2015-12-01
Storm surge has enough destructive power to damage buildings and infrastructure, erode beaches, and threaten human life across large geographic areas, hence posing the greatest threat of all the hurricane hazards. The United States Gulf of Mexico has proven vulnerable to hurricanes as it has been hit by some of the most destructive hurricanes on record. With projected rises in sea level and increases in hurricane activity, there is a need to better understand the associated risks for disaster mitigation, preparedness, and response. GIS has become a critical tool in enhancing disaster planning, risk assessment, and emergency response by communicating spatial information through a multi-layer approach. However, there is a need for a near real-time method of identifying areas with a high risk of being impacted by storm surge. Research was conducted alongside Baron, a private industry weather enterprise, to facilitate automated modeling and visualization of storm surge inundation and vulnerability on a near real-time basis. This research successfully automated current flood hazard mapping techniques using a GIS framework written in a Python programming environment, and displayed resulting data through an Application Program Interface (API). Data used for this methodology included high resolution topography, NOAA Probabilistic Surge model outputs parsed from Rich Site Summary (RSS) feeds, and the NOAA Census tract level Social Vulnerability Index (SoVI). The development process required extensive data processing and management to provide high resolution visualizations of potential flooding and population vulnerability in a timely manner. The accuracy of the developed methodology was assessed using Hurricane Isaac as a case study, which through a USGS and NOAA partnership, contained ample data for statistical analysis. This research successfully created a fully automated, near real-time method for mapping high resolution storm surge inundation and vulnerability for the Gulf of Mexico, and improved the accuracy and resolution of the Probabilistic Storm Surge model.
Atrial arrhythmias and autonomic dysfunction in rats exposed to chronic intermittent hypoxia.
Bober, Sara L; Ciriello, John; Jones, Douglas L
2018-06-01
Obstructive sleep apnea, which involves chronic intermittent hypoxia (CIH), is a major risk factor for developing atrial fibrillation (AF). Whether or not CIH alone alters cardiac mechanisms to support AF is unknown. This study investigated the effects of CIH on atrial electrophysiology and arrhythmia vulnerability and evaluated the role of autonomics in CIH promotion of AF. Adult male Sprague-Dawley rats were exposed to 8 h/day of CIH or normoxia for 7 days. After exposure, rats were anesthetized for intracardiac electrophysiological experiments. Atrial effective refractory periods (AERPs) and AF inducibility were determined using programmed electrical stimulation and burst pacing in the absence and presence of autonomic receptor agonists and antagonists. Western blot analysis measured atrial protein expression of muscarinic M2, M3, and β 1 -adrenergic receptors. Compared with normoxia-exposed control rats, CIH-exposed rats had enhanced AF vulnerability using both programmed electrical stimulation and burst pacing, accompanied by greater AERP responses to carbachol and propranolol, lesser responses to isoproterenol, and higher atrial M2 receptor protein levels. Enhanced atrial vulnerability was accentuated by carbachol and abolished by atropine, indicating that the AF-promoting effects of CIH depended principally on parasympathetic activation. Enhancement of atrial vulnerability and AERP shortening with cholinergic agonists in CIH-exposed rats is consistent with sensitivity to parasympathetic activation. Higher responses to adrenergic receptor blockade in CIH-exposed rats is consistent with sympathetic potentiation. These findings implicate CIH as an important mediator of enhanced AF susceptibility in obstructive sleep apnea and provide novel insights into the underlying mechanisms. NEW & NOTEWORTHY Our study demonstrates, for the first time, that chronic intermittent hypoxia alone enhances vulnerability to atrial arrhythmia induction, which depends principally on parasympathetic activation. Enhanced atrial vulnerability was accompanied by heightened electrophysiological responses of the atrial myocardium to carbachol and isoproterenol, dampened responses to propranolol, and increased atrial M2 receptor protein levels.
ERIC Educational Resources Information Center
Loi, Claudia X. Aguado; McDermott, Robert J.
2010-01-01
Conducting evaluations that are both valid and ethical is imperative for the support and sustainability of programs that address underserved and vulnerable populations. A key component is to have evaluators who are knowledgeable about relevant cultural issues and sensitive to population needs. Hispanics in rural settings are vulnerable for many…
Sung, Ki Wol; Kang, Hye Seung; Nam, Ji Ran; Park, Mi Kyung; Park, Ji Hyeon
2018-04-01
This study aimed to estimate the effects of a health mentoring program on fasting blood sugar, total cholesterol, triglyceride, physical activity, self care behavior and social support changes among community-dwelling vulnerable elderly individuals with diabetes. A non-equivalent control group pre-post-test design was used. Participants were 70 community-dwelling vulnerable elderly individuals with diabetes. They were assigned to the experimental (n=30) or comparative (n=30) or control group (n=28). The experimental group participated in the health mentoring program, while the comparative group participated in health education program, the control group did not participate in any program. Data analyses involved a chi-square test, Fisher's exact test, a generalized linear model, and the Bonferroni correction, using SPSS 23.0. Compared to the control group, the experimental and comparative groups showed a significant decrease in fasting blood sugar, total cholesterol, and triglyceride. Compared to the comparative and control groups, the experimental group showed significant improvement in self care behavior. However, there were no statistical differences in physical activity or social support among the three groups. These findings indicate that the health mentoring program is an effective intervention for community-dwelling vulnerable elderly individuals with diabetes. This program can be used as an efficient strategy for diabetes self-management within this population. © 2018 Korean Society of Nursing Science.
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2014 CFR
2014-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and approval of security vulnerability...
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and approval of security vulnerability...
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2013 CFR
2013-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and approval of security vulnerability...
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2012 CFR
2012-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and approval of security vulnerability...
Community mobilization, empowerment and HIV prevention among female sex workers in south India.
Blanchard, Andrea K; Mohan, Haranahalli Lakkappa; Shahmanesh, Maryam; Prakash, Ravi; Isac, Shajy; Ramesh, Banadakoppa Manjappa; Bhattacharjee, Parinita; Gurnani, Vandana; Moses, Stephen; Blanchard, James F
2013-03-16
While community mobilization has been widely endorsed as an important component of HIV prevention among vulnerable populations such as female sex workers (FSWs), there is uncertainty as to the mechanism through which it impacts upon HIV risk. We explored the hypothesis that individual and collective empowerment of FSW is an outcome of community mobilization, and we examined the means through which HIV risk and vulnerability reduction as well as personal and social transformation are achieved. This study was conducted in five districts in south India, where community mobilization programs are implemented as part of the Avahan program (India AIDS Initiative) of the Bill & Melinda Gates Foundation. We used a theoretically derived "integrated empowerment framework" to conduct a secondary analysis of a representative behavioural tracking survey conducted among 1,750 FSWs. We explored the associations between involvement with community mobilization programs, self-reported empowerment (defined as three domains including power within to represent self-esteem and confidence, power with as a measure of collective identity and solidarity, and power over as access to social entitlements, which were created using Principal Components analysis), and outcomes of HIV risk reduction and social transformation. In multivariate analysis, we found that engagement with HIV programs and community mobilization activities was associated with the domains of empowerment. Power within and power with were positively associated with more program contact (p < .01 and p < .001 respectively). These measures of empowerment were also associated with outcomes of "personal transformation" in terms of self-efficacy for condom and health service use (p < .001). Collective empowerment (power with others) was most strongly associated with "social transformation" variables including higher autonomy and reduced violence and coercion, particularly in districts with programs of longer duration (p < .05). Condom use with clients was associated with power with others (p < .001), while power within was associated with more condom use with regular partners (p < .01) and higher service utilization (p < .05). These findings support the hypothesis that community mobilization has benefits for empowering FSWs both individually and collectively. HIV prevention is strengthened by improving their ability to address different psycho-social and community-level sources of their vulnerability. Future challenges include the need to develop social, political and legal contexts that support community mobilization of FSWs, and to prospectively measure the impact of combined community-level interventions on measures of empowerment as a means to HIV prevention.
Community mobilization, empowerment and HIV prevention among female sex workers in south India
2013-01-01
Background While community mobilization has been widely endorsed as an important component of HIV prevention among vulnerable populations such as female sex workers (FSWs), there is uncertainty as to the mechanism through which it impacts upon HIV risk. We explored the hypothesis that individual and collective empowerment of FSW is an outcome of community mobilization, and we examined the means through which HIV risk and vulnerability reduction as well as personal and social transformation are achieved. Methods This study was conducted in five districts in south India, where community mobilization programs are implemented as part of the Avahan program (India AIDS Initiative) of the Bill & Melinda Gates Foundation. We used a theoretically derived “integrated empowerment framework” to conduct a secondary analysis of a representative behavioural tracking survey conducted among 1,750 FSWs. We explored the associations between involvement with community mobilization programs, self-reported empowerment (defined as three domains including power within to represent self-esteem and confidence, power with as a measure of collective identity and solidarity, and power over as access to social entitlements, which were created using Principal Components analysis), and outcomes of HIV risk reduction and social transformation. Results In multivariate analysis, we found that engagement with HIV programs and community mobilization activities was associated with the domains of empowerment. Power within and power with were positively associated with more program contact (p < .01 and p < .001 respectively). These measures of empowerment were also associated with outcomes of “personal transformation” in terms of self-efficacy for condom and health service use (p < .001). Collective empowerment (power with others) was most strongly associated with “social transformation” variables including higher autonomy and reduced violence and coercion, particularly in districts with programs of longer duration (p < .05). Condom use with clients was associated with power with others (p < .001), while power within was associated with more condom use with regular partners (p < .01) and higher service utilization (p < .05). Conclusion These findings support the hypothesis that community mobilization has benefits for empowering FSWs both individually and collectively. HIV prevention is strengthened by improving their ability to address different psycho-social and community-level sources of their vulnerability. Future challenges include the need to develop social, political and legal contexts that support community mobilization of FSWs, and to prospectively measure the impact of combined community-level interventions on measures of empowerment as a means to HIV prevention. PMID:23496972
A concept analysis of women's vulnerability during pregnancy, birth and the postnatal period.
Briscoe, Lesley; Lavender, Tina; McGowan, Linda
2016-10-01
To report an analysis of the concept of vulnerability associated with pregnancy, birth and the postnatal period. The concept of vulnerability during childbirth is complex and the term, 'to be vulnerable' frequently attains a vague application. Analysis about vulnerability is needed to guide policy, practice, education and research. Clarity around the concept has the potential to improve outcomes for women. Concept analysis. Searches were conducted in CINAHL, EMBASE, PubMed, Psychinfo, MEDLINE, MIDIRS and ASSIA and limited to between January 2000 - June 2014. Data were collected over 12 months during 2014. This concept analysis drew on Morse's qualitative methods. Vulnerability during pregnancy, birth and the postnatal period can be defined by three main attributes: (a) Threat; (b) Barrier; and (c) Repair. Key attributes have the potential to influence outcome for women. Inseparable sub-attributes such as mother and baby attachment, the woman's free will and choice added a level of complexity about the concept. This concept analysis has clarified how the term vulnerability is currently understood and used in relation to pregnancy, birth and the postnatal period. Vulnerability should be viewed as a complex phenomenon rather than a singular concept. A 'vulnerability journey plan' has the potential to identify how reparative interventions may develop the woman's capacity for resilience and influence the degree of vulnerability experienced. Methodology based around complex theory should be explored in future work about vulnerability. © 2016 John Wiley & Sons Ltd.
Regional prioritisation of flood risk in mountainous areas
NASA Astrophysics Data System (ADS)
Rogelis, M. C.; Werner, M.; Obregón, N.; Wright, G.
2015-07-01
A regional analysis of flood risk was carried out in the mountainous area surrounding the city of Bogotá (Colombia). Vulnerability at regional level was assessed on the basis of a principal component analysis carried out with variables recognised in literature to contribute to vulnerability; using watersheds as the unit of analysis. The area exposed was obtained from a simplified flood analysis at regional level to provide a mask where vulnerability variables were extracted. The vulnerability indicator obtained from the principal component analysis was combined with an existing susceptibility indicator, thus providing an index that allows the watersheds to be prioritised in support of flood risk management at regional level. Results show that the components of vulnerability can be expressed in terms of four constituent indicators; socio-economic fragility, which is composed of demography and lack of well-being; lack of resilience, which is composed of education, preparedness and response capacity, rescue capacity, social cohesion and participation; and physical exposure is composed of exposed infrastructure and exposed population. A sensitivity analysis shows that the classification of vulnerability is robust for watersheds with low and high values of the vulnerability indicator, while some watersheds with intermediate values of the indicator are sensitive to shifting between medium and high vulnerability. The complex interaction between vulnerability and hazard is evidenced in the case study. Environmental degradation in vulnerable watersheds shows the influence that vulnerability exerts on hazard and vice versa, thus establishing a cycle that builds up risk conditions.
ERIC Educational Resources Information Center
Lachowicz, Shana
2017-01-01
Head Start (HS) is a nationally known program for young children and continues to serve the most vulnerable children and families. HS teachers are required to have a minimum degree status and a certain number of Professional Development (PD) hours. However, teachers continue to struggle with preparedness and effectiveness. The problem is that HS…
A Peer-to-Peer Health Education Program for Vulnerable Children in Uganda
ERIC Educational Resources Information Center
Falk, Diane S.; Pettet, Kristen; Mpagi, Charles
2016-01-01
In this paper, children attending a U.S.-sponsored private primary school serving orphaned and vulnerable children in Uganda were interviewed in focus groups about their participation in a peer-to-peer health education program in which they used music, dance, poetry, art, and drama to convey health information. The children reported enhanced…
A coverage and slicing dependencies analysis for seeking software security defects.
He, Hui; Zhang, Dongyan; Liu, Min; Zhang, Weizhe; Gao, Dongmin
2014-01-01
Software security defects have a serious impact on the software quality and reliability. It is a major hidden danger for the operation of a system that a software system has some security flaws. When the scale of the software increases, its vulnerability has becoming much more difficult to find out. Once these vulnerabilities are exploited, it may lead to great loss. In this situation, the concept of Software Assurance is carried out by some experts. And the automated fault localization technique is a part of the research of Software Assurance. Currently, automated fault localization method includes coverage based fault localization (CBFL) and program slicing. Both of the methods have their own location advantages and defects. In this paper, we have put forward a new method, named Reverse Data Dependence Analysis Model, which integrates the two methods by analyzing the program structure. On this basis, we finally proposed a new automated fault localization method. This method not only is automation lossless but also changes the basic location unit into single sentence, which makes the location effect more accurate. Through several experiments, we proved that our method is more effective. Furthermore, we analyzed the effectiveness among these existing methods and different faults.
Coastal erosion risk assessment using natural and human factors in different scales.
NASA Astrophysics Data System (ADS)
Alexandrakis, George; Kampanis, Nikolaos
2015-04-01
Climate change, including sea-level rise and increasing storms, raise the threats of coastal erosion. Mitigating and adapting to coastal erosion risks in areas of human interest, like urban areas, culture heritage sites, and areas of economic interest, present a major challenge for society. In this context, decision making needs to be based in reliable risk assessment that includes environmental, social and economic factors. By integrating coastal hazard and risk assessments maps into coastal management plans, risks in areas of interest can be reduced. To address this, the vulnerability of the coast to sea level rise and associated erosion, in terms of expected land loss and socioeconomic importance need to be identified. A holistic risk assessment based in environmental, socioeconomic and economics approach can provide managers information how to mitigate the impact of coastal erosion and plan protection measures. Such an approach needs to consider social, economic and environmental factors, which interactions can be better assessed when distributed and analysed along the geographical space. In this work, estimations of climate change impact to coastline are based on a combination of environmental and economic data analysed in a GIS database. The risk assessment is implemented through the estimation of the vulnerability and exposure variables of the coast in two scales. The larger scale estimates the vulnerability in a regional level, with the use environmental factors with the use of CVI. The exposure variable is estimated by the use of socioeconomic factors. Subsequently, a smaller scale focuses on highly vulnerable beaches with high social and economic value. The vulnerability assessment of the natural processes to the environmental characteristics of the beach is estimated with the use of the Beach Vulnerability Index. As exposure variable, the value of beach width that is capitalized in revenues is implemented through a hedonic pricing model. In this econometric modelling, Beach Value is related with economic and environmental attributes of the beach. All calculations are implemented in a GIS database, organised in five levels. In the first level the gathering of raw data is been made. In the second level data are organized in different scales. Third level, concerns the generating of new thematic data for further use. Risk assessment analysis and cost benefit analysis for protection measures is been made in level four. In the fifth level the results are transformed in user friendly form to be used by coastal managers. As case study area for the application of the method is selected Crete Island, while for the small scale the city of Rethymnon, which at the regional vulnerability analysis was found as high vulnerable. In the small scale vulnerability analysis, the sectors of the beach which are most vulnerable were identified, and risk analysis was made based on the revenue losses. Acknowledgments This work was implemented within the framework of the Action «Supporting Postdoctoral Researchers» of the Operational Program "Education and Lifelong Learning" (Action's Beneficiary: General Secretariat for Research and Technology), and is co-financed by the European Social Fund (ESF) and the Greek State.
NASA Technical Reports Server (NTRS)
Elfer, N.; Meibaum, R.; Olsen, G.
1995-01-01
A unique collection of computer codes, Space Debris Surfaces (SD_SURF), have been developed to assist in the design and analysis of space debris protection systems. SD_SURF calculates and summarizes a vehicle's vulnerability to space debris as a function of impact velocity and obliquity. An SD_SURF analysis will show which velocities and obliquities are the most probable to cause a penetration. This determination can help the analyst select a shield design that is best suited to the predominant penetration mechanism. The analysis also suggests the most suitable parameters for development or verification testing. The SD_SURF programs offer the option of either FORTRAN programs or Microsoft-EXCEL spreadsheets and macros. The FORTRAN programs work with BUMPERII. The EXCEL spreadsheets and macros can be used independently or with selected output from the SD_SURF FORTRAN programs. Examples will be presented of the interaction between space vehicle geometry, the space debris environment, and the penetration and critical damage ballistic limit surfaces of the shield under consideration.
Automated Software Vulnerability Analysis
NASA Astrophysics Data System (ADS)
Sezer, Emre C.; Kil, Chongkyung; Ning, Peng
Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morrow, J.J.; Burris, R.A.; Watson, D.J.
1977-05-01
This report is intended to provide guidelines for the preparation of procurements specifications for aircraft survivability enhancement equipment, for the survivability/vulnerability (S/V) tasks associated with the procurement of a total aircraft system or its relate subsystems, and also for the modification of current fleet aircraft to their related subsystems. It is intended that these S/V procurement guidelines be applied to the procurement of all military aircraft, aircraft subsystems, and aircraft componenets which can either lose their functional capability of have their performance degraded as a result of interactions with the damage mechanisms of threat weapons. The guidelines should be appliedmore » to preliminary design programs, to production programs, and to programs that will retrofit or modify existing systems. These guidelines include general requirements statements for the establishment of an S/V program, requirements statements for reducing the susceptibility of the system to the threat weapons, and requirements for the reduction of vulnerability to nonnuclear, nuclear, and laser weapon effects. Requirements for S/V assessments and the verification of vulnerability levels and survival enhancement features are also included. Although nuclear and laser weapon effects are included, the major emphasis is on the reduction of susceptibility and vulnerability to conventional weapons and the establishment of the S/V program.« less
Economic vulnerability of timber resources to forest fires
Francisco Rodriguez y Silva; Juan Ramon Molina; Armando Gonzalez-Caban; Miguel Angel Herrera Machuca
2012-01-01
The temporal-spatial planning of activities for a territorial fire management program requires knowing the value of forest ecosystems. In this paper we extend to and apply the economic valuation principle to the concept of economic vulnerability and present a methodology for the economic valuation of the forest production ecosystems. The forest vulnerability is...
Plan To Reduce the Vulnerability of School Buildings to Natural Disasters: Dominica.
ERIC Educational Resources Information Center
Organization of American States, Washington, DC.
A workshop report provides the structure and content of a school building vulnerability reduction plan for schools in Dominica, determines roles and interactions between school stakeholders, and designs a natural hazard vulnerability reduction program. It provides a profile of the current stock of school buildings in Dominica while also addressing…
6 CFR 27.235 - Alternative security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1... Tier 3 facilities may not submit an ASP in lieu of a Security Vulnerability Assessment. (b) The... Security Vulnerability Assessment or using the procedure specified in § 27.245 if the ASP is intended to...
USDA-ARS?s Scientific Manuscript database
One finding of the Conservation Effects Assessment Program (CEAP) watershed studies was that Best Management practices (BMPs) were not always installed where most needed: in many watersheds, only a fraction of BMPs were implemented in the most vulnerable areas. While complex computer simulation mode...
NASA Astrophysics Data System (ADS)
Declet-Barreto, J.; Pham, M.
2016-12-01
Carbon emissions trading has been implemented in parts of the United States (and elsewhere) to reduce greenhouse gas emissions. Data from one such program focused on power plant emissions in the U.S. Northeast and Mid-Atlantic, the Regional Greenhouse Gas Initiative (RGGI), have shown that regionally, power sector carbon dioxide emissions have been reduced since the adoption of the program in 2009. However, it is not known what the spatial distributions of such reductions have been in individual plants, and if emissions reductions have ocurred in plants impacting low-income and ethnic minority communities, arguably the populations most overburdened by health threats from co-pollutants (e.g., fine particulates, nitrous oxides, and sulfurous oxides) emitted along greenhouse gases. In this research, we explore the trajectory of power plant emissions in the RGGI region in vulnerable communities. This is a first, exploratory step in understanding the environmental justice implications of market-based carbon reduction policies.
Adolescents from families of divorce: vulnerability to physiological and psychological disturbances.
Thompson, P
1998-03-01
Multiple factors contribute to the vulnerability of adolescents to physiological and psychological disturbances following parental divorce. These include father absence, interparental conflict, economic distress, multiple life stressors, parent adjustment, and short-term crisis. Clinical and societal problems manifested in these vulnerable adolescents are discussed. Systems theory is used to explain this vulnerability of adolescents and to identify appropriate interventions and policies to promote health in this population. Policies recommended include required divorce mediation, early referrals for family and sibling therapy, and school programs to identify and support those most vulnerable.
Zhang, Yang; Shen, Jing; Li, Yu
2018-01-01
Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management. PMID:29342852
Zhang, Yang; Shen, Jing; Li, Yu
2018-01-13
Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management.
Vulnerability Assessments in Support of the Climate Ready ...
As part of the Climate Ready Estuaries (CRE) program, the Global Change Research Program (GCRP) in the National Center for Environmental Assessment, Office of Research and Development at the U.S. Environmental Protection Agency has prepared this draft report exploring a new methodology for climate change vulnerability assessments using San Francisco Bay’s salt marsh and mudflat ecosystems as a demonstration. N/A
Evaluating the Generality and Limits of Blind Return-Oriented Programming Attacks
2015-12-01
consider a recently proposed information disclosure vulnerability called blind return-oriented programming (BROP). Under certain conditions, this...implementation disclosure attacks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF...Science iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT We consider a recently proposed information disclosure vulnerability called blind return
Estimation of Vulnerability Functions for Debris Flows Using Different Intensity Parameters
NASA Astrophysics Data System (ADS)
Akbas, S. O.; Blahut, J.; Luna, B. Q.; Sterlacchini, S.
2009-04-01
In landslide risk research, the majority of past studies have focused on hazard analysis, with only few targeting the concept of vulnerability. When debris flows are considered, there is no consensus or even modest agreement on a generalized methodology to estimate physical vulnerability of the affected buildings. Very few quantitative relationships have been proposed between intensities and vulnerability values. More importantly, in most of the existing relationships, information on process intensity is often missing or only described semi-quantitatively. However, robust assessment of vulnerabilities along with the associated uncertainties is of utmost importance from a quantitative risk analysis point of view. On the morning of 13th July 2008, after more than two days of intense rainfall, several debris and mud flows were released in the central part of Valtellina, an Italian alpine valley in Lombardy Region. One of the largest muddy-debris flows occurred in Selvetta, a fraction of Colorina municipality. The result was the complete destruction of two buildings, and damage at varying severity levels to eight others. The authors had the chance to gather detailed information about the event, by conducting extensive field work and interviews with local inhabitants, civil protection teams, and officials. In addition to the data gathered from the field studies, the main characteristics of the debris flow have been estimated using numerical and empirical approaches. The extensive data obtained from Selvetta event gave an opportunity to develop three separate empirical vulnerability curves, which are functions of deposition height, debris flow velocity, and pressure, respectively. Deposition heights were directly obtained from field surveys, whereas the velocity and pressure values were back-calculated using the finite difference program FLO2D. The vulnerability was defined as the ratio between the monetary loss and the reconstruction value. The monetary losses were obtained from official RASDA documents, which were compiled for claim purposes. For each building, the approximate reconstruction value was calculated according to the building type and size, using the official data given in the Housing Prices Index prepared by the Engineers and Architects of Milan. The resulting vulnerability curves were compared to those in the literature, and among themselves. Specific recommendations were given regarding the most suitable parameter to be used for characterizing the intensity of debris flows within the context of physical vulnerability.
Unequal Recovery? Federal Resource Distribution after a Midwest Flood Disaster
Muñoz, Cristina E.; Tate, Eric
2016-01-01
Following severe flooding in 2008, three Iowa communities acquired over 1000 damaged properties to support disaster recovery and mitigation. This research applies a distributive justice framework to analyze the distribution of disaster recovery funds for property acquisition. Two research questions drive the analysis: (1) how does recovery vary by acquisition funding source; and (2) what is the relationship between recovery and vulnerable populations? Through spatial econometric modeling, relative recovery is compared between two federal programs that funded the acquisitions, and across socially vulnerable populations. The results indicate both distributive and temporal inequalities in the allocation of federal recovery funds. In particular, Latino and elderly populations were associated with lower recovery rates. Recommendations for future research in flood recovery and acquisitions are provided. PMID:27196921
Unequal Recovery? Federal Resource Distribution after a Midwest Flood Disaster.
Muñoz, Cristina E; Tate, Eric
2016-05-17
Following severe flooding in 2008, three Iowa communities acquired over 1000 damaged properties to support disaster recovery and mitigation. This research applies a distributive justice framework to analyze the distribution of disaster recovery funds for property acquisition. Two research questions drive the analysis: (1) how does recovery vary by acquisition funding source; and (2) what is the relationship between recovery and vulnerable populations? Through spatial econometric modeling, relative recovery is compared between two federal programs that funded the acquisitions, and across socially vulnerable populations. The results indicate both distributive and temporal inequalities in the allocation of federal recovery funds. In particular, Latino and elderly populations were associated with lower recovery rates. Recommendations for future research in flood recovery and acquisitions are provided.
1998-01-01
usually written up by Logistics or Maintenance (4790 is the Maintenance “ Bible ”). If need be, and if resources are available, one could collect all...Public domain) SATAN (System Administration Tool for Analyzing Networks) (Public Domain) STAT ( Security Test and Analysis Tool) (Harris Corporation...Service-Filtering Tools 1. TCP/IP wrapper program • Tools to Scan Hosts for Known Vulnerabilities 1. ISS (Internet Security Scanner) 2. SATAN (Security
Optimal house elevation for reducing flood-related losses
NASA Astrophysics Data System (ADS)
Xian, Siyuan; Lin, Ning; Kunreuther, Howard
2017-05-01
FEMA recommends that houses in coastal flood zones be elevated to at least 1 foot above the base flood elevation (BFE). However, this guideline is not specific and ignores characteristics of houses that affect their vulnerability. An economically optimal elevation level (OEL) is proposed that minimizes the combined cost of elevation and cumulative insurance premiums over the lifespan of the house. As an illustration, analysis is performed for various coastal houses in Ortley Beach, NJ. Compared with the strategy of raising houses to 1 foot above BFE, the strategy of raising houses to their OELs is much more economical for the homeowners. Elevating to the OELs also significantly reduces government spending on subsidizing low-income homeowners through, for example, a voucher program, to mitigate flood risk. These results suggest that policy makers should consider vulnerability factors in developing risk-reduction strategies. FEMA may recommend OELs to homeowners based on their flood hazards as well as house characteristics or at least providing more information and tools to homeowners to assist them in making more economical decisions. The OEL strategy can also be coupled with a voucher program to make the program more cost-effective.
Arraes, Camila de Oliveira; Palos, Marinésia Aparecida Prado; Barbosa, Maria Alves; Teles, Sheila Araujo; Souza, Márcia Maria de; Matos, Marcos André de
2013-01-01
to analyze the relationship of masculinity, vulnerability and prevention of STD / HIV / AIDS among adolescent males of a land reform settlement in central Brazil. a qualitative study using as precepts the strands of social representations with teenagers between 12 to 24 years. three categories emerged - Perception of vulnerability; Gender and vulnerability; and, Prevention and vulnerability to STD / HIV / AIDS. Adolescents felt invulnerable to sexually transmitted diseases anchored in the social representations in favor of the male hegemony. An ignorance about forms of prevention for STD / HIV / AIDS was demonstrated in their statements. It is believed that institutional projects such as the School Health Program and the Men's Health Care Program constitute essential tools to minimize factors of vulnerability in this population, since the school is recognized as a social facility that promotes socialization of experiences and contributes to the construction of the identity of the adolescent. the social representations of masculinity collaborate for the vulnerable behavior of the adolescents for the acquisition of sexually transmitted diseases. One hopes that this study can contribute to the production of knowledge and technical-scientific improvement of the professionals, especially the nurse, in order to discuss issues related to male sexuality of adolescents in the situation of the land reform settlement.
Jacobs, Rachel H.; Reinecke, Mark A.; Gollan, Jackie K.; Kane, Peter
2008-01-01
We summarize and integrate research on cognitive vulnerability to depression among children and adolescents. We first review prospective longitudinal studies of the most researched cognitive vulnerability factors (attributional style, dysfunctional attitudes, and self-perception) and depression among youth. We next review research on information processing biases in youth. We propose that the integration of these two literatures will result in a more adequate test of cognitive vulnerability models. Last, we outline a program of research addressing methodological, statistical, and scientific limitations in the cognitive vulnerability literature. PMID:18068882
Kilburn, Kelly; Thirumurthy, Harsha; Halpern, Carolyn Tucker; Pettifor, Audrey; Handa, Sudhanshu
2016-02-01
This study investigates the causal effect of Kenya's unconditional cash transfer program on mental health outcomes of young people. Selected locations in Kenya were randomly assigned to receive unconditional cash transfers in the first phase of Kenya's Cash Transfer Program for orphans and Vulnerable Children. In intervention locations, low-income households and those with orphans and vulnerable childrens began receiving monthly cash transfers of $20 in 2007. In 2011, 4 years after program onset, data were collected on the psychosocial status for youth aged 15-24 years from households in intervention and control locations (N = 1960). The primary outcome variable was an indicator of depressive symptoms using the 10-question Center for Epidemiologic Studies Depression Scale. Secondary outcomes include an indicator for hopefulness and physical health measures. Logistic regression models that adjusted for individual and household characteristics were used to determine the effect of the cash transfer program. The cash transfer reduced the odds of depressive symptoms by 24 percent among young persons living in households that received cash transfers. Further analysis by gender and age revealed that the effects were only significant for young men and were larger among men aged 20-24 years and orphans. This study provides evidence that poverty-targeted unconditional cash transfer programs, can improve the mental health of young people in low-income countries. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
NV: Nessus Vulnerability Visualization for the Web
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harrison, Lane; Spahn, Riley B; Iannacone, Michael D
2012-01-01
Network vulnerability is a critical component of network se- curity. Yet vulnerability analysis has received relatively lit- tle attention from the security visualization community. In this paper we describe nv, a web-based Nessus vulnerability visualization. Nv utilizes treemaps and linked histograms to allow system administrators to discover, analyze, and man- age vulnerabilities on their networks. In addition to visual- izing single Nessus scans, nv supports the analysis of sequen- tial scans by showing which vulnerabilities have been fixed, remain open, or are newly discovered. Nv was also designed to operate completely in-browser, to avoid sending sensitive data to outside servers.more » We discuss the design of nv, as well as provide case studies demonstrating vulnerability analysis workflows which include a multiple-node testbed and data from the 2011 VAST Challenge.« less
SYNTHESIS OF SPATIAL DATA FOR DECISION-MAKING
EPA'S Regional Vulnerability Assessment Program (ReVA) has developed a web-based statistical tool that synthesizes available spatial data into indices of condition, vulnerability (risk, considering cumulative effects), and feasibility of management options. The Environmental Deci...
Hutchinson, Nancy L; Versnel, Joan; Poth, Cheryl; Berg, Derek; deLugt, Jenn; Dalton, C J; Chin, Peter; Munby, Hugh
2011-01-01
This paper describes and compares exemplary work-based education (WBE) programs in Ontario Canada designed to meet the needs of two groups of vulnerable youth - at-risk youth and youth with severe disabilities. Two focus group interviews were held, one with professionals from exemplary programs designed to meet the needs of at-risk youth and one with professionals from exemplary programs for youth with severe disabilities. Standard qualitative analyses were conducted on each focus group transcript to generate themes which were subsequently grouped into larger patterns. Then cross-case analyses identified consistencies and unique features within the two types of WBE programs. Two major patterns that characterize the WBE programs emerged from the analyses: the first pattern described the programmatic approaches to WBE appropriate for each type of type of student (which included themes such as the need for an alternative learning environment for at-risk youth), and the second pattern highlighted the rationale for each kind of program (which included themes like ensuring equity for youth with severe disabilities). The findings suggest that schools should continue to provide distinct WBE programs for each of these groups of vulnerable youth - at-risk youth and youth with severe disabilities.
Hames, Elizabeth; Stoler, Justin; Emrich, Christopher T; Tewary, Sweta; Pandya, Naushira
2017-11-10
We define, map, and analyze geodemographic patterns of socially and medically vulnerable older adults within the tri-county region of South Florida. We apply principal components analysis (PCA) to a set of previously identified indicators of social and medical vulnerability at the census tract level. We create and map age-stratified vulnerability scores using a geographic information system (GIS), and use spatial analysis techniques to identify patterns and interactions between social and medical vulnerability. Key factors contributing to social vulnerability in areas with higher numbers of older adults include age, large household size, and Hispanic ethnicity. Medical vulnerability in these same areas is driven by disease burden, access to emergency cardiac services, availability of nursing home and hospice beds, access to home health care, and available mental health services. Age-dependent areas of social vulnerability emerge in Broward County, whereas age-dependent areas of medical vulnerability emerge in Palm Beach County. Older-adult social and medical vulnerability interact differently throughout the study area. Spatial analysis of older adult social and medical vulnerability using PCA and GIS can help identify age-dependent pockets of vulnerability that are not easily identifiable in a populationwide analysis; improve our understanding of the dynamic spatial organization of health care, health care needs, access to care, and outcomes; and ultimately serve as a tool for health care planning. © The Author 2016. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
The value of daily money management: an analysis of outcomes and costs.
Sacks, Debra; Das, Dhiman; Romanick, Raquel; Caron, Matt; Morano, Carmen; Fahs, Marianne C
2012-01-01
For vulnerable and frail older adults, management of daily financial obligations can become an overwhelming burden spiraling into at-risk situations. Social service agencies have developed community-based Daily Money Management programs to assist these adults in protecting their financial security. Through this study the authors present the first economic estimates of the costs of Daily Money Management programs which, along with case management programs, save $60,000 per individual when compared with the cost of nursing home placement, making them highly cost effective. Most importantly, individuals are able to remain in their homes. The authors address the current gap between cost-effective community-based practice and public policy support.
Shen, Jiabin; Pang, Shulan; Schwebel, David C.
2015-01-01
Objective Dog-bite injuries pose significant threat to children globally. School-aged children are especially at risk because of their cognitively immature tendency toward low perceived vulnerability to bites, and this risk is elevated further for school-aged children living in rural China due to the large number of stray dogs, all potential rabies carriers, present in their communities. Methods This randomized controlled trial evaluated whether viewing an educational video of testimonials would change safety knowledge, perceived vulnerability, and simulated behaviors with dogs among a sample of 280 third and fourth graders living in rural China. Participants were randomly assigned to view either an educational video of testimonials on dog-bite prevention (treatment) or an educational video of testimonials on drowning prevention (comparison). Safety knowledge, perceived vulnerability to dog bites, and simulated behavior with dogs using a dollhouse model were assessed both before and after exposure to the video of testimonials. Results Children who watched the educational video of testimonials on dog-bite prevention had increased safety knowledge, higher perceived vulnerability, and less risky simulated behaviors with dogs compared to the comparison group. Mediation analysis revealed that the intervention successfully changed children's simulated behaviors with dogs through greater safety knowledge and increased perceived vulnerability. Conclusions Results suggest the incorporation of testimonials into injury prevention programs has potential for broad global dissemination. The fact that both increased knowledge and heightened perceived vulnerability mediated changes in simulated behavior suggests the dual roles of knowledge and appraisal on children's injury-risk behavior. PMID:26523353
Shen, Jiabin; Pang, Shulan; Schwebel, David C
2016-05-01
Dog-bite injuries pose significant threat to children globally. School-age children are especially at risk because of their insufficient safety knowledge and cognitively immature tendency toward low perceived vulnerability to bites, and this risk is elevated further for school-age children living in rural China due to the large number of stray dogs, all potential rabies carriers, present in their communities. This randomized controlled trial evaluated whether viewing an educational video of testimonials would change safety knowledge, perceived vulnerability, and simulated behaviors with dogs among a sample of 280 third and fourth graders living in rural China. Participants were randomly assigned to view either an educational video of testimonials on dog-bite prevention (treatment) or an educational video of testimonials on drowning prevention (comparison). Safety knowledge, perceived vulnerability to dog bites, and simulated behavior with dogs using a dollhouse model were assessed both before and after exposure to the video of testimonials. Children who watched the educational video of testimonials on dog-bite prevention had increased safety knowledge, higher perceived vulnerability, and less risky simulated behaviors with dogs compared with the comparison group. Mediation analysis revealed that the intervention successfully changed children's simulated behaviors with dogs through greater safety knowledge and increased perceived vulnerability. Results suggest the incorporation of testimonials into injury prevention programs has potential for broad global dissemination. The fact that both increased knowledge and heightened perceived vulnerability mediated changes in simulated behavior suggests the dual roles of knowledge and appraisal on children's injury-risk behavior. (c) 2016 APA, all rights reserved).
NASA Astrophysics Data System (ADS)
Ahmed, Ammar; Arthur, Craig; Edwards, Mark
2010-06-01
Bulk electricity transmission lines are linear assets that can be very exposed to wind effects, particularly where they traverse steep topography or open coastal terrain in cyclonic regions. Interconnected nature of the lattice type towers and conductors also, present complex vulnerabilities. These relate to the direction of wind attack to the conductors and the cascading failure mechanisms in which the failure of a single tower has cascading effects on neighbouring towers. Such behaviour is exacerbated by the finely tuned nature of tower design which serves to minimize cost and reserve strength at design wind speeds. There is a clear need to better quantify the interdependent vulnerabilities of these critical infrastructure assets in the context of the severe wind hazard. This paper presents a novel methodology developed for the Critical Infrastructure Protection Modelling and Analysis (CIPMA) capability for assessing local wind speeds and the likelihood of tower failure for a range of transmission tower and conductor types. CIPMA is a program managed by the Federal Attorney-General's Department and Geoscience Australia is leading the technical development. The methodology then involves the development of heuristically derived vulnerability models that are consistent with Australian industry experience and full-scale static tower testing results, considering isolated tower loss along with three interdependent failure mechanisms to give overall likelihoods of failure.
Vulnerability survival analysis: a novel approach to vulnerability management
NASA Astrophysics Data System (ADS)
Farris, Katheryn A.; Sullivan, John; Cybenko, George
2017-05-01
Computer security vulnerabilities span across large, enterprise networks and have to be mitigated by security engineers on a routine basis. Presently, security engineers will assess their "risk posture" through quantifying the number of vulnerabilities with a high Common Vulnerability Severity Score (CVSS). Yet, little to no attention is given to the length of time by which vulnerabilities persist and survive on the network. In this paper, we review a novel approach to quantifying the length of time a vulnerability persists on the network, its time-to-death, and predictors of lower vulnerability survival rates. Our contribution is unique in that we apply the cox proportional hazards regression model to real data from an operational IT environment. This paper provides a mathematical overview of the theory behind survival analysis methods, a description of our vulnerability data, and an interpretation of the results.
Policies on Protecting Vulnerable People During Disasters in Iran: A Document Analysis
Abbasi Dolatabadi, Zahra; Seyedin, Hesam; Aryankhesal, Aidin
2016-01-01
Context Developing official protection policies for disasters is a main strategy in protecting vulnerable people. The aim of this study was to analyze official documents concerning policies on protecting vulnerable people during disasters. Evidence Acquisition This study was conducted by the qualitative document analysis method. Documents were gathered by searching websites and referring to the organizations involved in disaster management. The documents were assessed by a researcher-made data collection form. A directed content analysis approach was used to analyze the retrieved documents regarding the protection policies and legislation for vulnerable people. Results A total of 22 documents were included in the final analysis. Most of the documents referred to women, children, elderly people, poor, and villagers as vulnerable people. Moreover, the documents did not provide information regarding official measures for protecting vulnerable people during different phases of disaster management. Conclusions A clear and comprehensive definition of “vulnerable people” and formulation of official policies to protect them is needs to be formulated. Given the high prevalence of disasters in Iran, policy makers need to develop effective context-based policies to protect vulnerable people during disasters. PMID:27921019
Vulnerabilities, Influences and Interaction Paths: Failure Data for Integrated System Risk Analysis
NASA Technical Reports Server (NTRS)
Malin, Jane T.; Fleming, Land
2006-01-01
We describe graph-based analysis methods for identifying and analyzing cross-subsystem interaction risks from subsystem connectivity information. By discovering external and remote influences that would be otherwise unexpected, these methods can support better communication among subsystem designers at points of potential conflict and to support design of more dependable and diagnosable systems. These methods identify hazard causes that can impact vulnerable functions or entities if propagated across interaction paths from the hazard source to the vulnerable target. The analysis can also assess combined impacts of And-Or trees of disabling influences. The analysis can use ratings of hazards and vulnerabilities to calculate cumulative measures of the severity and importance. Identification of cross-subsystem hazard-vulnerability pairs and propagation paths across subsystems will increase coverage of hazard and risk analysis and can indicate risk control and protection strategies.
Multi-dimensional flood vulnerability assessment using data envelopment analysis
NASA Astrophysics Data System (ADS)
Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd
2017-11-01
Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.
MOLECULAR GENETIC TOOLS FOR ASSESSING THE STATUS AND VULNERABILITY OF AQUATIC RESOURCES
Development of ecological indicators that efficiently capture the present condition and project future vulnerabilities of biological resources is critical to sound environmental management. For this reason, the ORD's Ecological Research Program is developing genetic methodologies...
DOT National Transportation Integrated Search
2003-05-01
The Department of Transportation's (DOT) Research and Special Programs Administration (RSPA) began research in to assess the vulnerabilities of the nation's transportation infrastructure and develop needed improvements in security in June 2001. The g...
Armed Conflict, Substance Use and HIV: A Global Analysis
Kerridge, Bradley T.; Saha, Tulshi D.; Hasin, Deborah S.
2015-01-01
Armed conflict is frequently assumed to be a contributor to the global HIV epidemic, but existing evidence is sparse. We examined the relationship between armed conflict between 2002-2008 and HIV disability life years (DALYs) in 2010 among WHO Member States. Using partial least squares analysis we also examined moderation of the armed conflict-HIV link by two susceptibility constructs (background risk, substance use) and one vulnerability mediator (numbers of refugees, people on ART, and total HIV spending). Background risk directly impacted HIV DALYs (p<0.05), substance use moderated the conflict-HIV relationship (p<0.01). The vulnerability construct mediated the conflict-HIV association (p<0.01). Findings underscore the need to align HIV prevention/intervention efforts with pre-existing HIV burden and reduce the impact of natural disasters on the populace in conflict-affected states. Integration of substance prevention/harm reduction programs within national HIV responses, attention to most-at-risk populations and increased surveillance/treatment of drug resistant HIV and TB is warranted. PMID:26286341
Regulating compassion: an overview of Canada's federal medical cannabis policy and practice.
Lucas, Philippe G
2008-01-28
In response to a number of court challenges brought forth by Canadian patients who demonstrated that they benefited from the use of medicinal cannabis but remained vulnerable to arrest and persecution as a result of its status as a controlled substance, in 1999 Canada became the second nation in the world to initiate a centralized medicinal cannabis program. Over its six years of existence, this controversial program has been found unconstitutional by a number of courts, and has faced criticism from the medical establishment, law enforcement, as well as the patient/participants themselves. This critical policy analysis is an evidence-based review of court decisions, government records, relevant studies and Access to Information Act data related to the three main facets of Health Canada's medicinal cannabis policy--the Marihuana Medical Access Division (MMAD); the Canadians Institute of Health Research Medical Marijuana Research Program; and the federal cannabis production and distribution program. This analysis also examines Canada's network of unregulated community-based dispensaries. There is a growing body of evidence that Health Canada's program is not meeting the needs of the nation's medical cannabis patient community and that the policies of the Marihuana Medical Access Division may be significantly limiting the potential individual and public health benefits achievable though the therapeutic use of cannabis. Canada's community-based dispensaries supply medical cannabis to a far greater number of patients than the MMAD, but their work is currently unregulated by any level of government, leaving these organizations and their clients vulnerable to arrest and prosecution. Any future success will depend on the government's ability to better assess and address the needs and legitimate concerns of end-users of this program, to promote and fund an expanded clinical research agenda, and to work in cooperation with community-based medical cannabis dispensaries in order to address the ongoing issue of safe and timely access to this herbal medicine.
Regulating compassion: an overview of Canada's federal medical cannabis policy and practice
Lucas, Philippe G
2008-01-01
Background In response to a number of court challenges brought forth by Canadian patients who demonstrated that they benefited from the use of medicinal cannabis but remained vulnerable to arrest and persecution as a result of its status as a controlled substance, in 1999 Canada became the second nation in the world to initiate a centralized medicinal cannabis program. Over its six years of existence, this controversial program has been found unconstitutional by a number of courts, and has faced criticism from the medical establishment, law enforcement, as well as the patient/participants themselves. Methods This critical policy analysis is an evidence-based review of court decisions, government records, relevant studies and Access to Information Act data related to the three main facets of Health Canada's medicinal cannabis policy – the Marihuana Medical Access Division (MMAD); the Canadians Institute of Health Research Medical Marijuana Research Program; and the federal cannabis production and distribution program. This analysis also examines Canada's network of unregulated community-based dispensaries. Results There is a growing body of evidence that Health Canada's program is not meeting the needs of the nation's medical cannabis patient community and that the policies of the Marihuana Medical Access Division may be significantly limiting the potential individual and public health benefits achievable though the therapeutic use of cannabis. Canada's community-based dispensaries supply medical cannabis to a far greater number of patients than the MMAD, but their work is currently unregulated by any level of government, leaving these organizations and their clients vulnerable to arrest and prosecution. Conclusion Any future success will depend on the government's ability to better assess and address the needs and legitimate concerns of end-users of this program, to promote and fund an expanded clinical research agenda, and to work in cooperation with community-based medical cannabis dispensaries in order to address the ongoing issue of safe and timely access to this herbal medicine. PMID:18226254
Examining social, physical, and environmental dimensions of tornado vulnerability in Texas.
Siebeneck, Laura
2016-01-01
To develop a vulnerability model that captures the social, physical, and environmental dimensions of tornado vulnerability of Texas counties. Guided by previous research and methodologies proposed in the hazards and emergency management literature, a principle components analysis is used to create a tornado vulnerability index. Data were gathered from open source information available through the US Census Bureau, American Community Surveys, and the Texas Natural Resources Information System. Texas counties. The results of the model yielded three indices that highlight geographic variability of social vulnerability, built environment vulnerability, and tornado hazard throughout Texas. Further analyses suggest that counties with the highest tornado vulnerability include those with high population densities and high tornado risk. This article demonstrates one method for assessing statewide tornado vulnerability and presents how the results of this type of analysis can be applied by emergency managers towards the reduction of tornado vulnerability in their communities.
How Should We Treat the Vulnerable?: Qualitative Study of Authoritative Ethics Documents.
Zagorac, Ivana
2016-01-01
The aim of this study is to explore what actual guidance is provided by authoritative ethics documents regarding the recognition and protection of the vulnerable. The documents included in this analysis are the Belmont Report, the Declaration of Helsinki, The Council for International Organizations of Medical Sciences (CIOMS) Guidelines, and the UNESCO Universal Declaration on Bioethics and Human Rights, including its supplementary report on vulnerability. A qualitative analysis of these documents was conducted in light of three questions: what is vulnerability, who are the vulnerable, and how should the vulnerable be protected? The results show significant differences among the documents regarding the first two questions. None of the documents provides any guidance on the third question (how to protect the vulnerable). These results suggest a great discrepancy between the acknowledged importance of the concept of vulnerability and a general understanding of the scope, content, and practical implications of vulnerability.
Spatial Supermarket Redlining and Neighborhood Vulnerability: A Case Study of Hartford, Connecticut
Zhang, Mengyao
2015-01-01
The disinclination of chain supermarkets to locate or pull out existing stores from impoverished neighborhoods is termed as “supermarket redlining”. This paper attempts to map and understand the spatial effects of potential supermarket redlining on food vulnerability in urban disadvantaged neighborhoods of Hartford, Connecticut. Using a combination of statistical and spatial analysis functions, we first, built a Supermarket Redlining Index (SuRI) from five indicators such as sales volume, employee count, accepts food coupons from federally assisted programs, and size and population density of the service area to rank supermarkets in the order of their importance. Second, to understand the effect of redlining, a Supermarket Redlining Impact Model (SuRIM) was built with eleven indicators describing both the socioeconomic and food access vulnerabilities. The interaction of these vulnerabilities would identify the final outcome: neighborhoods where the impact of supermarket redlining would be critical. Results mapped critical areas in the inner-city of Hartford where if a nearby supermarket closes or relocates to a suburb with limited mitigation efforts to gill the grocery gap, a large number of minority, poor, and disadvantaged residents will experience difficulties to access healthy food leading to food insecurity or perhaps a food desert. We also suggest mitigation efforts to reduce the impact of large supermarket closures. PMID:27034615
Spatial Supermarket Redlining and Neighborhood Vulnerability: A Case Study of Hartford, Connecticut.
Zhang, Mengyao; Debarchana, Ghosh
2016-02-01
The disinclination of chain supermarkets to locate or pull out existing stores from impoverished neighborhoods is termed as "supermarket redlining". This paper attempts to map and understand the spatial effects of potential supermarket redlining on food vulnerability in urban disadvantaged neighborhoods of Hartford, Connecticut. Using a combination of statistical and spatial analysis functions, we first, built a Supermarket Redlining Index (SuRI) from five indicators such as sales volume, employee count, accepts food coupons from federally assisted programs, and size and population density of the service area to rank supermarkets in the order of their importance. Second, to understand the effect of redlining, a Supermarket Redlining Impact Model (SuRIM) was built with eleven indicators describing both the socioeconomic and food access vulnerabilities. The interaction of these vulnerabilities would identify the final outcome: neighborhoods where the impact of supermarket redlining would be critical. Results mapped critical areas in the inner-city of Hartford where if a nearby supermarket closes or relocates to a suburb with limited mitigation efforts to gill the grocery gap, a large number of minority, poor, and disadvantaged residents will experience difficulties to access healthy food leading to food insecurity or perhaps a food desert. We also suggest mitigation efforts to reduce the impact of large supermarket closures.
Disaster Vulnerability in South Korea under a Gender Perspective
NASA Astrophysics Data System (ADS)
Chung, Gunhui
2017-04-01
The most affected natural disaster has been flooding in South Korea, however, many unexpected natural disasters cause by snow or drought have become severe due to the climate change. Therefore it is very important to analyze disaster vulnerability under the unexpected climate condition. When the natural disaster happens, in many cases, female was more damaged than male because of the cultural and physical limitations. Disaster is never gender neutral. For example, four times as many female as male died in Indonesia tsunami. Therefore, it is very important to consider gender sensitivity in the disaster vulnerability to mitigate effects on the female. In this study, the current disaster management guideline in South Korea is investigated in the gender perspective and compared to the other countries. As a result, gender analysis in the disaster preparedness and response is not implemented in South Korea. Thus, the gender balanced disaster management guideline is newly proposed. Also, the disaster vulnerability considering gendered factors are evaluated and analyzed in the urban area. Acknowledgement This research was supported by Support Program for Women in Science, Engineering and Technology through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT and future Planning(No. 2016H1C3A1903202)
Mankikar, Deepa; Campbell, Carla; Greenberg, Rachael
2016-09-09
This evaluation examined whether participation in a home-based environmental educational intervention would reduce exposure to health and safety hazards and asthma-related medical visits. The home intervention program focused on vulnerable, low-income households, where children had asthma, were at risk for lead poisoning, or faced multiple unsafe housing conditions. Home visitors conducted two home visits, two months apart, consisting of an environmental home assessment, Healthy Homes education, and distribution of Healthy Homes supplies. Measured outcomes included changes in participant knowledge and awareness of environmental home-based hazards, rate of children's asthma-related medical use, and the presence of asthma triggers and safety hazards. Analysis of 2013-2014 baseline and post-intervention program data for a cohort of 150 families revealed a significantly lower three-month rate (p < 0.05) of children's asthma-related doctor visits and hospital admissions at program completion. In addition, there were significantly reduced reports of the presence of home-based hazards, including basement or roof leaks (p = 0.011), plumbing leaks (p = 0.019), and use of an oven to heat the home (p < 0.001). Participants' pre- and post- test scores showed significant improvement (p < 0.05) in knowledge and awareness of home hazards. Comprehensive home interventions may effectively reduce environmental home hazards and improve the health of asthmatic children in the short term.
Lee King, Patricia A; Duan, Lei; Amaro, Hortensia
2015-01-01
We investigated social vulnerability and behavioral health clinical profiles (symptom severity) of pregnant women with co-occurring disorders, defined as substance abuse, mental illness, and trauma at treatment entry compared to their nonpregnant counterparts and the role of interpersonal abuse in clinical presentation among pregnant women. Our objective was to provide primary health care providers with insight into the needs of pregnant patients with high behavioral health risks to serve them better during the critical window of opportunity for long-term impact. We conducted cross-sectional secondary analysis of baseline data from women enrolled in treatment programs in the Women, Co-occurring Disorders and Violence Study from nine sites across the United States. We used analysis of variance and Cochran-Mantel-Haenszel statistical analyses to compare means and frequencies of social vulnerability indicators and baseline Addiction Severity Index, Brief Symptom Inventory of mental health, and Posttraumatic Stress Diagnostic Scale scores between 152 pregnant and 2,577 nonpregnant women, and between pregnant women with and without current interpersonal abuse. Compared to nonpregnant women, pregnant women evidenced more social vulnerability but better behavioral health clinical profiles at treatment entry. Current interpersonal abuse was associated with increased mental health and trauma symptomatology but not with alcohol or drug abuse severity among pregnant women. The prenatal period is an important time for screening and intervention for factors such as social vulnerability and co-occurring disorders, known to affect pregnancy and infant outcomes; social and behavioral health services are particularly essential among pregnant women with co-occurring disorders.
Greaves, Lorraine
2014-01-01
Tobacco use and exposure is unequally distributed across populations and countries and among women and men. These trends and patterns reflect and cause gender and economic inequities along with negative health impacts. Despite a commitment to gender analysis in the preamble to Framework Convention on Tobacco Control there is much yet to be done to fully understand how gender operates in tobacco control. Policies, program and research in tobacco control need to not only integrate gender, but rather operationalize gender with the goal of transforming gender and social inequities in the course of tobacco control initiatives. Gender transformative tobacco control goes beyond gender sensitive efforts and challenges policy and program developers to apply gender theory in designing their initiatives, with the goal of changing negative gender and social norms and improving social, economic, health and social indicators along with tobacco reduction. This paper outlines what is needed to progress tobacco control in enhancing the status of gendered and vulnerable groups, with a view to reducing gender and social inequities due to tobacco use and exposure. PMID:24402065
Cadman, Brie; Malone, Ruth E.
2016-01-01
Tobacco companies rely on corporate social responsibility (CSR) initiatives to improve their public image and advance their political objectives, which include thwarting or undermining tobacco control policies. For these reasons, implementation guidelines for the World Health Organization’s Framework Convention on Tobacco Control (FCTC) recommend curtailing or prohibiting tobacco industry CSR. To understand how and where major tobacco companies focus their CSR resources, we explored CSR-related content on 4 US and 4 multinational tobacco company websites in February 2014. The websites described a range of CSR-related activities, many common across all companies, and no programs were unique to a particular company. The websites mentioned CSR activities in 58 countries, representing nearly every region of the world. Tobacco companies appear to have a shared vision about what constitutes CSR, due perhaps to shared vulnerabilities. Most countries that host tobacco company CSR programs are parties to the FCTC, highlighting the need for full implementation of the treaty, and for funding to monitor CSR activity, replace industry philanthropy, and enforce existing bans. PMID:27261411
McDaniel, Patricia A; Cadman, Brie; Malone, Ruth E
2016-08-01
Tobacco companies rely on corporate social responsibility (CSR) initiatives to improve their public image and advance their political objectives, which include thwarting or undermining tobacco control policies. For these reasons, implementation guidelines for the World Health Organization's Framework Convention on Tobacco Control (FCTC) recommend curtailing or prohibiting tobacco industry CSR. To understand how and where major tobacco companies focus their CSR resources, we explored CSR-related content on 4 US and 4 multinational tobacco company websites in February 2014. The websites described a range of CSR-related activities, many common across all companies, and no programs were unique to a particular company. The websites mentioned CSR activities in 58 countries, representing nearly every region of the world. Tobacco companies appear to have a shared vision about what constitutes CSR, due perhaps to shared vulnerabilities. Most countries that host tobacco company CSR programs are parties to the FCTC, highlighting the need for full implementation of the treaty, and for funding to monitor CSR activity, replace industry philanthropy, and enforce existing bans. Copyright © 2016 Elsevier Inc. All rights reserved.
Livelihood Cycle and Vulnerability of Rural Households to Climate Change and Hazards in Bangladesh.
Alam, G M Monirul
2017-05-01
Rural riverine households in Bangladesh are confronted with many climate-driven hazards, including riverbank erosion, which results in loss of productive land and other natural resources of the riverine households, and thus threatens their livelihoods and food security. This study assesses the main drivers of vulnerability and livelihood cycle of vulnerable riparian households in Bangladesh. The study utilises the IPCC framework of vulnerability and develops a weighted approach by employing the livelihood vulnerability index and the climate vulnerability index. The results reveal that the livelihood vulnerability index and the climate vulnerability index differ across locations, however, a high index value for both measures indicates the households' high livelihood vulnerability to climate change and hazards. The main drivers that influence the vulnerability dimensions are livelihood strategies and access to food, water and health facilities. These hazard-prone households are also vulnerable due to their existing low livelihood status that leads to a vicious cycle of poverty. The findings of this study are crucial for policymakers to formulate and implement effective strategies and programs to minimise vulnerability and to enhance the local adaptation processes in order to improve such households' livelihood across Bangladesh.
Livelihood Cycle and Vulnerability of Rural Households to Climate Change and Hazards in Bangladesh
NASA Astrophysics Data System (ADS)
Alam, G. M. Monirul
2017-05-01
Rural riverine households in Bangladesh are confronted with many climate-driven hazards, including riverbank erosion, which results in loss of productive land and other natural resources of the riverine households, and thus threatens their livelihoods and food security. This study assesses the main drivers of vulnerability and livelihood cycle of vulnerable riparian households in Bangladesh. The study utilises the IPCC framework of vulnerability and develops a weighted approach by employing the livelihood vulnerability index and the climate vulnerability index. The results reveal that the livelihood vulnerability index and the climate vulnerability index differ across locations, however, a high index value for both measures indicates the households' high livelihood vulnerability to climate change and hazards. The main drivers that influence the vulnerability dimensions are livelihood strategies and access to food, water and health facilities. These hazard-prone households are also vulnerable due to their existing low livelihood status that leads to a vicious cycle of poverty. The findings of this study are crucial for policymakers to formulate and implement effective strategies and programs to minimise vulnerability and to enhance the local adaptation processes in order to improve such households' livelihood across Bangladesh.
NASA Astrophysics Data System (ADS)
Jayanimitta, M. E.; Puspasari, D. A.; Widyahantari, R.; Kristina, D.; Ratnaningtyas, T.; Setionurjaya, A.; Anindita, Y. A.
2018-02-01
Vulnerability Assessment is usually used for assessing the ability of an area on facing disaster. In previous studies, the study of Vulnerability Assessment applied only quantitative method to show the vulnerability level. Therefore, this study attempts to add information reviews using qualitative method. Kemijen City Village is one of the administrative areas in the northern part of Semarang City affected by climate change. The residents have to adapt it by renovating and elevating their houses and other infrastructures to avoid floods. There are some development programs held by government, NGOs, and corporations such as Banger Polder Development, PLPBK, etc. It is interesting to know how big the vulnerability level of Kemijen on facing flood disasters, then how the projects can affect local adaptive capacity. To answer it, this research uses mixed-method approach. Vulnerability Assessment uses quantitative method by scoring indicators of Exposure, Sensitivity, and Adaptive Capacity, while the development impact uses qualitative method. The data were collected through interviews and FGD conducted in Joint Studio Course between Diponegoro University and University of Hawaii in October 2016. Non-physical programs such as community empowerment have more positive impacts on local adaptive capacity in Kemijen. Community participation is important for environmental sustainability that can not be done in a short time to educate the people.
Modelling farm vulnerability to flooding: A step toward vulnerability mitigation policies appraisal
NASA Astrophysics Data System (ADS)
Brémond, P.; Abrami, G.; Blanc, C.; Grelot, F.
2009-04-01
Recent catastrophic flood events such as Elbe in 2002 or Rhône in 2003 have shown limits of flood management policies relying on dykes protection: worsening of flood impacts downstream, increased damage by dykes rupture. Those events, among others, contributes to radical changes on the philosophy of flood prevention, with the promotion of new orientations for mitigating flood exposition. Two new trends may have a significant impact on rural areas: floodplain restoration and vulnerability mitigation. The Rhône River program, which is an contract of objectives signed between French Government and local collectivites, is highly illustrative of these new trends and their impact on agricultural sector. In this program, it appears that areas to be concerned by floodplain restoration are agricultural ones, because their supposed vulnerability to flood is expected to be less important to urban areas. As a consequence, agricultural sector is particularly concerned by planned actions on mitigation of assets vulnerability, an important part of the program (financial support of European Union of 7.5 Million euros). Mitigation of agricultural assets vulnerability reveals particularly interesting for two following reasons. Firstly, it is a way to maintain agricultural activities in floodplains yet existing, without promoting flood protection. Secondly, in case of floodplain restoration, vulnerability mitigation is a way for local authorities to compensate over-flooding impacts. In practice, local authorities may financially support farmers for implementing measures to mitigate their farm vulnerability. On the Rhône River, an important work has already been done to identify farm vulnerability to flooding, and propose measures to mitigate it. More than 3 000 farms exposed to flood risk have been identified representing 88 690 ha of agricultural areas which is estimated to generate damage between 400 and 800 Million euros depending on the season of occurrence for a catastrophic flood. In the case of farm activities, vulnerability mitigation consists in implementing measures which can be: physical (equipment or electric power system elevation), organizational (emergency or recovery plan) or financial (insurance). These measures aim at decreasing the total damage incurred by farmers in case of flooding. For instance, if equipment is elevated, it will not suffer direct damage such as degradation. As a consequence, equipment will be available to continue production or recovery tasks, thus, avoiding indirect damage such as delays, indebtedness⦠The effects of these policies on farms, in particular vulnerability mitigation cannot be appraised using current methodologies mainly because they do not consider farm as a whole and focus on direct damage at the land plot scale (loss of yield). Moreover, since vulnerability mitigation policies are quite recent, few examples of implementation exist and no feedback experience can be processed. Meanwhile, decision makers and financial actors require more justification of the efficiency of public fund by economic appraisal of the projects. On the Rhône River, decision makers asked for an economic evaluation of the program of farm vulnerability mitigation they plan to implement. This implies to identify the effects of the measures to mitigate farm vulnerability, and to classify them by comparing their efficacy (avoided damage) and their cost of implementation. In this presentation, we propose and discuss a conceptual model of vulnerability at the farm scale. The modelling, in Unified Modelling Language, enabled to represent the ties between spatial, organizational and temporal dimensions, which are central to understanding of farm vulnerability and resilience to flooding. Through this modelling, we encompass three goals: To improve the comprehension of farm vulnerability and create a framework that allow discussion with experts of different disciplines as well as with local farmers; To identify data which are needed to implement the model and to collect them, specifically using the focus group method; Based on the conceptual model, to program a mathematical model which will be used to simulate damage (direct and indirect) on farm due to flood. This last objective should enable us to appraise policy to mitigate vulnerability which is planned to be implemented on Rhône River at the individual and regional scale. Finally, we discuss the possibility to use the UML modelling to develop a multi-agent system approach which could be interesting to take into account ties between farmers (solidarity, loan of equipment) or systemic effects due to the damage incurred by economic partners (loss of market share). Keywords vulnerability, UML modelling, farming systems, flood, mitigation policy, economic valuation
NASA Astrophysics Data System (ADS)
Auermuller, L. M.; Gatto, J.; Huch, C.
2015-12-01
The highly developed nature of New Jersey's coastline, barrier island and lagoon communities make them particularly vulnerable to storm surge, sea level rise and flooding. The impacts of Hurricane Sandy have enlightened coastal communities to these realities. Recognizing these vulnerabilities, the Jacques Cousteau National Research Reserve (JC NERR), Rutgers Center for Remote Sensing and Spatial Analysis (CRSSA), Rutgers Bloustein School and the Barnegat Bay Partnership (BBP) have developed web-based tools to assist NJ's coastal communities in visualizing and planning for future local impacts. NJFloodMapper and NJAdapt are two complementary interactive mapping websites that visualize different current and future flood hazards. These hazard layers can be combined with additional data including critical facilities, evacuation routes, socioeconomic and environmental data. Getting to Resilience is an online self-assessment tool developed to assist communities reduce vulnerability and increase preparedness by linking planning, mitigation, and adaptation. Through this interactive process communities will learn how their preparedness can yield valuable points through voluntary programs like FEMA's Community Rating System and Sustainable Jersey. The assessment process can also increase the community's understanding of where future vulnerabilities should be addressed through hazard mitigation planning. Since Superstorm Sandy, more than thirty communities in New Jersey have been provided technical assistance in assessing their risks and vulnerabilities to coastal hazards, and have begun to understand how to better plan and prepare for short and long-term changes along their shorelines.
Gu, Qian; Koenig, Lane; Faerberg, Jennifer; Steinberg, Caroline Rossi; Vaz, Christopher; Wheatley, Mary P
2014-06-01
To explore the impact of the Hospital Readmissions Reduction Program (HRRP) on hospitals serving vulnerable populations. Medicare inpatient claims to calculate condition-specific readmission rates. Medicare cost reports and other sources to determine a hospital's share of duals, profit margin, and characteristics. Regression analyses and projections were used to estimate risk-adjusted readmission rates and financial penalties under the HRRP. Findings were compared across groups of hospitals, determined based on their share of duals, to assess differential impacts of the HRRP. Both patient dual-eligible status and a hospital's dual-eligible share of Medicare discharges have a positive impact on risk-adjusted hospital readmission rates. Under current Centers for Medicare and Medicaid Service methodology, which does not adjust for socioeconomic status, high-dual hospitals are more likely to have excess readmissions than low-dual hospitals. As a result, HRRP penalties will disproportionately fall on high-dual hospitals, which are more likely to have negative all-payer margins, raising concerns of unintended consequences of the program for vulnerable populations. Policies to reduce hospital readmissions must balance the need to ensure continued access to quality care for vulnerable populations. © Health Research and Educational Trust.
Gu, Qian; Koenig, Lane; Faerberg, Jennifer; Steinberg, Caroline Rossi; Vaz, Christopher; Wheatley, Mary P
2014-01-01
Objective To explore the impact of the Hospital Readmissions Reduction Program (HRRP) on hospitals serving vulnerable populations. Data Sources/Study Setting Medicare inpatient claims to calculate condition-specific readmission rates. Medicare cost reports and other sources to determine a hospital's share of duals, profit margin, and characteristics. Study Design Regression analyses and projections were used to estimate risk-adjusted readmission rates and financial penalties under the HRRP. Findings were compared across groups of hospitals, determined based on their share of duals, to assess differential impacts of the HRRP. Principal Findings Both patient dual-eligible status and a hospital's dual-eligible share of Medicare discharges have a positive impact on risk-adjusted hospital readmission rates. Under current Centers for Medicare and Medicaid Service methodology, which does not adjust for socioeconomic status, high-dual hospitals are more likely to have excess readmissions than low-dual hospitals. As a result, HRRP penalties will disproportionately fall on high-dual hospitals, which are more likely to have negative all-payer margins, raising concerns of unintended consequences of the program for vulnerable populations. Conclusions Policies to reduce hospital readmissions must balance the need to ensure continued access to quality care for vulnerable populations. PMID:24417309
Interactive Vulnerability Analysis Enhancement Results
2012-12-01
from JavaEE web based applications to other non-web based Java programs. Technology developed in this effort should be generally applicable to other...Generating a rule is a 2 click process that requires no input from the user. • Task 3: Added support for non- Java EE applications Aspect’s...investigated a variety of Java -based technologies and how IAST can support them. We were successful in adding support for Scala, a popular new language, and
Decision Vulnerability Analysis (DVA) Program
2014-05-01
the external entities. For example, the chief financial officer can say that the organization will be buying back stock to make stockholders more...financial success Reichheld (2001) points out that a key component of success is “doing what you say you are going to do.” This applies to...that run counter to the explicit and implicit expectations expressed by the organization (e.g., do as I say , not as I do). Relevant Research Literature
Climbing the Slope of Enlightenment during NASA's Arctic Boreal Vulnerability Experiment
NASA Astrophysics Data System (ADS)
Griffith, P. C.; Hoy, E.; Duffy, D.; McInerney, M.
2015-12-01
The Arctic Boreal Vulnerability Experiment (ABoVE) is a new field campaign sponsored by NASA's Terrestrial Ecology Program and designed to improve understanding of the vulnerability and resilience of Arctic and boreal social-ecological systems to environmental change (http://above.nasa.gov). ABoVE is integrating field-based studies, modeling, and data from airborne and satellite remote sensing. The NASA Center for Climate Simulation (NCCS) has partnered with the NASA Carbon Cycle and Ecosystems Office (CCEO) to create a high performance science cloud for this field campaign. The ABoVE Science Cloud combines high performance computing with emerging technologies and data management with tools for analyzing and processing geographic information to create an environment specifically designed for large-scale modeling, analysis of remote sensing data, copious disk storage for "big data" with integrated data management, and integration of core variables from in-situ networks. The ABoVE Science Cloud is a collaboration that is accelerating the pace of new Arctic science for researchers participating in the field campaign. Specific examples of the utilization of the ABoVE Science Cloud by several funded projects will be presented.
[Frailty and its related Factors in Vulnerable Elderly Population by Age Groups].
Park, Eunok; Yu, Mi
2016-12-01
This study aimed to investigate factors affecting frailty by age groups among vulnerable elders in Korea. In this secondary analysis, data were collected from records for 22,868 eldesr registered in the Visiting Health Management program of Publci Health Centers in 2012. Health behaviors, clinically diagnosed disease, frailty, depression and cognitive condition were assessed. Data were analyzed using stepwise regression to determine the associated factors of frailty by age group. Alcohol consumption, physical activity, number of diseases, DM, CVA, arthritis, urinary incontinence, depression and cognitive condition were found to be factors significantly associated with frailty among the elders aged 65~74 (F=135.66, p<.001). Alcohol consumption, physical activity, CVA, arthritis, urinary incontinence, depression and cognitive condition were found to be factors associated with frailty in the elders aged 75~84 (F=245.40, p<.001). Physical activity, CVA, arthritis, depression and cognitive condition were factors associated with frailty in the elders over 85 years of age (F=96.48, p<.001). The findings show that frailty of elders and associated factors were different by age group, and common factors affecting frailty were physical activity, CVA, arthritis, depression and cognitive condition. Thus, these factors should be considered in the development of intervention program for care and prevention of frailty and program should be modified according to age group.
Quan, Zhan-Jun; Li, Yuan; Li, Jun-Sheng; Han, Yu; Xiao, Neng-Wen; Fu, Meng-Di
2013-06-01
In this paper, an ecological vulnerability evaluation index system for the Shengli Coalfield in Xilinguole of Inner Mongolia was established, which included 16 factors in ecological sensitivity, natural and social pressure, and ecological recovery capacity, respectively. Based on the expert scoring method and analytic hierarchy process (AHP), an ecological vulnerability model was built for the calculation of the regional ecological vulnerability by means of RS and GIS spatial analysis. An analysis of the relationships between land use and ecological vulnerability was also made, and the results were tested by spatial auto-correlation analysis. Overall, the ecological vulnerability of the study area was at medium-high level. The exploitation of four opencast areas in the Coalfield caused a significant increase of ecological vulnerability. Moreover, due to the effects of mine drained water and human activities, the 300 -2000 m around the opencast areas was turning into higher ecologically fragile area. With further exploitation, the whole Coalfield was evolved into moderate and heavy ecological vulnerability area, and the coal resources mining was a key factor in this process. The cluster analysis showed that the spatial distribution of the ecological vulnerability in the study area had reasonable clustering characteristics. To decrease the population density, control the grazing capacity of grassland, and regulate the ratios of construction land and cultivated land could be the optimal ways for resolving the natural and social pressure, and to increase the investment and improve the vegetation recovery coefficient could be the fundamental measures for decreasing the ecological vulnerability of the study area.
ERIC Educational Resources Information Center
Luguetti, Carla; Oliver, Kimberly L.; Dantas, Luiz E. P. B. T.; Kirk, David
2017-01-01
Purpose: This study discusses the process of co-constructing a prototype pedagogical model for working with youth from socially vulnerable backgrounds. Participants and settings: This six-month activist research project was conducted in a soccer program in a socially vulnerable area of Brazil in 2013. The study included 17 youths, 4 coaches, a…
Multi-level significance of vulnerability indicators. Case study: Eastern Romania
NASA Astrophysics Data System (ADS)
Stanga, I. C.; Grozavu, A.
2012-04-01
Vulnerability assessment aims, most frequently, to emphasize internal fragility of a system comparing to a reference standard, to similar systems or in relation to a given hazard. Internal fragility, either biophysical or structural, may affect the capacity to predict, to prepare for, to cope with or to recover from a disaster. Thus, vulnerability is linked to resilience and adaptive capacity. From local level to global one, vulnerability factors and corresponding indicators are different and their significance must be tested and validated in a well-structured conceptual and methodological framework. In this paper, the authors aim to show the real vulnerability of rural settlements in Eastern Romania in a multi-level approach. The research area, Tutova Hills, counts about 3421 sq.km and more than 200.000 inhabitants in 421 villages characterized by deficient accessibility, lack of endowments, subsistential agriculture, high pressure on natural environment (especially on forest and soil resources), poverty and aging process of population. Factors that could influence the vulnerability of these rural settlements have been inventoried and assigned into groups through a cluster analysis: habitat and technical urban facilities, infrastructure, economical, social and demographical indicators, environment quality, management of emergency situations etc. Firstly, the main difficulty was to convert qualitative variable in quantitative indicators and to standardize all values to make possible mathematical and statistical processing of data. Secondly, the great variability of vulnerability factors, their different measuring units and their high amplitude of variation require different method of standardization in order to obtain values between zero (minimum vulnerability) and one (maximum vulnerability). Final vulnerability indicators were selected and integrated in a general scheme, according to their significance resulted from an appropriate factor analysis: linear and logistic regression, varimax rotation, multiple-criteria decision analysis, weight of evidence, multi-criteria evaluation method etc. The approach started from the local level which allows a functional and structural analysis and was progressively translated to an upper level and to a spatial analysis. The model shows that changing the level of analysis diminishes the functional significance of some indicators and increases the capacity of discretization in the case of others, highlighting the spatial and functional complexity of vulnerability.
NASA Astrophysics Data System (ADS)
Khouakhi, A.; Snoussi, M.
2013-12-01
In the context of coastal vulnerability to climate change and human impacts, integrated coastal zone management (ICZM) is an increasingly relevant process for the sustainable development of coastal areas, in which scientific input plays a vital role. In the Mediterranean Basin, projected increases in sea level rise and in the magnitude and frequency of extreme weather events pose a major challenge for the management of low-lying coastal ecosystems and human settlements. The bay of Al Hoceima is one of the least studied and largest low-lying coastal areas of the Moroccan Mediterranean coast, and is exposed to the effects of sea level rise and storms. The coast is also a touristic area and one of the most important economic assets in the region. Physical coastal vulnerability assessments, determination of setback lines, and evaluation of coastal aquifer vulnerability to sea level rise are among the principal tools used to help decision makers in such a context. Here we quantified, in the context of sea level rise: (1) the physical vulnerability of the coastline, by developing a standard index methodology based on the five most relevant physical indices for local-scale vulnerability analysis, for a total of 822 50m/50m coastal cells; (2) coastal setback lines, based on shoreline evolutionary trends adjusted to sea level rise scenarios using a digital shoreline Analysis System (DSAS); and (3) the vulnerability to sea water intrusion in the coastal aquifer, using a modified GALDIT index (ground water occurrence, aquifer hydraulic conductivity, depth to groundwater level above the sea; distance from the shore; impact of existing status of sea water intrusion in the area; and thickness of the aquifer), following an integrated GIS approach. We find that 41% of the studied coastline is highly vulnerable to the effects of sea level rise and extreme weather events; 60% of the coastline is in retreat (with rates varying between -2m and -0.2m/y), 30% is in dynamic equilibrium (rates of -0.2 to +0.2m/y), and 10% is gradually prograding (with accretion rates of +0.2 to +0.8m/y). Setback line analysis indicates a potential retreat of the coastline of up to -90m by 2050 in the most vulnerable sectors. We find that the aquifer is subject to a moderate to high risk for at least half of its total area, and that for an assumed sea level rise of 0.5 m, the vulnerable surface area will increase by up to two times. The assessment of coastal erosion under different scenarios of sea level rise showed that, if no action is taken, most of the beaches are likely to disappear from the coupled effects of erosion and inundation. These findings will have direct repercussions for coastal development programs over both the short and long terms. The final results aim to provide coastal managers with tools to help the implementation of ICZM.
Allele-Specific Chromatin Recruitment and Therapeutic Vulnerabilities of ESR1 Activating Mutations.
Jeselsohn, Rinath; Bergholz, Johann S; Pun, Matthew; Cornwell, MacIntosh; Liu, Weihan; Nardone, Agostina; Xiao, Tengfei; Li, Wei; Qiu, Xintao; Buchwalter, Gilles; Feiglin, Ariel; Abell-Hart, Kayley; Fei, Teng; Rao, Prakash; Long, Henry; Kwiatkowski, Nicholas; Zhang, Tinghu; Gray, Nathanael; Melchers, Diane; Houtman, Rene; Liu, X Shirley; Cohen, Ofir; Wagle, Nikhil; Winer, Eric P; Zhao, Jean; Brown, Myles
2018-02-12
Estrogen receptor α (ER) ligand-binding domain (LBD) mutations are found in a substantial number of endocrine treatment-resistant metastatic ER-positive (ER + ) breast cancers. We investigated the chromatin recruitment, transcriptional network, and genetic vulnerabilities in breast cancer models harboring the clinically relevant ER mutations. These mutants exhibit both ligand-independent functions that mimic estradiol-bound wild-type ER as well as allele-specific neomorphic properties that promote a pro-metastatic phenotype. Analysis of the genome-wide ER binding sites identified mutant ER unique recruitment mediating the allele-specific transcriptional program. Genetic screens identified genes that are essential for the ligand-independent growth driven by the mutants. These studies provide insights into the mechanism of endocrine therapy resistance engendered by ER mutations and potential therapeutic targets. Copyright © 2018 Elsevier Inc. All rights reserved.
The assessment of vulnerability to natural disasters in China by using the DEA method
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wei Yiming; Fan Ying; Lu Cong
2004-05-01
China has been greatly affected by natural disasters, so that it is of great importance to analyze the impact of natural disasters on national economy. Usually, the frequency of disasters or absolute loss inflicted by disasters is the first priority to be considered, while the capability of regions to overcome disasters is ignored. The concept of vulnerability is used to measure the capability to overcome disasters in different regions with distinctive economies. Traditional methods for vulnerability analysis calculate sub-indices based on disaster frequency, loss, the economic impact and the population of each region, and then add the sub-indices to getmore » a composite index for regional vulnerability. But those methods are sensitive to the weights selected for sub-indices when multi-indexes are added up to get an index of total vulnerability. The analytic results are less convincing because of the subjectivity of different weighting methods. A data envelopment analysis (DEA)-based model for analysis of regional vulnerability to natural disasters is presented here to improve upon the traditional method. This paper systematically describes the DEA method to evaluate the relative severity of disasters in each region. A model for regional vulnerability analysis is developed, based on the annual governmental statistics from 1989 to 2000. The regional vulnerabilities in China's mainland are illustrated as a case study, and a new method for the classification of regional vulnerability to natural disasters in China is proposed.« less
Ecosystem Vulnerability Review: Proposal of an Interdisciplinary Ecosystem Assessment Approach
NASA Astrophysics Data System (ADS)
Weißhuhn, Peter; Müller, Felix; Wiggering, Hubert
2018-06-01
To safeguard the sustainable use of ecosystems and their services, early detection of potentially damaging changes in functional capabilities is needed. To support a proper ecosystem management, the analysis of an ecosystem's vulnerability provide information on its weaknesses as well as on its capacity to recover after suffering an impact. However, the application of the vulnerability concept to ecosystems is still an emerging topic. After providing background on the vulnerability concept, we summarize existing ecosystem vulnerability research on the basis of a systematic literature review with a special focus on ecosystem type, disciplinary background, and more detailed definition of the ecosystem vulnerability components. Using the Web of ScienceTM Core Collection, we overviewed the literature from 1991 onwards but used the 5 years from 2011 to 2015 for an in-depth analysis, including 129 articles. We found that ecosystem vulnerability analysis has been applied most notably in conservation biology, climate change research, and ecological risk assessments, pinpointing a limited spreading across the environmental sciences. It occurred primarily within marine and freshwater ecosystems. To avoid confusion, we recommend using the unambiguous term ecosystem vulnerability rather than ecological, environmental, population, or community vulnerability. Further, common ground has been identified, on which to define the ecosystem vulnerability components exposure, sensitivity, and adaptive capacity. We propose a framework for ecosystem assessments that coherently connects the concepts of vulnerability, resilience, and adaptability as different ecosystem responses. A short outlook on the possible operationalization of the concept by ecosystem vulnerabilty indices, and a conclusion section complete the review.
Ecosystem Vulnerability Review: Proposal of an Interdisciplinary Ecosystem Assessment Approach.
Weißhuhn, Peter; Müller, Felix; Wiggering, Hubert
2018-06-01
To safeguard the sustainable use of ecosystems and their services, early detection of potentially damaging changes in functional capabilities is needed. To support a proper ecosystem management, the analysis of an ecosystem's vulnerability provide information on its weaknesses as well as on its capacity to recover after suffering an impact. However, the application of the vulnerability concept to ecosystems is still an emerging topic. After providing background on the vulnerability concept, we summarize existing ecosystem vulnerability research on the basis of a systematic literature review with a special focus on ecosystem type, disciplinary background, and more detailed definition of the ecosystem vulnerability components. Using the Web of Science TM Core Collection, we overviewed the literature from 1991 onwards but used the 5 years from 2011 to 2015 for an in-depth analysis, including 129 articles. We found that ecosystem vulnerability analysis has been applied most notably in conservation biology, climate change research, and ecological risk assessments, pinpointing a limited spreading across the environmental sciences. It occurred primarily within marine and freshwater ecosystems. To avoid confusion, we recommend using the unambiguous term ecosystem vulnerability rather than ecological, environmental, population, or community vulnerability. Further, common ground has been identified, on which to define the ecosystem vulnerability components exposure, sensitivity, and adaptive capacity. We propose a framework for ecosystem assessments that coherently connects the concepts of vulnerability, resilience, and adaptability as different ecosystem responses. A short outlook on the possible operationalization of the concept by ecosystem vulnerabilty indices, and a conclusion section complete the review.
The concept of 'vulnerability' in research ethics: an in-depth analysis of policies and guidelines.
Bracken-Roche, Dearbhail; Bell, Emily; Macdonald, Mary Ellen; Racine, Eric
2017-02-07
The concept of vulnerability has held a central place in research ethics guidance since its introduction in the United States Belmont Report in 1979. It signals mindfulness for researchers and research ethics boards to the possibility that some participants may be at higher risk of harm or wrong. Despite its important intended purpose and widespread use, there is considerable disagreement in the scholarly literature about the meaning and delineation of vulnerability, stemming from a perceived lack of guidance within research ethics standards. The aim of this study was to assess the concept of vulnerability as it is employed in major national and international research ethics policies and guidelines. We conducted an in-depth analysis of 11 (five national and six international) research ethics policies and guidelines, exploring their discussions of the definition, application, normative justification and implications of vulnerability. Few policies and guidelines explicitly defined vulnerability, instead relying on implicit assumptions and the delineation of vulnerable groups and sources of vulnerability. On the whole, we found considerable richness in the content on vulnerability across policies, but note that this relies heavily on the structure imposed on the data through our analysis. Our results underscore a need for policymakers to revisit the guidance on vulnerability in research ethics, and we propose that a process of stakeholder engagement would well-support this effort.
DOT National Transportation Integrated Search
2009-11-01
The Oregon Department of Transportation and Portland State University evaluated the seismic : vulnerability of state highway bridges in western Oregon. The study used a computer program : called REDARS2 that simulated the damage to bridges within a t...
Early Detection Monitoring for Vulnerable Great Lakes Coastal Ecosystems
Great Lakes harbors/embayments are vulnerable to introduction of aquatic invasive species. Monitoring is needed to inform on new introductions, as well as to track success of prevention programs intended to limit spread. We have completed a pilot field case study in the Duluth-...
The U.S. Environmental Protection's Regional Vulnerability Assessment (REVA) Program is developing and evaluating approaches to integrate information on environmental condition, estimated stressor exposures, and quality of life indicators so that regional risks can be prioritized...
Ground-water vulnerability to nitrate contamination in the mid-atlantic region
Greene, Earl A.; LaMotte, Andrew E.; Cullinan, Kerri-Ann; Smith, Elizabeth R.
2005-01-01
The U.S. Environmental Protection Agency?s (USEPA) Regional Vulnerability Assessment (ReVA) Program has developed a set of statistical tools to support regional-scale, integrated ecological risk-assessment studies. One of these tools, developed by the U.S. Geological Survey (USGS), is used with available water-quality data obtained from USGS National Water-Quality Assessment (NAWQA) and other studies in association with land cover, geology, soils, and other geographic data to develop logistic-regression equations that predict the vulnerability of ground water to nitrate concentrations exceeding specified thresholds in the Mid-Atlantic Region. The models were developed and applied to produce spatial probability maps showing the likelihood of elevated concentrations of nitrate in the region. These maps can be used to identify areas that currently are at risk and help identify areas where ground water has been affected by human activities. This information can be used by regional and local water managers to protect water supplies and identify land-use planning solutions and monitoring programs in these vulnerable areas.
Hamershock, Rose A; Rajabiun, Serena; Fox, Jane E; Mofidi, Mahyar; Abel, Stephen N; York, Jill A; Kunzel, Carol; Sanogo, Moussa; Mayfield, Theresa G
2014-08-01
Access to oral health care for vulnerable populations is one of the concerns addressed by the U.S. Health Resources and Services Administration HIV/AIDS Bureau's Community-Based Dental Partnership Program (CBDPP). The program introduces dental students and residents at several dental schools to care for vulnerable patients through didactic and clinical work in community-based dental settings. This study of the dental students and residents in this program answered three questions: 1) What are their HIV knowledge, attitudes, and behaviors? 2) How has participation in the CBDPP impacted their knowledge, attitudes, and behaviors? 3) Has the intervention affected their work placement decisions and attitudes after graduation, particularly with respect to treating people living with HIV and other underserved populations? A total of 305 first- through fourth-year dental students and first- and second-year residents at five dental schools across the United States completed surveys before and after a community-based rotation and following graduation. Response rates at each of the five schools ranged from 82.4 to 100 percent. The results showed an increase in the participants' knowledge and positive attitudes regarding treatment for patients with HIV and other vulnerable populations post-rotation compared to pre-rotation. Results after graduation found that most respondents were practicing in private settings or in academic institutions as residents but were willing to treat a diverse patient population. These findings support the role of training programs, such as the CBDPP, for expanding the dental workforce to treating vulnerable populations including people living with HIV/AIDS.
Identifying Future Disease Hot Spots: Infectious Disease Vulnerability Index.
Moore, Melinda; Gelfeld, Bill; Okunogbe, Adeyemi; Paul, Christopher
2017-06-01
Recent high-profile outbreaks, such as Ebola and Zika, have illustrated the transnational nature of infectious diseases. Countries that are most vulnerable to such outbreaks might be higher priorities for technical support. RAND created the Infectious Disease Vulnerability Index to help U.S. government and international agencies identify these countries and thereby inform programming to preemptively help mitigate the spread and effects of potential transnational outbreaks. The authors employed a rigorous methodology to identify the countries most vulnerable to disease outbreaks. They conducted a comprehensive review of relevant literature to identify factors influencing infectious disease vulnerability. Using widely available data, the authors created an index for identifying potentially vulnerable countries and then ranked countries by overall vulnerability score. Policymakers should focus on the 25 most-vulnerable countries with an eye toward a potential "disease belt" in the Sahel region of Africa. The infectious disease vulnerability scores for several countries were better than what would have been predicted on the basis of economic status alone. This suggests that low-income countries can overcome economic challenges and become more resilient to public health challenges, such as infectious disease outbreaks.
NASA Astrophysics Data System (ADS)
Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu
2017-05-01
This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.
An Extreme-Value Approach to Anomaly Vulnerability Identification
NASA Technical Reports Server (NTRS)
Everett, Chris; Maggio, Gaspare; Groen, Frank
2010-01-01
The objective of this paper is to present a method for importance analysis in parametric probabilistic modeling where the result of interest is the identification of potential engineering vulnerabilities associated with postulated anomalies in system behavior. In the context of Accident Precursor Analysis (APA), under which this method has been developed, these vulnerabilities, designated as anomaly vulnerabilities, are conditions that produce high risk in the presence of anomalous system behavior. The method defines a parameter-specific Parameter Vulnerability Importance measure (PVI), which identifies anomaly risk-model parameter values that indicate the potential presence of anomaly vulnerabilities, and allows them to be prioritized for further investigation. This entails analyzing each uncertain risk-model parameter over its credible range of values to determine where it produces the maximum risk. A parameter that produces high system risk for a particular range of values suggests that the system is vulnerable to the modeled anomalous conditions, if indeed the true parameter value lies in that range. Thus, PVI analysis provides a means of identifying and prioritizing anomaly-related engineering issues that at the very least warrant improved understanding to reduce uncertainty, such that true vulnerabilities may be identified and proper corrective actions taken.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chinthavali, Supriya; Shankar, Mallikarjun
Critical Infrastructure systems(CIs) such as energy, water, transportation and communication are highly interconnected and mutually dependent in complex ways. Robust modeling of CIs interconnections is crucial to identify vulnerabilities in the CIs. We present here a national-scale Infrastructure Vulnerability Analysis System (IVAS) vision leveraging Se- mantic Big Data (SBD) tools, Big Data, and Geographical Information Systems (GIS) tools. We survey existing ap- proaches on vulnerability analysis of critical infrastructures and discuss relevant systems and tools aligned with our vi- sion. Next, we present a generic system architecture and discuss challenges including: (1) Constructing and manag- ing a CI network-of-networks graph,more » (2) Performing analytic operations at scale, and (3) Interactive visualization of ana- lytic output to generate meaningful insights. We argue that this architecture acts as a baseline to realize a national-scale network based vulnerability analysis system.« less
Richard, Lauralie; Furler, John; Densley, Konstancja; Haggerty, Jeannie; Russell, Grant; Levesque, Jean-Frederic; Gunn, Jane
2016-04-12
Improving access to primary healthcare (PHC) for vulnerable populations is important for achieving health equity, yet this remains challenging. Evidence of effective interventions is rather limited and fragmented. We need to identify innovative ways to improve access to PHC for vulnerable populations, and to clarify which elements of health systems, organisations or services (supply-side dimensions of access) and abilities of patients or populations (demand-side dimensions of access) need to be strengthened to achieve transformative change. The work reported here was conducted as part of IMPACT (Innovative Models Promoting Access-to-Care Transformation), a 5-year Canadian-Australian research program aiming to identify, implement and trial best practice interventions to improve access to PHC for vulnerable populations. We undertook an environmental scan as a broad screening approach to identify the breadth of current innovations from the field. We distributed a brief online survey to an international audience of PHC researchers, practitioners, policy makers and stakeholders using a combined email and social media approach. Respondents were invited to describe a program, service, approach or model of care that they considered innovative in helping vulnerable populations to get access to PHC. We used descriptive statistics to characterise the innovations and conducted a qualitative framework analysis to further examine the text describing each innovation. Seven hundred forty-four responses were recorded over a 6-week period. 240 unique examples of innovations originating from 14 countries were described, the majority from Canada and Australia. Most interventions targeted a diversity of population groups, were government funded and delivered in a community health, General Practice or outreach clinic setting. Interventions were mainly focused on the health sector and directed at organisational and/or system level determinants of access (supply-side). Few innovations were developed to enhance patients' or populations' abilities to access services (demand-side), and rarely did initiatives target both supply- and demand-side determinants of access. A wide range of innovations improving access to PHC were identified. The access framework was useful in uncovering the disparity between supply- and demand-side dimensions and pinpointing areas which could benefit from further attention to close the equity gap for vulnerable populations in accessing PHC services that correspond to their needs.
An Integrated Approach for Urban Earthquake Vulnerability Analyses
NASA Astrophysics Data System (ADS)
Düzgün, H. S.; Yücemen, M. S.; Kalaycioglu, H. S.
2009-04-01
The earthquake risk for an urban area has increased over the years due to the increasing complexities in urban environments. The main reasons are the location of major cities in hazard prone areas, growth in urbanization and population and rising wealth measures. In recent years physical examples of these factors are observed through the growing costs of major disasters in urban areas which have stimulated a demand for in-depth evaluation of possible strategies to manage the large scale damaging effects of earthquakes. Understanding and formulation of urban earthquake risk requires consideration of a wide range of risk aspects, which can be handled by developing an integrated approach. In such an integrated approach, an interdisciplinary view should be incorporated into the risk assessment. Risk assessment for an urban area requires prediction of vulnerabilities related to elements at risk in the urban area and integration of individual vulnerability assessments. However, due to complex nature of an urban environment, estimating vulnerabilities and integrating them necessities development of integrated approaches in which vulnerabilities of social, economical, structural (building stock and infrastructure), cultural and historical heritage are estimated for a given urban area over a given time period. In this study an integrated urban earthquake vulnerability assessment framework, which considers vulnerability of urban environment in a holistic manner and performs the vulnerability assessment for the smallest administrative unit, namely at neighborhood scale, is proposed. The main motivation behind this approach is the inability to implement existing vulnerability assessment methodologies for countries like Turkey, where the required data are usually missing or inadequate and decision makers seek for prioritization of their limited resources in risk reduction in the administrative districts from which they are responsible. The methodology integrates socio-economical, structural, coastal, ground condition, organizational vulnerabilities, as well as accessibility to critical services within the framework. The proposed framework has the following eight components: Seismic hazard analysis, soil response analysis, tsunami inundation analysis, structural vulnerability analysis, socio-economic vulnerability analysis, accessibility to critical services, GIS-based integrated vulnerability assessment, and visualization of vulnerabilities in 3D virtual city model The integrated model for various vulnerabilities obtained for the urban area is developed in GIS environment by using individual vulnerability assessments for considered elements at risk and serve for establishing the backbone of the spatial decision support system. The stages followed in the model are: Determination of a common mapping unit for each aspect of urban earthquake vulnerability, formation of a geo-database for the vulnerabilities, evaluation of urban vulnerability based on multi attribute utility theory with various weighting algorithms, mapping of the evaluated integrated earthquake risk in geographic information systems (GIS) in the neighborhood scale. The framework is also applicable to larger geographical mapping scales, for example, the building scale. When illustrating the results in building scale, 3-D visualizations with remote sensing data is used so that decision-makers can easily interpret the outputs. The proposed vulnerability assessment framework is flexible and can easily be applied to urban environments at various geographical scales with different mapping units. The obtained total vulnerability maps for the urban area provide a baseline for the development of risk reduction strategies for the decision makers. Moreover, as several aspects of elements at risk for an urban area is considered through vulnerability analyses, effect on changes in vulnerability conditions on the total can easily be determined. The developed approach also enables decision makers to monitor temporal and spatial changes in the urban environment due to implementation of risk reduction strategies.
This report describes methods for quantitative regional assessment developed by the Regional Vulnerability Assessment (ReVA) program. The goal of ReVA is to develop regional-scale assessments of the magnitude, extent, distribution, and uncertainty of current and anticipated envir...
EPA's Regional Vulnerability Assessment (ReVA) program is an approach to regional scale, priority-setting assessment being developed by EPA's Office of Research and Development (ORD). ReVA will effectively informs decision-makers as to the magnitude, extent, distribution, and unc...
40 CFR 1400.4 - Vulnerable zone indicator system.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Vulnerable zone indicator system. 1400.4 Section 1400.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY AND DEPARTMENT OF JUSTICE ACCIDENTAL RELEASE PREVENTION REQUIREMENTS; RISK MANAGEMENT PROGRAMS UNDER THE CLEAN AIR ACT SECTION 112(r)(7...
REGIONAL VULNERABILITY ASSESSMENT: CREATING A CONTEXT FOR EVALUATING STREAM ACIDIFICATION
USEPA's Regional Vulnerability Assessment (ReVA) program is designed to identify ecosystems that are likely to vary beyond the range of natural variability and thereby experience reduced ecological integrity as a result of natural and human-induced stressors. ReVA makes use of r...
Schroth, Götz; Läderach, Peter; Martinez-Valle, Armando Isaac; Bunn, Christian; Jassogne, Laurence
2016-06-15
The West African cocoa belt, reaching from Sierra Leone to southern Cameroon, is the origin of about 70% of the world's cocoa (Theobroma cacao), which in turn is the basis of the livelihoods of about two million farmers. We analyze cocoa's vulnerability to climate change in the West African cocoa belt, based on climate projections for the 2050s of 19 Global Circulation Models under the Intergovernmental Panel on Climate Change intermediate emissions scenario RCP 6.0. We use a combination of a statistical model of climatic suitability (Maxent) and the analysis of individual, potentially limiting climate variables. We find that: 1) contrary to expectation, maximum dry season temperatures are projected to become as or more limiting for cocoa as dry season water availability; 2) to reduce the vulnerability of cocoa to excessive dry season temperatures, the systematic use of adaptation strategies like shade trees in cocoa farms will be necessary, in reversal of the current trend of shade reduction; 3) there is a strong differentiation of climate vulnerability within the cocoa belt, with the most vulnerable areas near the forest-savanna transition in Nigeria and eastern Côte d'Ivoire, and the least vulnerable areas in the southern parts of Cameroon, Ghana, Côte d'Ivoire and Liberia; 4) this spatial differentiation of climate vulnerability may lead to future shifts in cocoa production within the region, with the opportunity of partially compensating losses and gains, but also the risk of local production expansion leading to new deforestation. We conclude that adaptation strategies for cocoa in West Africa need to focus at several levels, from the consideration of tolerance to high temperatures in cocoa breeding programs, the promotion of shade trees in cocoa farms, to policies incentivizing the intensification of cocoa production on existing farms where future climate conditions permit and the establishment of new farms in already deforested areas. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.
Ssewamala, Fred M; Nabunya, Proscovia; Mukasa, N Miriam; Ilic, Vilma; Nattabi, Jennifer
2014-03-01
We examine a mentorship component within a family-based economic empowerment intervention for AIDS-orphaned children in Uganda. Mentorship was guided by a comprehensive 9-session curriculum. We present themes developed from the mentors' field reports and logs. Findings suggest that mentorship offers AIDS-orphaned children opportunities to develop and strengthen future plans. Moreover, the mentorship process was beneficial to both the mentees and their mentors. The program creates a positive life trajectory for a highly vulnerable group of youth. The findings can be used to understand and design mentorship programs targeted at improving the psychosocial wellbeing of children and adolescents.
Sadler, Georgia Robins; Lee, Hau-Chen; Seung-Hwan Lim, Rod; Fullerton, Judith
2011-01-01
Nurse researchers and educators often engage in outreach to narrowly defined populations. This article offers examples of how variations on the snowball sampling recruitment strategy can be applied in the creation of culturally appropriate, community-based information dissemination efforts related to recruitment to health education programs and research studies. Examples from the primary author’s program of research are provided to demonstrate how adaptations of snowball sampling can be effectively used in the recruitment of members of traditionally underserved or vulnerable populations. The adaptation of snowball sampling techniques, as described in this article, helped the authors to gain access to each of the more vulnerable population groups of interest. The use of culturally sensitive recruitment strategies is both appropriate and effective in enlisting the involvement of members of vulnerable populations. Adaptations of snowball sampling strategies should be considered when recruiting participants for education programs or subjects for research studies when recruitment of a population based sample is not essential. PMID:20727089
Recruitment of hard-to-reach population subgroups via adaptations of the snowball sampling strategy.
Sadler, Georgia Robins; Lee, Hau-Chen; Lim, Rod Seung-Hwan; Fullerton, Judith
2010-09-01
Nurse researchers and educators often engage in outreach to narrowly defined populations. This article offers examples of how variations on the snowball sampling recruitment strategy can be applied in the creation of culturally appropriate, community-based information dissemination efforts related to recruitment to health education programs and research studies. Examples from the primary author's program of research are provided to demonstrate how adaptations of snowball sampling can be used effectively in the recruitment of members of traditionally underserved or vulnerable populations. The adaptation of snowball sampling techniques, as described in this article, helped the authors to gain access to each of the more-vulnerable population groups of interest. The use of culturally sensitive recruitment strategies is both appropriate and effective in enlisting the involvement of members of vulnerable populations. Adaptations of snowball sampling strategies should be considered when recruiting participants for education programs or for research studies when the recruitment of a population-based sample is not essential.
A pragmatic analysis of vulnerability in clinical research.
Wendler, David
2017-09-01
Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.
Community-based abstinence education project: program outcomes.
Bailey, Denise Nagle; Wolf, Zane Robinson
2015-01-01
Middle school and adolescent populations demonstrate high rates of unintended pregnancies and sexually transmitted infections, with young people in inner cities in the United States especially vulnerable. Teen births remain high, and youth are affected physically, mentally, socially, and economically. The Sex After Marriage primary prevention program, a federally funded, community-based abstinence education (CBAE) initiative, was implemented for 3 years in Philadelphia neighborhoods with vulnerable youth 12 to 18 years of age, supporting adults, healthcare professionals, and the general public. The three-tiered program offered a middle school curriculum, Sex Can Wait, at 16 different sites. The CBAE program delivered by the university's nursing center attempted to support vulnerable youths' decisions to postpone sexual activity by matching the interests of young people through an established curriculum, by holding workshops for supporting adults, and by creating a multimedia approach to supplement abstinence education initiatives including public service announcements and a website. Youth and college ambassadors and community colleagues were trained in the curriculum with a focus on healthy lifestyles. Youth and parents in experimental and control groups completed self-report surveys before and after program implementation. The project achieved most of its objectives on program evaluation. Youth (n = 1,428) 12 to 18 years of age received services, with most completing ≥75% of the program. Parents (n = 338) and other participating adults (n = 486) also received education or services. The need for risk reduction programs persists for youth in light of pregnancy, birth, and sexually transmitted disease statistics. Bailey Wolf. © 2014 Wiley Periodicals, Inc.
NASA Astrophysics Data System (ADS)
Puspito Sari, D. A.; Listiyowati, I.; Nefianto, T.; Lasmono
2018-03-01
Bogor regency consists of 40 districts, 23 are prone tonatural disasters. Klapanunggal district is listed in 10 districts declared as most vulnerable to natural disasters. Natural disasters could lead to loss of property and infrastructure damage and will affect the food security in the region. Food shortages is one example of the condition which causes food insecurity. The aim of this research is to analyze the government's food security strategy in anticipation of disaster with a case study of food insecurity in Klapanunggal district. The analysis suggested that; 1) FSVA is an appropriate program to identify food shortage areas, 2) Food Shortage Relief Program (Program Penanganan Daerah Rawan Pangan-PDRP) is the optimal efforts in reducing food shortages in the region, 3)The mismatch between FSVA indicators and Food Shortage Relief Program makes Klapanunggal district difficult in achievingfree status food-shortage. Based on the analysis, it is suggested that the implementation of Food Shortages Relief Program could be carried out based on the priority issues and implemented with integrated coordination and assistance among stakeholders. Such priority issues, integrated coordination and assistance are fully analyzed in this study.
Food Price Volatility and Decadal Climate Variability
NASA Astrophysics Data System (ADS)
Brown, M. E.
2013-12-01
The agriculture system is under pressure to increase production every year as global population expands and more people move from a diet mostly made up of grains, to one with more meat, dairy and processed foods. Weather shocks and large changes in international commodity prices in the last decade have increased pressure on local food prices. This paper will review several studies that link climate variability as measured with satellite remote sensing to food price dynamics in 36 developing countries where local monthly food price data is available. The focus of the research is to understand how weather and climate, as measured by variations in the growing season using satellite remote sensing, has affected agricultural production, food prices and access to food in agricultural societies. Economies are vulnerable to extreme weather at multiple levels. Subsistence small holders who hold livestock and consume much of the food they produce are vulnerable to food production variability. The broader society, however, is also vulnerable to extreme weather because of the secondary effects on market functioning, resource availability, and large-scale impacts on employment in trading, trucking and wage labor that are caused by weather-related shocks. Food price variability captures many of these broad impacts and can be used to diagnose weather-related vulnerability across multiple sectors. The paper will trace these connections using market-level data and analysis. The context of the analysis is the humanitarian aid community, using the guidance of the USAID Famine Early Warning Systems Network and the United Nation's World Food Program in their response to food security crises. These organizations have worked over the past three decades to provide baseline information on food production through satellite remote sensing data and agricultural yield models, as well as assessments of food access through a food price database. Econometric models and spatial analysis are used to describe the connection between shocks and food prices, and to demonstrate the importance of these metrics in overall outcomes in food-insecure communities.
Mankikar, Deepa; Campbell, Carla; Greenberg, Rachael
2016-01-01
This evaluation examined whether participation in a home-based environmental educational intervention would reduce exposure to health and safety hazards and asthma-related medical visits. The home intervention program focused on vulnerable, low-income households, where children had asthma, were at risk for lead poisoning, or faced multiple unsafe housing conditions. Home visitors conducted two home visits, two months apart, consisting of an environmental home assessment, Healthy Homes education, and distribution of Healthy Homes supplies. Measured outcomes included changes in participant knowledge and awareness of environmental home-based hazards, rate of children’s asthma-related medical use, and the presence of asthma triggers and safety hazards. Analysis of 2013–2014 baseline and post-intervention program data for a cohort of 150 families revealed a significantly lower three-month rate (p < 0.05) of children’s asthma-related doctor visits and hospital admissions at program completion. In addition, there were significantly reduced reports of the presence of home-based hazards, including basement or roof leaks (p = 0.011), plumbing leaks (p = 0.019), and use of an oven to heat the home (p < 0.001). Participants’ pre- and post- test scores showed significant improvement (p < 0.05) in knowledge and awareness of home hazards. Comprehensive home interventions may effectively reduce environmental home hazards and improve the health of asthmatic children in the short term. PMID:27618087
NASA Astrophysics Data System (ADS)
Teferra, A.; Watson, C.; Douglas, E. M.
2016-12-01
The Metro Boston region, an area whose civic leaders have been at the forefront of climate resilience initiatives in recent years, is finalizing a flood vulnerability assessment of food distribution center sites located north of Boston, with the support of the University of Massachusetts Boston and the American Geophysical Union's Thriving Earth Exchange program. The community-scientist collaboration emerged because of the need for more local analyses of the area to inform climate resiliency policy and planning actions for the region. A significant amount of the metro region's food supply passes through two major distribution centers in the cities of Everett and Chelsea, just north of the Mystic River. The Metropolitan Area Planning Council (MAPC), on behalf of the Metro Boston Climate Preparedness Taskforce, is working with Chris Watson and Ellen Douglas of UMass Boston to build on existing analyses of the region's food system and climate vulnerabilities and to develop a report identifying flood risk exposure to the sites. The analysis brings in dynamic modeling techniques that incorporate storm surge and sea level rise projections under different climate scenarios, and aims to align methodologies with those of other regional analyses, such as Climate Ready Boston and the City of Cambridge's Vulnerability Assessment. The study is helping to inform MAPC's and the Metro Boston Climate Preparedness Taskforce's understanding of this critical food distribution infrastructure, illustrate the larger regional implications of climate impacts on food distribution in the Greater Boston area, and guide the development of site-specific strategies for addressing identified vulnerabilities.
Social Studies for Somali Nomads.
ERIC Educational Resources Information Center
Brook, Diane L.; Brook, George A.
1993-01-01
Describes the Somalia Nomad Education Program. States that social studies is the core of the program which has a primary goal of developing national unity. Discusses successful features of the program and its vulnerability to political and economic events. (CFR)
Social Capital and Vulnerability from the Family, Neighborhood, School, and Community Perspectives
ERIC Educational Resources Information Center
Williams, Bonita; Le Menestrel, Suzanne M.
2013-01-01
This article reviews research and offers program examples for developing social capital in youth with a range of vulnerabilities: emotional, physical, social, and developmental. Protective factors provided by developing social capital at the individual level include access to support networks, transition to employment, and community connectedness.…
Opening Pathways for Vulnerable Young People in Patagonia
ERIC Educational Resources Information Center
Hamilton, Mary Agnes; Hamilton, Stephen F.; Bianchi, Lucia; Bran, Jacqui
2013-01-01
New and improved institutions are needed to support the transition to adulthood of vulnerable young people. Existing institutions that should provide that support demonstrate structural lag: they have not adapted to changing circumstances. Action research was conducted in Por un Manana, an employment training program for low-income youth and young…
NASA Astrophysics Data System (ADS)
Panthi, J., Sr.
2014-12-01
Climate change vulnerability depends upon various factors and differs between places, sectors and communities. People in developing countries whose subsistence livelihood depends upon agriculture and livestock are identified as particularly vulnerable. Nepal, where the majority of people are in a mixed agro-livestock system, is identified as the world's fourth most vulnerable country to climate change. However, there are few studies on how vulnerable mixed agro-livestock smallholders are and how their vulnerability differs across different ecological regions. This study aims to test two vulnerability assessment indices, livelihood vulnerability index (LVI) and IPCC vulnerability index (VI-IPCC), around the Gandaki river basin of Nepal. A total of 543 households practicing mixed agro-livestock were surveyed from three districts (Dhading, Syangja and Kapilvastu) representing the mountain, mid-hill and lowland altitudinal belts respectively. Data on socio-demographics, livelihoods, social networks, health, food and water security, natural disasters and climate variability were collected. Both indices differed across the three districts, with mixed agro-livestock smallholders of Dhading district found to be the most vulnerable and that of Syangja least vulnerable. This vulnerability index approach may be used to monitor rural vulnerability and/or evaluate potential program/policy effectiveness in poor countries like Nepal. The present findings are intended to help in designing intervention strategies to reduce vulnerability of mixed agro-livestock smallholders and other rural people in developing countries to climate change.
Vulnerability assessment of medieval civic towers as a tool for retrofitting design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Casciati, Sara; Faravelli, Lucia
2008-07-08
The seismic vulnerability of an ancient civic bell-tower is studied. Rather than seeing it as an intermediate stage toward a risk analysis, the assessment of vulnerability is here pursued for the purpose of optimizing the retrofit design. The vulnerability curves are drawn by carrying out a single time history analysis of a model calibrated on the basis of experimental data. From the results of this analysis, the medians of three selected performance parameters are estimated, and they are used to compute, for each of them, the probability of exceeding or attaining the three corresponding levels of light, moderate and severemore » damage. The same numerical model is then used to incorporate the effects of several retrofitting solutions and to re-estimate the associated vulnerability curves. The ultimate goal is to provide a numerical tool able to drive the optimization process of a retrofit design by the comparison of the vulnerability estimates associated with the different retrofitting solutions.« less
Integrated Risk Research. Case of Study: Motozintla, Chiapas, Mexico
NASA Astrophysics Data System (ADS)
Novelo-Casanova, D. A.; Jaimes, M.
2015-12-01
This integrated risk research include the analysis of all components of individual constituents of risk such hazard identification, hazard exposure, and vulnerability. We determined risk to natural hazards in the community of Motozintla located in southern Mexico in the state of Chiapas (15.37ºN, 92.25ºW. Due to its geographical and geological location, this community is continuously exposed mainly to earthquakes, landslides and floods. We developed integrated studies and analysis of seismic zonation, landslides and flood susceptibility using standard methodologies. Vulnerability was quantified from data collected from local families interviews considering five social variables: characteristics of housing construction, availability of basic public services, family economic conditions, existing community plans for disaster preparedness, and risk perception. Local families surveyed were randomly selected considering a sample statistically significant. Our results were spatially represented using a Geographical Information System (GIS). Structural vulnerability curves were generated for typical housing constructions. Our integrated risk analysis demonstrates that the community of Motozintla has a high level of structural and socio-economical risk to floods and earthquakes. More than half of the population does not know any existing Civil Protection Plan and perceive that they are in high risk to landslides and floods. Although the community is located in a high seismic risk zone, most of the local people believe that cannot be impacted by a large earthquake. These natural and social conditions indicate that the community of Motozintla has a very high level of risk to natural hazards. This research will support local decision makers in developing an integrated comprehensive natural hazards mitigation and prevention program.
76 FR 60050 - Medicaid Program: Money Follows the Person Rebalancing Demonstration Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-28
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Medicare & Medicaid Services Medicaid Program: Money Follows the Person Rebalancing Demonstration Program AGENCY: Centers for Medicare & Medicaid..., particularly given the complexity and vulnerability of the populations being served in MFP and the Congress...
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob
2017-01-01
While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.
Execution of a self-directed risk assessment methodology to address HIPAA data security requirements
NASA Astrophysics Data System (ADS)
Coleman, Johnathan
2003-05-01
This paper analyzes the method and training of a self directed risk assessment methodology entitled OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation) at over 170 DOD medical treatment facilities. It focuses specifically on how OCTAVE built interdisciplinary, inter-hierarchical consensus and enhanced local capabilities to perform Health Information Assurance. The Risk Assessment Methodology was developed by the Software Engineering Institute at Carnegie Mellon University as part of the Defense Health Information Assurance Program (DHIAP). The basis for its success is the combination of analysis of organizational practices and technological vulnerabilities. Together, these areas address the core implications behind the HIPAA Security Rule and can be used to develop Organizational Protection Strategies and Technological Mitigation Plans. A key component of OCTAVE is the inter-disciplinary composition of the analysis team (Patient Administration, IT staff and Clinician). It is this unique composition of analysis team members, along with organizational and technical analysis of business practices, assets and threats, which enables facilities to create sound and effective security policies. The Risk Assessment is conducted in-house, and therefore the process, results and knowledge remain within the organization, helping to build consensus in an environment of differing organizational and disciplinary perspectives on Health Information Assurance.
Social vulnerability indicators as a sustainable planning tool
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com
In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but alsomore » be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.« less
Modeling the Propagation of Mobile Phone Virus under Complex Network
Yang, Wei; Wei, Xi-liang; Guo, Hao; An, Gang; Guo, Lei
2014-01-01
Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively. PMID:25133209
Phrasisombath, Ketkesone; Thomsen, Sarah; Sychareun, Vanphanom; Faxelid, Elisabeth
2013-01-02
Female sex workers (FSWs) are vulnerable to sexually transmitted infections (STIs) and other types of health problems and they also encounter socio-economic difficulties. Efforts to develop effective health intervention programs for FSWs have been hampered by a lack of information on why FSWs do not seek or delay seeking treatment for STIs. To further understand their reasons, our study applied a qualitative approach to explore perceptions of health and ill-health among FSWs in Savannakhet province in Laos. Fifteen in-depth interviews were conducted with FSWs in Savannakhet province. Latent content analysis was used for analysis. Sex workers' definitions of health and wealth are intertwined. Thus, good health was described as strongly related to wealth, and wealth was needed in order to be healthy. This is explained in two sub-themes: health is necessary for work and income and ill-health creates social and economic vulnerability. Female sex workers' beliefs and perceptions about health and ill-health were dominated by their economic need, which in turn was influenced by expectations and demands from their families.
Vulnerability of populations and man-made facilities to seismic hazards
NASA Astrophysics Data System (ADS)
Badal, J.; Vazquez-Prada, M.; Gonzalez, A.; Chourak, M.; Samardzhieva, E.; Zhang, Z.
2003-04-01
Earthquakes become major societal risks when they impinge on vulnerable populations. According to the available worldwide data during the twentieth century (NEIC Catalog of Earthquakes 1980-1999), almost half a thousand of earthquakes resulted in more than 1,615,000 human victims. Besides human casualty levels, destructive earthquakes frequently inflict huge economic losses. An additional problem of very different nature, but also worthy of being considered in a damage and loss analysis, is the direct cost associated with the damages derived from a strong seismic impact. We focus our attention on both aspects to their rapid quantitative assessment, and to lessen the earthquake disaster in areas affected by relatively strong earthquakes. Our final goal is the knowledge of potential losses from earthquakes to forward national programs in emergency management, and consequently the minimization of the life loss due to earthquakes, and to aid in response and recovery tasks. For this purpose we follow a suitable and comprehensible methodology for risk-based loss analysis, and simulate the occurence of a seismic event in densely populated areas of Spain.
Vulnerability Assessments in Support of the Climate Ready ...
As part of the Climate Ready Estuaries (CRE) program, the Global Change Research Program (GCRP) in the National Center for Environmental Assessment, Office of Research and Development at the U.S. Environmental Protection Agency has prepared a report exploring a new methodology for climate change vulnerability assessments using Massachusetts Bays’ salt marsh ecosystem as a demonstration. The aim is to synthesize place-based information on the potential implications of climate change for key ecosystem processes in each estuary, in a form that will enable managers to undertake management adaptation planning.
2015-03-01
vulnerable people will have access to this airdropped consumable aid (since nobody 1 is necessarily coordinating the distribution on the ground... VBA ) platforms (see Appendix B). In particular, we used GAMS v.23.9.3 with IBM ILOG CPLEX 12.4.0.1 to solve the stochastic, mixed-integer weighted...goal programming model, and we used Excel/ VBA to create an auto- matic, user-friendly interface with the decision maker for model input and analysis of
2004-06-01
Prahalad , C. K. (1981). Headquarters influence and strategic control in MNCs. Sloan Management Review, 23(1), 15-29. Gagne, M., Koestner, R...p. 124). Rousseau, et al. (1998) defined trust as “a psychological state comprising the intention to accept vulnerability based on the positive...expectations of the intentions or behavior of another” (p. 395). McAllister (1995) defined trust as “the extent to which a person is confident in and
Carvalho, César Junior Aparecido de; Bocchi, Silvia Cristina Mangini
2017-04-01
understand the experience of the elderly with falls followed by femoral fracture and elaborate theoretical model of this process of lived experience. qualitative research with theoretical saturation through analysis of the ninth nondirected interview of elderly who underwent such experience. Interviews were recorded, transcribed, and analyzed according to Grounded Theory. three categories emerged (sub-processes): evaluating signs and symptoms of fracture after the fall; feeling sad and insecure with the new condition; and finding oneself susceptible to fractures. From realignment of these categories (sub-processes) we could abstract the central category (process), recognizing oneself as vulnerable to falls in the concreteness of the fracture. the theoretical model considering the Symbolic Interactionism signals the implementation of continued program for fall prevention, with teaching strategies that encourage the elderly to reflect on the concreteness of contexts in which there is risk of occurring injury to their health.
Ffuzz: Towards full system high coverage fuzz testing on binary executables.
Zhang, Bin; Ye, Jiaxi; Bi, Xing; Feng, Chao; Tang, Chaojing
2018-01-01
Bugs and vulnerabilities in binary executables threaten cyber security. Current discovery methods, like fuzz testing, symbolic execution and manual analysis, both have advantages and disadvantages when exercising the deeper code area in binary executables to find more bugs. In this paper, we designed and implemented a hybrid automatic bug finding tool-Ffuzz-on top of fuzz testing and selective symbolic execution. It targets full system software stack testing including both the user space and kernel space. Combining these two mainstream techniques enables us to achieve higher coverage and avoid getting stuck both in fuzz testing and symbolic execution. We also proposed two key optimizations to improve the efficiency of full system testing. We evaluated the efficiency and effectiveness of our method on real-world binary software and 844 memory corruption vulnerable programs in the Juliet test suite. The results show that Ffuzz can discover software bugs in the full system software stack effectively and efficiently.
Tinoco, Maria Auxiliadora Cannarozzo; Nodari, Christine Tessele; Pereira, Kimberllyn Rosa da Silva
2016-09-19
This study aimed to assess the environmental and social vulnerability and identify critical highway stretches for accidents involving transportation of hazardous products on the BR-101 highway between the cities of Osório and Torres in Rio Grande do Sul State, Brazil. The study's approach consisted of a multiple-criteria analysis combining highway safety analysis and environmental and social vulnerability analysis in the occurrence of accidents with hazardous products, plus cartographic analysis techniques. Thirty-eight kilometers of the highway showed high vulnerability, of which 8 kilometers with critical vulnerability, associated with bridges over rivers, water uptake points, a tunnel, environmental preservation areas, and an urban area. These stretches should be prioritized when developing action plans for accident mitigation and development of public policies for this highway. This proved to be an unprecedented approach when compared to existing studies and a potentially useful tool for decision-making in emergency operations.
Responding to the Effects of Extreme Heat: Baltimore City's Code Red Program.
Martin, Jennifer L
2016-01-01
Heat response plans are becoming increasingly more common as US cities prepare for heat waves and other effects of climate change. Standard elements of heat response plans exist, but plans vary depending on geographic location and distribution of vulnerable populations. Because heat events vary over time and affect populations differently based on vulnerability, it is difficult to compare heat response plans and evaluate responses to heat events. This article provides an overview of the Baltimore City heat response plan, the Code Red program, and discusses the city's response to the 2012 Ohio Valley/Mid Atlantic Derecho, a complex heat event. Challenges with and strategies for evaluating the program are reviewed and shared.
2000-04-21
The U.S. national civilian vulnerability to the deliberate use of biological and chemical agents has been highlighted by recognition of substantial biological weapons development programs and arsenals in foreign countries, attempts to acquire or possess biological agents by militants, and high-profile terrorist attacks. Evaluation of this vulnerability has focused on the role public health will have detecting and managing the probable covert biological terrorist incident with the realization that the U.S. local, state, and federal infrastructure is already strained as a result of other important public health problems. In partnership with representatives for local and state health departments, other federal agencies, and medical and public health professional associations, CDC has developed a strategic plan to address the deliberate dissemination of biological or chemical agents. The plan contains recommendations to reduce U.S. vulnerability to biological and chemical terrorism--preparedness planning, detection and surveillance, laboratory analysis, emergency response, and communication systems. Training and research are integral components for achieving these recommendations. Success of the plan hinges on strengthening the relationships between medical and public health professionals and on building new partnerships with emergency management, the military, and law enforcement professionals.
Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li, Qinghua; Zhang, Fengli
This paper explores a real security vulnerability and patch management dataset from an electric utility in order to shed light on characteristics of the vulnerabilities that electric utility assets have and how they are remediated in practice. Specifically, it first analyzes the distribution of vulnerabilities over software, assets, and other metric. Then it analyzes how vulnerability features affect remediate actions.
Durocher, Evelyne; Chung, Ryoa; Rochon, Christiane; Hunt, Matthew
2016-07-01
Vulnerability is a central concept in humanitarian aid. Discussions of vulnerability in disaster response literature and guidelines for humanitarian aid range from considerations of a universal human vulnerability, to more nuanced examinations of how particular characteristics render individuals more or less at risk. Despite its frequent use, there is a lack of clarity about how vulnerability is conceptualized and how it informs operational priorities in humanitarian assistance. Guided by interpretive description methodology, we draw on the feminist taxonomy of vulnerability presented by Mackenzie, Rogers and Dodds (2014) to examine perspectives of 24 expatriate and Haitian decision-makers and health professionals interviewed between May 2012 and March 2013. The analysis explores concepts of vulnerability and equity in relation to the humanitarian response following the 2010 earthquake in Haiti. Participants' conceptualizations of vulnerability included consideration for inherent vulnerabilities related to individual characteristics (e.g. being a woman or disabled) and situational vulnerabilities related to particular circumstances such as having less access to health care resources or basic necessities. Participants recognized that vulnerabilities could be exacerbated by socio-political structures but felt ill-equipped to address these. The use of the taxonomy and a set of questions inspired by Hurst's (2008) approach to identifying and reducing vulnerability can guide the analysis of varied sources of vulnerability and open discussions about how and by whom vulnerabilities should be addressed in humanitarian responses. More research is required to inform how humanitarian responders could balance addressing acute vulnerability with consideration of systemic and pre-existing circumstances that underlie much of the vulnerability experienced following an acute disaster.
Chung, Ryoa; Rochon, Christiane; Hunt, Matthew
2016-01-01
Vulnerability is a central concept in humanitarian aid. Discussions of vulnerability in disaster response literature and guidelines for humanitarian aid range from considerations of a universal human vulnerability, to more nuanced examinations of how particular characteristics render individuals more or less at risk. Despite its frequent use, there is a lack of clarity about how vulnerability is conceptualized and how it informs operational priorities in humanitarian assistance. Guided by interpretive description methodology, we draw on the feminist taxonomy of vulnerability presented by Mackenzie, Rogers and Dodds (2014) to examine perspectives of 24 expatriate and Haitian decision-makers and health professionals interviewed between May 2012 and March 2013. The analysis explores concepts of vulnerability and equity in relation to the humanitarian response following the 2010 earthquake in Haiti. Participants’ conceptualizations of vulnerability included consideration for inherent vulnerabilities related to individual characteristics (e.g. being a woman or disabled) and situational vulnerabilities related to particular circumstances such as having less access to health care resources or basic necessities. Participants recognized that vulnerabilities could be exacerbated by socio-political structures but felt ill-equipped to address these. The use of the taxonomy and a set of questions inspired by Hurst’s (2008) approach to identifying and reducing vulnerability can guide the analysis of varied sources of vulnerability and open discussions about how and by whom vulnerabilities should be addressed in humanitarian responses. More research is required to inform how humanitarian responders could balance addressing acute vulnerability with consideration of systemic and pre-existing circumstances that underlie much of the vulnerability experienced following an acute disaster. PMID:27617037
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-01
... design estimates. Analyses performed under the Generic Issue program (GIP) indicated the need to evaluate... Examination of External Events (IPEEE) for Severe Accident Vulnerabilities,'' (ADAMS Accession No. ML031150485) to request that each licensee identify and report to the NRC all plant- specific vulnerabilities to...
Perception of HIV prevention programs among Ayoreo sex workers in Bolivia.
López-Entrambasaguas, Olga María; Fernández-Sola, Cayetano; Granero-Molina, José
2015-11-01
The Ayoreo population constitutes one of Bolivia's most vulnerable ethnic groups in terms of HIV/AIDS. Being a woman, indigenous, and a sex worker signifies belonging to a high-risk group. The aim of this study is to explore the Ayoreo sex workers' and health agents' perceptions of HIV/AIDS prevention programs in order to identify variables that could influence their success or failure. This study used an ethnographic methodology that included participant observation and semistructured interviews. In the data collection, participant observation and semistructured interviews with sex workers and key informants were conducted. Three themes emerged from the inductive data analysis: health prevention efforts, cultural inadequacy of prevention programs, and the eventuality of interventions. We conclude that nursing can develop culturally-adequate HIV/AIDS prevention interventions and programs as well as promote health within these populations. © The Author(s) 2014.
Population-focused nursing: advocacy for vulnerable populations in an RN-BSN program.
Jones, Melissa; Smith, Paul
2014-01-01
The purpose of this article is to describe an innovative learning activity for online RN-BSN students designed to foster advocacy for vulnerable populations. The Vulnerable Population Advocacy Assignment, included as a component of the online Population-Focused Nursing class, provides students with the opportunity to identify and develop an awareness of issues impacting vulnerable populations and to advocate for policy changes that will influence the health of individuals, families, and populations. RN-BSN students build on previous knowledge and skills in professional communication and advocacy as they develop a policy statement designed to address health disparities impacting local, national, and global populations. © 2014 Wiley Periodicals, Inc.
Economic vulnerability of timber resources to forest fires.
y Silva, Francisco Rodríguez; Molina, Juan Ramón; González-Cabán, Armando; Machuca, Miguel Ángel Herrera
2012-06-15
The temporal-spatial planning of activities for a territorial fire management program requires knowing the value of forest ecosystems. In this paper we extend to and apply the economic valuation principle to the concept of economic vulnerability and present a methodology for the economic valuation of the forest production ecosystems. The forest vulnerability is analyzed from criteria intrinsically associated to the forest characterization, and to the potential behavior of surface fires. Integrating a mapping process of fire potential and analytical valuation algorithms facilitates the implementation of fire prevention planning. The availability of cartography of economic vulnerability of the forest ecosystems is fundamental for budget optimization, and to help in the decision making process. Published by Elsevier Ltd.
Engineering Safety- and Security-Related Requirements for Software-Intensive Systems
2010-04-27
Requirements Negative (shall not) Requirements Hardware Requirements equ remen s System / Documentation Requirements eve oper Requirements Operational ...Validation Actual / Proposed Defensibility C li Operational Vulnerability Analysis VulnerabilityVulnerability Safety Vulnerability performs System ...including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson
Understanding Young Women's Sexual Relationship Experiences: The Nature and Role of Vulnerability
ERIC Educational Resources Information Center
Maxwell, Claire
2006-01-01
This paper seeks to operationalise the concept of social "vulnerability" and explore its usefulness as a framework for understanding sexual relationships. Data from 30 vulnerable and less vulnerable young women in one UK city were collected through in-depth interviews and focus groups. An analysis of differences and similarities in…
Blanchard, Andrea K; Nair, Sapna G; Bruce, Sharon G; Ramanaik, Satyanarayana; Thalinja, Raghavendra; Murthy, Srikanta; Javalkar, Prakash; Pillai, Priya; Collumbien, Martine; Heise, Lori; Isac, Shajy; Bhattacharjee, Parinita
2018-05-11
Research has increasingly documented the important role that violence by clients and the police play in exacerbating HIV vulnerability for women in sex work. However few studies have examined violence in the intimate relationships of women in sex work, or drawn on community partnerships to explore the social dynamics involved. A community-based participatory research study was undertaken by community and academic partners leading intimate partner violence (IPV) and HIV prevention programs in Bagalkot district, Karnataka state, India. The purpose was to explore the experience and understandings of intimate partner violence and HIV/AIDS among women in sex work and their intimate partners in Bagalkot that would inform both theory and practice. A community-based, interpretive qualitative methodology was used. Data was collected between July and October 2014 through in-depth interviews with 38 participants, including 10 couples, 13 individual female sex workers, and 5 individual male intimate partners. Purposive sampling was done to maximize variation on socio-demographic characteristics. Thematic content analysis was conducted through coding and categorization for each interview question in NVivo 10.0, followed by collaborative analysis to answer the research questions. The results showed that an array of interrelated, multi-level factors underlay the widespread acceptance and perpetuation of violence and lack of condom use in participants' intimate relationships. These included individual expectations that justified violence and reflected societal gender norms, compounded by stigma, legal and economic constraints relating to sex work. The results demonstrate that structural vulnerability to IPV and HIV must be addressed not only on the individual and relationship levels to resolve relevant triggers of violence and lack of condom use, but also the societal-level to address gender norms and socio-economic constraints among women in sex work and their partners. The study contributes to a better understanding on the interplay of individual agency and structural forces at a time when researchers and program planners are increasingly pondering how best to address complex and intersecting social and health issues. Ongoing research should assess the generalizability of the results and the effectiveness of structural interventions aiming to reduce IPV and HIV vulnerability in other contexts.
Vulnerability related to oral health in early childhood: a concept analysis.
Mattheus, Deborah J
2010-09-01
This article is a report of the analysis of the concept of vulnerability and its relationship to oral health in early childhood. Poor oral health is a continued problem for children worldwide. Vulnerability increases the probability of poor oral health outcomes. The lack of clarity of the concept of vulnerability creates difficulty in understanding this multi-factoral condition. Data source included 34 articles covering the period 2000-2009 from a variety of disciplines, including nursing, dentistry, medicine and public health. The concept analysis was conducted using Rodgers' evolutionary method. The literature was analysed and a social ecology model was used to frame the discussion, recognizing family and community influences on children's oral health. The context of oral health in early childhood contributes to the changes in the concept vulnerability. The attributes are closely related to family and community factors and identified as limited parental income, parental education, community-based services and fluoride; and exposure to poor parental habits, parental neglect and harmful toxins. The primary antecedent is identified as a form of limited protection from exposure to various circumstances. Children with limited protection have increased vulnerability and greater probability of poor health outcomes. Nurses who understand the concept of vulnerability related to oral health and can identify factors that create protection and are capable of decreasing vulnerability through parent education, community awareness and policy changes that support children and families.
75 FR 14176 - Statement of Organization, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-24
... and on matters that affect other units and levels of government. Contributes to the formulation of... formulation, coordination, integration, implementation, and evaluation of national Medicare program policies... Program Integrity on the identification of program vulnerabilities and implementation of strategies to...
Weinhardt, Lance S; Galvao, Loren W; Mwenyekonde, Thokozani; Grande, Katarina M; Stevens, Patricia; Yan, Alice F; Mkandawire-Valhmu, Lucy; Masanjala, Winford; Kibicho, Jennifer; Ngui, Emmanuel; Emer, Lindsay; Watkins, Susan C
2014-01-01
Poverty and lack of a predictable, stable source of food are two fundamental determinants of ill health, including HIV/AIDS. Conversely, episodes of poor health and death from HIV can disrupt the ability to maintain economic stability in affected households, especially those that rely on subsistence farming. However, little empirical research has examined if, and how, improvements in people's economic status and food security translate into changes in HIV vulnerability. In this paper, we describe in detail the methods and protocol of an academic-NGO collaboration on a quasi-experimental, longitudinal study of the mechanisms and magnitude of the impact of a multilevel economic and food security program (Support to Able-Bodied Vulnerable Groups to Achieve Food Security; SAFE), as implemented by CARE. Primary outcomes include HIV vulnerability (i.e., HIV risk behaviors, HIV infection), economic status (i.e., income, household assets) and food security (including anthropometric measures). We recruited participants from two types of areas of rural central Malawi: traditional authorities (TA) selected by CARE to receive the SAFE program (intervention group) and TAs receiving other unrelated CARE programming (controls). In the intervention TAs, we recruited 598 program participants (398 women, 200 men) and interviewed them at baseline and 18- and 36-month follow-ups; we interviewed 301 control households. In addition, we conducted random surveys (n = 1002) in the intervention and control areas with a 36-month assessment interval, prior to and after implementation of SAFE. Thus, we are examining intervention outcomes both in direct SAFE program participants and their larger communities. We are using multilevel modeling to examine mediators and moderators of the effects of SAFE on HIV outcomes at the individual and community levels and determine the ways in which changes in HIV outcomes feed back into economic outcomes and food security at later interviews. Finally, we are conducting a qualitative end-of-program evaluation consisting of in-depth interviews with 90 SAFE participants. In addition to examining pathways linking structural factors to HIV vulnerability, this research will yield important information for understanding the impact of a multilevel environmental/structural intervention on HIV, with the potential for other sustainable long-term public health benefits.
ERIC Educational Resources Information Center
Blustein, David L.; Goodyear, Rodney K.; Perry, Justin C.; Cypers, Scott
2005-01-01
Despite strong indicators of the robustness of counseling psychology, the specialty seems somewhat vulnerable, as evidenced by the fact that several solid programs have been forced to phase out or to convert to combined-integrated programs. In fact, analyzing the trends among counseling psychology programs reveals that 30% of programs that have…
Weinhardt, Lance S; Galvao, Loren W; Yan, Alice F; Stevens, Patricia; Mwenyekonde, Thokozani Ng'ombe; Ngui, Emmanuel; Emer, Lindsay; Grande, Katarina M; Mkandawire-Valhmu, Lucy; Watkins, Susan C
2017-03-01
The objective of the Savings, Agriculture, Governance, and Empowerment for Health (SAGE4Health) study was to evaluate the impact of a large-scale multi-level economic and food security intervention on health outcomes and HIV vulnerability in rural Malawi. The study employed a quasi-experimental non-equivalent control group design to compare intervention participants (n = 598) with people participating in unrelated programs in distinct but similar geographical areas (control, n = 301). We conducted participant interviews at baseline, 18-, and 36-months on HIV vulnerability and related health outcomes, food security, and economic vulnerability. Randomly selected households (n = 1002) were interviewed in the intervention and control areas at baseline and 36 months. Compared to the control group, the intervention led to increased HIV testing (OR 1.90; 95 % CI 1.29-2.78) and HIV case finding (OR = 2.13; 95 % CI 1.07-4.22); decreased food insecurity (OR = 0.74; 95 % CI 0.63-0.87), increased nutritional diversity, and improved economic resilience to shocks. Most effects were sustained over a 3-year period. Further, no significant differences in change were found over the 3-year study period on surveys of randomly selected households in the intervention and control areas. Although there were general trends toward improvement in the study area, only intervention participants' outcomes were significantly better. Results indicate the intervention can improve economic and food security and HIV vulnerability through increased testing and case finding. Leveraging the resources of economic development NGOs to deliver locally-developed programs with scientific funding to conduct controlled evaluations has the potential to accelerate the scientific evidence base for the effects of economic development programs on health.
Laverdière, Émélie; Généreux, Mélissa; Gaudreau, Pierrette; Morais, José A; Shatenstein, Bryna; Payette, Hélène
2015-06-18
Heat vulnerability is increasing owing to climate change, aging and urbanization. This vulnerability may vary geographically. Our study examined the prevalence and distribution of risk and protective factors of heat-related outcomes among older adults across three health regions of Southern Quebec (Canada). This secondary cross-sectional study used data from the 1st follow-up of the NuAge longitudinal study, a cohort of community-dwelling older adults, aged 68-82 years at baseline, of three health regions: Eastern Townships, Montreal and Laval. Prevalence of factors, identified in Health Canada guidelines, was measured. An Older Adult Heat Vulnerability Index (OAHVI) simultaneously considering medical, social and environmental factors was constructed. The distribution of each factor and OAHVI was examined across the three regions. Results were weighted for age, sex (overall and region-specific analyses) and region (overall analyses). Ninety percent of participants had ≥1 risk factor, the most prevalent being: cardiovascular medication (50.8%), hypertension (46.7%), living alone (39.2%), cardiovascular disease (36.9%), living in an urban heat island (34.7%) and needing help in activities of daily living (26.5%). Two thirds of participants had ≥1 protective factor, the most prevalent being talking on the phone daily (70.9%). Heat vulnerability varied greatly by region and this variation was mainly attributable to social and environmental rather than medical factors. According to the OAHVI, 87.2% of participants cumulated ≥2 factors (median = 3.0 factors/participant). Our results support the need for small-scale assessment of heat vulnerability. This study could help stakeholders tackle heat-related illness and develop regionally tailored prevention programs.
Eisenberg, Marla E; Gower, Amy L; McMorris, Barbara J; Bucchianeri, Michaela M
2015-09-01
We examined perpetration of bullying among youths in vulnerable groups relative to youths in peer groups not categorized as vulnerable. Data were collected in 2013 from a large school-based survey of adolescents conducted in Minnesota (n = 122,180). We used the χ(2) test and logistic regression to compare measures of perpetration of physical and relational bullying, as well as experiences of victimization and perpetration (or both), across categories of sexual orientation, weight status, and disability status. Rates of physical and relational bullying perpetration were significantly higher among youths in vulnerable groups than among those not in vulnerable groups. With respect to context of victimization experiences, young men and women from vulnerable groups were overrepresented in the group comprising both perpetrators and victims. For example, odds of being both a perpetrator and a victim were 1.41 to 3.22 times higher among gay, lesbian, and bisexual youths than among heterosexual youths. Vulnerable youths, who are prone to peer harassment, may also act as perpetrators of bullying. Prevention strategies should address the particular needs of these populations; targeted programming may be appropriate.
NASA Astrophysics Data System (ADS)
Kasprzyk, J. R.; Reed, P. M.; Kirsch, B. R.; Characklis, G. W.
2009-12-01
Risk-based water supply management presents severe cognitive, computational, and social challenges to planning in a changing world. Decision aiding frameworks must confront the cognitive biases implicit to risk, the severe uncertainties associated with long term planning horizons, and the consequent ambiguities that shape how we define and solve water resources planning and management problems. This paper proposes and demonstrates a new interactive framework for sensitivity informed de novo programming. The theoretical focus of our many-objective de novo programming is to promote learning and evolving problem formulations to enhance risk-based decision making. We have demonstrated our proposed de novo programming framework using a case study for a single city’s water supply in the Lower Rio Grande Valley (LRGV) in Texas. Key decisions in this case study include the purchase of permanent rights to reservoir inflows and anticipatory thresholds for acquiring transfers of water through optioning and spot leases. A 10-year Monte Carlo simulation driven by historical data is used to provide performance metrics for the supply portfolios. The three major components of our methodology include Sobol globoal sensitivity analysis, many-objective evolutionary optimization and interactive tradeoff visualization. The interplay between these components allows us to evaluate alternative design metrics, their decision variable controls and the consequent system vulnerabilities. Our LRGV case study measures water supply portfolios’ efficiency, reliability, and utilization of transfers in the water supply market. The sensitivity analysis is used interactively over interannual, annual, and monthly time scales to indicate how the problem controls change as a function of the timescale of interest. These results have been used then to improve our exploration and understanding of LRGV costs, vulnerabilities, and the water portfolios’ critical reliability constraints. These results demonstrate how we can adaptively improve the value and robustness of our problem formulations by evolving our definition of optimality to discover key tradeoffs.
ERIC Educational Resources Information Center
Terrion, Jenepher Lennox
2006-01-01
Researchers suggest that key to addressing the needs of vulnerable families is to involve parents in their child's academic life. However, this article argues, it is not simply involvement that matters for the improved functioning of these families but the production of the three dimensions of social capital (bonding, bridging, and linking)…
2014-09-01
executable that is setuid root.4 fingerd The Morris worm exploited a buffer overflow in the fingerd program to gain unauthorized access to computer...in other taxonomies. There are still holes ; in fact, none of the vulnerabilities that Bishop discussed have a clear place in this taxonomy until a
ERIC Educational Resources Information Center
Mears, Melynda; Singletary, Jon; Rogers, Rob
2011-01-01
This qualitative study explored the extent to which programs in a religiously affiliated agency in Kenya incorporate 12 internationally sanctioned strategies for supporting orphans and vulnerable children in Sub-Saharan Africa (Olson, Knight, & Foster, 2006). The results indicated that all 12 strategies were being employed, though to varying…
A user exposure based approach for non-structural road network vulnerability analysis
Jin, Lei; Wang, Haizhong; Yu, Le; Liu, Lin
2017-01-01
Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework. Three aspects of the framework are mainly described: (i) the rationality of non-structural road network vulnerability, (ii) the metrics for negative consequences accounting for variant road conditions, and (iii) the introduction of a new vulnerability index based on user exposure. Based on the proposed methodology, a case study in the Sioux Falls network which was usually threatened by regular heavy snow during wintertime is detailedly discussed. The vulnerability ranking of links of Sioux Falls network with respect to heavy snow scenario is identified. As a result of non-structural consequences accompanied by conceivable degeneration of network, there are significant increases in generalized travel time costs which are measurements for “emotionally hurt” of topological road network. PMID:29176832
NASA Astrophysics Data System (ADS)
Subjects related to electromagnetic compatibility (EMC) analysis are discussed, taking into account forcing terms of line equations for externally excited transmission lines, E-fields over ground, electromagnetic near fields as a function of electrical size, a program for experimental verification of EMC analysis models, random susceptability of an IC 7400 TTL NAND gate, and a comparison of IEMCAP and SEMCAP. Other topics explored are concerned with EMC measurements, spectrum management, the electromagnetic pulse (EMP), a Navy EMC program, measurement systems, filters, EMC design, electromagnetic vulnerability (EMV) assessment of weapon systems, FCC rules and regulations, shielding, and electromagnetic interference (EMI) in communication systems. Attention is also given to nonsinusoidal functions in radar and communications, transients/electrostatic discharge, open field testing, cables and connectors, interference effects of induced and conducted earth current at dc and ELF, test cells, and cable coupling.
Prevalence of metabolic syndrome and cardiovascular risk level in a vulnerable population.
Kim, Chun-Ja; Park, JeeWon; Kang, Se-Won
2015-04-01
This study examined the prevalence of metabolic syndrome and the risk level of cardiovascular disease (CVD) in a vulnerable population of 407 subjects in Korea. This descriptive study was a part of the Tailed Health Visiting Service Program, using baseline data from public health centres in Suwon, Korea. The definition of metabolic syndrome was based on the National Cholesterol Education Program criteria, and risk of CVD was estimated according to the Framingham study equation. This study demonstrated that the prevalence of metabolic syndrome was 40.8% higher and the risk of CVD was significantly 3.1 times higher among those with metabolic syndrome than among those without it. Of those with metabolic syndrome, 50.6% overall and 81.1% of men had a high risk for CVD. These findings suggest a need to screen and prevent the risk of CVD in vulnerable populations with metabolic syndrome. © 2014 Wiley Publishing Asia Pty Ltd.
Economic Analysis of Cyber Security
2006-07-01
vulnerability databases and track the number of incidents reported by U.S. organizations. Many of these are private organizations, such as the security...VULNERABILITY AND ATTACK ESTIMATES Numerous organizations compile vulnerability databases and patch information, and track the number of reported incidents... database / security focus Databases of vulnerabilities identifying the software versions that are susceptible, including information on the method of
Interactive Programming Support for Secure Software Development
ERIC Educational Resources Information Center
Xie, Jing
2012-01-01
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Kuyper, Lisette; de Wit, John; Smolenski, Derek; Adam, Philippe; Woertman, Liesbeth; van Berlo, Willy
2013-11-01
The development of effective policies and programs to prevent sexual coercion among young people requires thorough understanding of the diversity of coercive sexual experiences, patterns in such types of experiences, and similarities and differences between subgroups, especially by gender, in patterns of coercive sexual experiences and associations with potential vulnerability factors. The present online self-report study assessed a wide range of coercive sexual experiences and potential vulnerability factors among a sociodemographically diverse sample of 1,319 young people (16-25 years old) in The Netherlands. Findings confirm that sexual coercion comprises a diversity of experiences, with rates differing substantially across types of coercion. Latent class analysis revealed distinct patterns of coercive sexual experiences for young women and young men. Among young men, three patterns of experiences were found: no coercive sexual experiences, experience with verbal pressure, and experience with verbal pressure as well as coercion related to alcohol intoxication. Among young women, four patterns of coercive experiences were identified. In addition to the three patterns observed among young men, a fourth pattern encompassed experiences with verbal pressure as well as the use of force or violence. Higher numbers of sexual partners, lower levels of sexual refusal skills, and higher levels of token resistance were consistently associated with increased vulnerability. Findings illustrate the importance of communication skills and suggest that sexual communication training should be an integral part of sexuality education.
[Vulnerability to HIV: tourism and the use of alcohol and other drugs].
Santos, Alessandro de Oliveira; Paiva, Vera
2007-12-01
To describe situations of alcohol and other drug use involving tourists, and their implications regarding vulnerability to HIV. This was an exploratory qualitative study conducted in communities that host tourism in the Vale do Ribeira, State of São Paulo, from October 2002 to February 2003. In the first stage of the study, 29 monitors in four host communities were interviewed to gather scenarios of drug use involving tourists. In the second stage, two workshops were held, bringing together 77 interviewees and health and education professionals from ten communities, in order to dramatize the scenarios gathered in the interviews and share repertoires for dealing with these situations and finding ways for preventing HIV. The scenarios showed that alcohol and other drug use by tourists increases their vulnerability to HIV transmission through favoring casual sexual intercourse without condoms and sexual harassment and abuse. HIV prevention work in these communities that host tourism needs to take into account the consumption of these substances which use creates difficulties regarding safe sex practices and, in the case of injecting drugs that are shared, constitutes a risk factor for HIV transmission. This study provided data to help in understanding how situations of alcohol and other drug use fit within daily life in these host communities, thereby extending the vulnerability to HIV. The study produced analysis of the social context of HIV transmission that may provide backing for drawing up prevention programs that are better adapted to these communities.
Barrington, Clare; Villa-Torres, Laura; Abdoulayi, Sara; Tsoka, Maxton Grant; Mvula, Peter Matthias
2017-10-01
Unconditional cash transfer programs are a form of structural intervention to address poverty, a "fundamental cause" of disease. Such programs increasingly aim to build resilience to sustain improved outcomes and provide a solid foundation for longer term transformations. As such, there is a need to understand what resilience means in specific contexts. The goal of this formative study was to explore local experiences of resilience and vulnerability among 11 youth-caregiver dyads ( n = 22) who were beneficiaries of the Malawi Social Cash Transfer Program in Balaka district. We used a photo-elicitation approach informed by the participatory, visual methodology photovoice to guide the study and conducted an iterative content analysis using thematic coding of transcripts and photos. Participants took pictures of their daily struggles and shocks and participated in audio-recorded discussions to reflect on the photos using an adapted version of the SHOWeD method. We found that participants characterized resilience as a tireless process of using all available individual, family, and community resources at all times in pursuit of survival and well-being. In the context of daily struggles, resilience was an essential part of survival. Shocks, mostly health-related, were depicted through staged images candidly highlighting individual and environmental vulnerabilities. Community support was an essential component of resilience for both daily struggles and shocks. Using photo-elicitation methods facilitated an intergenerational, community-driven reflection on the meaning of resilience and the multilevel determinants of health in a context of extreme poverty. Findings can inform the design of resilience-focused cash transfer programs to improve health equity.
Mayega, R W; Wafula, M R; Musenero, M; Omale, A; Kiguli, J; Orach, G C; Kabagambe, G; Bazeyo, W
2013-06-01
Most countries in sub-Saharan Africa have not conducted a disaster risk analysis. Hazards and vulnerability analyses provide vital information that can be used for development of risk reduction and disaster response plans. The purpose of this study was to rank disaster hazards for Uganda, as a basis for identifying the priority hazards to guide disaster management planning. The study as conducted in Uganda, as part of a multi-country assessment. A hazard, vulnerability and capacity analysis was conducted in a focus group discussion of 7 experts representing key stakeholder agencies in disaster management in Uganda. A simple ranking method was used to rank the probability of occurance of 11 top hazards, their potential impact and the level vulnerability of people and infrastructure. In-terms of likelihood of occurance and potential impact, the top ranked disaster hazards in Uganda are: 1) Epidemics of infectious diseases, 2) Drought/famine, 3) Conflict and environmental degradation in that order. In terms of vulnerability, the top priority hazards to which people and infrastructure were vulnerable were: 1) Conflicts, 2) Epidemics, 3) Drought/famine and, 4) Environmental degradation in that order. Poverty, gender, lack of information, and lack of resilience measures were some of the factors promoting vulnerability to disasters. As Uganda develops a disaster risk reduction and response plan, it ought to prioritize epidemics of infectious diseases, drought/famine, conflics and environmental degradation as the priority disaster hazards.
Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure
NASA Astrophysics Data System (ADS)
Arndt, Craig M.; Hall, Nathaniel A.
2004-08-01
Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.
Pignone, Michael P; Crutchfield, Trisha M; Brown, Paul M; Hawley, Sarah T; Laping, Jane L; Lewis, Carmen L; Lich, Kristen Hassmiller; Richardson, Lisa C; Tangka, Florence Kl; Wheeler, Stephanie B
2014-11-30
Screening for colorectal cancer (CRC) is suboptimal, particularly for vulnerable populations. Effective intervention programs are needed to increase screening rates. We used a discrete choice experiment (DCE) to learn about how vulnerable individuals in North Carolina value different aspects of CRC screening programs. We enrolled English-speaking adults ages 50-75 at average risk of CRC from rural North Carolina communities with low rates of CRC screening, targeting those with public or no insurance and low incomes. Participants received basic information about CRC screening and potential program features, then completed a 16 task DCE and survey questions that examined preferences for four attributes of screening programs: testing options available; travel time required; money paid for screening or rewards for completing screening; and the portion of the cost of follow-up care paid out of pocket. We used Hierarchical Bayesian methods to calculate individual-level utilities for the 4 attributes' levels and individual-level attribute importance scores. For each individual, the attribute with the highest importance score was considered the most important attribute. Individual utilities were then aggregated to produce mean utilities for each attribute. We also compared DCE-based results with those from direct questions in a post-DCE survey. We enrolled 150 adults. Mean age was 57.8 (range 50-74); 55% were women; 76% White and 19% African-American; 87% annual household income under $30,000; and 51% were uninsured. Individuals preferred shorter travel; rewards or small copayments compared with large copayments; programs that included stool testing as an option; and greater coverage of follow-up costs. Follow-up cost coverage was most frequently found to be the most important attribute from the DCE (47%); followed by test reward/copayment (33%). From the survey, proportion of follow-up costs paid was most frequently cited as most important (42% of participants), followed by testing options (32%). There was moderate agreement (45%) in attribute importance between the DCE and the single question in the post-DCE survey. Screening test copayments and follow-up care coverage costs are important program characteristics in this vulnerable, rural population.
NASA Astrophysics Data System (ADS)
Luna, B. Quan; Blahut, J.; van Westen, C. J.; Sterlacchini, S.; van Asch, T. W. J.; Akbas, S. O.
2011-07-01
For a quantitative assessment of debris flow risk, it is essential to consider not only the hazardous process itself but also to perform an analysis of its consequences. This should include the estimation of the expected monetary losses as the product of the hazard with a given magnitude and the vulnerability of the elements exposed. A quantifiable integrated approach of both hazard and vulnerability is becoming a required practice in risk reduction management. This study aims at developing physical vulnerability curves for debris flows through the use of a dynamic run-out model. Dynamic run-out models for debris flows are able to calculate physical outputs (extension, depths, velocities, impact pressures) and to determine the zones where the elements at risk could suffer an impact. These results can then be applied to consequence analyses and risk calculations. On 13 July 2008, after more than two days of intense rainfall, several debris and mud flows were released in the central part of the Valtellina Valley (Lombardy Region, Northern Italy). One of the largest debris flows events occurred in a village called Selvetta. The debris flow event was reconstructed after extensive field work and interviews with local inhabitants and civil protection teams. The Selvetta event was modelled with the FLO-2D program, an Eulerian formulation with a finite differences numerical scheme that requires the specification of an input hydrograph. The internal stresses are isotropic and the basal shear stresses are calculated using a quadratic model. The behaviour and run-out of the flow was reconstructed. The significance of calculated values of the flow depth, velocity, and pressure were investigated in terms of the resulting damage to the affected buildings. The physical damage was quantified for each affected structure within the context of physical vulnerability, which was calculated as the ratio between the monetary loss and the reconstruction value. Three different empirical vulnerability curves were obtained, which are functions of debris flow depth, impact pressure, and kinematic viscosity, respectively. A quantitative approach to estimate the vulnerability of an exposed element to a debris flow which can be independent of the temporal occurrence of the hazard event is presented.
Perkiomen Valley Peer Education Program.
ERIC Educational Resources Information Center
Barber, Nicole; And Others
Adolescence is a vulnerable period of life; teens are faced with challenging issues such as stress and suicide. Facilitating informed decision-making among adolescents requires educational programs that present information in compelling and credible ways. With this in mind, a peer education program was developed, using older students to teach…
Sakurai, Masahiro; Kawamura, Takae; Nishimura, Hidekazu; Suzuki, Hiroyoshi; Tezuka, Fumiaki; Abe, Koji
2009-04-01
The mechanism of spinal cord injury has been thought to be related to the vulnerability of spinal motor neuron cells against ischemia. However, the mechanisms of such vulnerability are not fully understood. We investigated a possible mechanism of neuronal death by immunohistochemical analysis for DJ-1, PINK1, and alpha-Synuclein. We used a 15-min rabbit spinal cord ischemia model, with use of a balloon catheter. Western blot analysis for DJ-1, PINK1, and alpha-Synuclein; temporal profiles of DJ-1, PINK1, and alpha-Synuclein immunoreactivity; and double-label fluorescence immunocytochemical studies were performed. Western blot analysis revealed scarce immunoreactivity for DJ-1, PINK1, and alpha-Synuclein in the sham-operated spinal cords. However, they became apparent at 8 h after transient ischemia, which returned to the baseline level at 1 day. Double-label fluorescence immunocytochemical study revealed that both DJ-1 and PINK1, and DJ-1 and alpha-Synuclein were positive at 8 h of reperfusion in the same motor neurons, which eventually die. The induction of DJ-1 and PINK1 proteins in the motor neurons at the early stage of reperfusion may indicate oxidative stress, and the induction of alpha-Synuclein may be implicated in the programmed cell death change after transient spinal cord ischemia.
Modelling social vulnerability in sub-Saharan West Africa using a geographical information system
Arokoyu, Samuel B.
2015-01-01
In recent times, disasters and risk management have gained significant attention, especially with increasing awareness of the risks and increasing impact of natural and other hazards especially in the developing world. Vulnerability, the potential for loss of life or property from disaster, has biophysical or social dimensions. Social vulnerability relates to societal attributes which has negative impacts on disaster outcomes. This study sought to develop a spatially explicit index of social vulnerability, thus addressing the dearth of research in this area in sub-Saharan Africa. Nineteen variables were identified covering various aspects. Descriptive analysis of these variables revealed high heterogeneity across the South West region of Nigeria for both the state and the local government areas (LGAs). Feature identification using correlation analysis identified six important variables. Factor analysis identified two dimensions, namely accessibility and socioeconomic conditions, from this subset. A social vulnerability index (SoVI) showed that Ondo and Ekiti have more vulnerable LGAs than other states in the region. About 50% of the LGAs in Osun and Ogun have a relatively low social vulnerability. Distribution of the SoVI shows that there are great differences within states as well as across regions. Scores of population density, disability and poverty have a high margin of error in relation to mean state scores. The study showed that with a geographical information system there are opportunities to model social vulnerability and monitor its evolution and dynamics across the continent.
Quantifying human vulnerability in rural areas: case study of Tutova Hills (Eastern Romania)
NASA Astrophysics Data System (ADS)
Stângă, I. C.; Grozavu, A.
2012-06-01
This paper aims to assess the vulnerability at regional level, the model and the proposed indicators being explicitly intended for an essentially rural region, in this case-Tutova Hills (Eastern Romania). Five categories of variables were taken into account to define the vulnerability components: rural habitat, demographic features, agriculture, environmental quality and emergency situations. For each one, five variables were analyzed and ranked based on the level of determination or subordination. In order to ensure the flexibility of the model and to avoid the criteria duplication in assessing vulnerability, only a single indicator of each category was retained and included in analysis: total number of inhabitants, dependency ratio, weight of arable land on slope categories, weight of land under forestry and road accessibility of villages. The selected indicators were mathematically processed in order to maximize their relevance and to unitary express the results in the spread 0-1. Also, values of each indicator were grouped into four classes, corresponding to the level of vulnerability: low, medium, high and very high. A general index was obtained through the integration of vulnerability factors in an equation based on the geometric mean. Spatial analysis was based on features of the MicroImages TNTmips 7.3. software, which allow the vulnerability mapping. This approach argues and states that vulnerability assessment through indicator-based methods can be made only according to the level and scale of analysis and related to natural or human conditions of a region.
NASA Astrophysics Data System (ADS)
Nisha, N.; Punia, M.
2016-12-01
Mountain stratigraphic system cannot be claimed as the extraordinarily fragile but a greater range of vulnerability to disturbance than many landscape, in the physical space leading to disturbance in social space, makes it special eco-sensitive zone with greater degree of fragility. The present study furnishes socio-economic vulnerability mapping of the Bhagirathi basin through computation of the Socio vulnerability Index (SoVI). SoVI correlates vulnerability to natural or anthropogenic disasters to socio - economic development and illustrates how developmental parameters alter equation of potential effect and recovery in event of a natural catastrophe in the study region. Use of time-series datasets from different sources, including the optical remote sensing data and the use of social and/or economic data to quantify the vulnerabilities during extreme events is attempted. From the analysis it has been found that the areas with high social vulnerability index are might prone to disaster than low index area. However, the analysis of social vulnerability not only helps to identify flood risk area but also raises the question how the key drivers trigger flood and controlled by the governments and local authorities.
Doyle, Frank; McGee, Hannah; Delaney, Mary; Motterlini, Nicola; Conroy, Ronán
2011-01-01
Depression is prevalent in patients hospitalized with acute coronary syndrome (ACS). We determined whether theoretical vulnerabilities for depression (interpersonal life events, reinforcing events, cognitive distortions, Type D personality) predicted depression, or depression trajectories, post-hospitalization. We followed 375 ACS patients who completed depression scales during hospital admission and at least once during three follow-up intervals over 1 year (949 observations). Questionnaires assessing vulnerabilities were completed at baseline. Logistic regression for panel/longitudinal data predicted depression status during follow-up. Latent class analysis determined depression trajectories. Multinomial logistic regression modeled the relationship between vulnerabilities and trajectories. Vulnerabilities predicted depression status over time in univariate and multivariate analysis, even when controlling for baseline depression. Proportions in each depression trajectory category were as follows: persistent (15%), subthreshold (37%), never depressed (48%). Vulnerabilities independently predicted each of these trajectories, with effect sizes significantly highest for the persistent depression group. Self-reported vulnerabilities - stressful life events, reduced reinforcing events, cognitive distortions, personality - measured during hospitalization can identify those at risk for depression post-ACS and especially those with persistent depressive episodes. Interventions should focus on these vulnerabilities. Copyright © 2011 Elsevier Inc. All rights reserved.
Meyer, Victor; Myres, Charles; Bakshi, Nitin
2010-03-01
The objective of this paper is to analyse the vulnerabilities of current power-grid systems and to propose alternatives to using fossil fuel power generation and infrastructure solutions in the form of microgrids, particularly those from renewable energy sources. One of the key potential benefits of microgrids, apart from their inherent sustainability and ecological advantages, is increased resilience. The analysis is targeted towards the context of business process outsourcing in India. However, much of the research on vulnerabilities has been derived from the USA and as such many of the examples cite vulnerabilities in the USA and other developed economies. Nevertheless, the vulnerabilities noted are to a degree common to all grid systems, and so the analysis may be more broadly applicable.
Fisher, Marisa H; Shivers, Carolyn M; Josol, Cynde K
2018-06-05
Although it is well-known that individuals with intellectual and developmental disabilities (IDD) are socially vulnerable, the field lacks valid assessments to identify risk factors for victimization. Parents/caregivers of 428 individuals with IDD (ages 12-53) completed the social vulnerability questionnaire (SVQ), a measure developed to assess specific aspects of social vulnerability among individuals with various forms of IDD. This study examined the psychometric structure of the SVQ (exploratory and confirmatory factor analysis), and the utility of the factors of the SVQ as predictors of diagnostic category (through discriminate function analysis). Results provide psychometric support for use of the SVQ and its factors for further research and as part of a clinical assessment battery to assess social vulnerability and to develop interventions.
Factor weighting in DRASTIC modeling.
Pacheco, F A L; Pires, L M G R; Santos, R M B; Sanches Fernandes, L F
2015-02-01
Evaluation of aquifer vulnerability comprehends the integration of very diverse data, including soil characteristics (texture), hydrologic settings (recharge), aquifer properties (hydraulic conductivity), environmental parameters (relief), and ground water quality (nitrate contamination). It is therefore a multi-geosphere problem to be handled by a multidisciplinary team. The DRASTIC model remains the most popular technique in use for aquifer vulnerability assessments. The algorithm calculates an intrinsic vulnerability index based on a weighted addition of seven factors. In many studies, the method is subject to adjustments, especially in the factor weights, to meet the particularities of the studied regions. However, adjustments made by different techniques may lead to markedly different vulnerabilities and hence to insecurity in the selection of an appropriate technique. This paper reports the comparison of 5 weighting techniques, an enterprise not attempted before. The studied area comprises 26 aquifer systems located in Portugal. The tested approaches include: the Delphi consensus (original DRASTIC, used as reference), Sensitivity Analysis, Spearman correlations, Logistic Regression and Correspondence Analysis (used as adjustment techniques). In all cases but Sensitivity Analysis, adjustment techniques have privileged the factors representing soil characteristics, hydrologic settings, aquifer properties and environmental parameters, by leveling their weights to ≈4.4, and have subordinated the factors describing the aquifer media by downgrading their weights to ≈1.5. Logistic Regression predicts the highest and Sensitivity Analysis the lowest vulnerabilities. Overall, the vulnerability indices may be separated by a maximum value of 51 points. This represents an uncertainty of 2.5 vulnerability classes, because they are 20 points wide. Given this ambiguity, the selection of a weighting technique to integrate a vulnerability index may require additional expertise to be set up satisfactorily. Following a general criterion that weights must be proportional to the range of the ratings, Correspondence Analysis may be recommended as the best adjustment technique. Copyright © 2014 Elsevier B.V. All rights reserved.
Drought disaster vulnerability mapping of agricultural sector in Bringin District, Semarang Regency
NASA Astrophysics Data System (ADS)
Lestari, D. R.; Pigawati, B.
2018-02-01
Agriculture sector is a sector that is directly affected by drought. The phenomenon of drought disaster on agriculture sector has occurred in Semarang regency. One of districts in Semarang which is affected by drought is Bringin district. Bringin district is a productive agricultural area. However, the district experienced the most severe drought in 2015. The question research of this study is, “How is the spatial distribution of drought vulnerability on agriculture sector in Bringin district, Semarang regency?” The purpose of this study is to determine the spatial distribution of drought vulnerability on agriculture sector to village units in Bringin district. This study investigated drought vulnerability based on Intergovernmental Panel on Climate Change (IPCC) by analyzing exposure, sensitivity, and adaptive capacity through mapping process. This study used quantitative approach. There were formulation analysis, scoring analysis, and overlay analysis. Drought vulnerability on agriculture sector in Bringin district was divided into three categories: low, medium, and high.
Bazzoli, Gloria J; Thompson, Michael P; Waters, Teresa M
2018-02-08
To examine relationships between penalties assessed by Medicare's Hospital Readmission Reduction Program and Value-Based Purchasing Program and hospital financial condition. Centers for Medicare and Medicaid Services, American Hospital Association, and Area Health Resource File data for 4,824 hospital-year observations. Bivariate and multivariate analysis of pooled cross-sectional data. Safety net hospitals have significantly higher HRRP/VBP penalties, but, unlike nonsafety net hospitals, increases in their penalty rate did not significantly affect their total margins. Safety net hospitals appear to rely on nonpatient care revenues to offset higher penalties for the years studied. While reassuring, these funding streams are volatile and may not be able to compensate for cumulative losses over time. © Health Research and Educational Trust.
ERIC Educational Resources Information Center
Peters, Ardith A.; McClatchey, Irene S.
2017-01-01
This paper addresses how professors in a Social Work and Human Services Program in the Southeastern United States include voices of the oppressed and vulnerable through art forms to develop analytical thinking to prepare human service practitioners. This pedagogical practice is based on Gardner's discussion of Multiple Intelligences. The authors…
Literacy and Life Skills Education for Vulnerable Youth: What Policy Makers Can Do
ERIC Educational Resources Information Center
Bernhardt, Anna Caroline; Yorozu, Rika; Medel-Añonuevo, Carolyn
2014-01-01
In countries with a high concentration of youth with low literacy levels, the policy and programming task related to education and training is particularly daunting. This note briefly presents policies and practices which have been put in place to provide vulnerable youth with literacy and life skills education. It is based on a multi-country…
ERIC Educational Resources Information Center
Olowokere, A. E.; Okanlawon, F. A.
2014-01-01
Responding to the psychosocial health needs of the vulnerable population has been considered as a significant public health issue that must be addressed through access to public health professionals. The study adopted a quasi-experimental design to evaluate the impact of a training program on nurses and teachers' knowledge of psychosocial health…
Alternative Education Programs in B.C.: Meeting the Needs of Vulnerable Students
ERIC Educational Resources Information Center
Peled, Maya; Smith, Annie
2010-01-01
Education plays a key role in young people's healthy development. Research conducted by the McCreary Centre Society (a British Columbia non-profit organization concerned with youth health) has shown that even the most vulnerable youth who feel connected to school are more likely to report better health and above average marks, and to engage in…
T.A. Munoz-Erickson; A.E. Lugo; E. Melendez-Ackerman; L.E. Santiago-Acevedo; J. Seguinot-Barbosa; P. Mendez-Lazaro
2014-01-01
This paper presents initial efforts to establish the San Juan Urban Long-Term Research Area Exploratory (ULTRA-Ex), a long-term program aimed at developing transdisciplinary social-ecological system (SES) research to address vulnerability and sustainability for the municipality of San Juan. Transdisciplinary approaches involve the collaborations between researchers,...
Tsasis, Peter; Nirupama, N.
2008-01-01
Understanding the way perception of risk is shaped and constructed is crucial in understanding why it has been so difficult to mitigate the spread of HIV/AIDS. This paper uses the Pressure and Release (PAR) model, used to predict the onset of natural disasters as the conceptual framework. It substitutes vulnerability and risk perception as the trigger factors in the model, in making the case that HIV/AIDS can be characterized as a slow onset disaster. The implications are that vulnerability must be managed and reduced by addressing root causes, dynamic pressures, and unsafe conditions that contribute to the HIV/AIDS pandemic. HIV/AIDS programs must be culturally appropriate and work toward influencing risk perception, while addressing social norms and values that negatively impact vulnerable populations. By impacting cultural and social expectations, individuals will be able to more readily adopt safer sex behaviors. The development of policies and programs addressing the issues in context, as opposed to individual behaviors alone, allows for effective public health intervention. This may have implications for public health measures implemented for combating the spread of HIV/AIDS. PMID:22312198
1986-01-01
by sensors in the test cell and sampled, digitized, averaged, and calibrated by the facility computer system. The data included flowrates calculated ...before the next test could be started. This required about 2 minutes. 6.4 Combat Damage Testing Appendix C contains calculations and analysis...were comparable (Figure 7-5). Agent quantities required per MIL-E-22285 were again calculated using the equations noted in paragraph 7.1.1. The
Nutritional assessment of free meal programs in San Francisco.
Lyles, Courtney R; Drago-Ferguson, Soledad; Lopez, Andrea; Seligman, Hilary K
2013-05-30
Free meals often serve as a primary food source for adults living in poverty, particularly the homeless. We conducted a nutritional analysis of 22 meals from 6 free meal sites in San Francisco to determine macronutrient and micronutrient content. Meals provided too little fiber and too much fat but appropriate levels of cholesterol. They were also below target for potassium, calcium, and vitamins A and E. These findings may inform development of nutritional content standards for free meals, particularly for vulnerable patients who might have, or be at risk of developing, a chronic illness.
NASA Astrophysics Data System (ADS)
Mazumdar, Jublee; Paul, Saikat
2015-04-01
Losses of life and property due to natural hazards have intensified in the past decade, motivating an alteration of disaster management away from simple post event resettlement and rehabilitation. The degree of exposure to hazard for a homogeneous population is not entirely reliant upon nearness to the source of hazard event. Socio-economic factors and infrastructural capability play an important role in determining the vulnerability of a place. This study investigates the vulnerability of eastern coastal states of India from tropical cyclones. The record of past hundred years shows that the physical vulnerability of eastern coastal states is four times as compared to the western coastal states in terms of frequency and intensity of tropical cyclones. Nevertheless, these physical factors played an imperative role in determining the vulnerability of eastern coast. However, the socio-economic and infrastructural factors influence the risk of exposure exponentially. Inclusion of these indicators would provide better insight regarding the preparedness and resilience of settlements to hazard events. In this regard, the present study is an effort to develop an Integrated Vulnerability Model (IVM) based on socio-economic and infrastructural factors for the districts of eastern coastal states of India. A method is proposed for quantifying the socio-economic and infrastructural vulnerability to tropical cyclone in these districts. The variables included in the study are extracted from Census of India, 2011 at district level administrative unit. In the analysis, a large number of variables are reduced to a smaller number of factors by using principal component analysis that represents the socio-economic and infrastructure vulnerability to tropical cyclone. Subsequently, the factor scores in socio-economic Vulnerability Index (SeVI) and Infrastructure Vulnerability Index (InVI) are standardized from 0 to 1, indicating the range from low to high vulnerability. The factor scores are then mapped for spatial analysis. Utilizing SeVI and InVI, the highly vulnerable districts are demonstrated that are likely to face significant challenges in coping with tropical cyclone and require strategies to address the various aspects of socio-economic and infrastructural vulnerability. Moreover, this model can be incorporated not only for multi-level governance but also to integrate it with the real-time weather forecasts to identify the predictive areas of vulnerability.
Identifying typical patterns of vulnerability: A 5-step approach based on cluster analysis
NASA Astrophysics Data System (ADS)
Sietz, Diana; Lüdeke, Matthias; Kok, Marcel; Lucas, Paul; Carsten, Walther; Janssen, Peter
2013-04-01
Specific processes that shape the vulnerability of socio-ecological systems to climate, market and other stresses derive from diverse background conditions. Within the multitude of vulnerability-creating mechanisms, distinct processes recur in various regions inspiring research on typical patterns of vulnerability. The vulnerability patterns display typical combinations of the natural and socio-economic properties that shape a systems' vulnerability to particular stresses. Based on the identification of a limited number of vulnerability patterns, pattern analysis provides an efficient approach to improving our understanding of vulnerability and decision-making for vulnerability reduction. However, current pattern analyses often miss explicit descriptions of their methods and pay insufficient attention to the validity of their groupings. Therefore, the question arises as to how do we identify typical vulnerability patterns in order to enhance our understanding of a systems' vulnerability to stresses? A cluster-based pattern recognition applied at global and local levels is scrutinised with a focus on an applicable methodology and practicable insights. Taking the example of drylands, this presentation demonstrates the conditions necessary to identify typical vulnerability patterns. They are summarised in five methodological steps comprising the elicitation of relevant cause-effect hypotheses and the quantitative indication of mechanisms as well as an evaluation of robustness, a validation and a ranking of the identified patterns. Reflecting scale-dependent opportunities, a global study is able to support decision-making with insights into the up-scaling of interventions when available funds are limited. In contrast, local investigations encourage an outcome-based validation. This constitutes a crucial step in establishing the credibility of the patterns and hence their suitability for informing extension services and individual decisions. In this respect, working at the local level provides a clear advantage since, to a large extent, limitations in globally available observational data constrain such a validation on the global scale. Overall, the five steps are outlined in detail in order to facilitate and motivate the application of pattern recognition in other research studies concerned with vulnerability analysis, including future applications to different vulnerability frameworks. Such applications could promote the refinement of mechanisms in specific contexts and advance methodological adjustments. This would further increase the value of identifying typical patterns in the properties of socio-ecological systems for an improved understanding and management of the relation between these systems and particular stresses.
Vulnerabilities in the Stafford Student Loan Program.
ERIC Educational Resources Information Center
Thompson, Lawrence H.
This testimony before the House Subcommittee on Postsecondary Education addresses the need for improving student financial aid programs administered by the Department of Education, and in particular, the Stafford Student Loan Programs. The testimony begins with a brief review of the default problems involving student loans. Next, an examination is…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-17
... Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure Security Compliance... questions about this Information Collection Request should be forwarded to DHS/NPPD/IP/ISCD CFATS Program... to the DHS/NPPD/IP/ISCD CFATS Program Manager at the Department of Homeland Security, 245 Murray Lane...
The FBI Crime Resistance Program. Technical Assistance Bulletin 24.
ERIC Educational Resources Information Center
National School Resource Network, Washington, DC.
To promote the concept that citizen involvement and responsibility for crime resistance are prime factors in law enforcement, the Federal Bureau of Investigation (FBI) assists local agencies in developing programs to encourage citizen participation. One facet of this program is directed toward educating students about their vulnerability to crime…
Dubuy, Veerle; De Cocker, Katrien; De Bourdeaudhuij, Ilse; Maes, Lea; Seghers, Jan; Lefevre, Johan; De Martelaer, Kristine; Brooke, Hannah; Cardon, Greet
2014-05-16
The increasing rates of obesity among children and adolescents, especially in those from lower socio-economic backgrounds, emphasise the need for interventions promoting a healthy diet and physical activity. The present study aimed to examine the effectiveness of the 'Health Scores!' program, which combined professional football player role models with a school-based program to promote a healthy diet and physical activity to socially vulnerable children and adolescents. The intervention was implemented in two settings: professional football clubs and schools. Socially vulnerable children and adolescents (n = 165 intervention group, n = 440 control group, aged 10-14 year) provided self-reported data on dietary habits and physical activity before and after the four-month intervention. Intervention effects were evaluated using repeated measures analysis of variance. In addition, a process evaluation was conducted. No intervention effects were found for several dietary behaviours, including consumption of breakfast, fruit, soft drinks or sweet and savoury snacks. Positive intervention effects were found for self-efficacy for having a daily breakfast (p < 0.01), positive attitude towards vegetables consumption (p < 0.01) and towards lower soft drink consumption (p < 0.001). A trend towards significance (p < 0.10) was found for self-efficacy for reaching the physical activity guidelines. For sports participation no significant intervention effect was found. In total, 92 pupils completed the process evaluation, the feedback was largely positive. The 'Health Scores!' intervention was successful in increasing psychosocial correlates of a healthy diet and PA. The use of professional football players as a credible source for health promotion was appealing to socially vulnerable children and adolescents.
Romano Foti; Jorge A. Ramirez; Thomas C. Brown
2014-01-01
We introduce a probabilistic framework for vulnerability analysis and use it to quantify current and future vulnerability of the US water supply system. We also determine the contributions of hydro-climatic and socio-economic drivers to the changes in projected vulnerability. For all scenarios and global climatemodels examined, the US Southwest including California and...
Larson, Bruce A; Wambua, Nancy; Masila, Juliana; Wangai, Susan; Rohr, Julia; Brooks, Mohamad; Bryant, Malcolm
2013-01-01
The Community-Based Care for Orphans and Vulnerable Children (CBCO) program operated in Kenya during 2006-2010. In Eastern Province, the program provided support to approximately 3000 orphans and vulnerable children (OVC) living in 1500 households. A primary focus of the program was to support savings and loan associations composed of OVC caregivers (typically elderly women) to improve household and OVC welfare. Cross-sectional data were collected in 2011 from 1500 randomly selected households from 3 populations: program participants (CBCO group, n=500), households in the same villages as program participants but not in the program (the local-community-group = Group L, n=300), and households living in nearby villages where the program did not operate (the adjacent-community-group, Group A, n=700). Primary welfare outcomes evaluated are household food security, as measured by the Household Food Insecurity Access instrument, and OVC educational attainment. We compared outcomes between the CBCO and the subset of Group L not meeting program eligibility criteria (L-N) to investigate disparities within local communities. We compared outcomes between the CBCO group and the subset of Group A meeting eligibility criteria (A-E) to consider program impact. We compared outcomes between households not eligible for the program in the local and adjacent community groups (L-N and A-N) to consider if the adjacent communities are similar to the local communities. In May-June 2011, at the end of the OVC program, the majority of CBCO households continued to be severely food insecure, with rates similar to other households living in nearby communities. Participation rates in primary school are high, reflecting free primary education. Among the 18-22 year olds who were "children" during the program years, relatively few children completed secondary school across all study groups. Although the CBCO program likely provided useful services and benefits to program participants, disparities continued to exist in food security and educational outcomes between program participants and their non-OVC peers in the local community. Outcomes for CBCO households were similar to those observed for OVC households in adjacent communities.
Larson, Bruce A.; Wambua, Nancy; Masila, Juliana; Wangai, Susan; Rohr, Julia; Brooks, Mohamad; Bryant, Malcolm
2013-01-01
The Community-Based Care for Orphans and Vulnerable Children (CBCO) program operated in Kenya during 2006–2010. In Eastern Province, the program provided support to approximately 3000 orphans and vulnerable children (OVC) living in 1500 households. A primary focus of the program was to support savings and loan associations composed of OVC caregivers (typically elderly women) to improve household and OVC welfare. Cross-sectional data were collected in 2011 from 1500 randomly selected households from 3 populations: program participants (CBCO group, n = 500), households in the same villages as program participants but not in the program (the local-community-group = Group L, n = 300), and households living in nearby villages where the program did not operate (the adjacent-community-group, Group A, n = 700). Primary welfare outcomes evaluated are household food security, as measured by the Household Food Insecurity Access instrument, and OVC educational attainment. We compared outcomes between the CBCO and the subset of Group L not meeting program eligibility criteria (L-N) to investigate disparities within local communities. We compared outcomes between the CBCO group and the subset of Group A meeting eligibility criteria (A-E) to consider program impact. We compared outcomes between households not eligible for the program in the local and adjacent community groups (L-N and A-N) to consider if the adjacent communities are similar to the local communities. In May-June 2011, at the end of the OVC program, the majority of CBCO households continued to be severely food insecure, with rates similar to other households living in nearby communities. Participation rates in primary school are high, reflecting free primary education. Among the 18–22 year olds who were “children” during the program years, relatively few children completed secondary school across all study groups. Although the CBCO program likely provided useful services and benefits to program participants, disparities continued to exist in food security and educational outcomes between program participants and their non-OVC peers in the local community. Outcomes for CBCO households were similar to those observed for OVC households in adjacent communities. PMID:23745629
Barriers to Health Service Utilization Among Iranian Female Sex Workers: A Qualitative Study
Merghati-Khoei, Effat
2018-01-01
Objectives In most countries around the world, sex work is an illegal activity. Female sex workers (FSWs) in Iran hide their identities, and they are known to be a hard-to-reach population. Despite free access to HIV testing, fewer than half of FSWs receive HIV testing. The purpose of this study was to characterize the reasons for which FSWs do not seek testing at drop-in centers (DICs) and voluntary counseling and testing (VCT) centers in Iran. Methods A qualitative study was conducted in 2016. The participants were 24 FSWs who received services at VCT centers and DICs for vulnerable females in the north of Iran and 9 males who were the clients of FSWs. In this study, we made use of purposive sampling and carried out a thematic analysis. Results We found 4 major and 6 minor themes. The major themes were: fear of being infected (with HIV), stigma, indifference, and knowledge. Conclusions Despite the significant efforts made by the government of Iran to establish and expand DICs for vulnerable females, the number of FSWs receiving services at these centers has not been very considerable. Consequently, by introducing and implementing training programs for peer groups, it may be possible to take steps toward establishing strategic programs for the control and prevention of HIV/AIDS. PMID:29631351
An analysis of the accessibility of video lottery terminals: the case of Montréal.
Robitaille, Eric; Herjean, Patrick
2008-01-18
Researchers and public health officials in Canada, the United States and Australia have for some time noted broader geographic accessibility to gambling establishments, above all in socioeconomically underprivileged communities. This increase in availability could lead to more and more gambling problems. This article focuses, in an ecological perspective, in particular on a spatial analysis of the geographic accessibility of sites possessing a VLT permit in the Montréal area, i.e. Montréal Island, the South Shore and Laval, from the standpoint of the development of an indicator of the vulnerability (socioeconomic components and demographic components) to gambling of populations at the level of certain neighbourhood units (dissemination areas). With the recent development of geographic information systems (GIS), it is now possible to ascertain accessibility to services much more accurately, for example by taking into account the configuration of the road network. The findings of our analysis reveal widespread geographic accessibility to sites possessing a VLT permit in the downtown area and in pericentral districts. In some neighbourhood units, a site possessing a VLT permit may be within a three-minute walk. In the region studied overall, average walking time to a VLT site is nine minutes. Access to this type of service on foot is usually limited in the outskirts. However, a number of groups of sites possessing VLT permits are found along certain axial highways. According to local spatial self-correlation analyses, the findings suggest a significant link between walking accessibility to sites possessing VLT permits and the vulnerability of the communities. In a number of neighbourhood units with ready access to VLT's the populations display high vulnerability. These findings reveal that accessibility to sites possessing a VLT permit is often linked to the vulnerability (socioeconomic and demographic components) of communities. Reliance in our analyses on neighbourhood units with fairly small areas enabled us to emphasize the rectilinear dimension of the spatial distribution of sites possessing VLT permits. This is a significant link that public health officials must consider when elaborating programs to combat pathological gambling.
Phrasisombath, Ketkesone; Thomsen, Sarah; Sychareun, Vanphanom; Faxelid, Elisabeth
2013-01-01
Background Female sex workers (FSWs) are vulnerable to sexually transmitted infections (STIs) and other types of health problems and they also encounter socio-economic difficulties. Efforts to develop effective health intervention programs for FSWs have been hampered by a lack of information on why FSWs do not seek or delay seeking treatment for STIs. To further understand their reasons, our study applied a qualitative approach to explore perceptions of health and ill-health among FSWs in Savannakhet province in Laos. Methods Fifteen in-depth interviews were conducted with FSWs in Savannakhet province. Latent content analysis was used for analysis. Results Sex workers’ definitions of health and wealth are intertwined. Thus, good health was described as strongly related to wealth, and wealth was needed in order to be healthy. This is explained in two sub-themes: health is necessary for work and income and ill-health creates social and economic vulnerability. Conclusions Female sex workers’ beliefs and perceptions about health and ill-health were dominated by their economic need, which in turn was influenced by expectations and demands from their families. PMID:23336614
Health Vulnerability Index and newborn hearing screening: urban inequality.
Januário, Gabriela Cintra; Alves, Claudia Regina Lindgren; Lemos, Stela Maris Aguiar; Almeida, Maria Cristina de Mattos; Cruz, Ramon Costa; Friche, Amélia Augusta de Lima
To analyze the intra-urban differentials related to the outcome of the Newborn Hearing Screening (NHS) of children living in Belo Horizonte tested in a reference service using the Health Vulnerability Index (HVI). cross-sectional study with children living in Belo Horizonte evaluated by a Newborn Hearing Screening Reference Service (NHSRS) between 2010 and 2011. The HVI of the census tract of each child was obtained by the georeferencing of their respective addresses. Multivariate analysis was conducted using the decision tree technique, considering a statistical model for each response. A thematic map of points representing the geographic distribution of the children evaluated by the NHS program was also developed. The NHS failure rate for children living in areas with very high HVI, or without HVI data, was 1.5 times higher than that for children living in other census tracts. For children living in areas of low, medium, and high HVI, who underwent NHS after 30 days of life, the NHS failure rate was 2.1 times higher in children that presented Risk Indicator for Hearing Loss (RIHL) (17.2%) than in those who did not (8.1%). Uneven distribution was observed between areas for children that underwent the NHS and those who failed it. Significant intra-urban differentials were found in Belo Horizonte, indicating correlation between health vulnerability and NHS outcomes.
Buotte, Polly C; Peterson, David L; McKelvey, Kevin S; Hicke, Jeffrey A
2016-03-15
Natural resource vulnerability to climate change can depend on the climatology and ecological conditions at a particular site. Here we present a conceptual framework for incorporating spatial variability in natural resource vulnerability to climate change in a regional-scale assessment. The framework was implemented in the first regional-scale vulnerability assessment conducted by the US Forest Service. During this assessment, five subregional workshops were held to capture variability in vulnerability and to develop adaptation tactics. At each workshop, participants answered a questionnaire to: 1) identify species, resources, or other information missing from the regional assessment, and 2) describe subregional vulnerability to climate change. Workshop participants divided into six resource groups; here we focus on wildlife resources. Participants identified information missing from the regional assessment and multiple instances of subregional variability in climate change vulnerability. We provide recommendations for improving the process of capturing subregional variability in a regional vulnerability assessment. We propose a revised conceptual framework structured around pathways of climate influence, each with separate rankings for exposure, sensitivity, and adaptive capacity. These revisions allow for a quantitative ranking of species, pathways, exposure, sensitivity, and adaptive capacity across subregions. Rankings can be used to direct the development and implementation of future regional research and monitoring programs. The revised conceptual framework is equally applicable as a stand-alone model for assessing climate change vulnerability and as a nested model within a regional assessment for capturing subregional variability in vulnerability. Copyright © 2015 Elsevier Ltd. All rights reserved.
Gower, Amy L.; McMorris, Barbara J.; Bucchianeri, Michaela M.
2015-01-01
Objectives. We examined perpetration of bullying among youths in vulnerable groups relative to youths in peer groups not categorized as vulnerable. Methods. Data were collected in 2013 from a large school-based survey of adolescents conducted in Minnesota (n = 122 180). We used the χ2 test and logistic regression to compare measures of perpetration of physical and relational bullying, as well as experiences of victimization and perpetration (or both), across categories of sexual orientation, weight status, and disability status. Results. Rates of physical and relational bullying perpetration were significantly higher among youths in vulnerable groups than among those not in vulnerable groups. With respect to context of victimization experiences, young men and women from vulnerable groups were overrepresented in the group comprising both perpetrators and victims. For example, odds of being both a perpetrator and a victim were 1.41 to 3.22 times higher among gay, lesbian, and bisexual youths than among heterosexual youths. Conclusions. Vulnerable youths, who are prone to peer harassment, may also act as perpetrators of bullying. Prevention strategies should address the particular needs of these populations; targeted programming may be appropriate. PMID:26180987
Calibration of groundwater vulnerability mapping using the generalized reduced gradient method.
Elçi, Alper
2017-12-01
Groundwater vulnerability assessment studies are essential in water resources management. Overlay-and-index methods such as DRASTIC are widely used for mapping of groundwater vulnerability, however, these methods mainly suffer from a subjective selection of model parameters. The objective of this study is to introduce a calibration procedure that results in a more accurate assessment of groundwater vulnerability. The improvement of the assessment is formulated as a parameter optimization problem using an objective function that is based on the correlation between actual groundwater contamination and vulnerability index values. The non-linear optimization problem is solved with the generalized-reduced-gradient (GRG) method, which is numerical algorithm based optimization method. To demonstrate the applicability of the procedure, a vulnerability map for the Tahtali stream basin is calibrated using nitrate concentration data. The calibration procedure is easy to implement and aims the maximization of correlation between observed pollutant concentrations and groundwater vulnerability index values. The influence of each vulnerability parameter in the calculation of the vulnerability index is assessed by performing a single-parameter sensitivity analysis. Results of the sensitivity analysis show that all factors are effective on the final vulnerability index. Calibration of the vulnerability map improves the correlation between index values and measured nitrate concentrations by 19%. The regression coefficient increases from 0.280 to 0.485. It is evident that the spatial distribution and the proportions of vulnerability class areas are significantly altered with the calibration process. Although the applicability of the calibration method is demonstrated on the DRASTIC model, the applicability of the approach is not specific to a certain model and can also be easily applied to other overlay-and-index methods. Copyright © 2017 Elsevier B.V. All rights reserved.
Calibration of groundwater vulnerability mapping using the generalized reduced gradient method
NASA Astrophysics Data System (ADS)
Elçi, Alper
2017-12-01
Groundwater vulnerability assessment studies are essential in water resources management. Overlay-and-index methods such as DRASTIC are widely used for mapping of groundwater vulnerability, however, these methods mainly suffer from a subjective selection of model parameters. The objective of this study is to introduce a calibration procedure that results in a more accurate assessment of groundwater vulnerability. The improvement of the assessment is formulated as a parameter optimization problem using an objective function that is based on the correlation between actual groundwater contamination and vulnerability index values. The non-linear optimization problem is solved with the generalized-reduced-gradient (GRG) method, which is numerical algorithm based optimization method. To demonstrate the applicability of the procedure, a vulnerability map for the Tahtali stream basin is calibrated using nitrate concentration data. The calibration procedure is easy to implement and aims the maximization of correlation between observed pollutant concentrations and groundwater vulnerability index values. The influence of each vulnerability parameter in the calculation of the vulnerability index is assessed by performing a single-parameter sensitivity analysis. Results of the sensitivity analysis show that all factors are effective on the final vulnerability index. Calibration of the vulnerability map improves the correlation between index values and measured nitrate concentrations by 19%. The regression coefficient increases from 0.280 to 0.485. It is evident that the spatial distribution and the proportions of vulnerability class areas are significantly altered with the calibration process. Although the applicability of the calibration method is demonstrated on the DRASTIC model, the applicability of the approach is not specific to a certain model and can also be easily applied to other overlay-and-index methods.
Das, Iswar; Kumar, Gaurav; Stein, Alfred; Bagchi, Arunabha; Dadhwal, Vinay K
2011-07-01
Little is known about the quantitative vulnerability analysis to landslides as not many attempts have been made to assess it comprehensively. This study assesses the spatio-temporal vulnerability of elements at risk to landslides in a stochastic framework. The study includes buildings, persons inside buildings, and traffic as elements at risk to landslides. Building vulnerability is the expected damage and depends on the position of a building with respect to the landslide hazard at a given time. Population and vehicle vulnerability are the expected death toll in a building and vehicle damage in space and time respectively. The study was carried out in a road corridor in the Indian Himalayas that is highly susceptible to landslides. Results showed that 26% of the buildings fall in the high and very high vulnerability categories. Population vulnerability inside buildings showed a value >0.75 during 0800 to 1000 hours and 1600 to 1800 hours in more buildings that other times of the day. It was also observed in the study region that the vulnerability of vehicle is above 0.6 in half of the road stretches during 0800 hours to 1000 hours and 1600 to 1800 hours due to high traffic density on the road section. From this study, we conclude that the vulnerability of an element at risk to landslide is a space and time event, and can be quantified using stochastic modeling. Therefore, the stochastic vulnerability modeling forms the basis for a quantitative landslide risk analysis and assessment.
McGuire, A. David; Chapin, F. Stuart; Ruess, Roger W.
2016-01-01
Long-term research by the Bonanza Creek (BNZ) Long Term Ecological Research (LTER) program has documented natural patterns of interannual and successional variability of the boreal forest in interior Alaska against which we can detect changes in system behavior. Between 2004 and 2010 the BNZ LTER program focused on understanding the dynamics of change through studying the resilience and vulnerability of Alaska's boreal forest in response to climate warming. The overarching question in this endeavor has been “How are boreal ecosystems responding, both gradually and abruptly, to climate warming, and what new landscape patterns are emerging?”
Earthquake Hazard Mitigation Using a Systems Analysis Approach to Risk Assessment
NASA Astrophysics Data System (ADS)
Legg, M.; Eguchi, R. T.
2015-12-01
The earthquake hazard mitigation goal is to reduce losses due to severe natural events. The first step is to conduct a Seismic Risk Assessment consisting of 1) hazard estimation, 2) vulnerability analysis, 3) exposure compilation. Seismic hazards include ground deformation, shaking, and inundation. The hazard estimation may be probabilistic or deterministic. Probabilistic Seismic Hazard Assessment (PSHA) is generally applied to site-specific Risk assessments, but may involve large areas as in a National Seismic Hazard Mapping program. Deterministic hazard assessments are needed for geographically distributed exposure such as lifelines (infrastructure), but may be important for large communities. Vulnerability evaluation includes quantification of fragility for construction or components including personnel. Exposure represents the existing or planned construction, facilities, infrastructure, and population in the affected area. Risk (expected loss) is the product of the quantified hazard, vulnerability (damage algorithm), and exposure which may be used to prepare emergency response plans, retrofit existing construction, or use community planning to avoid hazards. The risk estimate provides data needed to acquire earthquake insurance to assist with effective recovery following a severe event. Earthquake Scenarios used in Deterministic Risk Assessments provide detailed information on where hazards may be most severe, what system components are most susceptible to failure, and to evaluate the combined effects of a severe earthquake to the whole system or community. Casualties (injuries and death) have been the primary factor in defining building codes for seismic-resistant construction. Economic losses may be equally significant factors that can influence proactive hazard mitigation. Large urban earthquakes may produce catastrophic losses due to a cascading of effects often missed in PSHA. Economic collapse may ensue if damaged workplaces, disruption of utilities, and resultant loss of income produces widespread default on payments. With increased computational power and more complete inventories of exposure, Monte Carlo methods may provide more accurate estimation of severe losses and the opportunity to increase resilience of vulnerable systems and communities.
Chang, Heejun; Jung, Il-Won; Strecker, Angela L.; Wise, Daniel; Lafrenz, Martin; Shandas, Vivek; ,; Yeakley, Alan; Pan, Yangdong; Johnson, Gunnar; Psaris, Mike
2013-01-01
We investigated water resource vulnerability in the US portion of the Columbia River basin (CRB) using multiple indicators representing water supply, water demand, and water quality. Based on the US county scale, spatial analysis was conducted using various biophysical and socio-economic indicators that control water vulnerability. Water supply vulnerability and water demand vulnerability exhibited a similar spatial clustering of hotspots in areas where agricultural lands and variability of precipitation were high but dam storage capacity was low. The hotspots of water quality vulnerability were clustered around the main stem of the Columbia River where major population and agricultural centres are located. This multiple equal weight indicator approach confirmed that different drivers were associated with different vulnerability maps in the sub-basins of the CRB. Water quality variables are more important than water supply and water demand variables in the Willamette River basin, whereas water supply and demand variables are more important than water quality variables in the Upper Snake and Upper Columbia River basins. This result suggests that current water resources management and practices drive much of the vulnerability within the study area. The analysis suggests the need for increased coordination of water management across multiple levels of water governance to reduce water resource vulnerability in the CRB and a potentially different weighting scheme that explicitly takes into account the input of various water stakeholders.
Assessing the risk posed by natural hazards to infrastructures
NASA Astrophysics Data System (ADS)
Eidsvig, Unni; Kristensen, Krister; Vidar Vangelsten, Bjørn
2015-04-01
The modern society is increasingly dependent on infrastructures to maintain its function, and disruption in one of the infrastructure systems may have severe consequences. The Norwegian municipalities have, according to legislation, a duty to carry out a risk and vulnerability analysis and plan and prepare for emergencies in a short- and long term perspective. Vulnerability analysis of the infrastructures and their interdependencies is an important part of this analysis. This paper proposes a model for assessing the risk posed by natural hazards to infrastructures. The model prescribes a three level analysis with increasing level of detail, moving from qualitative to quantitative analysis. This paper focuses on the second level, which consists of a semi-quantitative analysis. The purpose of this analysis is to perform a screening of the scenarios of natural hazards threatening the infrastructures identified in the level 1 analysis and investigate the need for further analyses, i.e. level 3 quantitative analyses. The proposed level 2 analysis considers the frequency of the natural hazard, different aspects of vulnerability including the physical vulnerability of the infrastructure itself and the societal dependency on the infrastructure. An indicator-based approach is applied, ranking the indicators on a relative scale. The proposed indicators characterize the robustness of the infrastructure, the importance of the infrastructure as well as interdependencies between society and infrastructure affecting the potential for cascading effects. Each indicator is ranked on a 1-5 scale based on pre-defined ranking criteria. The aggregated risk estimate is a combination of the semi-quantitative vulnerability indicators, as well as quantitative estimates of the frequency of the natural hazard and the number of users of the infrastructure. Case studies for two Norwegian municipalities are presented, where risk to primary road, water supply and power network threatened by storm and landslide is assessed. The application examples show that the proposed model provides a useful tool for screening of undesirable events, with the ultimate goal to reduce the societal vulnerability.
Scott, Walter D; Beevers, Christopher G; Mermelstein, Robin J
2008-07-01
The present study extended previous tests of cognitive priming theories of depression by examining cognitive self-regulatory, motivational, and affective functioning of depression-vulnerable and nonvulnerable individuals after a failure experience. Participants were enrolled in a clinic-based smoking cessation program that consisted of seven group meetings. Major findings show that compared to the nonvulnerable group, depression-vulnerable individuals were less motivated to quit and experienced more negative affect, but only after a failure to quit smoking. However, after controlling for actual smoking rate, depression-vulnerable individuals did not evaluate their success any more negatively, nor did they indicate lower self-efficacy for quitting. Results are discussed in terms of cognitive self-regulatory and affect temperament models of motivation and depression.
ERIC Educational Resources Information Center
Jain, Shaili; Lapid, Maria I.; Dunn, Laura B.; Roberts, Laura Weiss
2011-01-01
Objective: The authors examined psychiatric residents' perceived needs for education in informed consent, principles of ethics and professionalism, and treating vulnerable populations. Method: A written survey was distributed to psychiatric residents (N = 249) at seven U.S. residency programs in 2005. The survey contained 149 questions in 10…
Home and Community-Based Service Use by Vulnerable Older Adults.
Weaver, Raven H; Roberto, Karen A
2017-06-01
The purpose of this study was to identify different types of clients who use home and community-based services. Enrollment characteristics of 76 clients at risk of nursing home placement and Medicaid spend-down who were enrolled in the Virginia Community Living Program were analyzed. Two-step cluster analysis identified 4 groups of service users. Enabling resources (caregiver relationship to participant, participant living arrangement, and length of time caregiver provided assistance to participant) and disability type (physical, cognitive, traumatic brain injury, or other) differentiated the client groups. Groups differed on average service cost per day and likelihood of nursing home placement if services were not provided. Findings point to the value of having practitioners assist vulnerable clients in tailoring services to meet different care needs and the need for refining policies guiding home and community-based care. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Ffuzz: Towards full system high coverage fuzz testing on binary executables
2018-01-01
Bugs and vulnerabilities in binary executables threaten cyber security. Current discovery methods, like fuzz testing, symbolic execution and manual analysis, both have advantages and disadvantages when exercising the deeper code area in binary executables to find more bugs. In this paper, we designed and implemented a hybrid automatic bug finding tool—Ffuzz—on top of fuzz testing and selective symbolic execution. It targets full system software stack testing including both the user space and kernel space. Combining these two mainstream techniques enables us to achieve higher coverage and avoid getting stuck both in fuzz testing and symbolic execution. We also proposed two key optimizations to improve the efficiency of full system testing. We evaluated the efficiency and effectiveness of our method on real-world binary software and 844 memory corruption vulnerable programs in the Juliet test suite. The results show that Ffuzz can discover software bugs in the full system software stack effectively and efficiently. PMID:29791469
Mapping Vulnerability to Disasters in Latin America and the Caribbean, 1900-2007
Maynard-Ford, Miriam C.; Phillips, Emily C.; Chirico, Peter G.
2008-01-01
The vulnerability of a population and its infrastructure to disastrous events is a factor of both the probability of a hazardous event occurring and the community's ability to cope with the resulting impacts. Therefore, the ability to accurately identify vulnerable populations and places in order to prepare for future hazards is of critical importance for disaster mitigation programs. This project created maps of higher spatial resolution of vulnerability to disaster in Latin America and the Caribbean from 1900 to 2007 by mapping disaster data by first-level administrative boundaries with the objective of identifying geographic trends in regional occurrences of disasters and vulnerable populations. The method of mapping by administrative level is an improvement on displaying and analyzing disasters at the country level and shows the relative intensity of vulnerability within and between countries in the region. Disaster mapping at the country level produces only a basic view of which countries experience various types of natural disasters. Through disaggregation, the data show which geographic areas of these countries, including populated areas, are historically most susceptible to different hazard types.
Heat Wave Vulnerability Mapping for India.
Azhar, Gulrez; Saha, Shubhayu; Ganguly, Partha; Mavalankar, Dileep; Madrigano, Jaime
2017-03-30
Assessing geographic variability in heat wave vulnerability forms the basis for planning appropriate targeted adaptation strategies. Given several recent deadly heatwaves in India, heat is increasingly being recognized as a public health problem. However, to date there has not been a country-wide assessment of heat vulnerability in India. We evaluated demographic, socioeconomic, and environmental vulnerability factors and combined district level data from several sources including the most recent census, health reports, and satellite remote sensing data. We then applied principal component analysis (PCA) on 17 normalized variables for each of the 640 districts to create a composite Heat Vulnerability Index (HVI) for India. Of the total 640 districts, our analysis identified 10 and 97 districts in the very high and high risk categories (> 2SD and 2-1SD HVI) respectively. Mapping showed that the districts with higher heat vulnerability are located in the central parts of the country. On examination, these are less urbanized and have low rates of literacy, access to water and sanitation, and presence of household amenities. Therefore, we concluded that creating and mapping a heat vulnerability index is a useful first step in protecting the public from the health burden of heat. Future work should incorporate heat exposure and health outcome data to validate the index, as well as examine sub-district levels of vulnerability.
Validation of a social vulnerability index in context to river-floods in Germany
NASA Astrophysics Data System (ADS)
Fekete, A.
2009-03-01
Social vulnerability indices are a means for generating information about people potentially affected by disasters that are e.g. triggered by river-floods. The purpose behind such an index is in this study the development and the validation of a social vulnerability map of population characteristics towards river-floods covering all counties in Germany. This map is based on a composite index of three main indicators for social vulnerability in Germany - fragility, socio-economic conditions and region. These indicators have been identified by a factor analysis of selected demographic variables obtained from federal statistical offices. Therefore, these indicators can be updated annually based on a reliable data source. The vulnerability patterns detected by the factor analysis are verified by using an independent second data set. The interpretation of the second data set shows that vulnerability is revealed by a real extreme flood event and demonstrates that the patterns of the presumed vulnerability match the observations of a real event. It comprises a survey of flood-affected households in three federal states. By using logistic regression, it is demonstrated that the theoretically presumed indications of vulnerability are correct and that the indicators are valid. It is shown that indeed certain social groups like the elderly, the financially weak or the urban residents are higher risk groups.
Vulnerability-attention analysis for space-related activities
NASA Technical Reports Server (NTRS)
Ford, Donnie; Hays, Dan; Lee, Sung Yong; Wolfsberger, John
1988-01-01
Techniques for representing and analyzing trouble spots in structures and processes are discussed. Identification of vulnerable areas usually depends more on particular and often detailed knowledge than on algorithmic or mathematical procedures. In some cases, machine inference can facilitate the identification. The analysis scheme proposed first establishes the geometry of the process, then marks areas that are conditionally vulnerable. This provides a basis for advice on the kinds of human attention or machine sensing and control that can make the risks tolerable.
Rupp, Kalman; Strand, Alexander; Davies, Paul; Sears, Jim
2007-01-01
Both target effectiveness and administrative simplicity are desirable properties in the design of minimum benefit packages for public retirement programs. The federal benefit rate (FBR) of the Supplemental Security Income (SSI) program has been proposed by some analysts as a potentially attractive basis of establishing a new minimum benefit for Social Security on both of these grounds. This type of proposal is related to a broader array of minimum benefit proposals that would establish a Social Security benefit floor based on the poverty rate. In contrast to Social Security, the SSI program is means tested, including both an income and asset screen and also a categorical eligibility screen (the requirement to qualify as aged or disabled). The SSI FBR provides an inflation-adjusted, guaranteed income floor for aged and disabled people with low assets. The FBR has been perceived by proponents as a minimal measure of Social Security benefit adequacy because it represents a subpoverty income level for a family of one or two depending on marital status. For this same reason it has been seen as a target-effective tool of designing a minimum Social Security benefit. An FBR-based minimum benefit has also been viewed as administratively simple to implement; the benefit can be calculated from Social Security administrative records using a completely automated electronic process. Therefore-in contrast to the SSI program itself-an FBR-based minimum benefit would incur virtually no ongoing administrative costs, would not require a separate application for a means-tested program, and would avoid the perception of welfare stigma. While these ideas have been discussed in the literature and among policymakers in the United States over the years, and similar proposals have been considered or implemented in several foreign countries, there have been no previous analyses measuring the size of the potentially affected beneficiary population. Nor has there been any systematic assessment of the FBR as a measure of benefit adequacy or the tradeoffs between potential target effectiveness and administrative simplicity. Based on a series of simulations, we assess the FBR as a potential foundation for minimum Social Security benefits and we examine the tradeoffs between administrative simplicity and target effectiveness using microdata from the 1996 panel of the Survey of Income and Program Participation (SIPP). Our empirical analysis is limited to Social Security retired-worker beneficiaries aged 65 or older. We start with the assessment of the FBR as a measure of benefit adequacy. We are particularly concerned about two types of error: (1) incorrectly identifying some Social Security beneficiaries as "economically vulnerable," and (2) incorrectly identifying others as "not economically vulnerable." Operationally we measure economic vulnerability by two alternative standards. One of our measures considers beneficiaries with family income below the official poverty threshold as vulnerable. Our second measure is more restrictive; it uses a family income threshold equal to 75 percent of the official poverty threshold. We find that a substantial minority of retired workers have Social Security benefits below the FBR. The results also show that the FBR-based measure of Social Security benefit adequacy is very imprecise in terms of identifying economically vulnerable people. We estimate that the vast majority of beneficiaries with Social Security benefits below the FBR are not economically vulnerable. Conversely, an FBR-level Social Security benefit threshold fails to identify some beneficiaries who are economically vulnerable. Thus an FBR-level minimum benefit would be poorly targeted in terms of both types of errors we are concerned about. An FBR-level minimum benefit would provide minimum Social Security benefits to many people who are clearly not poor. Conversely, an FBR-level minimum benefit would not provide any income relief to some who are poor. The administrative simplicity behind these screening errors also results in additional program cost that may be perceived as substantial. We estimate that an FBR-level minimum benefit would increase aggregate program cost for retired workers aged 65 or older by roughly 2 percent. There are two fundamental reasons for these findings. First, the concept of an FBR-level minimum benefit looks at the individual or married couple in artificial isolation; however, the family is the main consumption unit in our society. The income of an unmarried partner or family members other than a married spouse is ignored. Second, individuals and couples may also have income from sources other than Social Security or SSI, which is also ignored by a simple FBR-based minimum benefit concept. The substantial empirical magnitude of measurement error arising from these conceptual simplifications naturally leads to the assessment of the tradeoff between target effectiveness and administrative simplicity. To facilitate this analysis, we simulate the potential effect of alternative screening methods designed to increase target effectiveness; while reducing program cost, such alternatives also may increase administrative complexity. For example, considering the combined Social Security benefit of a married couple (rather than looking at the husband and wife in isolation) might substantially increase target effectiveness with a relatively small increase in administrative complexity. Adding a family income screen might increase administrative complexity to a greater degree, but also would increase target effectiveness dramatically. The results also suggest that at some point adding new screens-such as a comprehensive asset test-may drastically increase administrative complexity with diminishing returns in terms of increased target effectiveness and reduced program cost. Whether a broad-based minimum benefit concept that is not tied to previous work experience is perceived by policymakers as desirable or not may depend on several factors not addressed in this article. However, to the extent that this type of minimum benefit design is regarded as potentially desirable, the tradeoffs between administrative simplicity and target effectiveness need to be considered.
NASA Astrophysics Data System (ADS)
Esser, B. K.; Beller, H. R.; Carroll, S.; Cherry, J. A.; Jackson, R. B.; Jordan, P. D.; Madrid, V.; Morris, J.; Parker, B. L.; Stringfellow, W. T.; Varadharajan, C.; Vengosh, A.
2015-12-01
California recently passed legislation mandating dedicated groundwater quality monitoring for new well stimulation operations. The authors provided the State with expert advice on the design of such monitoring networks. Factors that must be considered in designing a new and unique groundwater monitoring program include: Program design: The design of a monitoring program is contingent on its purpose, which can range from detection of individual well leakage to demonstration of regional impact. The regulatory goals for permit-required monitoring conducted by operators on a well-by-well basis will differ from the scientific goals of a regional monitoring program conducted by the State. Vulnerability assessment: Identifying factors that increase the probability of transport of fluids from the hydrocarbon target zone to a protected groundwater zone enables the intensity of permit-required monitoring to be tiered by risk and also enables prioritization of regional monitoring of groundwater basins based on vulnerability. Risk factors include well integrity; proximity to existing wellbores and geologic features; wastewater disposal; vertical separation between the hydrocarbon and groundwater zones; and site-specific hydrogeology. Analyte choice: The choice of chemical analytes in a regulatory monitoring program is guided by the goals of detecting impact, assuring public safety, preventing resource degradation, and minimizing cost. Balancing these goals may be best served by tiered approach in which targeted analysis of specific chemical additives is triggered by significant changes in relevant but more easily analyzed constituents. Such an approach requires characterization of baseline conditions, especially in areas with long histories of oil and gas development. Monitoring technology: Monitoring a deep subsurface process or a long wellbore is more challenging than monitoring a surface industrial source. The requirement for monitoring multiple groundwater aquifers across a range of depths and of monitoring at deeper depths than is typical for regulatory monitoring programs requires consideration of monitoring technology, which can range from clusters of wells to multiple wells in a single wellbore to multi-level systems in a single cased wellbore.
As part of the Climate Ready Estuaries (CRE) program, the Global Change Research Program (GCRP) in the National Center for Environmental Assessment, Office of Research and Development at the U.S. Environmental Protection Agency has prepared a report exploring a new methodology fo...
As part of the Climate Ready Estuaries (CRE) program, the Global Change Research Program (GCRP) in the National Center for Environmental Assessment, Office of Research and Development at the U.S. Environmental Protection Agency has prepared a report exploring a new methodology fo...
Serving the Needs of At-Risk Refugee Youth: A Program Evaluation
ERIC Educational Resources Information Center
McBrien, J. Lynn
2006-01-01
Refugee students, although frequently subsumed under the "immigrant" heading, often suffer from effects of significant trauma that can make them more vulnerable than children of voluntary immigrant families. This study evaluated a program created specifically for refugee youth at-risk for academic failure and "social death." The program goals…
Developing Higher Education Programs in Emergency Management: Ghana's Experience
ERIC Educational Resources Information Center
Yakubu, Mariama Bisongu
2013-01-01
Ghana is highly vulnerable and threatened by several hazards and has sought ways of minimizing impacts of hazards events over time including demonstrating an interest in developing an emergency management training and an higher education degree program. Yet, as of 2013, the country has not developed a disaster management training program or a…
What is “Support” in Supportive Housing: Client and Service Providers’ Perspectives
Owczarzak, Jill; Dickson-Gomez, Julia; Convey, Mark; Weeks, Margaret
2014-01-01
Supportive housing programs are proposed as a way of increasing housing access and stability for the chronically homeless, improving access to needed services, and decreasing vulnerability to HIV and other diseases. Little is known about residents’ understandings of and experiences with different models of supportive housing and how they fit within residents’ broader strategies to maintain housing. We conducted semi-structured interviews with 23 residents and 10 service providers from nine different supportive housing programs in Hartford, Connecticut. Data analysis explored residents’ perceptions of and experiences with supportive housing programs in the context of strategies to access resources and receive emotional, financial, and other forms of support. Themes of independence, coercion, and choice pervaded participants’ narratives of their experiences accessing services. Concerns with privacy influenced the types of relationships residents formed with program staff and clients. Findings illustrate the need for more ethnographic studies of how supportive housing services are delivered by community agencies and accessed by clients. PMID:25477620
The Recovery Process When Participating in Cancer Support and Rehabilitation Programs in Sweden
Melin-Johansson, Christina; Öhlén, Joakim; Koinberg, Ingalill; Berg, Linda; Nolbris, Margaretha Jenholt
2015-01-01
The aim was to illuminate the meaning of participating in support and rehabilitation programs described by people diagnosed with cancer. Nineteen persons were interviewed in focus groups and face-to-face. Data were analyzed with a qualitative phenomenological hermeneutical method for researching lived experiences. Interpretation proceeded through three phases: naïve reading, structural analysis, and comprehensive understanding. Three themes were disclosed: receiving support for recovery when being most vulnerable, recapturing capabilities through supportive activities, and searching to find stability and well-being in a changed life situation. Participating in the programs was an existential transition from living in an unpredictable situation that was turned into something meaningful. Recovery did not mean the return to a state of normality; rather, it meant a continuing recovery from cancer treatments and symptoms involving recapturing capabilities and searching for a balance in a forever changed life. This study provides new insights about the experiences of participating in cancer support and rehabilitation programs. PMID:28462312
NASA Astrophysics Data System (ADS)
Dolan, K. A.
2015-12-01
Disturbance plays a critical role in shaping the structure and function of forested ecosystems as well as the ecosystem services they provide, including but not limited to: carbon storage, biodiversity habitat, water quality and flow, and land atmosphere exchanges of energy and water. In addition, recent studies suggest that disturbance rates may increase in the future under altered climate and land use scenarios. Thus understanding how vulnerable forested ecosystems are to potential changes in disturbance rates is of high importance. This study calculated the theoretical threshold rate of disturbance for which forest ecosystems could no longer be sustained (λ*) across the Coterminous U.S. using an advanced process based ecosystem model (ED). Published rates of disturbance (λ) in 50 study sites were obtained from the North American Forest Disturbance (NAFD) program. Disturbance distance (λ* - λ) was calculated for each site by differencing the model based threshold under current climate conditions and average observed rates of disturbance over the last quarter century. Preliminary results confirm all sample forest sites have current average rates of disturbance below λ*, but there were interesting patterns in the recorded disturbance distances. In general western sites had much smaller disturbance distances, suggesting higher vulnerability to change, while eastern sites showed larger buffers. Ongoing work is being conducted to assess the vulnerability of these sites in the context of potential future changes by propagating scenarios of future climate and land-use change through the analysis.
A PROJECTION OF URBAN GROWTH IN ATLANTA, GEORGIA
The U. S. Environmental Protection Agency's Regional Vulnerability Assessment Program(ReVA) is designed to develop and demonstrate approaches to identify the ecosystems at the greatest risk from regional population growth and economic activity. As part of this program, a cellular...
Jo, J A; Fang, Q; Papaioannou, T; Qiao, J H; Fishbein, M C; Beseth, B; Dorafshar, A H; Reil, T; Baker, D; Freischlag, J; Shung, K K; Sun, L; Marcu, L
2006-01-01
In this study, time-resolved laser-induced fluorescence spectroscopy (TR-LIFS) and ultrasonography were applied to detect vulnerable (high-risk) atherosclerotic plaque. A total of 813 TR-LIFS measurements were taken from carotid plaques of 65 patients, and subsequently analyzed using the Laguerre deconvolution technique. The investigated spots were classified by histopathology as thin, fibrotic, calcified, low-inflamed, inflamed and necrotic lesions. Spectral and time-resolved parameters (normalized intensity values and Laguerre expansion coefficients) were extracted from the TR-LIFS data. Feature selection for classification was performed by either analysis of variance (ANOVA) or principal component analysis (PCA). A stepwise linear discriminant analysis algorithm was developed for detecting inflamed and necrotic lesion, representing the most vulnerable plaques. These vulnerable plaques were detected with high sensitivity (>80%) and specificity (>90%). Ultrasound (US) imaging was obtained in 4 carotid plaques in addition to TR-LIFS examination. Preliminary results indicate that US provides important structural information of the plaques that could be combined with the compositional information obtained by TR-LIFS, to obtain a more accurate diagnosis of vulnerable atherosclerotic plaque.
Measuring Road Network Vulnerability with Sensitivity Analysis
Jun-qiang, Leng; Long-hai, Yang; Liu, Wei-yi; Zhao, Lin
2017-01-01
This paper focuses on the development of a method for road network vulnerability analysis, from the perspective of capacity degradation, which seeks to identify the critical infrastructures in the road network and the operational performance of the whole traffic system. This research involves defining the traffic utility index and modeling vulnerability of road segment, route, OD (Origin Destination) pair and road network. Meanwhile, sensitivity analysis method is utilized to calculate the change of traffic utility index due to capacity degradation. This method, compared to traditional traffic assignment, can improve calculation efficiency and make the application of vulnerability analysis to large actual road network possible. Finally, all the above models and calculation method is applied to actual road network evaluation to verify its efficiency and utility. This approach can be used as a decision-supporting tool for evaluating the performance of road network and identifying critical infrastructures in transportation planning and management, especially in the resource allocation for mitigation and recovery. PMID:28125706
On some recent definitions and analysis frameworks for risk, vulnerability, and resilience.
Aven, Terje
2011-04-01
Recently, considerable attention has been paid to a systems-based approach to risk, vulnerability, and resilience analysis. It is argued that risk, vulnerability, and resilience are inherently and fundamentally functions of the states of the system and its environment. Vulnerability is defined as the manifestation of the inherent states of the system that can be subjected to a natural hazard or be exploited to adversely affect that system, whereas resilience is defined as the ability of the system to withstand a major disruption within acceptable degradation parameters and to recover within an acceptable time, and composite costs, and risks. Risk, on the other hand, is probability based, defined by the probability and severity of adverse effects (i.e., the consequences). In this article, we look more closely into this approach. It is observed that the key concepts are inconsistent in the sense that the uncertainty (probability) dimension is included for the risk definition but not for vulnerability and resilience. In the article, we question the rationale for this inconsistency. The suggested approach is compared with an alternative framework that provides a logically defined structure for risk, vulnerability, and resilience, where all three concepts are incorporating the uncertainty (probability) dimension. © 2010 Society for Risk Analysis.
NASA Astrophysics Data System (ADS)
Park, C.; Cho, M.; Lee, D.
2017-12-01
Landslide vulnerability assessment methodology of urban area is proposed with urban structure and building charateristics which can consider total damage cost of climate impacts. We used probabilistic analysis method for modeling rainfall-induced shallow landslide susceptibility by slope stability analysis and Monte Carlo simulations. And We combined debris flows with considering spatial movements under topographical condition and built environmental condition. Urban vulnerability of landslide is assessed by two categories: physical demages and urban structure aspect. Physical vulnerability is related to buildings, road, other ubran infra. Urban structure vulnerability is considered a function of the socio-economic factors, trigger factor of secondary damage, and preparedness level of the local government. An index-based model is developed to evaluate the life and indirect damage under landslide as well as the resilience ability against disasters. The analysis was performed in a geographic information system (GIS) environment because GIS can deal efficiently with a large volume of spatial data. The results of the landslide susceptibility assessment were compared with the landslide inventory, and the proposed approach demonstrated good predictive performance. The general trend found in this study indicates that the higher population density areas under a weaker fiscal condition that are located at the downstream of mountainous areas are more vulnerable than the areas in opposite conditions.
Social vulnerability assessment: a growing practice in Europe?
NASA Astrophysics Data System (ADS)
Tapsell, S.; McC arthy, S.
2012-04-01
This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of country policy and the particular risk management focus to the smaller scale risk management perceptions of the analysis techniques employed being to resource expensive, difficult to interpret or to operationalise. This paper will provide a context with some empirical examples to perhaps explain the growing popularity of concepts such as resilience and capacity building which lie more comfortably with policy makers and risk managers as concepts which focus on the solution rather than identifying a problem by assessing social vulnerability.
AVQS: attack route-based vulnerability quantification scheme for smart grid.
Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.
Do climate extreme events foster violent civil conflicts? A coincidence analysis
NASA Astrophysics Data System (ADS)
Schleussner, Carl-Friedrich; Donges, Jonathan F.; Donner, Reik V.
2014-05-01
Civil conflicts promoted by adverse environmental conditions represent one of the most important potential feedbacks in the global socio-environmental nexus. While the role of climate extremes as a triggering factor is often discussed, no consensus is yet reached about the cause-and-effect relation in the observed data record. Here we present results of a rigorous statistical coincidence analysis based on the Munich Re Inc. extreme events database and the Uppsala conflict data program. We report evidence for statistically significant synchronicity between climate extremes with high economic impact and violent conflicts for various regions, although no coherent global signal emerges from our analysis. Our results indicate the importance of regional vulnerability and might aid to identify hot-spot regions for potential climate-triggered violent social conflicts.
Shan, Ming; Chan, Albert P C; Le, Yun; Hu, Yi
2015-06-01
Response strategy is a key for preventing widespread corruption vulnerabilities in the public construction sector. Although several studies have been devoted to this area, the effectiveness of response strategies has seldom been evaluated in China. This study aims to fill this gap by investigating the effectiveness of response strategies for corruption vulnerabilities through a survey in the Chinese public construction sector. Survey data obtained from selected experts involved in the Chinese public construction sector were analyzed by factor analysis and partial least squares-structural equation modeling. Analysis results showed that four response strategies of leadership, rules and regulations, training, and sanctions, only achieved an acceptable level in preventing corruption vulnerabilities in the Chinese public construction sector. This study contributes to knowledge by improving the understanding of the effectiveness of response strategies for corruption vulnerabilities in the public construction sector of developing countries.
Li, Jing; Xu, Xin; Yang, Jun; Liu, Zhidong; Xu, Lei; Gao, Jinghong; Liu, Xiaobo; Wu, Haixia; Wang, Jun; Yu, Jieqiong; Jiang, Baofa; Liu, Qiyong
2017-07-01
Understanding the health consequences of continuously rising temperatures-as is projected for China-is important in terms of developing heat-health adaptation and intervention programs. This study aimed to examine the association between mortality and daily maximum (T max ), mean (T mean ), and minimum (T min ) temperatures in warmer months; to explore threshold temperatures; and to identify optimal heat indicators and vulnerable populations. Daily data on temperature and mortality were obtained for the period 2007-2013. Heat thresholds for condition-specific mortality were estimated using an observed/expected analysis. We used a generalised additive model with a quasi-Poisson distribution to examine the association between mortality and T max /T min /T mean values higher than the threshold values, after adjustment for covariates. T max /T mean /T min thresholds were 32/28/24°C for non-accidental deaths; 32/28/24°C for cardiovascular deaths; 35/31/26°C for respiratory deaths; and 34/31/28°C for diabetes-related deaths. For each 1°C increase in T max /T mean /T min above the threshold, the mortality risk of non-accidental-, cardiovascular-, respiratory, and diabetes-related death increased by 2.8/5.3/4.8%, 4.1/7.2/6.6%, 6.6/25.3/14.7%, and 13.3/30.5/47.6%, respectively. Thresholds for mortality differed according to health condition when stratified by sex, age, and education level. For non-accidental deaths, effects were significant in individuals aged ≥65 years (relative risk=1.038, 95% confidence interval: 1.026-1.050), but not for those ≤64 years. For most outcomes, women and people ≥65 years were more vulnerable. High temperature significantly increases the risk of mortality in the population of Jinan, China. Climate change with rising temperatures may bring about the situation worse. Public health programs should be improved and implemented to prevent and reduce health risks during hot days, especially for the identified vulnerable groups. Copyright © 2017. Published by Elsevier Inc.
Factors Contributing to Exacerbating Vulnerabilities in Global Clinical Trials
da Silva, Ricardo E.; Amato, Angélica A.; Guilhem, Dirce B.; de Carvalho, Marta R.; Lima, Elisangela da C.; Novaes, Maria Rita C. G.
2018-01-01
Background: Although policies and guidelines make use of the concept of vulnerability, few define it. The European Union's directive for clinical trials does not include explanations for or the reasoning behind the designation of certain groups as vulnerable. Emerging economies from lower middle-income countries have, in recent years, had the largest average annual growth rate, as well as increase, in number of clinical trials registered in the US government's database. Nevertheless, careful supervision of research activities has to be ensured. Objective: To describe and analyze the features of the clinical trials involving vulnerable populations in various countries classified by development status and geographic region. Methods: Retrospective study that involved analysis of data obtained from the International Clinical Trials Registry Platform (ICTRP) database between 01/2014 and 12/2014 from countries with (i) highest trial densities during 2005 to 2012, (ii) highest average growth rate in clinical trials, and (iii) greatest trial capabilities. Results: Statistical analysis of this study showed that patients incapable of giving consent personally are 11.4 times more likely to be vulnerable patients than patients who are capable, and that patients in upper-middle-income countries are 1.7 times more likely to be vulnerable patients than patients from high-income countries when participating in global clinical trials. Malaysia (21%), Egypt (20%), Turkey (19%), Israel (18%), and Brazil (17%) had the highest percentages of vulnerable populations involving children. Conclusions: Although the inability to provide consent personally was a factor associated with vulnerability, arbitrary criteria may have been considered when classifying the populations of clinical trials as vulnerable. The EU Clinical Trials Register should provide guidance regarding exactly what aspects or factors should be taken into account to frame given populations as vulnerable, because vulnerability is not applicable to all risk situations. PMID:29403381
Factors Contributing to Exacerbating Vulnerabilities in Global Clinical Trials.
da Silva, Ricardo E; Amato, Angélica A; Guilhem, Dirce B; de Carvalho, Marta R; Lima, Elisangela da C; Novaes, Maria Rita C G
2017-01-01
Background: Although policies and guidelines make use of the concept of vulnerability, few define it. The European Union's directive for clinical trials does not include explanations for or the reasoning behind the designation of certain groups as vulnerable. Emerging economies from lower middle-income countries have, in recent years, had the largest average annual growth rate, as well as increase, in number of clinical trials registered in the US government's database. Nevertheless, careful supervision of research activities has to be ensured. Objective: To describe and analyze the features of the clinical trials involving vulnerable populations in various countries classified by development status and geographic region. Methods: Retrospective study that involved analysis of data obtained from the International Clinical Trials Registry Platform (ICTRP) database between 01/2014 and 12/2014 from countries with (i) highest trial densities during 2005 to 2012, (ii) highest average growth rate in clinical trials, and (iii) greatest trial capabilities. Results: Statistical analysis of this study showed that patients incapable of giving consent personally are 11.4 times more likely to be vulnerable patients than patients who are capable, and that patients in upper-middle-income countries are 1.7 times more likely to be vulnerable patients than patients from high-income countries when participating in global clinical trials. Malaysia (21%), Egypt (20%), Turkey (19%), Israel (18%), and Brazil (17%) had the highest percentages of vulnerable populations involving children. Conclusions: Although the inability to provide consent personally was a factor associated with vulnerability, arbitrary criteria may have been considered when classifying the populations of clinical trials as vulnerable. The EU Clinical Trials Register should provide guidance regarding exactly what aspects or factors should be taken into account to frame given populations as vulnerable, because vulnerability is not applicable to all risk situations.
Construction of an integrated social vulnerability index in urban areas prone to flash flooding
NASA Astrophysics Data System (ADS)
Aroca-Jimenez, Estefania; Bodoque, Jose Maria; Garcia, Juan Antonio; Diez-Herrero, Andres
2017-09-01
Among the natural hazards, flash flooding is the leading cause of weather-related deaths. Flood risk management (FRM) in this context requires a comprehensive assessment of the social risk component. In this regard, integrated social vulnerability (ISV) can incorporate spatial distribution and contribution and the combined effect of exposure, sensitivity and resilience to total vulnerability, although these components are often disregarded. ISV is defined by the demographic and socio-economic characteristics that condition a population's capacity to cope with, resist and recover from risk and can be expressed as the integrated social vulnerability index (ISVI). This study describes a methodological approach towards constructing the ISVI in urban areas prone to flash flooding in Castilla y León (Castile and León, northern central Spain, 94 223 km2, 2 478 376 inhabitants). A hierarchical segmentation analysis (HSA) was performed prior to the principal components analysis (PCA), which helped to overcome the sample size limitation inherent in PCA. ISVI was obtained from weighting vulnerability factors based on the tolerance statistic. In addition, latent class cluster analysis (LCCA) was carried out to identify spatial patterns of vulnerability within the study area. Our results show that the ISVI has high spatial variability. Moreover, the source of vulnerability in each urban area cluster can be identified from LCCA. These findings make it possible to design tailor-made strategies for FRM, thereby increasing the efficiency of plans and policies and helping to reduce the cost of mitigation measures.
NASA Astrophysics Data System (ADS)
Armaş, I.; Gavriş, A.
2013-06-01
In recent decades, the development of vulnerability frameworks has enlarged the research in the natural hazards field. Despite progress in developing the vulnerability studies, there is more to investigate regarding the quantitative approach and clarification of the conceptual explanation of the social component. At the same time, some disaster-prone areas register limited attention. Among these, Romania's capital city, Bucharest, is the most earthquake-prone capital in Europe and the tenth in the world. The location is used to assess two multi-criteria methods for aggregating complex indicators: the social vulnerability index (SoVI model) and the spatial multi-criteria social vulnerability index (SEVI model). Using the data of the 2002 census we reduce the indicators through a factor analytical approach to create the indices and examine if they bear any resemblance to the known vulnerability of Bucharest city through an exploratory spatial data analysis (ESDA). This is a critical issue that may provide better understanding of the social vulnerability in the city and appropriate information for authorities and stakeholders to consider in their decision making. The study emphasizes that social vulnerability is an urban process that increased in a post-communist Bucharest, raising the concern that the population at risk lacks the capacity to cope with disasters. The assessment of the indices indicates a significant and similar clustering pattern of the census administrative units, with an overlap between the clustering areas affected by high social vulnerability. Our proposed SEVI model suggests adjustment sensitivity, useful in the expert-opinion accuracy.
Study on the Groundwater Vulnerability Assessment in Sanjiang Plain in Northeast China
NASA Astrophysics Data System (ADS)
Tang, Y.; Tang, W. K.; Liu, C.
2012-12-01
The Sanjiang Plain is located in eastern part of China's Heilongjiang Province.It's total area is 109 000 km2, with cultivated land area being 3.6677 million hm2. It is a major national commodity grain base. Rice planting area in Sanjiang Plain has been increasing year by year. Groundwater exploitation is increasing rapidly as a result of rapid increase of paddy field area. It is necessary to research and analyze spatial diversity of groundwater pollution vulnerability for Sanjiang Plain, so as to fulfill the goal of integrated planning, rational utilization of land and water resource, avoiding or minimizing groundwater contamination, and protecting grain security of China. Based on the commonly used DRASTIC method internationally, and according to hydrogeology, land use and other characteristics of Sanjiang Plain, this paper establishes groundwater vulnerability assessment index system. Since the Sanjiang Plain is an area that gives priority to agriculture, and impact of agricultural land and agricultural activity on groundwater vulnerability can not be ignored. Two indicators of agricultural land use rate (L) and population density (P) are increased in the DRASTC index system, the remaining 5 indicators are groundwater depth (D), aquifer net recharge(R), aquifer media type (A), soil type(S), aquifer hydraulic conductivity (C). Taking ArcGis as a calculation analysis platform to assess groundwater vulnerability of the Sanjiang Plain, by using hierarchical analysis method of the fuzzy mathematics method to calculate each index weigh of evaluation vulnerability. This paper applies 6 levels of assessment standard as follows: vulnerability index DI <2 stands for not vulnerable; 2
INTERNATIONAL COOPERATION ON RADIOLOGICAL THREAT REDUCTION PROGRAMS IN RUSSIA
DOE Office of Scientific and Technical Information (OSTI.GOV)
Landers, Christopher C.; Tatyrek, Aaron P.
Since its inception in 2004, the United States Department of Energy’s Global Threat Reduction Initiative (GTRI) has provided the Russian Federation with significant financial and technical assistance to secure its highly vulnerable and dangerous radiological material. The three program areas of this assistance are the removal of radioisotope thermoelectric generators (RTG), the physical protection of vulnerable in-use radiological material of concern, and the recovery of disused or abandoned radiological material of concern. Despite the many successes of the GTRI program in Russia, however, there is still a need for increased international cooperation in these efforts. Furthermore, concerns exist over howmore » the Russian government will ensure that the security of its radiological materials provided through GTRI will be sustained. This paper addresses these issues and highlights the successes of GTRI efforts and ongoing activities.« less
Giesbrecht, Melissa; Crooks, Valorie A; Williams, Allison; Hankivsky, Olena
2012-11-01
Family (i.e., unpaid) caregiving has long been thought of as a 'woman's issue', which ultimately results not only in gendered, but also financial and health inequities. Because of this, gender-based analyses have been prioritized in caregiving research. However, trends in current feminist scholarship demonstrate that gender intersects with other axes of difference, such as culture, socio-economic status, and geography to create diverse experiences. In this analysis we examine how formal front-line palliative care providers understand the role of such diversities in shaping Canadian family caregivers' experiences of end-of-life care. In doing so we consider the implications of these findings for a social benefit program aimed at supporting family caregivers, namely the Compassionate Care Benefit (CCB). This analysis contributes to a utilization-focused evaluation of Canada's CCB, a social program that provides job security and limited income assistance to Canadian family caregivers who take a temporary leave from employment to provide care for a dying family member at end-of-life. Fifty semi-structured phone interviews with front-line palliative care providers from across Canada were conducted and thematic diversity analysis of the transcripts ensued. Findings reveal that experiences of caregiving are not homogenous and access to services and supports are not universal across Canada. Five axes of difference were commonly raised by front-line palliative care providers when discussing important differences in family caregivers' experiences: culture, gender, geography, lifecourse stage, and material resources. Our findings reveal inequities with regard to accessing needed caregiver services and resources, including the CCB, based on these axes of difference. We contend that without considering diversity, patterns in vulnerability and inequity are overlooked, and thus continually reinforced in health policy. Based on our findings, we demonstrate that re-framing categorizations of caregivers can expose specific vulnerabilities and inequities while identifying implications for the CCB program as it is currently administered. From a policy perspective, this analysis demonstrates why diversity needs to be acknowledged in policy circles, including in relation to the CCB, and seeks to counteract single dimensional approaches for understanding caregiver needs at end-of-life. Such findings illustrate how diversity analysis can dramatically enhance evaluative health policy research.
2012-01-01
Introduction Family (i.e., unpaid) caregiving has long been thought of as a ‘woman’s issue’, which ultimately results not only in gendered, but also financial and health inequities. Because of this, gender-based analyses have been prioritized in caregiving research. However, trends in current feminist scholarship demonstrate that gender intersects with other axes of difference, such as culture, socio-economic status, and geography to create diverse experiences. In this analysis we examine how formal front-line palliative care providers understand the role of such diversities in shaping Canadian family caregivers’ experiences of end-of-life care. In doing so we consider the implications of these findings for a social benefit program aimed at supporting family caregivers, namely the Compassionate Care Benefit (CCB). Methods This analysis contributes to a utilization-focused evaluation of Canada’s CCB, a social program that provides job security and limited income assistance to Canadian family caregivers who take a temporary leave from employment to provide care for a dying family member at end-of-life. Fifty semi-structured phone interviews with front-line palliative care providers from across Canada were conducted and thematic diversity analysis of the transcripts ensued. Results Findings reveal that experiences of caregiving are not homogenous and access to services and supports are not universal across Canada. Five axes of difference were commonly raised by front-line palliative care providers when discussing important differences in family caregivers’ experiences: culture, gender, geography, lifecourse stage, and material resources. Our findings reveal inequities with regard to accessing needed caregiver services and resources, including the CCB, based on these axes of difference. Conclusions We contend that without considering diversity, patterns in vulnerability and inequity are overlooked, and thus continually reinforced in health policy. Based on our findings, we demonstrate that re-framing categorizations of caregivers can expose specific vulnerabilities and inequities while identifying implications for the CCB program as it is currently administered. From a policy perspective, this analysis demonstrates why diversity needs to be acknowledged in policy circles, including in relation to the CCB, and seeks to counteract single dimensional approaches for understanding caregiver needs at end-of-life. Such findings illustrate how diversity analysis can dramatically enhance evaluative health policy research. PMID:23116474
Siekmans, Kendra; Receveur, Olivier; Haddad, Slim
2014-01-01
Addressing the complex, multi-factorial causes of childhood anaemia is best done through integrated packages of interventions. We hypothesized that due to reduced child vulnerability, a “buffering” of risk associated with known causes of anaemia would be observed among children living in areas benefiting from a community-based health and nutrition program intervention. Cross-sectional data on the nutrition and health status of children 24–59 mo (N = 2405) were obtained in 2000 and 2004 from program evaluation surveys in Ghana, Malawi and Tanzania. Linear regression models estimated the association between haemoglobin and immediate, underlying and basic causes of child anaemia and variation in this association between years. Lower haemoglobin levels were observed in children assessed in 2000 compared to 2004 (difference -3.30 g/L), children from Tanzania (-9.15 g/L) and Malawi (-2.96 g/L) compared to Ghana, and the youngest (24–35 mo) compared to oldest age group (48–59 mo; -5.43 g/L). Children who were stunted, malaria positive and recently ill also had lower haemoglobin, independent of age, sex and other underlying and basic causes of anaemia. Despite ongoing morbidity, risk of lower haemoglobin decreased for children with malaria and recent illness, suggesting decreased vulnerability to their anaemia-producing effects. Stunting remained an independent and unbuffered risk factor. Reducing chronic undernutrition is required in order to further reduce child vulnerability and ensure maximum impact of anaemia control programs. Buffering the impact of child morbidity on haemoglobin levels, including malaria, may be achieved in certain settings. PMID:24598692
Siekmans, Kendra; Receveur, Olivier; Haddad, Slim
2014-01-01
Addressing the complex, multi-factorial causes of childhood anaemia is best done through integrated packages of interventions. We hypothesized that due to reduced child vulnerability, a "buffering" of risk associated with known causes of anaemia would be observed among children living in areas benefiting from a community-based health and nutrition program intervention. Cross-sectional data on the nutrition and health status of children 24-59 mo (N=2405) were obtained in 2000 and 2004 from program evaluation surveys in Ghana, Malawi and Tanzania. Linear regression models estimated the association between haemoglobin and immediate, underlying and basic causes of child anaemia and variation in this association between years. Lower haemoglobin levels were observed in children assessed in 2000 compared to 2004 (difference -3.30 g/L), children from Tanzania (-9.15 g/L) and Malawi (-2.96 g/L) compared to Ghana, and the youngest (24-35 mo) compared to oldest age group (48-59 mo; -5.43 g/L). Children who were stunted, malaria positive and recently ill also had lower haemoglobin, independent of age, sex and other underlying and basic causes of anaemia. Despite ongoing morbidity, risk of lower haemoglobin decreased for children with malaria and recent illness, suggesting decreased vulnerability to their anaemia-producing effects. Stunting remained an independent and unbuffered risk factor. Reducing chronic undernutrition is required in order to further reduce child vulnerability and ensure maximum impact of anaemia control programs. Buffering the impact of child morbidity on haemoglobin levels, including malaria, may be achieved in certain settings.
A Framework for Programming and Budgeting for Cybersecurity
2016-01-01
environment in which hackers operate and extends beyond the confines of a single organization. Reducing the incen- tive for hacking and availability of...convey- ing to hackers that going after their organization entails a great deal of frustration (deterrence by denial) or risk (e.g., via hack -backs...components in the network: Systems are hacked because they have vulnerabilities (although a vulnerability-free system may be encounter risks from protocol
Patel, Sangram Kishor; Prabhakar, Parimi; Jain, Anrudh Kumar; Saggurti, Niranjan; Adhikary, Rajatashuvra
2016-01-01
Studies exploring the linkages between financial vulnerabilities and community collectivization of female sex workers (FSWs) are scarce in India despite having potential policy implications. To fill this gap in the literature, this study attempts to understand the financial vulnerabilities among FSWs and assess the relationship between community collectivization and financial vulnerabilities in southern India. Data were drawn from a cross-sectional, behavioral tracking survey (BTS)-2014, conducted among FSWs (N = 2400) in Andhra Pradesh, a southern state of India under the Avahan-India AIDS initiative program. Adjusted odds ratios (AOR) and their 95% confidence intervals (CI) were estimated through multivariate logistic regression, to assess the independent relationships of the degree of community collectivization indicators with financial vulnerability indicators, adjusting for socio-demographic characteristics. Most FSWs (87%) reported having either one or more financial vulnerability and nearly one-fifth had a high financial vulnerability. The risk of facing financial vulnerability was significantly lower among FSWs with a high degree of perceived collective efficacy (15% vs 31%; AOR: 0.4; 95% CI: 0.3-0.5) and collective agency (4% vs 21%; AOR: 0.2; 95% CI: 0.1-0.3) as compared to their respective counterparts, after controlling for their individual socio-demographic characteristics. FSWs with a high degree of collective efficacy are also less likely to report different components of financial vulnerability (e.g. income, saving, expenditure, and debt). This study finding suggests that community-led interventions such as improving collectivization are promising strategies to address financial vulnerabilities and a path to a sustainable reduction of HIV risk. This study calls for further evidence-based research and measurement of the effects of community-led approaches in addressing the financial vulnerabilities of the key population at risk for HIV.
Setting Priorities in Behavioral Interventions: An Application to Reducing Phishing Risk.
Canfield, Casey Inez; Fischhoff, Baruch
2018-04-01
Phishing risk is a growing area of concern for corporations, governments, and individuals. Given the evidence that users vary widely in their vulnerability to phishing attacks, we demonstrate an approach for assessing the benefits and costs of interventions that target the most vulnerable users. Our approach uses Monte Carlo simulation to (1) identify which users were most vulnerable, in signal detection theory terms; (2) assess the proportion of system-level risk attributable to the most vulnerable users; (3) estimate the monetary benefit and cost of behavioral interventions targeting different vulnerability levels; and (4) evaluate the sensitivity of these results to whether the attacks involve random or spear phishing. Using parameter estimates from previous research, we find that the most vulnerable users were less cautious and less able to distinguish between phishing and legitimate emails (positive response bias and low sensitivity, in signal detection theory terms). They also accounted for a large share of phishing risk for both random and spear phishing attacks. Under these conditions, our analysis estimates much greater net benefit for behavioral interventions that target these vulnerable users. Within the range of the model's assumptions, there was generally net benefit even for the least vulnerable users. However, the differences in the return on investment for interventions with users with different degrees of vulnerability indicate the importance of measuring that performance, and letting it guide interventions. This study suggests that interventions to reduce response bias, rather than to increase sensitivity, have greater net benefit. © 2017 Society for Risk Analysis.
NASA Astrophysics Data System (ADS)
Naumann, G.; Barbosa, P.; Garrote, L.; Iglesias, A.; Vogt, J.
2014-05-01
We propose a composite drought vulnerability indicator (DVI) that reflects different aspects of drought vulnerability evaluated at Pan-African level for four components: the renewable natural capital, the economic capacity, the human and civic resources, and the infrastructure and technology. The selection of variables and weights reflects the assumption that a society with institutional capacity and coordination, as well as with mechanisms for public participation, is less vulnerable to drought; furthermore, we consider that agriculture is only one of the many sectors affected by drought. The quality and accuracy of a composite indicator depends on the theoretical framework, on the data collection and quality, and on how the different components are aggregated. This kind of approach can lead to some degree of scepticism; to overcome this problem a sensitivity analysis was done in order to measure the degree of uncertainty associated with the construction of the composite indicator. Although the proposed drought vulnerability indicator relies on a number of theoretical assumptions and some degree of subjectivity, the sensitivity analysis showed that it is a robust indicator and hence able of representing the complex processes that lead to drought vulnerability. According to the DVI computed at country level, the African countries classified with higher relative vulnerability are Somalia, Burundi, Niger, Ethiopia, Mali and Chad. The analysis of the renewable natural capital component at sub-basin level shows that the basins with high to moderate drought vulnerability can be subdivided into the following geographical regions: the Mediterranean coast of Africa; the Sahel region and the Horn of Africa; the Serengeti and the Eastern Miombo woodlands in eastern Africa; the western part of the Zambezi Basin, the southeastern border of the Congo Basin, and the belt of Fynbos in the Western Cape province of South Africa. The results of the DVI at the country level were compared with drought disaster information from the EM-DAT disaster database. Even if a cause-effect relationship cannot be established between the DVI and the drought disaster database, a good agreement is observed between the drought vulnerability maps and the number of persons affected by droughts. These results are expected to contribute to the discussion on how to assess drought vulnerability and hopefully contribute to the development of drought early warning systems in Africa.
Nutrient inadequacy among nutritionally vulnerable populations in the US
USDA-ARS?s Scientific Manuscript database
Objective: To estimate the prevalence of inadequacy of selected nutrients among participants in the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC); participants in the Supplemental Nutrition Assistance Program (SNAP); and those with low/very low food security status. ...
EPA’s Lead-based Paint Enforcement Helps Protect Children and Vulnerable Communities
The Toxic Substances Control Act (TSCA) New and Existing Chemicals (NEC) Program is exclusively a federal program that provides for review of the risk of chemicals prior to their manufacture and importation to prevent unreasonable risk to human health
NASA Astrophysics Data System (ADS)
Sangpenchan, R.
2011-12-01
This research explores the vulnerability of Thai rice production to simultaneous exposure by climate and socioeconomic change -- so-called "double exposure." Both processes influence Thailand's rice production system, but the vulnerabilities associated with their interactions are unknown. To understand this double exposure, I adopts a mixed-method, qualitative-quantitative analytical approach consisting of three phases of analysis involving a Vulnerability Scoping Diagram, a Principal Component Analysis, and the EPIC crop model using proxy datasets collected from secondary data sources at provincial scales.The first and second phases identify key variables representing each of the three dimensions of vulnerability -- exposure, sensitivity, and adaptive capacity indicating that the greatest vulnerability in the rice production system occurs in households and areas with high exposure to climate change, high sensitivity to climate and socioeconomic stress, and low adaptive capacity. In the third phase, the EPIC crop model simulates rice yields associated with future climate change projected by CSIRO and MIROC climate models. Climate change-only scenarios project the decrease in yields by 10% from the current productivity during 2016-2025 and 30% during 2045-2054. Scenarios applying both climate change and improved technology and management practices show that a 50% increase in rice production is possible, but requires strong collaboration between sectors to advance agricultural research and technology and requires strong adaptive capacity in the rice production system characterized by well-developed social capital, social networks, financial capacity, and infrastructure and household mobility at the local scale. The vulnerability assessment and climate and crop adaptation simulations used here provide useful information to decision makers developing vulnerability reduction plans in the face of concurrent climate and socioeconomic change.
The vulnerability of family caregivers in relation to vulnerability as understood by nurses.
Sarvimäki, Anneli; Stenbock-Hult, Bettina; Sundell, Eija; Oesch-Börman, Christine
2017-03-01
In Finland, the care of older persons is shifting from institutional care to family care. Research shows that family caregivers experience their situation much in the same way as professional nurses. The nurses' experiences have been studied in terms of vulnerability, and the same perspective could deepen our understanding of family caregivers' experiences. The aim of this study was to gain knowledge of the vulnerability of older caregivers taking care of an ageing family member. The research questions were as follows: How do family caregivers experience vulnerability? How do their experiences relate to vulnerability as understood by nurses? The study was done as a secondary analysis of focus group interviews on the experiences and daily life of older family caregivers. Four caregivers had taken part in monthly interviews during a period of 10 months. The interviews were analysed by deductive and inductive content analysis. The results showed that the caregivers saw caregiving as part of being human. They experienced a variety of feelings and moral agony and were harmed physically, mentally and socially. They showed courage, protected themselves and recognised that being a caregiver also was a source of maturing and developing. These results corresponded with the nurses' understanding of vulnerability. Shame, the experience of duty as a burden, worry and loneliness were themes that were found only among the family caregivers. The use of a matrix may have restricted the analysis, but using it in an unconstrained way allowed for new themes to be created. The results indicate a common humanness and vulnerability in professional and family caregiving. They also show that family caregivers need more support both from society and professionals. © 2016 Nordic College of Caring Science.
Vulnerability to the transmission of human visceral leishmaniasis in a Brazilian urban area
de Toledo, Celina Roma Sánchez; de Almeida, Andréa Sobral; Chaves, Sergio Augusto de Miranda; Sabroza, Paulo Chagastelles; Toledo, Luciano Medeiros; Caldas, Jefferson Pereira
2017-01-01
ABSTRACT OBJECTIVE To analyze the determinants for the occurrence of human visceral leishmaniasis linked to the conditions of vulnerability. METHODS This is an ecological study, whose spatial analysis unit was the Territorial Analysis Unit in Araguaína, State of Tocantins, Brazil, from 2007 to 2012. We have carried out an analysis of the sociodemographic and urban infrastructure situation of the municipality. Normalized primary indicators were calculated and used to construct the indicators of vulnerability of the social structure, household structure, and urban infrastructure. From them, we have composed a vulnerability index. Kernel density estimation was used to evaluate the density of cases of human visceral leishmaniasis, based on the coordinates of the cases. Bivariate global Moran’s I was used to verify the existence of spatial autocorrelation between the incidence of human visceral leishmaniasis and the indicators and index of vulnerability. Bivariate local Moran’s I was used to identify spatial clusters. RESULTS We have observed a pattern of centrifugal spread of human visceral leishmaniasis in the municipality, where outbreaks of the disease have progressively reached central and peri-urban areas. There has been no correlation between higher incidences of human visceral leishmaniasis and worse living conditions. Statistically significant clusters have been observed between the incidences of human visceral leishmaniasis in both periods analyzed (2007 to 2009 and 2010 to 2012) and the indicators and index of vulnerability. CONCLUSIONS The environment in circumscribed areas helps as protection factor or increases the local vulnerability to the occurrence of human visceral leishmaniasis. The use of methodology that analyzes the conditions of life of the population and the spatial distribution of human visceral leishmaniasis is essential to identify the most vulnerable areas to the spread/maintenance of the disease. PMID:28513764
How Researchers Define Vulnerable Populations in HIV/AIDS Clinical Trials
Lo, Bernard; Strauss, Ronald P.; Eron, Joseph; Gifford, Allen L.
2010-01-01
In this study, we interviewed researchers, asking them to define vulnerable populations in HIV/AIDS clinical trials, and provide feedback on the federal regulations for three vulnerable populations. Interview data informed a conceptual framework, and were content analyzed to identify acceptability or disagreement with the regulations. Beginning with several characteristics of vulnerable enrollees identified by researchers, the conceptual framework illustrates possible scenarios of how enrollees could be considered vulnerable in clinical research. Content analysis identified barriers affecting HIV/AIDS researchers’ ability to conduct clinical trials with pregnant women, prisoners, and children, for which the regulations specify additional protections. This study challenges current thinking about federal regulations’ group-based approach to defining vulnerable populations. PMID:20721614
Vulnerability Analysis and Evaluation of Urban Road System in Tianjin
NASA Astrophysics Data System (ADS)
Liu, Y. Q.; Wu, X.
In recent years, with the development of economy, the road construction of our country has entered into a period of rapid growth. The road transportation network has been expanding and the risk of disasters is increasing. In this paper we study the vulnerability of urban road system in Tianjin. After analyzed many risk factors of the urban road system security, including road construction, road traffic and the natural environment, we proposed an evaluation index of vulnerability of urban road system and established the corresponding evaluation index system. Based on the results of analysis and comprehensive evaluation, appropriate improvement measures and suggestions which may reduce the vulnerability of the road system and improve the safety and reliability of the road system are proposed.
Burke, Holly M.; Moret, Whitney; Field, Samuel; Chen, Mario; Zeng, Yanwu; Seka, Firmin M.
2016-01-01
The objective of this study was to identify and describe levels of household economic vulnerability in HIV-affected communities in Côte d’Ivoire, defined as those with a high prevalence of HIV and large numbers of orphans and vulnerable children. We conducted a cross-sectional survey of 3,749 households in five health regions of Côte d’Ivoire. Using principal component analysis, we attempted to identify sets of correlated vulnerabilities and derive a small number of composite scores to create an index for targeting interventions to vulnerable populations. The 65 vulnerability measures examined did not cluster in ways that would allow for the creation of a small number of composite measures. Instead, we found that households face numerous unique pathways to vulnerability. PMID:27655530
2009-04-14
and analyzes Rothe’s potential effect on these programs, including the Business Development Program under Section 8(a) of the Small Business Act...13 Potential Vulnerability of Existing Programs... Newell , Decision in Defense Procurement Case Could Set Precedent, GovExec.com, Nov. 11, 2008, available at http://www.govexec.com/dailyfed/1108
Parental Depression and Child Cognitive Vulnerability Predict Children’s Cortisol Reactivity
Hayden, Elizabeth P.; Hankin, Benjamin L.; Mackrell, Sarah V.M.; Sheikh, Haroon I.; Jordan, Patricia L.; Dozois, David J.A.; Singh, Shiva M.; Olino, Thomas M.; Badanes, Lisa S.
2015-01-01
Risk for depression is expressed across multiple levels of analysis. For example, parental depression and cognitive vulnerability are known markers of depression risk, but no study has examined their interactive effects on children’s cortisol reactivity, a likely mediator of early depression risk. We examined relations across these different levels of vulnerability using cross-sectional and longitudinal methods in two community samples of children. Children were assessed for cognitive vulnerability using self-reports (Study 1; n = 244) and tasks tapping memory and attentional bias (Study 2; n = 205), and their parents were assessed for depression history using structured clinical interviews. In both samples, children participated in standardized stress tasks and cortisol reactivity was assessed. Cross-sectionally and longitudinally, parental depression history and child cognitive vulnerability interacted to predict children’s cortisol reactivity; specifically, associations between parent depression and elevated child cortisol activity were found when children also showed elevated depressotypic attributions, as well as attentional and memory biases. Findings indicate that models of children’s emerging depression risk may benefit from the examination of the interactive effects of multiple sources of vulnerability across levels of analysis. PMID:25422972
Kang, Hou; Xuxiang, Li; Jing, Zhang
2015-01-01
Changes in ecological vulnerability were analyzed for Northern Shaanxi, China using a geographic information system (GIS). An evaluation model was developed using a spatial principal component analysis (SPCA) model containing land use, soil erosion, topography, climate, vegetation and social economy variables. Using this model, an ecological vulnerability index was computed for the research region. Using natural breaks classification (NBC), the evaluation results were divided into five types: potential, slight, light, medium and heavy. The results indicate that there is greater than average optimism about the conditions of the study region, and the ecological vulnerability index (EVI) of the southern eight counties is lower than that of the northern twelve counties. From 1997 to 2011, the ecological vulnerability index gradually decreased, which means that environmental security was gradually enhanced, although there are still some places that have gradually deteriorated over the past 15 years. In the study area, government and economic factors and precipitation are the main reasons for the changes in ecological vulnerability. PMID:25898407
NASA Astrophysics Data System (ADS)
Ciurean, R. L.; Glade, T.
2012-04-01
Decision under uncertainty is a constant of everyday life and an important component of risk management and governance. Recently, experts have emphasized the importance of quantifying uncertainty in all phases of landslide risk analysis. Due to its multi-dimensional and dynamic nature, (physical) vulnerability is inherently complex and the "degree of loss" estimates imprecise and to some extent even subjective. Uncertainty analysis introduces quantitative modeling approaches that allow for a more explicitly objective output, improving the risk management process as well as enhancing communication between various stakeholders for better risk governance. This study presents a review of concepts for uncertainty analysis in vulnerability of elements at risk to landslides. Different semi-quantitative and quantitative methods are compared based on their feasibility in real-world situations, hazard dependency, process stage in vulnerability assessment (i.e. input data, model, output), and applicability within an integrated landslide hazard and risk framework. The resulted observations will help to identify current gaps and future needs in vulnerability assessment, including estimation of uncertainty propagation, transferability of the methods, development of visualization tools, but also address basic questions like what is uncertainty and how uncertainty can be quantified or treated in a reliable and reproducible way.
Videos | Argonne National Laboratory
science --Agent-based modeling --Applied mathematics --Artificial intelligence --Cloud computing management -Intelligence & counterterrorrism -Vulnerability assessment -Sensors & detectors Programs
Hudon, Catherine; Chouinard, Maud-Christine; Diadiou, Fatoumata; Bouliane, Danielle; Lambert, Mireille; Hudon, Émilie
2016-04-01
Large amount of evidence supports the contribution of the Stanford Chronic Disease Self-Management Program (CDSMP) to a global chronic disease management strategy. However, many studies have suggested further exploring of the factors influencing acceptance and completion of participants in this program. This study aimed to describe and examine factors associated with acceptance and completion rates of the CDSMP among frequent users of health care services, and to highlight the experience of patients and peer leaders who facilitated the program. A descriptive design with mixed sequential data was used. Acceptance and completion rates were calculated and their relationship with patient characteristics was examined in regression analysis (n = 167). Interviews were conducted among patients who accepted (n = 11) and refused (n = 13) to participate and with the program coordinator. Focus groups were held with the seven peer leaders who facilitated the program. Data were analysed using thematic analysis. Of the 167 patients invited, 60 (36%) accepted to participate in the program. Group format was the most frequent reason to decline the invitation to participate. Twenty-eight participants (47%) completed the program. Participants who dropped out during the program raised different reasons such as poor health and too much heterogeneity among participants. Factors such as location, schedule, content, group composition and facilitation were considered as important elements contributing to the success of the program. The CDSMP could therefore be considered as a self-management support option for this vulnerable clientele, while taking measures to avoid too much heterogeneity among participants to improve completion rates. © The Author 2016. Published by Oxford University Press.
After-School Programs: A Potential Partner to Support Urban Youth
ERIC Educational Resources Information Center
Evans, Ashley; Leung, Brian P.
2012-01-01
After-school programs (ASPs) are learning centers that provide enrichment opportunities after regular school hours. This article examines the value these programs can add to a child's educational day, especially for urban youth who are vulnerable during after-school hours. Quality ASPs can be part of the solution to help mitigate the effects of…
LaMotte, A.E.; Greene, E.A.
2007-01-01
Spatial relations between land use and groundwater quality in the watershed adjacent to Assateague Island National Seashore, Maryland and Virginia, USA were analyzed by the use of two spatial models. One model used a logit analysis and the other was based on geostatistics. The models were developed and compared on the basis of existing concentrations of nitrate as nitrogen in samples from 529 domestic wells. The models were applied to produce spatial probability maps that show areas in the watershed where concentrations of nitrate in groundwater are likely to exceed a predetermined management threshold value. Maps of the watershed generated by logistic regression and probability kriging analysis showing where the probability of nitrate concentrations would exceed 3 mg/L (>0.50) compared favorably. Logistic regression was less dependent on the spatial distribution of sampled wells, and identified an additional high probability area within the watershed that was missed by probability kriging. The spatial probability maps could be used to determine the natural or anthropogenic factors that best explain the occurrence and distribution of elevated concentrations of nitrate (or other constituents) in shallow groundwater. This information can be used by local land-use planners, ecologists, and managers to protect water supplies and identify land-use planning solutions and monitoring programs in vulnerable areas. ?? 2006 Springer-Verlag.
Hu, Chih-Yi; Tsai, You-Zen; Lin, Shun-Fu
2014-12-01
Tea (Camellia sinensis) is an important economic crop in Taiwan. Particularly, two major commercial types of tea (Paochong tea and Oolong tea) which are produced in Taiwan are famous around the world, and they must be manufactured with specific cultivars. Nevertheless, many elite cultivars have been illegally introduced to foreign countries. Because of the lower cost, large amount of "Taiwan-type tea" are produced and imported to Taiwan, causing a dramatic damage in the tea industry. It is very urgent to develop the stable, fast and reliable DNA markers for fingerprinting tea cultivars in Taiwan and protecting intellectual property rights for breeders. Furthermore, genetic diversity and phylogenetic relationship evaluations of tea germplasm in Taiwan are imperative for parental selection in the cross-breeding program and avoidance of genetic vulnerability. Two STS and 37 CAPS markers derived from cytoplasmic genome and ESTs of tea have been developed in this study providing a useful tool for distinguishing all investigated germplasm. For identifying 12 prevailing tea cultivars in Taiwan, five core markers, including each one of mitochondria and chloroplast, and three nuclear markers, were developed. Based on principal coordinate analysis and cluster analysis, 55 tea germplasm in Taiwan were divided into three groups: sinensis type (C. sinensis var. sinensis), assamica type (C. sinensis var. assamica) and Taiwan wild species (C. formosensis). The result of genetic diversity analysis revealed that both sinensis (0.44) and assamica (0.41) types had higher genetic diversity than wild species (0.25). The close genetic distance between the first (Chin-Shin-Oolong) and the third (Shy-Jih-Chuen) prevailing cultivars was found, and many recently released varieties are the descents of Chin-Shin-Oolong. This implies the potential risk of genetic vulnerability for tea cultivation in Taiwan. We have successfully developed a tool for tea germplasm discrimination and genetic diversity analysis, as well as a set of core markers for effective identification of prevailing cultivars in Taiwan. According to the results of phylogenetic analysis on prevailing tea cultivars, it is necessary to broaden genetic diversity from wild species or plant introduction in future breeding programs.
Hamilton, Jane E; Srivastava, Devika; Womack, Danica; Brown, Ashlie; Schulz, Brian; Macakanja, April; Walker, April; Wu, Mon-Ju; Williamson, Mark; Cho, Raymond Y
2018-06-05
Young adults experiencing first-episode psychosis have historically been difficult to retain in mental health treatment. Communities across the United States are implementing Coordinated Specialty Care to improve outcomes for individuals experiencing first-episode psychosis. This mixed-methods research study examined the relationship between program services and treatment retention, operationalized as the likelihood of remaining in the program for 9 months or more. In the adjusted analysis, male gender and participation in home-based cognitive behavioral therapy were associated with an increased likelihood of remaining in treatment. The key informant interview findings suggest the shared decision-making process and the breadth, flexibility, and focus on functional recovery of the home-based cognitive behavioral therapy intervention may have positively influenced treatment retention. These findings suggest the use of shared decision-making and improved access to home-based cognitive behavioral therapy for first-episode psychosis patients may improve outcomes for this vulnerable population.
Nutritional Assessment of Free Meal Programs in San Francisco
Drago-Ferguson, Soledad; Lopez, Andrea; Seligman, Hilary K.
2013-01-01
Free meals often serve as a primary food source for adults living in poverty, particularly the homeless. We conducted a nutritional analysis of 22 meals from 6 free meal sites in San Francisco to determine macronutrient and micronutrient content. Meals provided too little fiber and too much fat but appropriate levels of cholesterol. They were also below target for potassium, calcium, and vitamins A and E. These findings may inform development of nutritional content standards for free meals, particularly for vulnerable patients who might have, or be at risk of developing, a chronic illness. PMID:23721791
2012-10-01
du C2 de l’OTAN à divers aspects de la planification axée sur les capacités, à l’ingénierie des systèmes et à la gestion des ...renforcement des quatre piliers du cycle de gestion des urgences – c’est-à-dire l’atténuation et la prévention, la préparation, l’intervention et le...démontrer l’utilité de l’analyse et de la recherche opérationnelles lorsqu’il s’agit d’améliorer des
Lippman, Sheri A.; Treves-Kagan, Sarah; Gilvydis, Jennifer M.; Naidoo, Evasen; Khumalo-Sakutukwa, Gertrude; Darbes, Lynae; Raphela, Elsie; Ntswane, Lebogang; Barnhart, Scott
2014-01-01
Objective Building a successful combination prevention program requires understanding the community’s local epidemiological profile, the social community norms that shape vulnerability to HIV and access to care, and the available community resources. We carried out a situational analysis in order to shape a comprehensive HIV prevention program that address local barriers to care at multiple contextual levels in the North West Province of South Africa. Method The situational analysis was conducted in two sub-districts in 2012 and guided by an adaptation of WHO’s Strategic Approach, a predominantly qualitative method, including observation of service delivery points and in-depth interviews and focus groups with local leaders, providers, and community members, in order to recommend context-specific HIV prevention strategies. Analysis began during fieldwork with nightly discussions of findings and continued with coding original textual data from the fieldwork notebooks and a select number of recorded interviews. Results We conducted over 200 individual and group interviews and gleaned four principal social barriers to HIV prevention and care, including: HIV fatalism, traditional gender norms, HIV-related stigma, and challenges with communication around HIV, all of which fuel the HIV epidemic. At the different levels of response needed to stem the epidemic, we found evidence of national policies and programs that are mitigating the social risk factors but little community-based responses that address social risk factors to HIV. Conclusions Understanding social and structural barriers to care helped shape our comprehensive HIV prevention program, which address the four ‘themes’ identified into each component of the program. Activities are underway to engage communities, offer community-based testing in high transmission areas, community stigma reduction, and a positive health, dignity and prevention program for stigma reduction and improve communication skills. The situational analysis process successfully shaped key programmatic decisions and cultivated a deeper collaboration with local stakeholders to support program implementation. PMID:25028976
Lippman, Sheri A; Treves-Kagan, Sarah; Gilvydis, Jennifer M; Naidoo, Evasen; Khumalo-Sakutukwa, Gertrude; Darbes, Lynae; Raphela, Elsie; Ntswane, Lebogang; Barnhart, Scott
2014-01-01
Building a successful combination prevention program requires understanding the community's local epidemiological profile, the social community norms that shape vulnerability to HIV and access to care, and the available community resources. We carried out a situational analysis in order to shape a comprehensive HIV prevention program that address local barriers to care at multiple contextual levels in the North West Province of South Africa. The situational analysis was conducted in two sub-districts in 2012 and guided by an adaptation of WHO's Strategic Approach, a predominantly qualitative method, including observation of service delivery points and in-depth interviews and focus groups with local leaders, providers, and community members, in order to recommend context-specific HIV prevention strategies. Analysis began during fieldwork with nightly discussions of findings and continued with coding original textual data from the fieldwork notebooks and a select number of recorded interviews. We conducted over 200 individual and group interviews and gleaned four principal social barriers to HIV prevention and care, including: HIV fatalism, traditional gender norms, HIV-related stigma, and challenges with communication around HIV, all of which fuel the HIV epidemic. At the different levels of response needed to stem the epidemic, we found evidence of national policies and programs that are mitigating the social risk factors but little community-based responses that address social risk factors to HIV. Understanding social and structural barriers to care helped shape our comprehensive HIV prevention program, which address the four 'themes' identified into each component of the program. Activities are underway to engage communities, offer community-based testing in high transmission areas, community stigma reduction, and a positive health, dignity and prevention program for stigma reduction and improve communication skills. The situational analysis process successfully shaped key programmatic decisions and cultivated a deeper collaboration with local stakeholders to support program implementation.
Spouse Psychological Well-Being: A Keystone to Military Family Health
Green, Sara; Nurius, Paula S.; Lester, Patricia
2013-01-01
Understanding predictors of military spouse psychosocial vulnerability informs efforts to assess, identify, and support at-risk spouses and families. In this analysis we test the effects of family stress and strain on military spouse psychological health, using a sample of female civilian spouses (n=161). Regression findings confirm expectations of the significant contribution of family stressors, strain, and resources in explaining variation in spouses' psychological health, controlling for deployment and socioeconomic factors. Identifying the effects of family stress on military spouse psychological health supports the need for family-centered interventions and prevention programs. PMID:24415897
EXAMINING REGIONAL LAND USE CHANGE: THE COMMUNITY GROWTH MODEL (CGM)
The U. S. Environmental Protection Agency's Regional Vulnerability Assessment
Program (ReV A) is designed to develop and demonstrate approaches to identify the ecosystems at the greatest risk from regional population growth and economic activity.
As part of this program, ...
The Jornada Basin long term ecological research program
USDA-ARS?s Scientific Manuscript database
Chihuahuan Desert landscapes exemplify the ecological conditions, vulnerability, and management challenges in arid and semi-arid regions around the world. The goal of the Jornada Basin Long Term Ecological Research program (JRN LTER) established in 1982 is to understand and quantify the key factors ...
Sister cities and easy passage: HIV, mobility and economies of desire in a Thai/Lao border zone.
Lyttleton, Chris; Amarapibal, Amorntip
2002-02-01
It is recognised that people movement can increase potential risk of HIV transmission. In recent years, mobile populations moving across national borders have become a focus for HIV/AIDS prevention campaigns. These programs generally target border "hot zones" that produce high levels of HIV vulnerability due to the degree of mobility and the risk behaviours fostered by these marginal environments. However, high degrees of movement and social exploitation need not be the only criteria for borders to exacerbate HIV vulnerability. The types of social interactions promoted by mobility take many forms. In this paper we consider a border zone between Thailand and Laos to show that the links between movement and HIV vulnerability are not confined to stereotypical instances of coercion and exploitation. Rather we demonstrate that HIV risk in this area is a product of both a sense of community and a sense of difference that together foster a range of interactions based on mobility back and forth across the border. As HIV/AIDS prevention programs increasingly control forms of sexual interaction, the border provides a practical and symbolic opportunity to establish new forms of sexual relationship falling outside these constraints. This tendency to move outside bounds is not limited to border areas but has implications for prevention programs everywhere.
HIV vulnerability and the erasure of sexual and gender diversity in Abidjan, Côte d'Ivoire.
Thomann, Matthew
2016-01-01
In the fight against concentrated HIV epidemics, men who have sex with men (MSM) are often framed as a homogeneous population, with little attention paid to sexual and gender diversity and its impact on HIV vulnerability. This article draws on ethnographic research conducted in Abidjan, Côte d'Ivoire among les branchés - a local term encompassing several categories of same-sex desire and practice. In the context of increased HIV prevention programming targeting Ivoirian sexual and gender minorities, such diversity is effectively erased. This obfuscation of difference has particularly negative impacts for travestis, who may be at higher risk for HIV infection, though research and prevention efforts in which they are grouped with 'MSM' render them underrepresented and make their vulnerability difficult to quantify. Branchés whose class and/or ethnic backgrounds compound their stigmatised status as sexual and gender minorities also bear the burden of this exclusion. Furthermore, some branchés deploy 'MSM' as a form of self-identification, further complicating who such categories represent. By highlighting the ways in which constructions of gender and sexuality within HIV/AIDS programming obscure complex social realities, I aim to reorient thinking around the development of purposeful HIV programming that engages the complexity of sexual and gender minority experience.
NASA Astrophysics Data System (ADS)
Hung, Hung-Chih; Wu, Ju-Yu; Hung, Chih-Hsuan
2017-04-01
1. Background Asia-Pacific region is one of the most vulnerable areas of the world to climate-related hazards and extremes due to rapid urbanization and over-development in hazard-prone areas. It is thus increasingly recognized that the management of land use and reduction of hazard risk are inextricably linked. This is especially critical from the perspective of integrated river basin management. A range of studies has targeted existing vulnerability assessments. However, limited attention has been paid to the cumulative effects of multiple vulnerable factors and their dynamics faced by local communities. This study proposes a novel methodology to access the changing cumulative vulnerability to climate-related hazards, and to examine the relationship between the attraction factors relevant to the general process of urbanization and vulnerability variability with a focus on a river basin management unit. 2. Methods and data The methods applied in this study include three steps. First, using Intergovernmental Panel on Climate Change's (IPCC) approach, a Cumulative Vulnerability Assessment Framework (CVAF) is built with a goal to characterize and compare the vulnerability to climate-related hazards within river basin regions based on a composition of multiple indicators. We organize these indicator metrics into three categories: (1) hazard exposure; (2) socioeconomic sensitivity, and (3) adaptive capacity. Second, the CVAF is applied by combining a geographical information system (GIS)-based spatial statistics technique with a multicriteria decision analysis (MCDA) to assess and map the changing cumulative vulnerability, comparing conditions in 1996 and 2006 in Danshui River Basin, Taiwan. Third, to examine the affecting factors of vulnerability changing, we develop a Vulnerability Changing Model (VCM) using four attraction factors to reflect how the process of urban developments leads to vulnerability changing. The factors are transport networks, land uses, production values of industries, and infrastructures. We then conduct a regression analysis to test the VCM. To illustrate the proposed methodology, the data are collected from the National Science and Technology Center for Disaster Reduction, Taiwan as well as the National Land Use Investigation and official census statistics. 3. Results and policy implications Results of CVAF analysis demonstrate heterogeneous patterns of vulnerability in the region, and highlight trends of long-term changes. The vulnerable areas unfold as clustered patterns and spatial analogues across regions, rather than randomly distributed. Highest cumulative vulnerability is concentrated in densely populated and downstream reaches (such as Taipei City) of the Danshui River in both time periods. When examining the VCM, it indicates that upper stream and more remote areas generally show low vulnerability, increases are observed in some areas between 1996 and 2006 due to land use intensification, industrial and infrastructure expansion. These findings suggest that land use planning should consider the socioeconomic progression and infrastructure investment factors that contribute to urban sprawl and address current as well as future urban developments vulnerable to hazard risk transmission. The cumulative vulnerability assessment, mapping methods and modelling presented here can be applied to other climate change and hazard risks to highlight priority areas for further investigation and contribute towards improving river basin management.
Engaging Vulnerable Adolescents in a Pregnancy Prevention Program: Perspectives of Prime Time Staff
Tanner, Amanda E.; Secor-Turner, Molly; Garwick, Ann; Sieving, Renee; Rush, Kayci
2011-01-01
Introduction Evaluating interventions for reducing unintended adolescent pregnancy is necessary to ensure quality and efficacy. The purpose of this study was to examine core case management practices and processes for engaging high-risk girls in Prime Time, an intensive multi-component intervention from the perspectives of intervention program staff. Method Structured individual interviews were conducted with the entire Prime Time program staff (N=7) to assess successes and challenges in engaging adolescent girls at high risk for early pregnancy recruited from school and community clinics. Results Program staff described different capacities of adolescents to engage with the program (easy, middle and difficult connecting adolescents) and provided specific recommendations for working with different connectors. Discussion Findings from this study support the notion that preventive interventions with vulnerable groups of adolescents must pay careful attention to strategies for establishing trusting youth-adult relationships. The ability of staff (e.g., case managers, nurses) to engage with adolescents is a crucial step in improving health outcomes. The identified strategies are useful in helping adolescents build skills, motivations and supports needed for healthy behavior change. PMID:22726710
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1982-06-01
The US General Accounting Office and executive agency Inspectors General have reported losses of millions of dollars in government funds resulting from fraud, waste and error. The Administration and the Congress have initiated determined efforts to eliminate such losses from government programs and activities. Primary emphasis in this effort is on the strengthening of accounting and administrative controls. Accordingly, the Office of Management and Budget (OMB) issued Circular No. A-123, Internal Control Systems, on October 28, 1981. The campaign to improve internal controls was endorsed by the Secretary of Energy in a memorandum to Heads of Departmental Components, dated Marchmore » 13, 1981, Subject: Internal Control as a Deterrent to Fraud, Waste and Error. A vulnerability assessment is a review of the susceptibility of a program or function to unauthorized use of resources, errors in reports and information, and illegal or unethical acts. It is based on considerations of the environment in which the program or function is carried out, the inherent riskiness of the program or function, and a preliminary evaluation as to whether adequate safeguards exist and are functioning.« less
Mining Bug Databases for Unidentified Software Vulnerabilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dumidu Wijayasekara; Milos Manic; Jason Wright
2012-06-01
Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, amore » significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.« less
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923
Inclusion of vulnerable groups in health policies: Regional policies on health priorities in Africa
Eide, Arne Henning; Amin, Mutamad; MacLachlan, Malcom; Mannan, Hasheem
2013-01-01
Background If access to equitable health care is to be achieved for all, policy documents must mention and address in some detail different needs of groups vulnerable to not accessing such health care. If these needs are not addressed in the policy documents, there is little chance that they will be addressed at the stage of implementation. Objectives This paper reports on an analysis of 11 African Union (AU) policy documents to ascertain the frequency and the extent of mention of 13 core concepts in relation to 12 vulnerable groups, with a specific focus on people with disabilities. Method The paper applied the EquiFrame analytical framework to the 11 AU policy documents. The 11 documents were analysed in terms of how many times a core concept was mentioned and the extent of information on how the core concept should be addressed at the implementation level. Each core concept mention was further analysed in terms of the vulnerable group in referred to. Results The analysis of regional AU policies highlighted the broad nature of the reference made to vulnerable groups, with a lack of detailed specifications of different needs of different groups. This is confirmed in the highest vulnerable group mention being for ‘universal’. The reading of the documents suggests that vulnerable groups are homogeneous in their needs, which is not the case. There is a lack of recognition of different needs of different vulnerable groups in accessing health care. Conclusion The need for more information and knowledge on the needs of all vulnerable groups is evident. The current lack of mention and of any detail on how to address needs of vulnerable groups will significantly impair the access to equitable health care for all. PMID:28729986
Test Program for Assessing Vulnerability of Industrial Equipment to Nuclear Air Blast.
1983-10-01
PROJECT. TASK 4Scientific Servic, Inc. AREA & WORK UNIT NUMBERS 517 East Bayshore Work Unit 1124F Redwood City, CA 94063___ __________ 11. CONTROLLING ...vulnerability, but perhaps less expensive, to be selected and substituted, with an eye to cost control . 5. MODELING AND SCALING CONSIDERATIONS Reiterating...behavior and properties of the test items and Interfaces that control behavior (e4g., test objects/flow field, test objects/interfacing surface of
Victims of Chronic Dating Violence: How Women's Vulnerabilities Link to Their Decisions to Stay
ERIC Educational Resources Information Center
Few, April L.; Rosen, Karen H.
2005-01-01
This article describes relational and situational vulnerabilities that emerged from interviews with 28 women (7 Black and 21 White) who were victims of chronic abuse suffered at the hands of male dating partners. Based on a qualitative content analysis, we explore how these vulnerabilities relate to women's decisions to stay in their abusive…
The Irish famine of 1740-1741: famine vulnerability and "climate migration"
NASA Astrophysics Data System (ADS)
Engler, S.; Mauelshagen, F.; Werner, J.; Luterbacher, J.
2013-05-01
The "Great Frost" of 1740 was one of the coldest winters of the eighteenth century and impacted many countries all over Europe. The years 1740-1741 have long been known as a period of general crisis caused by harvest failures, high prices for staple foods, and excess mortality. Vulnerabilities, coping capacities and adaptation processes varied considerably among different countries. This paper investigates the famine of 1740-1741 in Ireland applying a multi-indicator model developed specifically for the integration of an analysis of pre-famine vulnerability, the Famine Vulnerability Analysis Model (FVAM). Our focus is on Ireland, because famine has played a more outstanding role in Irish national history than in any other European country, due to the "Great Famine" of 1845-1852 and its long-term demographic effects. Our analysis shows that Ireland was already particularly vulnerable to famine in the first half of the eighteenth century. During and after the experience of hardship in 1740-1741, many Irish moved within Ireland or left the country entirely. We regard migration as a form of adaptation and argue that Irish migration in 1740-1741 should be considered as a case of climate-induced migration.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kumar, Prashant, E-mail: prashantkumar@csio.res.in; Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030; Bansod, Baban K.S.
2015-02-15
Groundwater vulnerability maps are useful for decision making in land use planning and water resource management. This paper reviews the various groundwater vulnerability assessment models developed across the world. Each model has been evaluated in terms of its pros and cons and the environmental conditions of its application. The paper further discusses the validation techniques used for the generated vulnerability maps by various models. Implicit challenges associated with the development of the groundwater vulnerability assessment models have also been identified with scientific considerations to the parameter relations and their selections. - Highlights: • Various index-based groundwater vulnerability assessment models havemore » been discussed. • A comparative analysis of the models and its applicability in different hydrogeological settings has been discussed. • Research problems of underlying vulnerability assessment models are also reported in this review paper.« less
Comparison analysis on vulnerability of metro networks based on complex network
NASA Astrophysics Data System (ADS)
Zhang, Jianhua; Wang, Shuliang; Wang, Xiaoyuan
2018-04-01
This paper analyzes the networked characteristics of three metro networks, and two malicious attacks are employed to investigate the vulnerability of metro networks based on connectivity vulnerability and functionality vulnerability. Meanwhile, the networked characteristics and vulnerability of three metro networks are compared with each other. The results show that Shanghai metro network has the largest transport capacity, Beijing metro network has the best local connectivity and Guangzhou metro network has the best global connectivity, moreover Beijing metro network has the best homogeneous degree distribution. Furthermore, we find that metro networks are very vulnerable subjected to malicious attacks, and Guangzhou metro network has the best topological structure and reliability among three metro networks. The results indicate that the proposed methodology is feasible and effective to investigate the vulnerability and to explore better topological structure of metro networks.
McNeil, Ryan; Kerr, Thomas; Anderson, Solanna; Maher, Lisa; Keewatin, Chereece; Milloy, MJ; Wood, Evan; Small, Will
2015-01-01
While regulatory frameworks governing methadone maintenance therapy (MMT) require highly regimented treatment programs that shape treatment outcomes, little research has examined the effects of regulatory changes to these programs on those receiving treatment, and located their experiences within the wider context of socialstructural inequities. In British Columbia (BC), Canada, provincial regulations governing MMT have recently been modified, including: replacing the existing methadone formulation with Methadose® (pre-mixed and 10 times more concentrated); prohibiting pharmacy delivery of methadone; and, prohibiting pharmacies incentives for methadone dispensation. We undertook this study to examine the impacts of these changes on a structurally vulnerable population enrolled in MMT in Vancouver, BC. Qualitative interviews were conducted with 34 people enrolled in MMT and recruited from two ongoing observational prospective cohort studies comprised of drug-using individuals in the six-month period in 2014 following these regulatory changes. Interview transcripts were analyzed thematically, and by drawing on the concept of ‘structural vulnerability’. Findings underscore how these regulatory changes disrupted treatment engagement, producing considerable health and social harms. The introduction of Methadose® precipitated increased withdrawal symptoms. The discontinuation of pharmacy delivery services led to interruptions in MMT and codispensed HIV medications due to constraints stemming from their structural vulnerability (e.g., poverty, homelessness). Meanwhile, the loss of pharmacy incentives limited access to material supports utilized by participants to overcome barriers to MMT, while diminishing their capacity to assert some degree of agency in negotiating dispensation arrangements with pharmacies. Collectively, these changes functioned to compromise MMT engagement and increased structural vulnerability to harm, including re-initiation of injection drug use and participation in high-risk incomegenerating strategies. Greater attention to the impacts of social-structural inequities on MMT engagement is needed when modifying MMT programs, especially as other jurisdictions are adopting similar changes. Comprehensive environmental supports should be provided to minimize adverse outcomes during transitional periods. PMID:25875323
Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh
We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. Wemore » develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.« less
Managing the Health Impacts of Drought in Brazil
Sena, Aderita; Barcellos, Christovam; Freitas, Carlos; Corvalan, Carlos
2014-01-01
Drought is often a hidden risk with the potential to become a silent public health disaster. It is difficult to define precisely when it starts or when it is over, and although it is a climatological event, its impacts depend on other human activities, and are intensified by social vulnerability. In Brazil, half of all natural disaster events are drought related, and they cause half of the impacts in number of affected persons. One large affected area is the semiarid region of Brazil’s Northeast, which has historically been affected by drought. Many health and well-being indicators in this region are worse than the rest of the country, based on an analysis of 5565 municipalities using available census data for 1991, 2000 and 2010, which allowed separating the 1133 municipalities affected by drought in order to compare them with the rest of the country. Although great progress has been made in reducing social and economic vulnerability, climate change and the expected changes in the semiarid region in the next few decades call for a review of current programs, particularly in public health, and the planning of new interventions with local communities. This study reviews the literature, analyzes available data and identifies possible actions and actors. The aim is to ensure there will be sufficient and sustainable local adaptive capacity and resilience, for a population already living within the limits of environmental vulnerability. PMID:25325358
Gennaro, Susan; Deatrick, Janet A; Dobal, May T; Jemmott, Loretta Sweet; Ball, Katherine R
2007-01-01
Post-doctoral education has become a necessity for new nursing doctoral graduates. However, post-doctoral positions are limited and nurse scientists may face barriers that make non-traditional programs necessary. This study describes the outcomes of the Summer Nursing Research Institute (SNRI), an alternative post-doctoral educational program, reports formative perceptions of SNRI participants, and illustrates the efficacy and limitations of the model with selected summative research related outcomes. Participants between 1997 and 2006 were asked to evaluate the experience while attending the Institute (formative evaluation) and an overall summative evaluation was also conducted. Evaluations indicate that participants gained knowledge, skills, and networking abilities in terms of conducting research with vulnerable populations. A program like the SNRI can be successful in widening the research pipeline, in imparting knowledge, and in fostering positive attitudes as well as in improving research skills.
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
National Cancer Institute Patient Navigation Research Program: methods, protocol, and measures.
Freund, Karen M; Battaglia, Tracy A; Calhoun, Elizabeth; Dudley, Donald J; Fiscella, Kevin; Paskett, Electra; Raich, Peter C; Roetzheim, Richard G
2008-12-15
Patient, provider, and systems barriers contribute to delays in cancer care, a lower quality of care, and poorer outcomes in vulnerable populations, including low-income, underinsured, and racial/ethnic minority populations. Patient navigation is emerging as an intervention to address this problem, but navigation requires a clear definition and a rigorous testing of its effectiveness. Pilot programs have provided some evidence of benefit, but have been limited by evaluation of single-site interventions and varying definitions of navigation. To overcome these limitations, a 9-site National Cancer Institute Patient Navigation Research Program (PNRP) was initiated. The PNRP is charged with designing, implementing, and evaluating a generalizable patient navigation program targeting vulnerable populations. Through a formal committee structure, the PNRP has developed a definition of patient navigation and metrics to assess the process and outcomes of patient navigation in diverse settings, compared with concurrent continuous control groups. The PNRP defines patient navigation as support and guidance offered to vulnerable persons with abnormal cancer screening or a cancer diagnosis, with the goal of overcoming barriers to timely, quality care. Primary outcomes of the PNRP are 1) time to diagnostic resolution; 2) time to initiation of cancer treatment; 3) patient satisfaction with care; and 4) cost effectiveness, for breast, cervical, colon/rectum, and/or prostate cancer. The metrics to assess the processes and outcomes of patient navigation have been developed for the NCI-sponsored PNRP. If the metrics are found to be valid and reliable, they may prove useful to other investigators.
Small vulnerable sets determine large network cascades in power grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.
The understanding of cascading failures in complex systems has been hindered by the lack of realistic large-scale modeling and analysis that can account for variable system conditions. By using the North American power grid, we identified, quantified, and analyzed the set of network components that are vulnerable to cascading failures under any out of multiple conditions. We show that the vulnerable set consists of a small but topologically central portion of the network and that large cascades are disproportionately more likely to be triggered by initial failures close to this set. These results elucidate aspects of the origins and causesmore » of cascading failures relevant for grid design and operation and demonstrate vulnerability analysis methods that are applicable to a wider class of cascade-prone networks.« less
Climate volatility deepens poverty vulnerability in developing countries
NASA Astrophysics Data System (ADS)
Ahmed, Syud A.; Diffenbaugh, Noah S.; Hertel, Thomas W.
2009-07-01
Extreme climate events could influence poverty by affecting agricultural productivity and raising prices of staple foods that are important to poor households in developing countries. With the frequency and intensity of extreme climate events predicted to change in the future, informed policy design and analysis requires an understanding of which countries and groups are going to be most vulnerable to increasing poverty. Using a novel economic-climate analysis framework, we assess the poverty impacts of climate volatility for seven socio-economic groups in 16 developing countries. We find that extremes under present climate volatility increase poverty across our developing country sample—particularly in Bangladesh, Mexico, Indonesia, and Africa—with urban wage earners the most vulnerable group. We also find that global warming exacerbates poverty vulnerability in many nations.
Small vulnerable sets determine large network cascades in power grids
Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.
2017-11-17
The understanding of cascading failures in complex systems has been hindered by the lack of realistic large-scale modeling and analysis that can account for variable system conditions. By using the North American power grid, we identified, quantified, and analyzed the set of network components that are vulnerable to cascading failures under any out of multiple conditions. We show that the vulnerable set consists of a small but topologically central portion of the network and that large cascades are disproportionately more likely to be triggered by initial failures close to this set. These results elucidate aspects of the origins and causesmore » of cascading failures relevant for grid design and operation and demonstrate vulnerability analysis methods that are applicable to a wider class of cascade-prone networks.« less
Critical evaluation of international health programs: Reframing global health and evaluation.
Chi, Chunhuei; Tuepker, Anaïs; Schoon, Rebecca; Núñez Mondaca, Alicia
2018-04-01
Striking changes in the funding and implementation of international health programs in recent decades have stimulated debate about the role of communities in deciding which health programs to implement. An important yet neglected piece of that discussion is the need to change norms in program evaluation so that analysis of community ownership, beyond various degrees of "participation," is seen as central to strong evaluation practices. This article challenges mainstream evaluation practices and proposes a framework of Critical Evaluation with 3 levels: upstream evaluation assessing the "who" and "how" of programming decisions; midstream evaluation focusing on the "who" and "how" of selecting program objectives; and downstream evaluation, the focus of current mainstream evaluation, which assesses whether the program achieved its stated objectives. A vital tenet of our framework is that a community possesses the right to determine the path of its health development. A prerequisite of success, regardless of technical outcomes, is that programs must address communities' high priority concerns. Current participatory methods still seldom practice community ownership of program selection because they are vulnerable to funding agencies' predetermined priorities. In addition to critiquing evaluation practices and proposing an alternative framework, we acknowledge likely challenges and propose directions for future research. Copyright © 2018 John Wiley & Sons, Ltd.
DOT National Transportation Integrated Search
2000-10-01
This report represents the latest in a series of efforts by the U.S. Department of Transportation (DOT) and the Federal Motor Carrier Safety Administration (FMCSA) to enhance and improve the commercial driver's license (CDL) program. In September 199...
A Climate Ready Estuaries Vulnerability Assessment
The purpose of the the Climate Ready Estuaries program is to build capacity in the National Estuary Programs (NEPs) for local leadership and expertise to adapt to the effects of climate change through a joint effort with the NEPs and EPA.
The 106th Congress: What to Watch.
ERIC Educational Resources Information Center
Fege, Arnold F.
1999-01-01
The Improving America's School Act funds numerous small programs that dissipate its purpose and increase its vulnerability. Congress is debating extension of federal roles into areas such as social promotion, parental rights, reading programs, class-size reduction, and national voluntary tests. Changing budget rules pits education against military…
Coggins, L.G.; Pine, William E.; Walters, C.J.; Martell, S.J.D.
2006-01-01
We present a new model to estimate capture probabilities, survival, abundance, and recruitment using traditional Jolly-Seber capture-recapture methods within a standard fisheries virtual population analysis framework. This approach compares the numbers of marked and unmarked fish at age captured in each year of sampling with predictions based on estimated vulnerabilities and abundance in a likelihood function. Recruitment to the earliest age at which fish can be tagged is estimated by using a virtual population analysis method to back-calculate the expected numbers of unmarked fish at risk of capture. By using information from both marked and unmarked animals in a standard fisheries age structure framework, this approach is well suited to the sparse data situations common in long-term capture-recapture programs with variable sampling effort. ?? Copyright by the American Fisheries Society 2006.
NASA Technical Reports Server (NTRS)
1970-01-01
A survey of the electrostatic vulnerability of explosive manufacturing plants and recommendations for reducing the vulnerability are discussed. During the course of the investigations, the XM15/XM165 and the E8 launcher were shown to be susceptible to electrostatic ignition. The pyrotechnic hazard of prime concern associated with electrostatics is that of the spark which can be generated. The heat, shock, and ionization produced by the spark can cause ignition of pyrotechnics. However, as a result of the initial ignition tests (XM15 fuse train), changes have been incorporated to make the fusing system relatively safe from premature electrostatic activation.
NASA Astrophysics Data System (ADS)
Papathoma-Köhle, Maria
2016-08-01
The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.
Navigator Approach to Improve Quality of Care for Vulnerable Populations in Mexico.
Ramos, Rebeca; Ferreira-Pinto, João; Loza, Oralia
2015-01-01
For nearly 30 years, Programa Compañeros Inc (Compañeros) has worked in Ciudad Juarez, Chihuahua, Mexico, to ensure that vulnerable populations can exercise their rights to receive HIV and substance abuse prevention and treatment services. Compañeros staff has worked to ameliorate the negative results that limit access to care to the most vulnerable individuals: those who are poor, homeless, sex workers, addicted, and others whose life context put them at greater risk for being infected with HIV. With support from the MAC AIDS Foundation, Compañeros has expanded its capacity to deliver services to persons living with HIV/AIDS (PLWHA) and to HIV-vulnerable populations. This short communication describes findings from an internal evaluation conducted to investigate the effectiveness of the MAC AIDS-funded navigator-based program implemented at Compañeros. © The Author(s) 2015.
Carbon pollution increases health inequities: lessons in resilience from the most vulnerable.
Ebi, Kristie L; Fawcett, Stephen B; Spiegel, Jerry; Tovalin, Horacio
2016-09-01
Climate change is a social justice as well as an environmental issue. The magnitude and pattern of changes in weather and climate variables are creating differential exposures, vulnerabilities, and health risks that increase stress on health systems while exacerbating existing and creating new health inequities. Examples from national and local health adaptation projects highlight that developing partnerships across sectors and levels are critical for building climate-resilient health systems and communities. Strengthening current and implementing new health interventions, such as using environmental information to develop early warning systems, can be effective in protecting the most vulnerable. However, not all projected risks of climate change can be avoided by climate policies and programs, so health system strengthening is also critical. Applying a health inequity lens can reduce current vulnerabilities while building resilience to longer-term climate change. Taking inequities into account is critical if societies are to effectively prepare for and manage the challenges ahead.
Chang, Chia-Ling; Chao, Yu-Chi
2012-05-01
Every year, Taiwan endures typhoons and earthquakes; these natural hazards often induce landslides and debris flows. Therefore, watershed management strategies must consider the environmental vulnerabilities of local basins. Because many factors affect basin ecosystems, this study applied multiple criteria analysis and the analytical hierarchy process (AHP) to evaluate seven criteria in three phases (geographic phase, hydrologic phase, and societal phase). This study focused on five major basins in Taiwan: the Tan-Shui River Basin, the Ta-Chia River Basin, the Cho-Shui River Basin, the Tseng-Wen River Basin, and the Kao-Ping River Basin. The objectives were a comprehensive examination of the environmental characteristics of these basins and a comprehensive assessment of their environmental vulnerabilities. The results of a survey and AHP analysis showed that landslide area is the most important factor for basin environmental vulnerability. Of all these basins, the Cho-Shui River Basin in central Taiwan has the greatest environmental vulnerability.
The impact of a livelihood program on depressive symptoms among people living with HIV in Cambodia.
Shimizu, Mayumi; Yi, Siyan; Tuot, Sovannary; Suong, Samedy; Sron, Samrithea; Shibanuma, Akira; Jimba, Masamine
2016-01-01
Psychological and social problems are major concerns in this era of successful antiretroviral therapy. Although livelihood programs have been implemented extensively to improve the daily living conditions of people living with HIV in Cambodia, no studies have yet investigated the impacts of these programs on the mental health of this vulnerable population. Therefore, we examined the impact of a livelihood program on depressive symptoms and associated factors among people living with HIV in Cambodia. A quasi-experimental, nonequivalent comparison group study was conducted in six provinces of Cambodia in 2014. Data were collected from an intervention group comprising 357 people living with HIV who had participated in the livelihood program and a comparison group comprising 328 people living with HIV who had not participated in this program. Multiple logistic regression analysis was carried out to examine the association between livelihood-program participation and depressive symptoms as measured by the depressive symptoms subscale of the 25-item Cambodian version of the Hopkins Symptom Checklist. A propensity score matching was used to examine the effect of the livelihood program on depressive symptoms while controlling for selection bias. Overall, 56.0% and 62.7% of the participants in the intervention and comparison groups, respectively, met the Hopkins Symptom Checklist threshold for depressive symptoms. The multiple logistic regression analysis showed that the participants in the intervention group had significantly lower odds of having depressive symptoms (adjusted odds ratio 0.68, 95% confidence interval 0.52-0.88). The analysis from propensity score matching indicated that the livelihood program helped mitigate depressive symptoms among the participants in the intervention group (T=-1.99). The livelihood program appeared to help mitigate the burden of depressive symptoms among people living with HIV in Cambodia. Thus, this program should be scaled up and modified to better improve participants' mental health.
ERIC Educational Resources Information Center
de Greef, Maurice; Segers, Mien; Verte, Dominique
2010-01-01
To date, hardly any evidence is available on the quality of adult education programs for vulnerable adults. Evaluation instruments or models mostly focussed on regular education and less on programs of adult education aiming to enhance social inclusion. This study presents a first exploration of the construct validity of a newly developed…
ERIC Educational Resources Information Center
Chang, Mae Chu; Joshi, Arun R.; Winkler, Donald; Yano, Satoko
In 1996 the government of the Arab Republic of Egypt initiated a basic education enhancement program to extend full coverage to vulnerable groups, especially girls, and to raise the quality of instruction. The basic education reform program was followed in 1998 by the government's secondary education reform program, supported by the World Bank. In…
As part of the Climate Ready Estuaries (CRE) program, the Global Change Research Program (GCRP) in the National Center for Environmental Assessment, Office of Research and Development at the U.S. Environmental Protection Agency has prepared this draft report exploring a new metho...
ERIC Educational Resources Information Center
Bandy, Tawana; Moore, Kristin A.
2011-01-01
The disproportionate vulnerability of African American youth to certain negative outcomes, including teen pregnancy, low academic achievement, HIV infection, and violent death, has emphasized the need for out-of-school time program providers and funders to seek programs that have been found to have positive impacts for this population.…
As part of the Climate Ready Estuaries (CRE) program, the Global Change Research Program (GCRP) in the National Center for Environmental Assessment, Office of Research and Development at the U.S. Environmental Protection Agency has prepared this draft report exploring a new metho...
Snyder, D.T.; Wilkinson, J.M.; Orzol, L.L.
1996-01-01
A ground-water flow model was used in conjunction with particle tracking to evaluate ground-water vulnerability in Clark County, Washington. Using the particle-tracking program, particles were placed in every cell of the flow model (about 60,000 particles) and tracked backwards in time and space upgradient along flow paths to their recharge points. A new computer program was developed that interfaces the results from a particle-tracking program with a geographic information system (GIS). The GIS was used to display and analyze the particle-tracking results. Ground-water vulnerability was evaluated by selecting parts of the ground-water flow system and combining the results with ancillary information stored in the GIS to determine recharge areas, characteristics of recharge areas, downgradient impact of land use at recharge areas, and age of ground water. Maps of the recharge areas for each hydrogeologic unit illustrate the presence of local, intermediate, or regional ground-water flow systems and emphasize the three-dimensional nature of the ground-water flow system in Clark County. Maps of the recharge points for each hydrogeologic unit were overlaid with maps depicting aquifer sensitivity as determined by DRASTIC (a measure of the pollution potential of ground water, based on the intrinsic characteristics of the near-surface unsaturated and saturated zones) and recharge from on-site waste-disposal systems. A large number of recharge areas were identified, particularly in southern Clark County, that have a high aquifer sensitivity, coincide with areas of recharge from on-site waste-disposal systems, or both. Using the GIS, the characteristics of the recharge areas were related to the downgradient parts of the ground-water system that will eventually receive flow that has recharged through these areas. The aquifer sensitivity, as indicated by DRASTIC, of the recharge areas for downgradient parts of the flow system was mapped for each hydrogeologic unit. A number of public-supply wells in Clark County may be receiving a component of water that recharged in areas that are more conducive to contaminant entry. The aquifer sensitivity maps illustrate a critical deficiency in the DRASTIC methodology: the failure to account for the dynamics of the ground-water flow system. DRASTIC indices calculated for a particular location thus do not necessarily reflect the conditions of the ground-water resources at the recharge areas to that particular location. Each hydrogeologic unit was also mapped to highlight those areas that will eventually receive flow from recharge areas with on-site waste-disposal systems. Most public-supply wells in southern Clark County may eventually receive a component of water that was recharged from on-site waste-disposal systems.Traveltimes from particle tracking were used to estimate the minimum and maximum age of ground water within each model-grid cell. Chlorofluorocarbon (CFC)-age dating of ground water from 51 wells was used to calibrate effective porosity values used for the particle- tracking program by comparison of ground-water ages determined through the use of the CFC-age dating with those calculated by the particle- tracking program. There was a 76 percent agreement in predicting the presence of modern water in the 51 wells as determined using CFCs and calculated by the particle-tracking program. Maps showing the age of ground water were prepared for all the hydrogeologic units. Areas with the youngest ground-water ages are expected to be at greatest risk for contamination from anthropogenic sources. Comparison of these maps with maps of public- supply wells in Clark County indicates that most of these wells may withdraw ground water that is, in part, less than 100 years old, and in many instances less than 10 years old. Results of the analysis showed that a single particle-tracking analysis simulating advective transport can be used to evaluate ground-water vulnerability for any part of a ground-wate
NASA Astrophysics Data System (ADS)
Li, C.-H.; Li, N.; Wu, L.-C.; Hu, A.-J.
2013-07-01
The vulnerability to flood disaster is addressed by a number of studies. It is of great importance to analyze the vulnerability of different regions and various periods to enable the government to make policies for distributing relief funds and help the regions to improve their capabilities against disasters, yet a recognized paradigm for such studies seems missing. Vulnerability is defined and evaluated through either physical or economic-ecological perspectives depending on the field of the researcher concerned. The vulnerability, however, is the core of both systems as it entails systematic descriptions of flood severities or disaster management units. The research mentioned often has a development perspective, and in this article we decompose the overall flood system into several factors: disaster driver, disaster environment, disaster bearer, and disaster intensity, and take the interaction mechanism among all factors as an indispensable function. The conditions of flood disaster components are demonstrated with disaster driver risk level, disaster environment stability level and disaster bearer sensitivity, respectively. The flood system vulnerability is expressed as vulnerability = f(risk, stability, sensitivity). Based on the theory, data envelopment analysis method (DEA) is used to detail the relative vulnerability's spatiotemporal variation of a flood disaster system and its components in the Dongting Lake region. The study finds that although a flood disaster system's relative vulnerability is closely associated with its components' conditions, the flood system and its components have a different vulnerability level. The overall vulnerability is not the aggregation of its components' vulnerability. On a spatial scale, zones central and adjacent to Dongting Lake and/or river zones are characterized with very high vulnerability. Zones with low and very low vulnerability are mainly distributed in the periphery of the Dongting Lake region. On a temporal scale, the occurrence of a vibrating flood vulnerability trend is observed. A different picture is displayed with the disaster driver risk level, disaster environment stability level and disaster bearer sensitivity level. The flood relative vulnerability estimation method based on DEA is characteristic of good comparability, which takes the relative efficiency of disaster system input-output into account, and portrays a very diverse but consistent picture with varying time steps. Therefore, among different spatial and time domains, we could compare the disaster situations with what was reflected by the same disaster. Additionally, the method overcomes the subjectivity of a comprehensive flood index caused by using an a priori weighting system, which exists in disaster vulnerability estimation of current disasters.
Ouyang, Min; Tian, Hui; Wang, Zhenghua; Hong, Liu; Mao, Zijun
2017-01-17
This article studies a general type of initiating events in critical infrastructures, called spatially localized failures (SLFs), which are defined as the failure of a set of infrastructure components distributed in a spatially localized area due to damage sustained, while other components outside the area do not directly fail. These failures can be regarded as a special type of intentional attack, such as bomb or explosive assault, or a generalized modeling of the impact of localized natural hazards on large-scale systems. This article introduces three SLFs models: node centered SLFs, district-based SLFs, and circle-shaped SLFs, and proposes a SLFs-induced vulnerability analysis method from three aspects: identification of critical locations, comparisons of infrastructure vulnerability to random failures, topologically localized failures and SLFs, and quantification of infrastructure information value. The proposed SLFs-induced vulnerability analysis method is finally applied to the Chinese railway system and can be also easily adapted to analyze other critical infrastructures for valuable protection suggestions. © 2017 Society for Risk Analysis.
NASA Astrophysics Data System (ADS)
Forte, F.; Strobl, R. O.; Pennetta, L.
2006-07-01
The impact of calamitous meteoric events and their interaction with the geological and geomorphological environment represent a current problem of the Supersano-Ruffano-Nociglia Graben in southern Italy. Indeed, severe floods take place on a frequent basis not only in autumn and winter, but in summer also. These calamities are not only triggered by exceptional events, but are also amplified by peculiar geological and morpho-structural characteristics of the Graben. Flooding often affects vast agricultural areas and consequently, water-scooping machines cannot remove the rainwater. These events cause warnings and emergency states, involving people as well as socio economic goods. This study represents an application of a vanguard technique for loss estimation and flood vulnerability analysis, integrating a geographic information system (GIS) with aerial photos and remote sensing methods. The analysis results clearly show that the Graben area is potentially at greatest flood vulnerability, while along the Horsts the flood vulnerability is lower.
Chatterjee, Chiradip; Mozumder, Pallab
2014-06-01
Risk information is critical to adopting mitigation measures, and seeking risk information is influenced by a variety of factors. An essential component of the recently adopted My Safe Florida Home (MSFH) program by the State of Florida is to provide homeowners with pertinent risk information to facilitate hurricane risk mitigation activities. We develop an analytical framework to understand household preferences for hurricane risk mitigation information through allowing an intensive home inspection. An empirical analysis is used to identify major drivers of household preferences to receive personalized information regarding recommended hurricane risk mitigation measures. A variety of empirical specifications show that households with home insurance, prior experience with damages, and with a higher sense of vulnerability to be affected by hurricanes are more likely to allow inspection to seek information. However, households with more members living in the home and households who live in manufactured/mobile homes are less likely to allow inspection. While findings imply MSFH program's ability to link incentives offered by private and public agencies in promoting mitigation, households that face a disproportionately higher level of risk can get priority to make the program more effective. © 2014 Society for Risk Analysis.
Mobilising "vulnerability" in the public health response to pandemic influenza.
Stephenson, Niamh; Davis, Mark; Flowers, Paul; MacGregor, Casimir; Waller, Emily
2014-02-01
Analysis of public health's growing interest in "vulnerability" has largely focused on health policy, with little interrogation of how vulnerability is being actively appropriated, countered, ignored or reworked by the publics whose health such policy is designed to protect. Once the assemblage of public health is understood as comprised of different forms of expertise and actors, including publics, addressing this gap matters. We examine the use of vulnerability in the specific context of pandemic influenza preparedness. Pandemic preparedness raises some familiar dilemmas for public health governance: how to engage with publics without fuelling social divisions and disruption; and whether to invoke publics as passive recipients of public health advice or to recognise publics as collective agents responding to the threat of pandemic influenza. Thus, we ask how the mobilisation of vulnerability connects with these dilemmas. To examine vulnerability in pandemic preparedness, two forms of qualitative data are analysed: 1) interviews and focus groups with "vulnerable" and "healthy" people (conducted 2011-12) discussing seasonal and pandemic influenza and; 2) international, Australian national and state level pandemic plans (1999-2013). Vulnerability is variously used in plans as a way to identify groups at particular risk of infection because of pre-existing clinical conditions, and as a free-floating social category that could apply to a broad range of people potentially involved in the social disruption a pandemic might entail. Our interview and focus group data indicate that healthy people rework the free-floating extension of vulnerability, and that people designated vulnerable encounter an absence of any collective responsibility for the threat of pandemic influenza. Our analysis suggests that vulnerability's mobilisation in pandemic preparedness limits the connection between public health governance and its publics: here, the openness and unpredictability of people's collective agency is something to be tightly controlled by a government concerned with protecting people from themselves. Copyright © 2013 Elsevier Ltd. All rights reserved.
Ivanova, Olena; Dræbel, Tania; Tellier, Siri
2015-08-12
Health policies are important instruments for improving population health. However, experience suggests that policies designed for the whole population do not always benefit the most vulnerable. Participation of vulnerable groups in the policy-making process provides an opportunity for them to influence decisions related to their health, and also to exercise their rights. This paper presents the findings from a study that explored how vulnerable groups and principles of human rights are incorporated into national sexual and reproductive health (SRH) policies of 4 selected countries (Spain, Scotland, Republic of Moldova, and Ukraine). It also aimed at discussing the involvement of vulnerable groups in SRH policy development from the perspective of policy-makers. Literature review, health policy analysis and 5 semi-structured interviews with policy-makers were carried out in this study. Content analysis of SRH policies was performed using the EquiFrame analytical framework. The study revealed that vulnerable groups and core principles of human rights are differently addressed in SRH policies within 4 studied countries. The opinions of policy-makers on the importance of mentioning vulnerable groups in policy documents and the way they ought to be mentioned varied, but they agreed that a clear definition of vulnerability, practical examples, and evidences on health status of these groups have to be included. In addition, different approaches to vulnerable group's involvement in policy development were identified during the interviews and the range of obstacles to this process was discussed by respondents. Incorporation of vulnerable groups in the SRH policies and their involvement in policy development were found to be important in addressing SRH of these groups and providing an opportunity for them to advocate for equal access to healthcare and exercise their rights. Future research on this topic should include representatives of vulnerable communities which could help to build a dialogue and present the problem from multiple perspectives. © 2015 by Kerman University of Medical Sciences.
Ivanova, Olena; Dræbel, Tania; Tellier, Siri
2015-01-01
Background: Health policies are important instruments for improving population health. However, experience suggests that policies designed for the whole population do not always benefit the most vulnerable. Participation of vulnerable groups in the policy-making process provides an opportunity for them to influence decisions related to their health, and also to exercise their rights. This paper presents the findings from a study that explored how vulnerable groups and principles of human rights are incorporated into national sexual and reproductive health (SRH) policies of 4 selected countries (Spain, Scotland, Republic of Moldova, and Ukraine). It also aimed at discussing the involvement of vulnerable groups in SRH policy development from the perspective of policy-makers. Methods: Literature review, health policy analysis and 5 semi-structured interviews with policy-makers were carried out in this study. Content analysis of SRH policies was performed using the EquiFrame analytical framework. Results: The study revealed that vulnerable groups and core principles of human rights are differently addressed in SRH policies within 4 studied countries. The opinions of policy-makers on the importance of mentioning vulnerable groups in policy documents and the way they ought to be mentioned varied, but they agreed that a clear definition of vulnerability, practical examples, and evidences on health status of these groups have to be included. In addition, different approaches to vulnerable group’s involvement in policy development were identified during the interviews and the range of obstacles to this process was discussed by respondents. Conclusion: Incorporation of vulnerable groups in the SRH policies and their involvement in policy development were found to be important in addressing SRH of these groups and providing an opportunity for them to advocate for equal access to healthcare and exercise their rights. Future research on this topic should include representatives of vulnerable communities which could help to build a dialogue and present the problem from multiple perspectives. PMID:26673176
A Heat Vulnerability Index and Adaptation Solutions for Pittsburgh, Pennsylvania.
Bradford, Kathryn; Abrahams, Leslie; Hegglin, Miriam; Klima, Kelly
2015-10-06
With increasing evidence of global warming, many cities have focused attention on response plans to address their populations' vulnerabilities. Despite expected increased frequency and intensity of heat waves, the health impacts of such events in urban areas can be minimized with careful policy and economic investments. We focus on Pittsburgh, Pennsylvania and ask two questions. First, what are the top factors contributing to heat vulnerability and how do these characteristics manifest geospatially throughout Pittsburgh? Second, assuming the City wishes to deploy additional cooling centers, what placement will optimally address the vulnerability of the at risk populations? We use national census data, ArcGIS geospatial modeling, and statistical analysis to determine a range of heat vulnerability indices and optimal cooling center placement. We find that while different studies use different data and statistical calculations, all methods tested locate additional cooling centers at the confluence of the three rivers (Downtown), the northeast side of Pittsburgh (Shadyside/Highland Park), and the southeast side of Pittsburgh (Squirrel Hill). This suggests that for Pittsburgh, a researcher could apply the same factor analysis procedure to compare data sets for different locations and times; factor analyses for heat vulnerability are more robust than previously thought.
NASA Astrophysics Data System (ADS)
Kim, J. M.; Woods, P. K.; Park, Y. J.; Son, K.
2013-08-01
Following growing public awareness of the danger from hurricanes and tremendous demands for analysis of loss, many researchers have conducted studies to develop hurricane damage analysis methods. Although researchers have identified the significant indicators, there currently is no comprehensive research for identifying the relationship among the vulnerabilities, natural disasters, and economic losses associated with individual buildings. To address this lack of research, this study will identify vulnerabilities and hurricane indicators, develop metrics to measure the influence of economic losses from hurricanes, and visualize the spatial distribution of vulnerability to evaluate overall hurricane damage. This paper has utilized the Geographic Information System to facilitate collecting and managing data, and has combined vulnerability factors to assess the financial losses suffered by Texas coastal counties. A multiple linear regression method has been applied to develop hurricane economic damage predicting models. To reflect the pecuniary loss, insured loss payment was used as the dependent variable to predict the actual financial damage. Geographical vulnerability indicators, built environment vulnerability indicators, and hurricane indicators were all used as independent variables. Accordingly, the models and findings may possibly provide vital references for government agencies, emergency planners, and insurance companies hoping to predict hurricane damage.
A Heat Vulnerability Index and Adaptation Solutions for Pittsburgh, Pennsylvania
NASA Astrophysics Data System (ADS)
Klima, K.; Abrahams, L.; Bradford, K.; Hegglin, M.
2015-12-01
With increasing evidence of global warming, many cities have focused attention on response plans to address their populations' vulnerabilities. Despite expected increased frequency and intensity of heat waves, the health impacts of such events in urban areas can be minimized with careful policy and economic investments. We focus on Pittsburgh, Pennsylvania and ask two questions. First, what are the top factors contributing to heat vulnerability and how do these characteristics manifest geospatially throughout Pittsburgh? Second, assuming the City wishes to deploy additional cooling centers, what placement will optimally address the vulnerability of the at risk populations? We use national census data, ArcGIS geospatial modeling, and statistical analysis to determine a range of heat vulnerability indices and optimal cooling center placement. We find that while different studies use different data and statistical calculations, all methods tested locate additional cooling centers at the confluence of the three rivers (Downtown), the northeast side of Pittsburgh (Shadyside/ Highland Park), and the southeast side of Pittsburgh (Squirrel Hill). This suggests that for Pittsburgh, a researcher could apply the same factor analysis procedure to compare datasets for different locations and times; factor analyses for heat vulnerability are more robust than previously thought.
Polycyclic aromatic hydrocarbon-DNA adducts in Beluga whales from the Arctic
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mathieu, A.; Payne, J.F.; Fancey, L.L.
1997-09-01
The Arctic is still relatively pristine in nature, but it is also vulnerable to pollution because contaminants originating from midlatitudes are transported to the Arctic by atmospheric processes, ocean currents, and river. Recognition of this fact of Arctic vulnerability has resulted in a Declaration on the Protection of the Arctic Environment by eight Arctic countries. A manifest aim of this declaration is to develop an Arctic Monitoring and Assessment Program. We report here on the presence of measurable levels of polycyclic aromatic hydrocarbon-DNA adducts, including relatively high levels in Arctic beluga (Delphinapterus leucas). These results lend support to the valuemore » of developing biological assessment programs for Arctic wildlife. 15 refs., 1 tab.« less
Probabilistic seismic vulnerability and risk assessment of stone masonry structures
NASA Astrophysics Data System (ADS)
Abo El Ezz, Ahmad
Earthquakes represent major natural hazards that regularly impact the built environment in seismic prone areas worldwide and cause considerable social and economic losses. The high losses incurred following the past destructive earthquakes promoted the need for assessment of the seismic vulnerability and risk of the existing buildings. Many historic buildings in the old urban centers in Eastern Canada such as Old Quebec City are built of stone masonry and represent un-measurable architectural and cultural heritage. These buildings were built to resist gravity loads only and generally offer poor resistance to lateral seismic loads. Seismic vulnerability assessment of stone masonry buildings is therefore the first necessary step in developing seismic retrofitting and pre-disaster mitigation plans. The objective of this study is to develop a set of probability-based analytical tools for efficient seismic vulnerability and uncertainty analysis of stone masonry buildings. A simplified probabilistic analytical methodology for vulnerability modelling of stone masonry building with systematic treatment of uncertainties throughout the modelling process is developed in the first part of this study. Building capacity curves are developed using a simplified mechanical model. A displacement based procedure is used to develop damage state fragility functions in terms of spectral displacement response based on drift thresholds of stone masonry walls. A simplified probabilistic seismic demand analysis is proposed to capture the combined uncertainty in capacity and demand on fragility functions. In the second part, a robust analytical procedure for the development of seismic hazard compatible fragility and vulnerability functions is proposed. The results are given by sets of seismic hazard compatible vulnerability functions in terms of structure-independent intensity measure (e.g. spectral acceleration) that can be used for seismic risk analysis. The procedure is very efficient for conducting rapid vulnerability assessment of stone masonry buildings. With modification of input structural parameters, it can be adapted and applied to any other building class. A sensitivity analysis of the seismic vulnerability modelling is conducted to quantify the uncertainties associated with each of the input parameters. The proposed methodology was validated for a scenario-based seismic risk assessment of existing buildings in Old Quebec City. The procedure for hazard compatible vulnerability modelling was used to develop seismic fragility functions in terms of spectral acceleration representative of the inventoried buildings. A total of 1220 buildings were considered. The assessment was performed for a scenario event of magnitude 6.2 at distance 15km with a probability of exceedance of 2% in 50 years. The study showed that most of the expected damage is concentrated in the old brick and stone masonry buildings.
This draft report uses biological data collected by four states in wadeable rivers and streams to examine the components of state and tribal bioassessment and biomonitoring programs that may be vulnerable to climate change. The study investigates the potential to identify biologi...
Evaluating Alternative High Schools: Program Evaluation in Action
ERIC Educational Resources Information Center
Hinds, Drew Samuel Wayne
2013-01-01
Alternative high schools serve some of the most vulnerable students and their programs present a significant challenge to evaluate. Determining the impact of an alternative high school that serves mostly at-risk students presented a significant research problem. Few studies exist that dig deeper into the characteristics and strategies of…
Behavioral Interventions to Advance Self-Sufficiency
ERIC Educational Resources Information Center
MDRC, 2017
2017-01-01
As the first major effort to use a behavioral economics lens to examine human services programs that serve poor and vulnerable families in the United States, the Behavioral Interventions to Advance Self-Sufficiency (BIAS) project demonstrated the value of applying behavioral insights to improve the efficacy of human services programs. The BIAS…
Probability of Corporal Punishment: Lack of Resources and Vulnerable Students
ERIC Educational Resources Information Center
Han, Seunghee
2011-01-01
The author examined corporal punishment practices in the United States based on data from 362 public school principals where corporal punishment is available. Results from multiple regression analyses show that schools with multiple student violence prevention programs and teacher training programs had fewer possibilities of use corporal…
The Relationship between Grandiose and Vulnerable (Hypersensitive) Narcissism
Jauk, Emanuel; Weigle, Elena; Lehmann, Konrad; Benedek, Mathias; Neubauer, Aljoscha C.
2017-01-01
Narcissistic grandiosity is characterized by overt expressions of feelings of superiority and entitlement, while narcissistic vulnerability reflects hypersensitivity and introversive self-absorbedness. Clinical evidence suggests that grandiosity is accompanied by vulnerable aspects, pointing to a common foundation. Subclinical personality research, however, views grandiose and vulnerable narcissism as independent traits. Grandiose narcissism displays substantial correlation with extraversion, while vulnerable narcissism correlates highly with introversion. We investigated if (1) controlling for intro-/extraversion might reveal a “common core” of grandiose and vulnerable narcissism, and if (2) the correlation between both aspects might be higher at higher levels of narcissism. Latent variable structural equation modeling and segmented regression analysis confirmed these hypotheses in a large non-clinical sample (N = 1,006). Interindividual differences in intro-/extraversion mask the common core of grandiose and vulnerable narcissism. The association between both aspects increases at high levels (upper 10%) of grandiose narcissism, which suggests a possible transition to clinically relevant (pathological) narcissism. PMID:28955288
2012-01-01
leader. Although Russians remain wary of the United States, perpetuating and accenting American- Russian dif- ferences is no longer the formula for...truly seek a nonadversarial relationship, each can agree not to be the Raising Our Sights: Russian - American Strategic Restraint in an Age of...Raising Our Sights: Russian -American Strategic Restraint in an Age of Vulnerability 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT
Coping with seismic vulnerability: small manufacturing firms in western Athens.
Sapountzaki, Kalliopi
2005-06-01
This paper attempts to contribute to international discourse on the responsibility of macro structures (economic and political) and private agencies for the production and distribution of vulnerability. It does so by focusing on an individual economic entity, small manufacturing firms (SMFs), in a specific location, western Athens, Greece. By evaluating the losses that SMFs sustained in the earthquake of 7 September 1999, the paper points to variations in vulnerability levels among such firms and highlights the 'sources' of vulnerability they confront. Furthermore, the SMF recovery cycle is systematically monitored in parallel with relevant public policies and state reactions to private recovery methods. The analysis illustrates processes that externalise recovery costs, alter the relationship between physical and socio-economic vulnerability and shift the vulnerability load from macro structures to individual agencies or vice versa. It is based on two methodological approaches: the division of vulnerability into three constituent components (exposure, resistance and resilience); and the conceptual split between producers and carriers of vulnerability.
Liu, Zheng-jia; Yu, Xing-xiu; Li, Lei; Huang, Mei
2011-08-01
Based on the ecological sensitivity-resilience-pressure (SRP) conceptual model, and selecting 13 indices including landscape diversity index, soil erosion, and elevation, etc. , the vulnerability of the eco-environment in Yimeng mountainous area of Shandong Province was assessed under the support of GIS and by using principal component analysis and hierarchy analytical method. According to the eco-environmental vulnerability index (EVI) values, the eco-environment vulnerability of study area was classified into 5 levels, i.e., slight (<1.8), light (1.8-2.8), moderate (2.8-3.5), heavy (3.5-4.0), and extreme vulnerability (>4.0). In the study area, moderately vulnerable area occupied 43.3% of the total, while the slightly, lightly, heavily, and extremely vulnerable areas occupied 6.1%, 33.8%, 15.9%, and 0.9%, respectively. The heavily and extremely vulnerable areas mainly located in the topographically complicated hilly area or the hill-plain ecotone with frequent human activities.
NASA Astrophysics Data System (ADS)
Shahriar, Pervez M.; Ramachandran, Mahadevan; Mutuwatte, Lal
2003-03-01
It is becoming increasingly recognized that computer methods such as models and Geographic Information Systems (GIS) can be valuable tools for analyzing a geographical area in terms of it's hazards vulnerability, Vulnerability is an important aspect of households' experience of poverty. The measurement and analysis of poverty, inequality and vulnerability are crucial for cognitive purposes (to know what the situation is), for analytical purposes (to understand the factors determining this situation), for policy making purposes (to design interventions best adapted to the issues), and for monitoring and evaluation purposes (to assess whether current policies are effective, and whether the situation is changing). Here vulnerability defined as the probability or risk today of being in poverty - or falling deeper into poverty - in the future. Vulnerability is a key dimension of well being since it affects individuals' behavior (in terms of investment, production patterns, coping strategies) and their perception of their own situation. This study has been conducted with the joint collaboration of World Food Programme (WFP) and International Water Management Institute (IWMI) in Sri Lanka for identifying regions and population which are food insecure, for analyzing the reasons for vulnerability to food insecurity in order to provide decision-makers with information to identify possible sectors of intervention and for identifying where and for whom food aid can be best utilized in Sri Lanka. This new approach integrates GIS and Remote sensing with other statistical packages to allow consideration of more spatial/physical parameters like accessibility to economic resources, particularly land and the assets of the built environment, creating employment, and attracting investment in order to improve the quality and quantity of goods and services for the analysis which leads the analysis to represent the real scenario. For this study a detailed topographic data are being used along with MODIS EVI (Enhanced Vegetation Index)
Li, Ruopu; Merchant, James W
2013-03-01
Modeling groundwater vulnerability to pollution is critical for implementing programs to protect groundwater quality. Most groundwater vulnerability modeling has been based on current hydrogeology and land use conditions. However, groundwater vulnerability is strongly dependent on factors such as depth-to-water, recharge and land use conditions that may change in response to future changes in climate and/or socio-economic conditions. In this research, a modeling framework, which employs three sets of models linked within a geographic information system (GIS) environment, was used to evaluate groundwater pollution risks under future climate and land use changes in North Dakota. The results showed that areas with high vulnerability will expand northward and/or northwestward in Eastern North Dakota under different scenarios. GIS-based models that account for future changes in climate and land use can help decision-makers identify potential future threats to groundwater quality and take early steps to protect this critical resource. Copyright © 2013 Elsevier B.V. All rights reserved.
NASA Technical Reports Server (NTRS)
Foyle, David C.; Goodman, Allen; Hooley, Becky L.
2003-01-01
An overview is provided of the Human Performance Modeling (HPM) element within the NASA Aviation Safety Program (AvSP). Two separate model development tracks for performance modeling of real-world aviation environments are described: the first focuses on the advancement of cognitive modeling tools for system design, while the second centers on a prescriptive engineering model of activity tracking for error detection and analysis. A progressive implementation strategy for both tracks is discussed in which increasingly more complex, safety-relevant applications are undertaken to extend the state-of-the-art, as well as to reveal potential human-system vulnerabilities in the aviation domain. Of particular interest is the ability to predict the precursors to error and to assess potential mitigation strategies associated with the operational use of future flight deck technologies.
[Tuberculosis among the socially vulnerable populations; perspectives from human security concept].
Ishikawa, Nobukatsu
2009-07-01
Tuberculosis (TB) has been and will continue to be the disease of the poor and the socially vulnerable. Current TB epidemiology in Japan shows increasing proportion of TB among the economically and socially poor or vulnerable populations. Though there is no universally recognized set of the definitions, the economically poor who are covered under the social security services including the homeless, foreign migrants, or the aged over 80 years may be considered as consisting the "socially vulnerable population" for TB in Japan. TB among the socially vulnerable has several characteristics, for example, patients are often detected with severe conditions due to delayed diagnosis, and have high defaulter rate during treatment, which causes immature death, or drug-resistant disease. Stop TB Strategy by WHO, responding to the Millennium Development Goals, proposes a new approach which focuses on empowering the patients and the community. Observations from various studies show that DOTS contributes to empowering the patients and the communities. Further effort will be needed to reorient TB programs towards the perspective of patients' empowerment. Solely relying on static analyses of TB among the socially vulnerable has its limitations. Dynamic approach, which utilizes human security concepts such as empowerment and patients' perspective, will be required not only to control TB among the socially vulnerable population but also to holistically tackle the problem of TB for Japan.
ERIC Educational Resources Information Center
Kim, Kyung Hi
2014-01-01
This research, based on a case study of vulnerable children in Korea, used a mixed methods transformative approach to explore strategies to support and help disadvantaged children. The methodological approach includes three phases: a mixed methods contextual analysis, a qualitative dominant analysis based on Sen's capability approach and critical…
DARKDROID: Exposing the Dark Side of Android Marketplaces
2016-06-01
Moreover, our approaches can detect apps containing both intentional and unintentional vulnerabilities, such as unsafe code loading mechanisms and...Security, Static Analysis, Dynamic Analysis, Malware Detection , Vulnerability Scanning 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18...applications in a DoD context. ................... 1 1.2.2 Develop sophisticated whole-system static analyses to detect malicious Android applications
Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection
NASA Astrophysics Data System (ADS)
Wu, Raymond; Seki, Keisuke; Sakamoto, Ryusuke; Hisada, Masayuki
Web security became an alert in internet computing. To cope with ever-rising security complexity, semantic analysis is proposed to fill-in the gap that the current approaches fail to commit. Conventional methods limit their focus to the physical source codes instead of the abstraction of semantics. It bypasses new types of vulnerability and causes tremendous business loss.
The EPA and USGS have developed a framework to evaluate the relative vulnerability of near-coastal species to impacts of climate change. This framework is implemented in a web-based tool, the Coastal Biogeographic Risk Analysis Tool (CBRAT). We evaluated the vulnerability of the ...
The EPA and USGS have developed a framework to evaluate the relative vulnerability of near-coastal species to impacts of climate change. This framework was implemented in a web-based tool, the Coastal Biogeographic Risk Analysis Tool (CBRAT). We evaluated the vulnerability of the...
Kidman, Rachel; Nice, Johanna; Taylor, Tory; Thurman, Tonya R
2014-10-02
Home visiting is a popular component of programs for HIV-affected children in sub-Saharan Africa, but its implementation varies widely. While some home visitors are lay volunteers, other programs invest in more highly trained paraprofessional staff. This paper describes a study investigating whether additional investment in paraprofessional staffing translated into higher quality service delivery in one program context. Beneficiary children and caregivers at sites in KwaZulu-Natal, South Africa were interviewed after 2 years of program enrollment and asked to report about their experiences with home visiting. Analysis focused on intervention exposure, including visit intensity, duration and the kinds of emotional, informational and tangible support provided. Few beneficiaries reported receiving home visits in program models primarily driven by lay volunteers; when visits did occur, they were shorter and more infrequent. Paraprofessional-driven programs not only provided significantly more home visits, but also provided greater interaction with the child, communication on a larger variety of topics, and more tangible support to caregivers. These results suggest that programs that invest in compensation and extensive training for home visitors are better able to serve and retain beneficiaries, and they support a move toward establishing a professional workforce of home visitors to support vulnerable children and families in South Africa.
Hong, Young; Zheng, Chaoyi; Hechenbleikner, Elizabeth; Johnson, Lynt B; Shara, Nawar; Al-Refaie, Waddah B
2016-07-01
Penalties from the Hospital Readmission Reduction Program can push financially strained, vulnerable patient-serving hospitals into additional hardship. In this study, we quantified the association between vulnerable hospitals and readmissions and examined the respective contributions of patient- and hospital-related factors. A total of 110,857 patients who underwent major cancer operations were identified from the 2004-2011 State Inpatient Database of California. Vulnerable hospitals were defined as either self-identified safety net hospitals (SNHs) or hospitals with a high percentage of Medicaid patients (high Medicaid hospitals [HMHs]). We used multivariable logistic regression to determine the association between vulnerable hospitals and readmission. Patient and hospital contributions to the elevation in odds of readmission were assessed by comparing estimates from models with different subsets of predictors. Of the 355 hospitals, 13 were SNHs and 31 were HMHs. After adjusting for Hospital Readmission Reduction Program variables, SNHs had higher 30-day (odds ratio [OR] = 1.32; 95% CI, 1.18-1.47), 90-day (OR = 1.28; 95% CI, 1.18-1.38), and repeated readmissions (OR = 1.33; 95% CI, 1.18-1.49); HMHs also had higher 30-day (OR = 1.18; 95% CI, 1.05-1.32), 90-day (OR = 1.28; 95% CI, 1.16-1.42), and repeated readmissions (OR = 1.24; 95% CI, 1.01-1.54). Compared with patient characteristics, hospital factors accounted for a larger proportion of the increase in odds of readmission among SNHs (60% to 93% vs 24% to 39%), but a smaller proportion among HMHs (9% to 15% vs 60% to 115%). Vulnerable status of hospitals is associated with higher readmission rates after major cancer surgery. These findings reinforce the call to account for socioeconomic variables in risk adjustments for hospitals who serve a disproportionate share of disadvantaged patients. Copyright © 2016 American College of Surgeons. Published by Elsevier Inc. All rights reserved.
Disasters and development: Part 2: understanding and exploiting disaster-development linkages.
Stephenson, Rob S; DuFrane, Charles
2002-01-01
Disasters can impede the effectiveness of development resource allocation. The damage sustained from an event can be classified into four categories: (1) Loss of resources; (2) Interruption of programs and switching of crucial resources to other, shorter-term needs; (3) Negative impacts upon investment climates; and/or (4) Disruption of the non-formal sector (local businesses). Disasters have a particularly destructive economic impact in areas in which there are few alternatives for assets that are destroyed or in areas in which the resources already are at critical levels. Development processes can both increase and/or decrease the vulnerability of a society to hazards. There are dearly established linkages between poverty, marginalization, over-population, and vulnerability. To a large extent, vulnerability derives from poverty. The poor are more likely to live in vulnerable areas (slopes prone to landslides, flood plains, marginal agricultural land), have difficulty accessing education and information, have fewer assets to invest in resources to reduce vulnerability, and are more prone to become malnourished and have chronic illnesses that predispose them to injury and death. Development may be associated with the production of new hazards accepted by a society because the perceived benefits of the development project far exceed the relative risk associated with the project. Therefore, risk assessments must be part of any program planning and evaluation. Training and education are of critical importance in preventing increased vulnerability as a result of development strategies. Development also can progress in a manner that will result in mitigation of the impacts of an event on a given society (increase absorbing capacity and/or buffering capacity, elimination of hazards or the risk of them producing a disaster). Such mitigation measures can be either structural or nonstructural. There exists a wide range of options for incorporating mitigation measures in development projects. Two case studies provide exercises that incorporate the concepts provided in this discussion: (1) The 1985 earthquake in Mexico City; and (2) Agricultural development in northern Sudan.
NASA Astrophysics Data System (ADS)
Boori, Mukesh S.; Choudhary, Komal; Kupriyanov, Alexander; Sugimoto, Atsuko; Evers, Mariele
2016-10-01
The aim of this research work is to understand natural and environmental vulnerability situation and its cause such as intensity, distribution and socio-economic effect in the Indigirka River basin, Eastern Siberia, Russia. This paper identifies, assess and classify natural and environmental vulnerability using landscape pattern from multidisciplinary approach, based on remote sensing and Geographical Information System (GIS) techniques. A model was developed by following thematic layers: land use/cover, vegetation, wetland, geology, geomorphology and soil in ArcGIS 10.2 software. According to numerical results vulnerability classified into five levels: low, sensible, moderate, high and extreme vulnerability by mean of cluster principal. Results are shows that in natural vulnerability maximum area covered by moderate (29.84%) and sensible (38.61%) vulnerability and environmental vulnerability concentrated by moderate (49.30%) vulnerability. So study area has at medial level vulnerability. The results found that the methodology applied was effective enough in the understanding of the current conservation circumstances of the river basin in relation to their environment with the help of remote sensing and GIS. This study is helpful for decision making for eco-environmental recovering and rebuilding as well as predicting the future development.
A Preliminary Tsunami vulnerability analysis for Bakirkoy district in Istanbul
NASA Astrophysics Data System (ADS)
Tufekci, Duygu; Lutfi Suzen, M.; Cevdet Yalciner, Ahmet; Zaytsev, Andrey
2016-04-01
Resilience of coastal utilities after earthquakes and tsunamis has major importance for efficient and proper rescue and recovery operations soon after the disasters. Vulnerability assessment of coastal areas under extreme events has major importance for preparedness and development of mitigation strategies. The Sea of Marmara has experienced numerous earthquakes as well as associated tsunamis. There are variety of coastal facilities such as ports, small craft harbors, and terminals for maritime transportation, water front roads and business centers mainly at North Coast of Marmara Sea in megacity Istanbul. A detailed vulnerability analysis for Yenikapi region and a detailed resilience analysis for Haydarpasa port in Istanbul have been studied in previously by Cankaya et al., (2015) and Aytore et al., (2015) in SATREPS project. In this study, the methodology of vulnerability analysis under tsunami attack given in Cankaya et al., (2015) is modified and applied to Bakirkoy district of Istanbul. Bakirkoy district is located at western part of Istanbul and faces to the North Coast of Marmara Sea from 28.77oE to 28.89oE. High resolution spatial dataset of Istanbul Metropolitan Municipality (IMM) is used and analyzed. The bathymetry and topography database and the spatial dataset containing all buildings/structures/infrastructures in the district are collated and utilized for tsunami numerical modeling and following vulnerability analysis. The tsunami parameters from deterministically defined worst case scenarios are computed from the simulations using tsunami numerical model NAMI DANCE. The vulnerability assessment parameters in the district according to vulnerability and resilience are defined; and scored by implementation of a GIS based TVA with appropriate MCDA methods. The risk level is computed using tsunami intensity (level of flow depth from simulations) and TVA results at every location in Bakirkoy district. The preliminary results are presented and discussed. Acknowledgements: Partial support by Japan-Turkey Joint Research Project by JICA on earthquakes and tsunamis in Marmara Region in (JICA SATREPS - MarDiM Project), 603839 ASTARTE Project of EU, UDAP-C-12-14 project of AFAD, Turkey, 108Y227, 113M556, 213M534 projects of TUBITAK Turkey, RAPSODI (CONCERT_Dis-021) of CONCERT-Japan Joint Call and Istanbul Metropolitan Municipality are acknowledged.
NASA Astrophysics Data System (ADS)
Masure, P.
2003-04-01
The GEMITIS method has been implemented since 1995 into a global and integrated Risk Reduction Strategy for improving the seismic risk-assessment effectiveness in urban areas, including the generation of crisis scenarios and mid- to long term- seismic impact assessment. GEMITIS required us to provide more precise definitions of notions in common use by natural-hazard specialists, such as elements at risk and vulnerability. Until then, only the physical and human elements had been considered, and analysis of their vulnerability referred to their fragility in the face of aggression by nature. We have completed this approach by also characterizing the social and cultural vulnerability of a city and its inhabitants, and, with a wider scope, the functional vulnerability of the "urban system". This functional vulnerability depends upon the relations between the system elements (weak links in chains, functional relays, and defense systems) and upon the city's relations with the outside world (interdependence). Though well developed in methods for evaluating industrial risk (fault-tree analysis, event-tree analysis, multiple defense barriers, etc.), this aspect had until now been ignored by the "hard-science" specialists working on natural hazards. Based on the implementation of an Urban System Exposure methodology, we were able to identify specific human, institutional, or functional vulnerability factors for each urban system, which until had been very little discussed by risk-analysis and civil-protection specialists. In addition, we have defined the new concept of "main stakes" of the urban system, ranked by order of social value (or collective utility). Obviously, vital or strategic issues must be better resistant or protected against natural hazards than issues of secondary importance. The ranking of exposed elements of a city in terms of "main stakes" provides a very useful guide for adapting vulnerability studies and for orienting preventive actions. For this, GEMITIS is based on a systemic approach of the city and on value analysis of exposed elements. It facilitates a collective expertise for the definition of a preventive action plan based on the participation of the main urban actors (crisis preparedness, construction, land-use, etc.).
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing
2017-01-01
Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.
NASA Astrophysics Data System (ADS)
Yao, Kun; Bai, Lin; Li, Xiao Ju; Wang, Xiao
2018-05-01
The Xianshui River basin is an important ecological barrier and water conservation area of Qinghai-Tibet plateau. To master the spatial and temporal differentiation of ecological environment is beneficial to the realization of the protection of regional ecological environment and the development of restoration measures. In this paper, the evaluation index system of ecological environment vulnerability was constructed from topography, climate, soil, land use and social economy. In this study, GIS and information entropy theory are combined to complete the analysis of spatial and temporal variation of vulnerability of ecological environment vulnerability in 2000-2015 years, and the main results are as follows: The ecological vulnerability of the watershed is characterized by the obvious vertical distribution, which is characterized by the gradual increase of the vulnerability of the south to the north. The evaluation results were classified as potential, micro, mild, moderate and severe, with the proportion of each grade being Micro > mild > potential > moderate > severity. The proportion of light and below accounts for more than 80% of the whole area, and the whole basin is at a medium vulnerable level. The change of overall trend indicates that the overall ecological environment of the basin has improved obviously in 15 years. The driving force factor analysis shows that the national environmental protection and restoration project is playing a significant role and plays a major driving role in the obvious improvement of the ecological environment in the basin area. However, there are still a few parts of the region that are deteriorating. This is mainly due to the special natural environment and over exploitation of hydropower resources.
Human vulnerability in volcanic environments: the case of Furnas, São Miguel, Azores
NASA Astrophysics Data System (ADS)
Dibben, Christopher; Chester, David K.
1999-09-01
The need to examine the vulnerability of people to natural hazards, in addition to the long-established requirement to study extreme events of nature, is being increasingly recognised within disaster research. Following a discussion of the nature of human vulnerability, we propose a framework for its analysis within the context of volcanic activity and we exemplify our approach by a detailed study of Furnas, a village located at the centre of a volcano with the same name on the island of São Miguel in the Azores. The methods used included in-depth interviews with permanent residents ( n=50), analysis of census records and an examination of the socio-economic history of the town. The vulnerability of an individual to volcanic hazards involves a complex interaction of elements which, in addition to the usual factors taken into account in programmes of hazard reduction (e.g., the nature of the physical threat, location and economic situation), also comprises his or her social context and a number of physiological and psychological considerations. It is argued, further, that both generally and in the case of Furnas, the root causes of vulnerability lie in the history and development of society. Individual decision making is fundamental but takes place within and cannot be separated from this social context. Vulnerability analysis allows the identification of points where intervention may be successful in reducing the likelihood of suffering in a society. It avoids the problem of people's unexpected reactions to invention leading to a changing or even increasing level of vulnerability, by studying society rather than just one aspect of volcanic hazard in isolation.
Use of modeling to identify vulnerabilities to human error in laparoscopy.
Funk, Kenneth H; Bauer, James D; Doolen, Toni L; Telasha, David; Nicolalde, R Javier; Reeber, Miriam; Yodpijit, Nantakrit; Long, Myra
2010-01-01
This article describes an exercise to investigate the utility of modeling and human factors analysis in understanding surgical processes and their vulnerabilities to medical error. A formal method to identify error vulnerabilities was developed and applied to a test case of Veress needle insertion during closed laparoscopy. A team of 2 surgeons, a medical assistant, and 3 engineers used hierarchical task analysis and Integrated DEFinition language 0 (IDEF0) modeling to create rich models of the processes used in initial port creation. Using terminology from a standardized human performance database, detailed task descriptions were written for 4 tasks executed in the process of inserting the Veress needle. Key terms from the descriptions were used to extract from the database generic errors that could occur. Task descriptions with potential errors were translated back into surgical terminology. Referring to the process models and task descriptions, the team used a modified failure modes and effects analysis (FMEA) to consider each potential error for its probability of occurrence, its consequences if it should occur and be undetected, and its probability of detection. The resulting likely and consequential errors were prioritized for intervention. A literature-based validation study confirmed the significance of the top error vulnerabilities identified using the method. Ongoing work includes design and evaluation of procedures to correct the identified vulnerabilities and improvements to the modeling and vulnerability identification methods. Copyright 2010 AAGL. Published by Elsevier Inc. All rights reserved.
Rico, Andreu; Van den Brink, Paul J
2015-08-01
In the present study, the authors evaluated the vulnerability of aquatic invertebrates to insecticides based on their intrinsic sensitivity and their population-level recovery potential. The relative sensitivity of invertebrates to 5 different classes of insecticides was calculated at the genus, family, and order levels using the acute toxicity data available in the US Environmental Protection Agency ECOTOX database. Biological trait information was linked to the calculated relative sensitivity to evaluate correlations between traits and sensitivity and to calculate a vulnerability index, which combines intrinsic sensitivity and traits describing the recovery potential of populations partially exposed to insecticides (e.g., voltinism, flying strength, occurrence in drift). The analysis shows that the relative sensitivity of arthropods depends on the insecticide mode of action. Traits such as degree of sclerotization, size, and respiration type showed good correlation to sensitivity and can be used to make predictions for invertebrate taxa without a priori sensitivity knowledge. The vulnerability analysis revealed that some of the Ephemeroptera, Plecoptera, and Trichoptera taxa were vulnerable to all insecticide classes and indicated that particular gastropod and bivalve species were potentially vulnerable. Microcrustaceans (e.g., daphnids, copepods) showed low potential vulnerability, particularly in lentic ecosystems. The methods described in the present study can be used for the selection of focal species to be included as part of ecological scenarios and higher tier risk assessments. © 2015 SETAC.
Simons, Mirre J P; Koch, Wouter; Verhulst, Simon
2013-06-01
Dietary restriction (DR) extends lifespan in multiple species from various taxa. This effect can arise via two distinct but not mutually exclusive ways: a change in aging rate and/or vulnerability to the aging process (i.e. initial mortality rate). When DR affects vulnerability, this lowers mortality instantly, whereas a change in aging rate will gradually lower mortality risk over time. Unraveling how DR extends lifespan is of interest because it may guide toward understanding the mechanism(s) mediating lifespan extension and also has practical implications for the application of DR. We reanalyzed published survival data from 82 pairs of survival curves from DR experiments in rats and mice by fitting Gompertz and also Gompertz-Makeham models. The addition of the Makeham parameter has been reported to improve the estimation of Gompertz parameters. Both models separate initial mortality rate (vulnerability) from an age-dependent increase in mortality (aging rate). We subjected the obtained Gompertz parameters to a meta-analysis. We find that DR reduced aging rate without affecting vulnerability. The latter contrasts with the conclusion of a recent analysis of a largely overlapping data set, and we show how the earlier finding is due to a statistical artifact. Our analysis indicates that the biology underlying the life-extending effect of DR in rodents likely involves attenuated accumulation of damage, which contrasts with the acute effect of DR on mortality reported for Drosophila. Moreover, our findings show that the often-reported correlation between aging rate and vulnerability does not constrain changing aging rate without affecting vulnerability simultaneously. © 2013 John Wiley & Sons Ltd and the Anatomical Society.
Advanced Fault Diagnosis Methods in Molecular Networks
Habibi, Iman; Emamian, Effat S.; Abdi, Ali
2014-01-01
Analysis of the failure of cell signaling networks is an important topic in systems biology and has applications in target discovery and drug development. In this paper, some advanced methods for fault diagnosis in signaling networks are developed and then applied to a caspase network and an SHP2 network. The goal is to understand how, and to what extent, the dysfunction of molecules in a network contributes to the failure of the entire network. Network dysfunction (failure) is defined as failure to produce the expected outputs in response to the input signals. Vulnerability level of a molecule is defined as the probability of the network failure, when the molecule is dysfunctional. In this study, a method to calculate the vulnerability level of single molecules for different combinations of input signals is developed. Furthermore, a more complex yet biologically meaningful method for calculating the multi-fault vulnerability levels is suggested, in which two or more molecules are simultaneously dysfunctional. Finally, a method is developed for fault diagnosis of networks based on a ternary logic model, which considers three activity levels for a molecule instead of the previously published binary logic model, and provides equations for the vulnerabilities of molecules in a ternary framework. Multi-fault analysis shows that the pairs of molecules with high vulnerability typically include a highly vulnerable molecule identified by the single fault analysis. The ternary fault analysis for the caspase network shows that predictions obtained using the more complex ternary model are about the same as the predictions of the simpler binary approach. This study suggests that by increasing the number of activity levels the complexity of the model grows; however, the predictive power of the ternary model does not appear to be increased proportionally. PMID:25290670
Climate Change and Civil Violence
NASA Astrophysics Data System (ADS)
van der Vink, G.; Plancherel, Y.; Hennet, C.; Jones, K. D.; Abdullah, A.; Bradshaw, J.; Dee, S.; Deprez, A.; Pasenello, M.; Plaza-Jennings, E.; Roseman, D.; Sopher, P.; Sung, E.
2009-05-01
The manifestations of climate change can result in humanitarian impacts that reverse progress in poverty- reduction, create shortages of food and resources, lead to migration, and ultimately result in civil violence and conflict. Within the continent of Africa, we have found that environmentally-related variables are either the cause or the confounding factor for over 80% of the civil violence events during the last 10 years. Using predictive climate models and land-use data, we are able to identify populations in Africa that are likely to experience the most severe climate-related shocks. Through geospatial analysis, we are able to overlay these areas of high risk with assessments of both the local population's resiliency and the region's capacity to respond to climate shocks should they occur. The net result of the analysis is the identification of locations that are becoming particularly vulnerable to future civil violence events (vulnerability hotspots) as a result of the manifestations of climate change. For each population group, over 600 social, economic, political, and environmental indicators are integrated statistically to measures the vulnerability of African populations to environmental change. The indicator time-series are filtered for data availability and redundancy, broadly ordered into four categories (social, political, economic and environmental), standardized and normalized. Within each category, the dominant modes of variability are isolated by principal component analysis and the loadings of each component for each variable are used to devise composite index scores. Comparisons of past vulnerability with known environmentally-related conflicts demonstrates the role that such vulnerability hotspot maps can play in evaluating both the potential for, and the significance of, environmentally-related civil violence events. Furthermore, the analysis reveals the major variables that are responsible for the population's vulnerability and therefore provides an opportunity for targeted proactive measures to mitigate certain classes of future civil violence events.
NASA Astrophysics Data System (ADS)
Kunz-Plapp, T.; Khazai, B.; Daniell, J. E.
2012-04-01
This paper presents a new method for modeling health impacts caused by earthquake damage which allows for integrating key social impacts on individual health and health-care systems and for implementing these impacts in quantitative systemic seismic vulnerability analysis. In current earthquake casualty estimation models, demand on health-care systems is estimated by quantifying the number of fatalities and severity of injuries based on empirical data correlating building damage with casualties. The expected number of injured people (sorted by priorities of emergency treatment) is combined together with post-earthquake reduction of functionality of health-care facilities such as hospitals to estimate the impact on healthcare systems. The aim here is to extend these models by developing a combined engineering and social science approach. Although social vulnerability is recognized as a key component for the consequences of disasters, social vulnerability as such, is seldom linked to common formal and quantitative seismic loss estimates of injured people which provide direct impact on emergency health care services. Yet, there is a consensus that factors which affect vulnerability and post-earthquake health of at-risk populations include demographic characteristics such as age, education, occupation and employment and that these factors can aggravate health impacts further. Similarly, there are different social influences on the performance of health care systems after an earthquake both on an individual as well as on an institutional level. To link social impacts of health and health-care services to a systemic seismic vulnerability analysis, a conceptual model of social impacts of earthquakes on health and the health care systems has been developed. We identified and tested appropriate social indicators for individual health impacts and for health care impacts based on literature research, using available European statistical data. The results will be used to develop a socio-physical model of systemic seismic vulnerability that enhances the further understanding of societal seismic risk by taking into account social vulnerability impacts for health and health-care system, shelter, and transportation.
A new approach for computing a flood vulnerability index using cluster analysis
NASA Astrophysics Data System (ADS)
Fernandez, Paulo; Mourato, Sandra; Moreira, Madalena; Pereira, Luísa
2016-08-01
A Flood Vulnerability Index (FloodVI) was developed using Principal Component Analysis (PCA) and a new aggregation method based on Cluster Analysis (CA). PCA simplifies a large number of variables into a few uncorrelated factors representing the social, economic, physical and environmental dimensions of vulnerability. CA groups areas that have the same characteristics in terms of vulnerability into vulnerability classes. The grouping of the areas determines their classification contrary to other aggregation methods in which the areas' classification determines their grouping. While other aggregation methods distribute the areas into classes, in an artificial manner, by imposing a certain probability for an area to belong to a certain class, as determined by the assumption that the aggregation measure used is normally distributed, CA does not constrain the distribution of the areas by the classes. FloodVI was designed at the neighbourhood level and was applied to the Portuguese municipality of Vila Nova de Gaia where several flood events have taken place in the recent past. The FloodVI sensitivity was assessed using three different aggregation methods: the sum of component scores, the first component score and the weighted sum of component scores. The results highlight the sensitivity of the FloodVI to different aggregation methods. Both sum of component scores and weighted sum of component scores have shown similar results. The first component score aggregation method classifies almost all areas as having medium vulnerability and finally the results obtained using the CA show a distinct differentiation of the vulnerability where hot spots can be clearly identified. The information provided by records of previous flood events corroborate the results obtained with CA, because the inundated areas with greater damages are those that are identified as high and very high vulnerability areas by CA. This supports the fact that CA provides a reliable FloodVI.
Juritzen, Truls I; Engebretsen, Eivind; Heggen, Kristin
2013-08-01
Empowerment and user participation represents an ideal of power with a strong position in the health sector. In this article we use text analysis to investigate notions of power in a program plan for health workers focusing on empowerment. Issues addressed include: How are relationships of power between users and helpers described in the program plan? Which notions of user participation are embedded in the plan? The analysis is based on Foucault's idea that power which is made subject to attempts of redistribution will re-emerge in other forms. How this happens, and with what consequences, is our analytical concern. The analysis is contrasted with 'snapshots' from everyday life in a nursing home. The program plan communicates empowerment as a democracy-building instrument that the users need. It is a tool for providing expert assistance to the user's self-help. User participation is made into a tool which is external to the user him-/herself. Furthermore, the analysis shows that the plan's image of empowerment presupposes an 'élite user' able to articulate personal needs and desires. This is not very applicable to the most vulnerable user groups, who thereby may end up in an even weaker position. By way of conclusion, we argue that an exchange of undesirable dominating paternalism for a desirable empowerment will not abolish power, but may result in more covert and subtle forms of power that are less open to criticism. The paper offers insights that will facilitate reflections on the premises for practising empowerment-oriented health care.
Patel, Sangram Kishor; Prabhakar, Parimi; Jain, Anrudh Kumar; Saggurti, Niranjan; Adhikary, Rajatashuvra
2016-01-01
Introduction Studies exploring the linkages between financial vulnerabilities and community collectivization of female sex workers (FSWs) are scarce in India despite having potential policy implications. To fill this gap in the literature, this study attempts to understand the financial vulnerabilities among FSWs and assess the relationship between community collectivization and financial vulnerabilities in southern India. Data and Methods Data were drawn from a cross-sectional, behavioral tracking survey (BTS)—2014, conducted among FSWs (N = 2400) in Andhra Pradesh, a southern state of India under the Avahan-India AIDS initiative program. Adjusted odds ratios (AOR) and their 95% confidence intervals (CI) were estimated through multivariate logistic regression, to assess the independent relationships of the degree of community collectivization indicators with financial vulnerability indicators, adjusting for socio-demographic characteristics. Results Most FSWs (87%) reported having either one or more financial vulnerability and nearly one-fifth had a high financial vulnerability. The risk of facing financial vulnerability was significantly lower among FSWs with a high degree of perceived collective efficacy (15% vs 31%; AOR: 0.4; 95% CI: 0.3–0.5) and collective agency (4% vs 21%; AOR: 0.2; 95% CI: 0.1–0.3) as compared to their respective counterparts, after controlling for their individual socio-demographic characteristics. FSWs with a high degree of collective efficacy are also less likely to report different components of financial vulnerability (e.g. income, saving, expenditure, and debt). Conclusion This study finding suggests that community-led interventions such as improving collectivization are promising strategies to address financial vulnerabilities and a path to a sustainable reduction of HIV risk. This study calls for further evidence-based research and measurement of the effects of community-led approaches in addressing the financial vulnerabilities of the key population at risk for HIV. PMID:27227998
NASA Astrophysics Data System (ADS)
Knouz, Najat; Boudhar, Abdelghani; Bachaoui, El Mostafa
2016-04-01
Fresh water is the condition of all life on Earth for its vital role in the survival of living beings and in the social, economic and technological development. The Groundwater, as the surface water, is increasingly threatened by agricultural and industrial pollution. In this respect, the groundwater vulnerability assessment to pollution is a very valuable tool for resource protection, management of its quality and uses it in a sustainable way. The main objective of this study is the evaluation of groundwater vulnerability to pollution of the study area, Beni Amir, located in the first irrigated perimeter of Morocco, Tadla, using the DRASTIC method (depth to water, net recharge, aquifer media, soil media, Topography, impact of Vadose zone and hydraulic conductivity), and assessing the impact of each parameter on the DRASTIC vulnerability index by a sensitivity analysis. This study also highlights the role of geographic information systems (GIS) in assessing vulnerability. The Vulnerability index is calculated as the sum of product of ratings and weights assigned to each of the parameter DRASTIC. The results revealed four vulnerability classes, 7% of the study area has a high vulnerability, 31% are moderately vulnerable, 57% have a low vulnerability and 5% are of very low vulnerability.
Shi, Weifang; Zeng, Weihua
2013-01-01
Reducing human vulnerability to chemical hazards in the industrialized city is a matter of great urgency. Vulnerability mapping is an alternative approach for providing vulnerability-reducing interventions in a region. This study presents a method for mapping human vulnerability to chemical hazards by using clustering analysis for effective vulnerability reduction. Taking the city of Shanghai as the study area, we measure human exposure to chemical hazards by using the proximity model with additionally considering the toxicity of hazardous substances, and capture the sensitivity and coping capacity with corresponding indicators. We perform an improved k-means clustering approach on the basis of genetic algorithm by using a 500 m × 500 m geographical grid as basic spatial unit. The sum of squared errors and silhouette coefficient are combined to measure the quality of clustering and to determine the optimal clustering number. Clustering result reveals a set of six typical human vulnerability patterns that show distinct vulnerability dimension combinations. The vulnerability mapping of the study area reflects cluster-specific vulnerability characteristics and their spatial distribution. Finally, we suggest specific points that can provide new insights in rationally allocating the limited funds for the vulnerability reduction of each cluster. PMID:23787337
A socioeconomic profile of vulnerable land to desertification in Italy.
Salvati, Luca
2014-01-01
Climate changes, soil vulnerability, loss in biodiversity, and growing human pressure are threatening Mediterranean-type ecosystems which are increasingly considered as a desertification hotspot. In this region, land vulnerability to desertification strongly depends on the interplay between natural and anthropogenic factors. The present study proposes a multivariate exploratory analysis of the relationship between the spatial distribution of land vulnerability to desertification and the socioeconomic contexts found in three geographical divisions of Italy (north, center and south) based on statistical indicators. A total of 111 indicators describing different themes (demography, human settlements, labor market and human capital, rural development, income and wealth) were used to discriminate vulnerable from non-vulnerable areas. The resulting socioeconomic profile of vulnerable areas in northern and southern Italy diverged significantly, the importance of demographic and economic indicators being higher in southern Italy than in northern Italy. On the contrary, human settlement indicators were found more important to discriminate vulnerable and non-vulnerable areas in northern Italy, suggesting a role for peri-urbanization in shaping the future vulnerable areas. An in-depth knowledge of the socioeconomic characteristics of vulnerable land may contribute to scenarios' modeling and the development of more effective policies to combat desertification. © 2013 Elsevier B.V. All rights reserved.
The Pacific Northwest's Climate Impacts Group: Climate Science in the Public Interest
NASA Astrophysics Data System (ADS)
Mantua, N.; Snover, A.
2006-12-01
Since its inception in 1995, the University of Washington's Climate Impacts Group (CIG) (funded under NOAA's Regional Integrated Science and Assessments (RISA) Program) has become the leader in exploring the impacts of climate variability and climate change on natural and human systems in the U.S. Pacific Northwest (PNW), specifically climate impacts on water, forest, fish and coastal resource systems. The CIG's research provides PNW planners, decision makers, resource managers, local media, and the general public with valuable knowledge of ways in which the region's key natural resources are vulnerable to changes in climate, and how this vulnerability can be reduced. The CIG engages in climate science in the public interest, conducting original research on the causes and consequences of climate variability and change for the PNW and developing forecasts and decision support tools to support the use of this information in federal, state, local, tribal, and private sector resource management decisions. The CIG's focus on the intersection of climate science and public policy has placed the CIG nationally at the forefront of regional climate impacts assessment and integrated analysis.
Assessing vulnerability to drought: identifying underlying factors across Europe
NASA Astrophysics Data System (ADS)
Urquijo, Julia; Gonzalez Tánago, Itziar; Ballesteros, Mario; De Stefano, Lucia
2015-04-01
Drought is considered one of the most severe and damaging natural hazards in terms of people and sectors affected and associated losses. Drought is a normal and recurrent climatic phenomenon that occurs worldwide, although its spatial and temporal characteristics vary significantly among climates. In the case of Europe, in the last thirty years, the region has suffered several drought events that have caused estimated economic damages over a €100 billion and have affected almost 20% of its territory and population. In recent years, there has been a growing awareness among experts and authorities of the need to shift from a reactive crisis approach to a drought risk management approach, as well as of the importance of designing and implementing policies, strategies and plans at country and river basin levels to deal with drought. The identification of whom and what is vulnerable to drought is a central aspect of drought risk mitigation and planning and several authors agree that societal vulnerability often determines drought risk more than the actual precipitation shortfalls. The final aim of a drought vulnerability assessment is to identify the underlying sources of drought impact, in order to develop policy options that help to enhance coping capacity and therefore to prevent drought impact. This study identifies and maps factors underlying vulnerability to drought across Europe. The identification of factors influencing vulnerability starts from the analysis of past drought impacts in four European socioeconomic sectors. This analysis, along with an extensive literature review, led to the selection of vulnerability factors that are both relevant and adequate for the European context. Adopting the IPCC model, vulnerability factors were grouped to describe exposure, sensitivity and adaptive capacity. The aggregation of these components has resulted in the mapping of vulnerability to drought across Europe at NUTS02 level. Final results have been compared with data from the European Drought Impact Report Inventory. For specific hotpots vulnerability factors are presented also through spider diagrams in order to allow policy and decision makers to identify underlying sources of vulnerability in the European context. This assessment offers an overall picture at a European level that strives to contribute to enhance the understanding of drought vulnerability across Europe.
NASA Astrophysics Data System (ADS)
Lee, S.; Maharani, Y. N.; Ki, S. J.
2015-12-01
The application of Self-Organizing Map (SOM) to analyze social vulnerability to recognize the resilience within sites is a challenging tasks. The aim of this study is to propose a computational method to identify the sites according to their similarity and to determine the most relevant variables to characterize the social vulnerability in each cluster. For this purposes, SOM is considered as an effective platform for analysis of high dimensional data. By considering the cluster structure, the characteristic of social vulnerability of the sites identification can be fully understand. In this study, the social vulnerability variable is constructed from 17 variables, i.e. 12 independent variables which represent the socio-economic concepts and 5 dependent variables which represent the damage and losses due to Merapi eruption in 2010. These variables collectively represent the local situation of the study area, based on conducted fieldwork on September 2013. By using both independent and dependent variables, we can identify if the social vulnerability is reflected onto the actual situation, in this case, Merapi eruption 2010. However, social vulnerability analysis in the local communities consists of a number of variables that represent their socio-economic condition. Some of variables employed in this study might be more or less redundant. Therefore, SOM is used to reduce the redundant variable(s) by selecting the representative variables using the component planes and correlation coefficient between variables in order to find the effective sample size. Then, the selected dataset was effectively clustered according to their similarities. Finally, this approach can produce reliable estimates of clustering, recognize the most significant variables and could be useful for social vulnerability assessment, especially for the stakeholder as decision maker. This research was supported by a grant 'Development of Advanced Volcanic Disaster Response System considering Potential Volcanic Risk around Korea' [MPSS-NH-2015-81] from the Natural Hazard Mitigation Research Group, National Emergency Management Agency of Korea. Keywords: Self-organizing map, Component Planes, Correlation coefficient, Cluster analysis, Sites identification, Social vulnerability, Merapi eruption 2010
The Role of Demand Response in Reducing Water-Related Power Plant Vulnerabilities
NASA Astrophysics Data System (ADS)
Macknick, J.; Brinkman, G.; Zhou, E.; O'Connell, M.; Newmark, R. L.; Miara, A.; Cohen, S. M.
2015-12-01
The electric sector depends on readily available water supplies for reliable and efficient operation. Elevated water temperatures or low water levels can trigger regulatory or plant-level decisions to curtail power generation, which can affect system cost and reliability. In the past decade, dozens of power plants in the U.S. have curtailed generation due to water temperatures and water shortages. Curtailments occur during the summer, when temperatures are highest and there is greatest demand for electricity. Climate change could alter the availability and temperature of water resources, exacerbating these issues. Constructing alternative cooling systems to address vulnerabilities can be capital intensive and can also affect power plant efficiencies. Demand response programs are being implemented by electric system planners and operators to reduce and shift electricity demands from peak usage periods to other times of the day. Demand response programs can also play a role in reducing water-related power sector vulnerabilities during summer months. Traditionally, production cost modeling and demand response analyses do not include water resources. In this effort, we integrate an electricity production cost modeling framework with water-related impacts on power plants in a test system to evaluate the impacts of demand response measures on power system costs and reliability. Specifically, we i) quantify the cost and reliability implications of incorporating water resources into production cost modeling, ii) evaluate the impacts of demand response measures on reducing system costs and vulnerabilities, and iii) consider sensitivity analyses with cooling systems to highlight a range of potential benefits of demand response measures. Impacts from climate change on power plant performance and water resources are discussed. Results provide key insights to policymakers and practitioners for reducing water-related power plant vulnerabilities via lower cost methods.
Vulnerability of global food production to extreme climatic events.
Yeni, F; Alpas, H
2017-06-01
It is known that the frequency, intensity or duration of the extreme climatic events have been changing substantially. The ultimate goal of this study was to identify current vulnerabilities of global primary food production against extreme climatic events, and to discuss potential entry points for adaptation planning by means of an explorative vulnerability analysis. Outcomes of this analysis were demonstrated as a composite index where 118 country performances in maintaining safety of food production were compared and ranked against climate change. In order to better interpret the results, cluster analysis technique was used as a tool to group the countries based on their vulnerability index (VI) scores. Results suggested that one sixth of the countries analyzed were subject to high level of exposure (0.45-1), one third to high to very high level of sensitivity (0.41-1) and low to moderate level of adaptive capacity (0-0.59). Proper adaptation strategies for reducing the microbial and chemical contamination of food products, soil and waters on the field were proposed. Finally, availability of data on food safety management systems and occurrence of foodborne outbreaks with global coverage were proposed as key factors for improving the robustness of future vulnerability assessments. Copyright © 2017 Elsevier Ltd. All rights reserved.
Development and implementation of a Bayesian-based aquifer vulnerability assessment in Florida
Arthur, J.D.; Wood, H.A.R.; Baker, A.E.; Cichon, J.R.; Raines, G.L.
2007-01-01
The Florida Aquifer Vulnerability Assessment (FAVA) was designed to provide a tool for environmental, regulatory, resource management, and planning professionals to facilitate protection of groundwater resources from surface sources of contamination. The FAVA project implements weights-of-evidence (WofE), a data-driven, Bayesian-probabilistic model to generate a series of maps reflecting relative aquifer vulnerability of Florida's principal aquifer systems. The vulnerability assessment process, from project design to map implementation is described herein in reference to the Floridan aquifer system (FAS). The WofE model calculates weighted relationships between hydrogeologic data layers that influence aquifer vulnerability and ambient groundwater parameters in wells that reflect relative degrees of vulnerability. Statewide model input data layers (evidential themes) include soil hydraulic conductivity, density of karst features, thickness of aquifer confinement, and hydraulic head difference between the FAS and the watertable. Wells with median dissolved nitrogen concentrations exceeding statistically established thresholds serve as training points in the WofE model. The resulting vulnerability map (response theme) reflects classified posterior probabilities based on spatial relationships between the evidential themes and training points. The response theme is subjected to extensive sensitivity and validation testing. Among the model validation techniques is calculation of a response theme based on a different water-quality indicator of relative recharge or vulnerability: dissolved oxygen. Successful implementation of the FAVA maps was facilitated by the overall project design, which included a needs assessment and iterative technical advisory committee input and review. Ongoing programs to protect Florida's springsheds have led to development of larger-scale WofE-based vulnerability assessments. Additional applications of the maps include land-use planning amendments and prioritization of land purchases to protect groundwater resources. ?? International Association for Mathematical Geology 2007.
Psychometric Properties of the Psychological Vulnerability Scale in Higher Education Students.
Nogueira, Maria José; Barros, Luisa; Sequeira, Carlos
2017-05-01
Psychological vulnerability is related to cognitive beliefs that reflect dependence on one's sense of self-worth and to maladaptive functioning. It is a disadvantage that renders people less protected to face negative life experiences. The purpose of this study was to adapt and test the psychometric properties of the Psychological Vulnerability Scale in a sample of 267 Portuguese higher education students. A psychometric study of the Psychological Vulnerability Scale, after translation into Portuguese, was performed with a convenience sample of higher education students. Participants were asked to fill in the sociodemographic questionnaire, the Psychological Vulnerability Scale, the Brief Symptom Inventory, and a one-item question about the Perception of Vulnerability. The mean age of the participants was 20.5 years ( SD = 3.3). A factor analysis confirmed the original one-factor structure, explaining 42.9% of the total variance. The Psychological Vulnerability Scale showed adequate internal consistency and excellent test-retest stability. Convergent validity was confirmed by positive correlations with the Brief Symptom Inventory and Perception of Vulnerability. Overall, the Psychological Vulnerability Scale showed good validity, reliability, and stability over time. The Psychological Vulnerability Scale is now ready to be used by practitioners and researchers to measure the psychological vulnerability among Portuguese higher education students. These data add to the body of knowledge of psychiatric and mental health nursing and provides support for the use of the Psychological Vulnerability Scale in higher education students.
Coastal vulnerability: climate change and natural hazards perspectives
NASA Astrophysics Data System (ADS)
Romieu, E.; Vinchon, C.
2009-04-01
Introduction Studying coastal zones as a territorial concept (Integrated coastal zone management) is an essential issue for managers, as they have to consider many different topics (natural hazards, resources management, tourism, climate change…). The recent approach in terms of "coastal vulnerability" studies (since the 90's) is the main tool used nowadays to help them in evaluating impacts of natural hazards on coastal zones, specially considering climate change. This present communication aims to highlight the difficulties in integrating this concept in risk analysis as it is usually practiced in natural hazards sciences. 1) Coastal vulnerability as a recent issue The concept of coastal vulnerability mainly appears in the International panel on climate change works of 1992 (IPCC. 2001), where it is presented as essential for climate change adaptation. The concept has been defined by a common methodology which proposes the assessment of seven indicators, in regards to a sea level rise of 1m in 2100: people affected, people at risk, capital value at loss, land at loss, wetland at loss, potential adaptation costs, people at risk assuming this adaptation. Many national assessments have been implemented (Nicholls, et al. 1995) and a global assessment was proposed for three indicators (Nicholls, et al. 1999). The DINAS-Coast project reuses this methodology to produce the DIVA-tool for coastal managers (Vafeidis, et al. 2004). Besides, many other methodologies for national or regional coastal vulnerability assessments have been developed (review by (UNFCCC. 2008). The use of aggregated vulnerability indicators (including geomorphology, hydrodynamics, climate change…) is widespread: the USGS coastal vulnerability index is used worldwide and was completed by a social vulnerability index (Boruff, et al. 2005). Those index-based methods propose a vulnerability mapping which visualise indicators of erosion, submersion and/or socio economic sensibility in coastal zones. This concept is a great tool for policy makers to help managing their action and taking into account climate change (McFadden, et al. 2006). However, in those approaches, vulnerability is the output itself (cost of effective impacts, geomorphologic impacts…), but is not integrated it in a risk analysis. Furthermore, those studies emerged from a climatic perspective, which leads to consider climate change as a hazard or pressure whereas risk studies commonly consider hazards such as erosion and flooding, where climate change modifies the drivers of the hazard. 2) The natural hazards and socio economic perspectives In order to reduce impacts of natural hazards, decision makers need a complete risk assessment (probability of losses). Past studies on natural risks (landslide, earthquake...) highlighted the pertinence of defining risk as a combination of : (1)hazard occurrence and intensity, (2) exposition and (3)vulnerability of assets and population to this hazard (e.g. Douglas. 2007, Sarewitz, et al. 2003). Following the Renn and Klinke risk assessment frame, high uncertainties associated with coastal risks considering climatic and anthropic change highlights the importance of working on that concept of "vulnerability" (Klinke and Renn. 2002). Past studies on vulnerability assessment showed a frequently mentioned gap between "impact based" and "human based" points of view. It is nowadays a great issue for natural risk sciences. Many research efforts in FP7 projects such as MOVE and ENSURE focus on integrating the different dimensions of vulnerability (Turner, et al. 2003, Birkmann. 2006). Coastal risk studies highlight another issue of concern. We previously detailed the different use of the term "vulnerability" in the coastal context, quite different of the "natural risk's" use. Interaction of social, economic and physical sciences is considered within two french research projects (Vulsaco, Miseeva), in order to identify the vulnerability of a system to flooding or erosion (i.e. its characteristics that create potential harm), and integrate them in a risk assessment. Global change is considered by modifications of hazard, anthropogenic pressure and exposition, in order to point out possible modification of vulnerabilities. 3) Learning from both perspectives Coastal vulnerability in its "end in itself" and climate change dimension is a widespread tool for decision makers but it can be inadequate when vulnerability is a component of risk. This is mainly due to the consideration of climate change as a "hazard", so that coastal vulnerability is seen as the possible adverse impacts of climate change. As a matter of fact, this concept is clearly well considered by managers, who feel deeply concerned by climate change. However, coastal risk managers would gain in considering climate change more like a driver able to modify existing hazards than like the pressure in itself. Using this concept could lead to new perspectives of coastal risk mitigation for decision makers (social vulnerability, risk perception…), learning from other disciplines and sciences thanks to research projects such as MOVE (FP7). Acknowledgements The authors would like to thank the BRGM coastal team for rich discussions and fruitful collaborations in coastal vulnerability studies, more specially Déborah Idier for animating the Vulsaco project and Manuel Garcin for his work on tsunamis in Sri Lanka. They are also grateful to the MISEEVA and MOVE teams, which are doing some great trans-disciplinary work. References Birkmann, J., 2006. Measuring vulnerability to Natural Hazards : towards disaster resilient societies. United Nations University Press. Boruff, B. J., Emrich, C., Cutter, S. L., 2005. Erosion hazard vulnerability of US coastal counties. Journal of Coastal Research. 21, 932-942. Douglas, J., 2007. Physical vulnerability modelling in natural hazard risk assessment. Natural Hazards and Earth System Sciences. 7, 283-288. IPCC, 2001. Climate change 2001 : synthesis report. A contribution of working groups I, II and III to the Third Assesment Report of the Intergovernmental Panel on Climate Change. Klinke, A. and Renn, O., 2002. A new approach to risk evaluation and management : risk based, precaution based and discourse based strategies. Risk Analysis. 22, 1071-1094. McFadden, L., Nicholls, R.J., Penning-Rowsell, E. (Eds.), 2006. Managing coastal vulnerability. Elsevier Science. Nicholls, R. J., Hoozemans, F. M. J., Marchand, M., 1999. Increasing flood risk and wetland losses due to global sea-level rise: regional and global analyses. Global Environmental Change, Part A: Human and Policy Dimensions. 9, S69-S87. Nicholls, R. J., Leatherman, S. P., Volonte, C. R., 1995. Impacts and responses to sea-level rise; qualitative and quantitative assessments; Potential impacts of accelerated sea-level rise on developing countries. Journal of Coastal Research. Special issue 14, 26-43. Sarewitz, D., Pielke, R., Keykhah, M., 2003. Vulnerability and Risk: Some Thoughts from a Political and Policy Perspective. Risk Analysis. 23, 805-810. Turner, B. L.,II, Kasperson, R. E., Matson, P. A., McCarthy, J. J., Corell, R. W., Christensen, L., Eckley, N., Kasperson, J. X., Luers, A., Martello, M. L., Polsky, C., Pulsipher, A., Schiller, A., 2003. A framework for vulnerability analysis in sustainability science. Proceedings of the National Academy of Sciences, USA. 100, 8074-8079. UNFCCC, 2008. Compendium on methods and tools to evaluate impacts of vulnerability and adaptation to climate change. Vafeidis, A., Nicholls, R., McFadden, L., 2004. Developing a database for global vulnerability analysis of coastal zones: The DINAS-COAST project and the DIVA tool.
Bexfield, Laura M.; Thiros, Susan A.; Anning, David W.; Huntington, Jena M.; McKinney, Tim S.
2011-01-01
As part of the U.S. Geological Survey National Water-Quality Assessment (NAWQA) Program, the Southwest Principal Aquifers (SWPA) study is building a better understanding of the factors that affect water quality in basin-fill aquifers in the Southwestern United States. The SWPA study area includes four principal aquifers of the United States: the Basin and Range basin-fill aquifers in California, Nevada, Utah, and Arizona; the Rio Grande aquifer system in New Mexico and Colorado; and the California Coastal Basin and Central Valley aquifer systems in California. Similarities in the hydrogeology, land- and water-use practices, and water-quality issues for alluvial basins within the study area allow for regional analysis through synthesis of the baseline knowledge of groundwater-quality conditions in basins previously studied by the NAWQA Program. Resulting improvements in the understanding of the sources, movement, and fate of contaminants are assisting in the development of tools used to assess aquifer susceptibility and vulnerability.This report synthesizes previously published information about the groundwater systems and water quality of 15 information-rich basin-fill aquifers (SWPA case-study basins) into conceptual models of the primary natural and human factors commonly affecting groundwater quality with respect to selected contaminants, thereby helping to build a regional understanding of the susceptibility and vulnerability of basin-fill aquifers to those contaminants. Four relatively common contaminants (dissolved solids, nitrate, arsenic, and uranium) and two contaminant classes (volatile organic compounds (VOCs) and pesticide compounds) were investigated for sources and controls affecting their occurrence and distribution above specified levels of concern in groundwater of the case-study basins. Conceptual models of factors that are important to aquifer vulnerability with respect to those contaminants and contaminant classes were subsequently formed. The conceptual models are intended in part to provide a foundation for subsequent development of regional-scale statistical models that relate specific constituent concentrations or occurrence in groundwater to natural and human factors.
Pandemic Influenza Preparedness and Response Among Immigrants and Refugees
Tinker, Timothy; Vaughan, Elaine; Kapella, Bryan K.; Brenden, Marta; Woznica, Celine V.; Rios, Elena; Lichtveld, Maureen
2009-01-01
Some immigrants and refugees might be more vulnerable than other groups to pandemic influenza because of preexisting health and social disparities, migration history, and living conditions in the United States. Vulnerable populations and their service providers need information to overcome limited resources, inaccessible health services, limited English proficiency and foreign language barriers, cross-cultural misunderstanding, and inexperience applying recommended guidelines. To increase the utility of guidelines, we searched the literature, synthesized relevant findings, and examined their implications for vulnerable populations and stakeholders. Here we summarize advice from an expert panel of public health scientists and service program managers who attended a meeting convened by the Centers for Disease Control and Prevention, May 1 and 2, 2008, in Atlanta, Georgia. PMID:19461109
Tsunami vulnerability assessment in the western coastal belt in Sri Lanka
NASA Astrophysics Data System (ADS)
Ranagalage, M. M.
2017-12-01
26th December 2004 tsunami disaster has caused massive loss of life, damage to coastal infrastructures and disruption to economic activities in the coastal belt of Sri Lanka. Tsunami vulnerability assessment is a requirement for disaster risk and vulnerability reduction. It plays a major role in identifying the extent and level of vulnerabilities to disasters within the communities. There is a need for a clearer understanding of the disaster risk patterns and factors contributing to it in different parts of the coastal belt. The main objective of this study is to investigate tsunami vulnerability assessment of Moratuwa Municipal council area in Sri Lanka. We have selected Moratuwa area due to considering urbanization pattern and Tsunami hazards of the country. Different data sets such as one-meter resolution LiDAR data, orthophoto, population, housing data and road layer were employed in this study. We employed tsunami vulnerability model for 1796 housing units located there, for a tsunami scenario with a maximum run-up 8 meters. 86% of the total land area affected by the tsunami in 8 meters scenarios. Additionally, building population has been used to estimate population in different vulnerability levels. The result shows that 32% of the buildings have extremely critical vulnerability level, 46% have critical vulnerability level, 22% have high vulnerability level, and 1% have a moderate vulnerability. According to the population estimation model results, 18% reside building with extremely critical vulnerability, 43% with critical vulnerability, 36% with high vulnerability and 3% belong to moderate vulnerability level. The results of the study provide a clear picture of tsunami vulnerability. Outcomes of this analysis can use as a valuable tool for urban planners to assess the risk and extent of disaster risk reduction which could be achieved via suitable mitigation measures to manage the coastal belt in Sri Lanka.
Baghersad, Zahra; Alimohammadi, Nasrollah; Boroumandfar, Zahra; Golshiri, Parastoo
2016-01-01
Vulnerable women are prone to sexually transmitted diseases due to their high-risk behaviors. The present study aimed to investigate the effect of self-care training program based on Orem's model on the behaviors leading to sexually transmitted diseases in vulnerable women. This field trial was initially conducted on 100 women covered under health services and welfare organization in Isfahan city, who were selected by rationing ssampling. For needs assessment, they filled the self-care needs assessment questionnaire in three domains of knowledge, attitude, and practice. Then, at the stage of intervention (self-care training), 64 subjects were selected through convenient sampling and were assigned to experimental and control groups by random allocation. Data were analyzed by descriptive and analytical statistical tests through SPSS 18. Results showed that mean scores of knowledge ( P < 0.001), attitude ( P < 0.001), practice ( P = 0.04), and behavior change ( P = 0.01) were significantly higher immediately after and 3 months after intervention, compared to before intervention, but there was no significant difference in mean scores between immediately after and 3 months after intervention. With regard to these results, it can be concluded that if the educational programs are planned based on clients' real needs assessment, the learners follow the educational materials, related to their problems, more seriously and it results in a notable behavior change in them.
HIV Vulnerability and the Erasure of Sexual and Gender Diversity in Abidjan, Côte d'Ivoire
Thomann, Matthew
2016-01-01
In the fight against concentrated HIV epidemics, men who have sex with men (MSM) are often framed as a homogeneous population, with little attention paid to sexual and gender diversity and its impact on HIV vulnerability. This article draws on ethnographic research conducted in Abidjan, Côte d'Ivoire among les branchés – a local term encompassing several categories of same-sex desire and practice. In the context of increased HIV prevention programming targeting Ivoirian sexual and gender minorities, such diversity is effectively erased. This obfuscation of difference has particularly negative impacts for travestis, who may be at higher risk for HIV infection, though research and prevention efforts in which they are grouped with “MSM” render them underrepresented and make their vulnerability difficult to quantify. Branchés whose class and/or ethnic backgrounds compound their stigmatized status as sexual and gender minorities also bear the burden of this exclusion. Furthermore, some branchés deploy “MSM” as a form of self-identification, further complicating who such categories represent. By highlighting the ways in which constructions of gender and sexuality within HIV/AIDS programming obscure complex social realities, I aim to reorient thinking around the development of purposeful HIV programming that engages the complexity of sexual and gender minority experience. PMID:26894990
A Preliminary Tsunami Vulnerability Analysis for Yenikapi Region in Istanbul
NASA Astrophysics Data System (ADS)
Ceren Cankaya, Zeynep; Suzen, Lutfi; Cevdet Yalciner, Ahmet; Kolat, Cagil; Aytore, Betul; Zaytsev, Andrey
2015-04-01
One of the main requirements during post disaster recovery operations is to maintain proper transportation and fluent communication at the disaster areas. Ports and harbors are the main transportation hubs which must work with proper performance at all times especially after the disasters. Resilience of coastal utilities after earthquakes and tsunamis have major importance for efficient and proper rescue and recovery operations soon after the disasters. Istanbul is a mega city with its various coastal utilities located at the north coast of the Sea of Marmara. At Yenikapi region of Istanbul, there are critical coastal utilities and vulnerable coastal structures and critical activities occur daily. Fishery ports, commercial ports, small craft harbors, passenger terminals of intercity maritime transportation, water front commercial and/or recreational structures are some of the examples of coastal utilization which are vulnerable against marine disasters. Therefore their vulnerability under tsunami or any other marine hazard to Yenikapi region of Istanbul is an important issue. In this study, a methodology of vulnerability analysis under tsunami attack is proposed with the applications to Yenikapi region. In the study, high resolution (1m) GIS database of Istanbul Metropolitan Municipality (IMM) is used and analyzed by using GIS implementation. The bathymetry and topography database and the vector dataset containing all buildings/structures/infrastructures in the study area are obtained for tsunami numerical modeling for the study area. GIS based tsunami vulnerability assessment is conducted by applying the Multi-criteria Decision Making Analysis (MCDA). The tsunami parameters from deterministically defined worst case scenarios are computed from the simulations using tsunami numerical model NAMI DANCE. The vulnerability parameters in the region due to two different classifications i) vulnerability of buildings/structures and ii) vulnerability of (human) evacuation are defined and scored. The risk level is computed using tsunami intensity (level of flow depth from simulations) and vulnerability (structural and human-based) at each node in Yenikapi. The results are presented at high resolution (1m) and discussed. Acknowledgements: Partial support by EU 603839 ASTARTE Project, UDAP-C-12-14 of AFAD of Turkey, 108Y227 and 113M556 of TUBITAK Turkey, RAPSODI (CONCERT_Dis-021) of CONCERT-Japan Joint Call, 2011K140210 of DPT, Istanbul Metropolitan Municipality, Japan-Turkey Joint Research Project by JICA on earthquakes and tsunamis in Marmara Region by SATREPS are acknowledged.
ERIC Educational Resources Information Center
Sellman, Edward
2015-01-01
This article provides a critical and thematic analysis of three research projects involving artists working with vulnerable young people in educational contexts. It argues that artists create safe spaces in contrast to traditional educational activities but it will also raise questions about what constitutes such a space for participants. It will…
NASA Astrophysics Data System (ADS)
Guillard-Gonçalves, C.; Zêzere, J. L.; Pereira, S.; Garcia, R. A. C.
2016-02-01
This study offers a semi-quantitative assessment of the physical vulnerability of buildings to landslides in a Portuguese municipality (Loures), as well as the quantitative landslide risk analysis computed as the product of the landslide hazard by the vulnerability and the economic value of the buildings. The hazard was assessed by combining the spatiotemporal probability and the frequency-magnitude relationship of the landslides. The physical vulnerability assessment was based on an inquiry of a pool of European landslide experts and a sub-pool of landslide experts who know the study area, and the answers' variability was assessed with standard deviation. The average vulnerability of the basic geographic entities was compared by changing the map unit and applying the vulnerability to all the buildings of a test site, the inventory of which was listed on the field. The economic value was calculated using an adaptation of the Portuguese Tax Services approach, and the risk was computed for different landslide magnitudes and different spatiotemporal probabilities. As a rule, the vulnerability values given by the sub-pool of experts who know the study area are higher than those given by the European experts, namely for the high-magnitude landslides. The obtained vulnerabilities vary from 0.2 to 1 as a function of the structural building types and the landslide magnitude, and are maximal for 10 and 20 m landslide depths. However, the highest risk was found for the landslides that are 3 m deep, because these landslides combine a relatively high frequency in the Loures municipality with a substantial potential damage.
NASA Astrophysics Data System (ADS)
Sugiarto, Y.; Perdinan; Atmaja, T.; Wibowo, A.
2017-03-01
Agriculture plays a strategic role in strengthening sustainable development. Based on agropolitan concept, the village becomes the center of economic activities by combining agriculture, agro-industry, agribusiness and tourism that able to create high value-added economy. The impact of climate change on agriculture and water resources may increase the pressure on agropolitan development. The assessment method is required to measure the vulnerability of area-based communities in the agropolitan to climate change impact. An analysis of agropolitan vulnerability was conducted in Malang district based on four aspects and considering the availability and distribution of water as the problem. The indicators used to measure was vulnerability component which consisted of sensitivity and adaptive capacity and exposure component. The studies earned 21 indicators derived from the 115 village-based data. The results of vulnerability assessments showed that most of the villages were categorised at a moderate level. Around 20% of 388 villages were categorized at high to very high level of vulnerability due to low level of agricultural economic. In agropolitan region within the sub-district of Poncokusumo, the vulnerability of the villages varies between very low to very high. The most villages were vulnerable due to lower adaptive capacity, eventhough the level of sensitivity and exposure of all villages were relatively similar. The existence of water resources was the biggest contributor to the high exposure of the villages in Malang district, while the reception of credit facilities and source of family income were among the indicators that lead to high sensitivity component.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.
2013-10-01
Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-daymore » exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.« less
45 CFR 155.210 - Navigator program standards.
Code of Federal Regulations, 2013 CFR
2013-10-01
... underserved and vulnerable populations; (ii) Eligibility and enrollment rules and procedures; (iii) The range... population being served by the Exchange, including individuals with limited English proficiency, and ensure...
Kevlar: Transitioning Helix for Research to Practice
2016-03-01
entropy randomization techniques, automated program repairs leveraging highly-optimized virtual machine technology, and developing a novel framework...attacker from exploiting residual vulnerabilities in a wide variety of classes. Helix/Kevlar uses novel, fine-grained, high- entropy diversification...the Air Force, and IARPA). Salient features of Helix/Kevlar include developing high- entropy randomization techniques, automated program repairs
Crossing the Divide: An Emerging Typology of Postsecondary Bridging for Opportunity Youth
ERIC Educational Resources Information Center
Almeida, Cheryl; Allen, Lili
2016-01-01
Through Job For the Future's (JFF's) work with communities around the country on the Back on Track model, postsecondary bridging strategies have emerged as a particularly critical and especially replicable component of programming for vulnerable youth. This issue brief offers a typology of evidence-informed bridge programming, drawing on…
Facebook and the Final Practicum: The Impact of Online Peer Support in the Assistant Teacher Program
ERIC Educational Resources Information Center
Paris, Lisa F.; Boston, Julie; Morris, Julia
2015-01-01
Australian pre-service teachers (PST) frequently report feeling isolated and vulnerable during the high stakes Assistant Teacher Program (ATP) final practicum. Mentoring and online learning communities have been shown to offer effective support during periods in which pre-service and beginning teachers feel challenged. As social media…
Principal Efficacy: Implications for Rural "Grow Your Own" Leadership Programs
ERIC Educational Resources Information Center
Versland, Tena M.
2013-01-01
Although "grow your own" principal preparation programs have become a popular method for recruiting and selecting administrator candidates for hard to fill positions in both urban and rural schools, "grow your own" principal candidates in rural contexts may be more vulnerable to the phenomenon of loss of self-efficacy. This…
The Vulnerability of Urban Elementary School Arts Programs: A Case Study
ERIC Educational Resources Information Center
Shaw, Ryan D.
2018-01-01
With the intent of improving understanding of cuts to elementary arts programs, the purpose of this research was to investigate how one urban school district (Lansing School District in Lansing, Michigan) eliminated its elementary arts specialists. Research questions were (1) What policy conditions enabled the Lansing School District's decision to…
Long-Term Outcomes for the Promoting CARE Suicide Prevention Program
ERIC Educational Resources Information Center
Hooven, Carole; Herting, Jerald R.; Snedker, Karen A.
2010-01-01
Objectives: To provide a long-term look at suicide risk from adolescence to young adulthood for former participants in Promoting CARE, an indicated suicide prevention program. Methods: Five hundred ninety-three suicide-vulnerable high school youth were involved in a long-term follow-up study. Latent class growth models identify patterns of change…
Validating a Children's Self-Report Plate Waste Questionnaire
ERIC Educational Resources Information Center
Forrestal, Sarah G.; Issel, L. Michele; Kviz, Frederick J.; Chávez, Noel
2008-01-01
Purpose/Objectives: The National School Lunch Program is well situated to address the vulnerability of lower income children at increased risk for both under and overnutrition. Evidence suggests, however, that a significant amount of food served in the program goes uneaten. One way to monitor this problem is through children's self-reported plate…
Estimating the value of volunteer-assisted community-based aging services: a case example.
Scharlach, Andrew E
2015-01-01
This study demonstrates the use of a social return on investment (SROI) approach in estimating the financial and social value created by volunteer-assisted community-based aging services. An expanded value added statement (EVAS) analysis found that the total value of outputs produced by the Concierge Club of San Diego substantially exceeded the cost of the program, after considering likely secondary and tertiary benefits for a range of affected stakeholders-including elderly service recipients, family members, volunteers, and societal institutions. Additional research is needed regarding the direct and indirect costs and benefits of volunteer support services for vulnerable older adults and their families.
NASA Technical Reports Server (NTRS)
Denning, Peter J.
1989-01-01
In November 1988 a worm program invaded several thousand UNIX-operated Sun workstations and VAX computers attached to the Research Internet, seriously disrupting service for several days but damaging no files. An analysis of the work's decompiled code revealed a battery of attacks by a knowledgeable insider, and demonstrated a number of security weaknesses. The attack occurred in an open network, and little can be inferred about the vulnerabilities of closed networks used for critical operations. The attack showed that passwork protection procedures need review and strengthening. It showed that sets of mutually trusting computers need to be carefully controlled. Sharp public reaction crystalized into a demand for user awareness and accountability in a networked world.
1999-06-01
This project seeks to help reduce the vulnerability of young Cambodians aged 12-25 to HIV/AIDS and sexually transmitted diseases (STDs) by strengthening nongovernmental organization (NGO) capacity to develop sustainable, effective and appropriate responses to HIV/AIDS and STDs. The strategies include strengthening local NGO capacity, sharing technical support concerning HIV/AIDS, and working together to develop information, education and communication on HIV/AIDS. Main activities included in the project are: 1) enable NGOs to undertake broader response to HIV/STDs by mobilizing, selecting, contracting, monitoring and supervising local NGO projects; 2) enhance local NGO capacity to work with the youth by organizing specialist training workshops, providing technical support and training in external relations and sustainability, and promoting local NGO/youth volunteer exchange and exposure programs; 3) strengthen the capacity of local NGOs through training, skill building, technical support and development of NGO support program; and 4) improve the knowledge base of programming for youth by identifying, documenting and disseminating effective programming models and tools.
Ordóñez Barona, Camilo
2015-12-01
Urban trees are a dominant natural element in cities; they provide important ecosystem services to urban citizens and help urban areas adapt to climate change. Many rationales have been proposed to provide a purpose for urban forest management, some of which have been ineffective in addressing important ecological and social management themes. Among these rationales we find a values-based perspective, which sees management as a process where the desires of urban dwellers are met. Another perspective is climate change adaptation, which sees management as a process where urban forest vulnerability to climate change is reduced and resilience enhanced. Both these rationales have the advantage of complementing, enhancing, and broadening urban forest management objectives. A critical analysis of the literature on public values related to urban forests and climate change adaptation in the context of urban forests is undertaken to discuss what it means to adopt these two issues in urban forest management. The analysis suggests that by seeing urban forest management as a process by which public values are satisfied and urban-forest vulnerabilities to climate change are reduced, we can place issues such as naturalization, adaptive management, and engaging people in management at the centre of urban forest management. Focusing urban forest management on these issues may help ensure the success of programs focused on planting more trees and increasing citizen participation in urban forest management. Copyright © 2015 Elsevier Ltd. All rights reserved.
Implementation contexts of a Tuberculosis Control Program in Brazilian prisons
de Oliveira, Luisa Gonçalves Dutra; Natal, Sonia; Camacho, Luiz Antonio Bastos
2015-01-01
OBJECTIVE To analyze the influence from context characteristics in the control of tuberculosis in prisons, and the influence from the program implementation degrees in observed effects. METHODS A multiple case study, with a qualitative approach, conducted in the prison systems of two Brazilian states in 2011 and 2012. Two prisons were analyzed in each state, and a prison hospital was analyzed in one of them. The data were submitted to a content analysis, which was based on external, political-organizational, implementation, and effect dimensions. Contextual factors and the ones in the program organization were correlated. The independent variable was the program implementation degree and the dependent one, the effects from the Tuberculosis Control Program in prisons. RESULTS The context with the highest sociodemographic vulnerability, the highest incidence rate of tuberculosis, and the smallest amount of available resources were associated with the low implementation degree of the program. The results from tuberculosis treatment in the prison system were better where the program had already been partially implemented than in the case with low implementation degree in both cases. CONCLUSIONS The implementation degree and its contexts – external and political-organizational dimensions – simultaneously contribute to the effects that are observed in the control of tuberculosis in analyzed prisons. PMID:26465668
Web vulnerability study of online pharmacy sites.
Kuzma, Joanne
2011-01-01
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.
Seidel, Bastian M; Bell, Erica
2014-11-28
Many countries are developing or reviewing national adaptation policy for climate change but the extent to which these meet the health needs of vulnerable groups has not been assessed. This study examines the adequacy of such policies for nine known climate-vulnerable groups: people with mental health conditions, Aboriginal people, culturally and linguistically diverse groups, aged people, people with disabilities, rural communities, children, women, and socioeconomically disadvantaged people. The study analyses an exhaustive sample of national adaptation policy documents from Annex 1 ('developed') countries of the United Nations Framework Convention on Climate Change: 20 documents from 12 countries. A 'critical computational linguistics' method was used involving novel software-driven quantitative mapping and traditional critical discourse analysis. The study finds that references to vulnerable groups are relatively little present or non-existent, as well as poorly connected to language about practical strategies and socio-economic contexts, both also little present. The conclusions offer strategies for developing policy that is better informed by a 'social determinants of health' definition of climate vulnerability, consistent with best practice in the literature and global policy prescriptions.
NASA Astrophysics Data System (ADS)
Tahri, Meryem; Maanan, Mohamed; Hakdaoui, Mustapha
2016-04-01
This paper shows a method to assess the vulnerability of coastal risks such as coastal erosion or submarine applying Fuzzy Analytic Hierarchy Process (FAHP) and spatial analysis techniques with Geographic Information System (GIS). The coast of the Mohammedia located in Morocco was chosen as the study site to implement and validate the proposed framework by applying a GIS-FAHP based methodology. The coastal risk vulnerability mapping follows multi-parametric causative factors as sea level rise, significant wave height, tidal range, coastal erosion, elevation, geomorphology and distance to an urban area. The Fuzzy Analytic Hierarchy Process methodology enables the calculation of corresponding criteria weights. The result shows that the coastline of the Mohammedia is characterized by a moderate, high and very high level of vulnerability to coastal risk. The high vulnerability areas are situated in the east at Monika and Sablette beaches. This technical approach is based on the efficiency of the Geographic Information System tool based on Fuzzy Analytical Hierarchy Process to help decision maker to find optimal strategies to minimize coastal risks.
Effectiveness of landslide risk mitigation strategies in Shihmen Watershed, Taiwan
NASA Astrophysics Data System (ADS)
Wu, Chun-Yi; Chen, Su-Chin
2015-04-01
The purpose of this study was to establish landslide risk analysis procedures that can be used to analyze landslide risk in a watershed scale and to assess the effectiveness of risk mitigation strategies. Landslide risk analysis encompassed the landslide hazard, the vulnerability of elements at risk, and community resilience capacity. First, landslide spatial probability, landslide temporal probability, and landslide area probability were joined to estimate the probability of landslides with an area exceeding a certain threshold in each slope unit. Second, the expected property and life losses were both analyzed in vulnerability analysis. Different elements at risk were assigned corresponding values, and then used in conjunction with the vulnerabilities to carry out quantitative analysis. Third, the resilience capacity of different communities was calculated based on the scores obtained through community checklists and the weights of individual items, including "the participation experience of disaster prevention drill," "real-time monitoring mechanism of community," "autonomous monitoring of residents," and "disaster prevention volunteer." Finally, the landslide probabilities, vulnerability analysis results, and resilience capacities were combined to assess landslide risk in Shihmen Watershed. In addition, the risks before and after the implementation of non-structural disaster prevention strategies were compared to determine the benefits of various strategies, and subsequently benefit-cost analysis was performed. Communities with high benefit-cost ratios included Hualing, Yisheng, Siouluan, and Gaoyi. The watershed as a whole had a benefit-cost ratio far greater than 1, indicating that the effectiveness of strategies was greater than the investment cost, and these measures were thus cost-effective. The results of factor sensitivity analysis revealed that changes in vulnerability and mortality rates would increase the uncertainty of risk, and that raise in annual interest rates or reduction in life cycle of measures would decrease the benefit-cost ratio. However, with regard to effectiveness analysis, these changes did not reverse the cost-effective inference.
López-Carr, David; Pricope, Narcisa G.; Aukema, Juliann E.; Jankowska, Marta M.; Funk, Christopher C.; Husak, Gregory J.; Michaelsen, Joel C.
2014-01-01
We present an integrative measure of exposure and sensitivity components of vulnerability to climatic and demographic change for the African continent in order to identify “hot spots” of high potential population vulnerability. Getis-Ord Gi* spatial clustering analyses reveal statistically significant locations of spatio-temporal precipitation decline coinciding with high population density and increase. Statistically significant areas are evident, particularly across central, southern, and eastern Africa. The highly populated Lake Victoria basin emerges as a particularly salient hot spot. People located in the regions highlighted in this analysis suffer exceptionally high exposure to negative climate change impacts (as populations increase on lands with decreasing rainfall). Results may help inform further hot spot mapping and related research on demographic vulnerabilities to climate change. Results may also inform more suitable geographical targeting of policy interventions across the continent.
Handa, Sudhanshu; Peterman, Amber; Huang, Carolyn; Halpern, Carolyn; Pettifor, Audrey; Thirumurthy, Harsha
2015-09-01
There is promising evidence that poverty-targeted cash transfer programs can have positive impacts on adolescent transitions to adulthood in resource poor settings, however existing research is typically from small scale programs in diverse geographic and cultural settings. We provide estimates of the impact of a national unconditional cash transfer program, the Kenya Cash Transfer for Orphans and Vulnerable Children, on pregnancy and early marriage among females aged 12 to 24, four years after program initiation. The evaluation was designed as a clustered randomized controlled trial and ran from 2007 to 2011, capitalizing on the existence of a control group, which was delayed entry to the program due to budget constraints. Findings indicate that, among 1549 females included in the study, while the program reduced the likelihood of pregnancy by five percentage points, there was no significant impact on likelihood of early marriage. Program impacts on pregnancy appear to work through increasing the enrollment of young women in school, financial stability of the household and delayed age at first sex. The Kenyan program is similar in design to most other major national cash transfer programs in Eastern and Southern Africa, suggesting a degree of generalizability of the results reported here. Although the objective of the program is primarily poverty alleviation, it appears to have an important impact on facilitating the successful transition of adolescent girls into adulthood. Copyright © 2015 Elsevier Ltd. All rights reserved.
Handa, Sudhanshu; Huang, Carolyn; Halpern, Carolyn; Pettifor, Audrey; Thirumurthy, Harsha
2015-01-01
There is promising evidence that poverty-targeted cash transfer programs can have positive impacts on adolescent transitions to adulthood in resource poor settings, however existing research is typically from small scale programs in diverse geographic and cultural settings. We provide estimates of the impact of a national unconditional cash transfer program, the Kenya Cash Transfer for Orphans and Vulnerable Children, on pregnancy and early marriage among females aged 12 to 24, four years after program initiation. The evaluation was designed as a clustered randomized controlled trial and ran from 2007 to 2011, capitalizing on the existence of a control group, which was delayed entry to the program due to budget constraints. Findings indicate that, among 1,549 females included in the study, while the program reduced the likelihood of pregnancy by five percentage points, there was no significant impact on likelihood of early marriage. Program impacts on pregnancy appear to work through increasing the enrollment of young women in school, financial stability of the household and delayed age at first sex. The Kenyan program is similar in design to most other major national cash transfer programs in Eastern and Southern Africa, suggesting a degree of generalizability of the results reported here. Although the objective of the program is primarily poverty alleviation, it appears to have an important impact on facilitating the successful transition of adolescent girls into adulthood. PMID:26246032
Transformation-aware Exploit Generation using a HI-CFG
2013-05-16
testing has many limitations of its own: it can require significant target -specific setup to perform well; it is unlikely to trigger vulnerabilities...check fails represents a potential vulnerability, but a conservative analysis can produce false positives , so we can use exploit generation to find...warnings that correspond to true positives . We can also find potentially vulnerable instructions in the course of a manual binary- level security audit
Cassandra Johnson Gaither; N.C. Poudyal; S. Goodrick; J.M. Bowker; S. Malone; J. Gan
2011-01-01
The southeastern U.S. is one of the more wildland fire prone areas of the country and also contains some of the poorest or most socially vulnerable rural communities. Our project addresses wildland fire risk in this part of the U.S and its intersection with social vulnerability. We examine spatial association between high wildland fire prone areas which also rank high...
NASA Astrophysics Data System (ADS)
Guillard-Gonçalves, C.; Zêzere, J. L.; Pereira, S.; Garcia, R. A. C.
2015-09-01
This study offers a semi-quantitative assessment of the physical vulnerability of buildings to landslides in the Loures municipality, as well as an analysis of the landslide risk computed as the product of the vulnerability by the economic value of the buildings and by the landslide hazard. The physical vulnerability assessment, which was based on a questionnaire sent to a pool of Portuguese and European researchers, and the assessment of the subjectivity of their answers are innovative contributions of this work. The generalization of the vulnerability to the smallest statistical subsection was validated by changing the map unit and applying the vulnerability to all the buildings of a test site (approximately 800 buildings), which were inventoried during fieldwork. The economic value of the buildings of the Loures municipality was calculated using an adaptation of the Portuguese Tax Services formula. The hazard was assessed by combining the susceptibility of the slopes, the spatio-temporal probability and the frequency-magnitude relationship of the landslide. Finally, the risk was mapped for different landslide magnitudes and different spatio-temporal probabilities. The highest landslide risk was found for the landslide with a depth of 3 m in the landslide body, and a height of 1m in the landslide foot.
Bryan, Craig J; Dhillon-Davis, Luther E; Dhillon-Davis, Kieran K
2009-12-01
In light of continuing concerns about iatrogenic effects associated with suicide prevention efforts utilizing video-based media, the impact of emotionally-charged videos on two vulnerable subgroups--suicidal viewers and suicide survivors--was explored. Following participation in routine suicide education as a part of the U.S. Air Force Suicide Prevention Program's video-based community briefing, a sample of young active duty airmen demonstrated small decreases in positive emotional states and larger decreases in negative emotional states, especially among suicidal females. No evidence of iatrogenic effects were observed among suicidal or survivor subgroups when compared to controls. Results support the use of video-based media as a safe educational strategy that might actually serve to decrease emotional distress among vulnerable subgroups.
Hiner, Jacqueline; Pyka, Jeanine; Burks, Colleen; Pisegna, Lily; Gador, Rachel Ann
2012-01-01
Ensuring the safety of infants born in a hospital is a top priority and, therefore, requires a solid infant security plan. Using an interdisciplinary approach and a systematic change process, nursing leadership in collaboration with clinical nurses and security personnel analyzed the infant security program at this community hospital to identify vulnerabilities. By establishing an interdisciplinary approach to infant security, participants were able to unravel a complicated concept, systematically analyze the gaps, and agree to a plan of action. This resulted in improved communication and clarification of roles between the nursing and security divisions. Supply costs decreased by 17.4% after the first year of implementation. Most importantly, this project enhanced and strengthened the existing infant abduction prevention measures, hard wired the importance of infant security, and minimized vulnerabilities.
Risk assessment by dynamic representation of vulnerability, exploitation, and impact
NASA Astrophysics Data System (ADS)
Cam, Hasan
2015-05-01
Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.
Population and business exposure to twenty scenario earthquakes in the State of Washington
Wood, Nathan; Ratliff, Jamie
2011-01-01
This report documents the results of an initial analysis of population and business exposure to scenario earthquakes in Washington. This analysis was conducted to support the U.S. Geological Survey (USGS) Pacific Northwest Multi-Hazards Demonstration Project (MHDP) and an ongoing collaboration between the State of Washington Emergency Management Division (WEMD) and the USGS on earthquake hazards and vulnerability topics. This report was developed to help WEMD meet internal planning needs. A subsequent report will provide analysis to the community level. The objective of this project was to use scenario ground-motion hazard maps to estimate population and business exposure to twenty Washington earthquakes. In consultation with the USGS Earthquake Hazards Program and the Washington Division of Geology and Natural Resources, the twenty scenario earthquakes were selected by WEMD (fig. 1). Hazard maps were then produced by the USGS and placed in the USGS ShakeMap archive.
An R package for the design, analysis and operation of reservoir systems
NASA Astrophysics Data System (ADS)
Turner, Sean; Ng, Jia Yi; Galelli, Stefano
2016-04-01
We present a new R package - named "reservoir" - which has been designed for rapid and easy routing of runoff through storage. The package comprises well-established tools for capacity design (e.g., the sequent peak algorithm), performance analysis (storage-yield-reliability and reliability-resilience-vulnerability analysis) and release policy optimization (Stochastic Dynamic Programming). Operating rules can be optimized for water supply, flood control and amenity objectives, as well as for maximum hydropower production. Storage-depth-area relationships are in-built, allowing users to incorporate evaporation from the reservoir surface. We demonstrate the capabilities of the software for global studies using thousands of reservoirs from the Global Reservoir and Dam (GRanD) database fed by historical monthly inflow time series from a 0.5 degree gridded global runoff dataset. The package is freely available through the Comprehensive R Archive Network (CRAN).
Integrated flash flood vulnerability assessment: Insights from East Attica, Greece
NASA Astrophysics Data System (ADS)
Karagiorgos, Konstantinos; Thaler, Thomas; Heiser, Micha; Hübl, Johannes; Fuchs, Sven
2016-10-01
In the framework of flood risk assessment, vulnerability is a key concept to assess the susceptibility of elements at risk. Besides the increasing amount of studies on flash floods available, in-depth information on vulnerability in Mediterranean countries was missing so far. Moreover, current approaches in vulnerability research are driven by a divide between social scientists who tend to view vulnerability as representing a set of socio-economic factors, and natural scientists who view vulnerability in terms of the degree of loss to an element at risk. Further, vulnerability studies in response to flash flood processes are rarely answered in the literature. In order to close this gap, this paper implemented an integrated vulnerability approach focusing on residential buildings exposed to flash floods in Greece. In general, both physical and social vulnerability was comparable low, which is interpreted as a result from (a) specific building regulations in Greece as well as general design principles leading to less structural susceptibility of elements at risk exposed, and (b) relatively low economic losses leading to less social vulnerability of citizens exposed. The population show high risk awareness and coping capacity to response to natural hazards event and in the same time the impact of the events are quite low, because of the already high use of local protection measures. The low vulnerability score for East Attica can be attributed especially to the low physical vulnerability and the moderate socio-economic well-being of the area. The consequence is to focus risk management strategies mainly in the reduction of the social vulnerability. By analysing both physical and social vulnerability an attempt was made to bridge the gap between scholars from sciences and humanities, and to integrate the results of the analysis into the broader vulnerability context.
Russell, David; Oberlink, Mia R; Shah, Shivani; Evans, Lauren; Bassuk, Karen
To describe the design and participants of a program that employed health coaches and community health workers to address the social, health, and long-term disaster recovery needs of Rockaway residents roughly 2 years after Hurricane Sandy made landfall. Baseline and exit questionnaires, containing demographic, health, and health care utilization measures, were administered to participants at the start and end of the program. Enrollment and encounter information was captured in program administrative records. Descriptive statistics were used to summarize participant characteristics, personal goals, referrals to local organizations and agencies, and outcomes. Qualitative analyses were used to identify recurring themes in challenges faced by participants and barriers to health and wellness. The program served 732 community residents, of whom 455 (62%) completed baseline and exit questionnaires. Participants were directly and/or indirectly impacted by Hurricane Sandy through property damage, closures of health care facilities, limited employment opportunities, and trouble securing affordable housing. Furthermore, many participants faced considerable adversities and struggled to manage chronic health conditions. Personal goals set by participants included locating health care and other resources (44%), weight management and healthy eating (35%), and self-management of chronic conditions (24%). Health coaches and community health workers engaged participants an average of 4 times-providing counseling and referrals to local organizations and services, including medical and dental services (29%), city-issued identification cards (27%), and health insurance and other entitlements (23%). Comparisons of baseline and exit surveys indicated significant improvements in self-reported health, health care utilization, and confidence managing health issues. No significant improvement was observed in the use of preventive health care services. The program represents a model for engaging vulnerable populations and addressing social and economic barriers to health and wellness during the long-term disaster recovery phase. Health coaches and community health workers may be instrumental in helping to address the health and wellness needs of vulnerable residents living in disaster-affected areas.
NASA Astrophysics Data System (ADS)
Puissant, Anne; Cioloboc, Florin; Schlosser, Arnaud; Gazo, Aurelien; Martin, Brice; Malet, Jean-Philippe
2016-04-01
Over the last decades and centuries, mountain landscapes have experiment natural and man-made landcover/use changes with mainly the development of tourism activities and the reduction of agro-pastoral activities. These transformations have directly influenced the spatial organization of mountain landscapes. To better anticipate the future exposure of the territory to natural hazards, decision-makers need retrospective analyses of the past changes. In the frame of the SAMCO project, whose objective is to propose mountain risk assessment methodologies in the context of global changes, this research presents a retrospective analysis of land cover/use changes (from 1948 to 2013) in the Vars catchment (French South Alps) submitted to several natural hazards (rockfall, landslide, and flood). Database of elements at risk has been built for five dates and evolution of vulnerability is performed through a versatile GIS-based analysis tool developed for the estimation of vulnerability indicators (physical, economical, social) at a fine scale (1:5000). Results allow identifying several areas with different trajectories of vulnerability which can be use as input data for risk analysis and define future trends.
Cyberspace: Devolution and Recovery
2011-03-23
time of the source of the burst and we do not know if it was accidental, an act of God , or a malicious attack. 28 The remainder of a speech like...Security 15 Mailing List, Federal Vulnerability Knowledgebase (VKB), US-CERT Portal, US-CERT Einstein Program, Internet Health and Status Service...The US-CERT portal is a website dedicated to sharing relevant information with participants. The Einstein Program is a program that allows for the
ERIC Educational Resources Information Center
Kutz, Gregory D.
2010-01-01
Through the Child Care and Development Fund (CCDF), the U.S. Department of Health and Human Services (HHS) subsidizes child care for low-income families whose parents work or attend education or training programs. In fiscal year 2009, the CCDF budget was $7 billion. States are responsible for determining program priorities and overseeing funds.…
Integrated assessment of urban vulnerability and resilience. Case study: Targu Ocna town, Romania
NASA Astrophysics Data System (ADS)
Grozavu, Adrian; Bănică, Alexandru
2015-04-01
Vulnerability assessment frequently emphasizes the internal fragility of a system in relation to a given hazard, when compared to similar systems or to a reference standard. This internal fragility, either biophysical or structural, may affect the ability to predict, to prepare for and cope with or to recover from the manifestation of a risk phenomenon. Thus, the vulnerability is highly related to resilience and adaptability. There is no single methodology for vulnerability and resilience analysis, their assessment can only be made by identifying and integrating indicators which are compatible with the analysis level and the geographic, economic and social features of a certain area. An integrated model of evaluating vulnerability and resilience capacity is being proposed in this paper for Targu Ocna, a small mining settlement in the Eastern Carpathians of Romania, that became in the last years a tourist town and acts within the surrounding territory as a dynamic local pole. Methodologically, the following steps and operations were considered: identifying potential hazards, identifying elements at risk, identifying proper indicators and integrating them in order to evaluate the general vulnerability and resilience. The inventory of elements at risk (the number of people potentially affected, residential or other functionalities buildings, roads and other infrastructure elements etc.) was made based on General Urban Plan, topographic maps (scale 1:5000), ortophotos from 2003 and 2008 and field mapping and researches. Further on, several vulnerability indicators were identified and included within the analytical approach: dependency ratio, income, quality of the habitat and technical urban facilities, environment quality showing differentiated sensitivity. Issues such as preparedness and preventive measures (priority areas within the risk prevention plans), coping ability (networks' geometry and connectivity, emergency utilities and services accessibility) and the recovering capacity (the time needed to reestablish functions after a disastrous event) were also taken into account. The selected indicators were mathematically processed (standardized and normalized) in order to maximize their relevance and to unitary express the results in the spread 0-1. Then a grid with a cell size of 100 x 100 m was created in order to spatialize vulnerability indicators, that were calculated as the average vulnerability of the exposed elements in each cell. All identified indicators have been processed within a cluster analysis that permitted the identification of similar areas in terms of vulnerabilities. Finally, a general index was obtained by the integration of all vulnerability factors in an equation based on the geometric mean. The results of the study could provide a reference basis to substantiate local correctly prioritized decisions for reducing vulnerability by mitigation and adaptation measures in order to avoid significant damages when risks materialise.
Limitation of the Cavitron technique by conifer pit aspiration.
Beikircher, B; Ameglio, T; Cochard, H; Mayr, S
2010-07-01
The Cavitron technique facilitates time and material saving for vulnerability analysis. The use of rotors with small diameters leads to high water pressure gradients (DeltaP) across samples, which may cause pit aspiration in conifers. In this study, the effect of pit aspiration on Cavitron measurements was analysed and a modified 'conifer method' was tested which avoids critical (i.e. pit aspiration inducing) DeltaP. Four conifer species were used (Juniperus communis, Picea abies, Pinus sylvestris, and Larix decidua) for vulnerability analysis based on the standard Cavitron technique and the conifer method. In addition, DeltaP thresholds for pit aspiration were determined and water extraction curves were constructed. Vulnerability curves obtained with the standard method showed generally a less negative P for the induction of embolism than curves of the conifer method. Differences were species-specific with the smallest effects in Juniperus. Larix showed the most pronounced shifts in P(50) (pressure at 50% loss of conductivity) between the standard (-1.5 MPa) and the conifer (-3.5 MPa) methods. Pit aspiration occurred at the lowest DeltaP in Larix and at the highest in Juniperus. Accordingly, at a spinning velocity inducing P(50), DeltaP caused only a 4% loss of conductivity induced by pit aspiration in Juniperus, but about 60% in Larix. Water extraction curves were similar to vulnerability curves indicating that spinning itself did not affect pits. Conifer pit aspiration can have major influences on Cavitron measurements and lead to an overestimation of vulnerability thresholds when a small rotor is used. Thus, the conifer method presented here enables correct vulnerability analysis by avoiding artificial conductivity losses.
45 CFR 155.210 - Navigator program standards.
Code of Federal Regulations, 2012 CFR
2012-10-01
... underserved and vulnerable populations; (ii) Eligibility and enrollment rules and procedures; (iii) The range... manner that is culturally and linguistically appropriate to the needs of the population being served by...
Keegan, Conor; Conroy, Ronán; Doyle, Frank
2016-02-01
Depression is associated with increased mortality in patients with acute coronary syndrome (ACS). However, little is known about the theoretical causes of depression trajectories post-ACS, and whether these trajectories predict subsequent morbidity/mortality. We tested a longitudinal model of depressive vulnerabilities, trajectories and mortality. A prospective observational study of 374 ACS patients was conducted. Participants completed questionnaires on theoretical vulnerabilities (interpersonal life events, reinforcing events, cognitive distortions, and Type D personality) during hospitalisation and depression at baseline and 3, 6 and 12 months post-hospitalisation. Latent class analysis determined trajectories of depression. Path analysis was used to test relationships among vulnerabilities, depression trajectories and outcomes (combination of 1-year morbidity and 7-year mortality). Vulnerabilities independently predicted persistent and subthreshold depression trajectory categories, with effect sizes significantly highest for persistent depression. Both subthreshold and persistent depression trajectories were significant predictors of morbidity/mortality (e.g. persistent depression OR=2.4, 95% CI=1.8-3.1, relative to never depressed). Causality cannot be inferred from these associations. We had no measures of history of depression or treatments, which may affect associations. Theoretical vulnerabilities predicted depression trajectories, which in turn predicted increased morbidity/mortality, demonstrating for the first time a potential longitudinal chain of events post-ACS. This longitudinal model has important practical implications as clinicians can use vulnerability measures to identify those at most risk of poor outcomes. Copyright © 2015. Published by Elsevier B.V.
Assessing the social vulnerability to malaria in Rwanda.
Bizimana, Jean-Pierre; Twarabamenye, Emmanuel; Kienberger, Stefan
2015-01-07
Since 2004, malaria interventions in Rwanda have resulted in substantial decline of malaria incidence. However, this achievement is fragile as potentials for local malaria transmissions remain. The risk of getting malaria infection is partially explained by social conditions of vulnerable populations. Since vulnerability to malaria is both influenced by social and environmental factors, its complexity cannot be measured by a single value. The aim of this paper is, therefore, to apply a composite indicator approach for assessing social vulnerability to malaria in Rwanda. This assessment informs the decision-makers in targeting malaria interventions and allocating limited resources to reduce malaria burden in Rwanda. A literature review was used to conceptualize the social vulnerability to malaria and to select the appropriate vulnerability indicators. Indicators used in the index creation were classified into susceptibility and lack of resilience vulnerability domains. The main steps followed include selection of indicators and datasets, imputation of missing values, descriptive statistics, normalization and weighting of indicators, local sensitivity analysis and indicators aggregation. Correlation analysis helped to empirically evidence the association between the indicators and malaria incidence. The high values of social vulnerability to malaria are found in Gicumbi, Rusizi, Nyaruguru and Gisagara, and low values in Muhanga, Nyarugenge, Kicukiro and Nyanza. The most influential susceptibility indicators to increase malaria are population change (r = 0.729), average number of persons per bedroom (r = 0.531), number of households affected by droughts and famines (r = 0.591), and area used for irrigation (r = 0.611). The bed net ownership (r = -0.398) and poor housing wall materials (0.378) are the lack of resilience indicators that significantly correlate with malaria incidence. The developed composite index social vulnerability to malaria indicates which indicators need to be addressed and in which districts. The results from this study are salient for public health policy- and decision makers in malaria control in Rwanda and timely support the national integrated malaria initiative. Future research development should focus on spatial explicit vulnerability assessment by combining environmental and social drivers to achieve an integrated and complete assessment of vulnerability to malaria.