302 resultados para Vulnerabilities


Relevância:

10.00% 10.00%

Publicador:

Resumo:

JXME is the JXTA protocols implementation formobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default security level provided. This paper presents a brief analysis of the current state of security in JXME, focusing on the JXME-Proxied version, identifies existing vulnerabilities and proposes further improvements in this field.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spectrum scarcity demands thinking new ways tomanage the distribution of radio frequency bands so that its use is more effective. The emerging technology that can enable this paradigm shift is the cognitive radio. Different models fororganizing and managing cognitive radios have emerged, all with specific strategic purposes. In this article we review the allocation spectrum patterns of cognitive radio networks andanalyse which are the common basis of each model.We expose the vulnerabilities and open challenges that still threaten the adoptionand exploitation of cognitive radios for open civil networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of open source software continues to grow on a daily basis. Today, enterprise applications contain 40% to 70% open source code and this fact has legal, development, IT security, risk management and compliance organizations focusing their attention on its use, as never before. They increasingly understand that the open source content within an application must be detected. Once uncovered, decisions regarding compliance with intellectual property licensing obligations must be made and known security vulnerabilities must be remediated. It is no longer sufficient from a risk perspective to not address both open source issues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aquest projecte inclou una aproximació als conceptes de RFID i targetes contactless centrant-se en l’ampliament usat MIFARE Classic chip. L’objectiu principal es mostrar el seu funcionament i les seves vulnerabilitats, així com alguns exemples pràctics fent una anàlisi de diferents serveis que les utilitzen.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Työn tavoitteena oli selventää tietopääomaresurssien merkitys liiketoiminnassa riskien hallinnan kohteina. Tarkoitus oli määrittää eri tietopääomaresurssit ja niihin liittyviä riskejä. Tutkimus on kirjallisuustutkimus. Tutkimuksen tuloksena oli, että tietopääomaresursseihin kohdistuu erilaisia riskejä ja, että liiketoiminnalle tärkeät ja kriittiset tietopääomaresurssit ovat riskienhallinnan kohteita. Tutkimuksessa syntyi tietopääomaresurssien hallintamalli,jossa 1) toimintatapa yhdistää 2) osaamisen, 3) tiedot ja tietovarannot sekä 4) aineettomat oikeudet yhteneväiseksi kokonaisuudeksi. Tutkimuksessa kuvattiin kuhunkin resurssiin mahdollisesti liittyviä riskejä. Tutkimus osoitti, että liiketoiminnan tietopääomaresurssit voidaan tunnistaa ja niiden liiketoiminnallinen merkitys ja suojaustarve arvioida. Tietopääomaresurssien suojauskeinoja ovat yhteistyösopimukset, toimintatavat ja ohjeet sekä tietotekniset ja fyysiset suojausratkaisut.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lorsqu'un individu est confronté à une situation stressante, une des réponses les plus saillantes est l'activation de l'axe HPA, caractérisée par le déclenchement d'un taux élevé de glucocorticoïdes dans le sang. De manière générale, cette réponse hormonale est adaptative et elle a pour but la mobilisation des ressources physiques et cognitives de l'individu pour une action spécifique (Axelrod & Reisine, 1984; Chrousos & Gold, 1992; N. M. Kaplan, 1988; McEwen, 2004). Cependant, lorsque une personne est confrontée très tôt dans son développement, et de manière répétée, à des situations de stress, cette réponse physiologique peut s'altérer, devenir inadaptée (Anand, 1993; Bremner et al., 1995; Meaney et al., 1996; Mirescu, Peters, & Gould, 2004; Plotsky & Meaney, 1993; Sapolsky, 2000) et être associée à des troubles cognitifs (McEwen & Sapolsky, 1995) et émotionnels (McEwen, 2000). A l'âge adulte, le résultat de ces altérations psychoneuroendocriniennes se traduit au cours de l'activation de l'axe HPA et elles sont visibles lors de situations de stress moins intenses (Graham, Heim, Goodman, Miller, & Nemeroff, 1999; Mirescu et al., 2004; Stam, Bruijnzeel, & Wiegant, 2000; A. Taylor, Fisk, & Glover, 2000). La dysregulation de l'axe HPA semble représenter un facteur de vulnérabilité lié à des dysfonctionnements psychiques et physiologiques chez les adultes (Heim, Ehlert, & Hellhammer, 2000; Heim & Nemeroff, 1999; Heim, Newport, Mletzko, Miller, & Hemeroff, 2008). Cependant, des facteurs de protection peuvent influencer à leur tour ces vulnérabilités. La littérature, basée sur des études translationnelles (animaux, humains), converge vers le postulat selon lequel la dimension relationnelle apportée par l'environnement est fondamentale dans le développement des vulnérabilités physiologiques et psychiques du sujet. Dans ce sens, les relations d'attachement ont été particulièrement étudiées. A l'âge adulte, par exemple, la qualité des représentations d'attachement semble influencer directement l'expression de gènes impliqués dans les réponses hormonales de stress (Biagini, Pich, Carani, Marrama, & Agnati, 1998; Caldji, Diorio, & Meaney, 2000; Dallman, 2000; De Kloet, Rosenfeld, Van Eekelen, Sutanto, & Levine, 1988; Rincon-Cortes & Sullivan, 2014; Romeo, Tang, & Sullivan, 2009; van Oers, de Kloet, Whelan, & Levine, 1998), illustrant ainsi une perspective épigénétique. Traumatismes précoces et réponses de stress, leur association avec la santé mentale, l'attachement et l'ocytocine Deux objectifs principaux définissent ce travail de doctorat. Le premier est de comprendre comment un événement à portée traumatique, qui a eu lieu pendant la période périnatale, l'enfance ou l'adolescence, peut s'inscrire au niveau physiologique (axe hypotalamico- hypophysaire-surrénalien - axe HPA), au niveau psychopathologique ou encore au niveau de la régulation émotionnelle au cours de l'âge adulte. A ce propos, nous avons évalué les réponses physiologiques (telles que le Cortisol, l'ACTH et l'ocytocine), la présence de psychopathologies (relatives à l'axe I du DSM-IV) et les réponses émotionnelles (telles que la perception au stress) au cours d'une situation de stress de nature psychosociale, induite en laboratoire. Le deuxième objectif de ce travail est de savoir si les représentations d'attachement peuvent médiatiser ces effets, chez des individus exposés à différents événements à portée traumatique. Dans ce but, trois populations ont été considérées. La première est relative à des jeunes adultes nés grands prématurés ; la deuxième, concerne des femmes adultes ayant vécu un ou plusieurs abus sexuels au cours de leur enfance ou de leur adolescence et enfin la troisième est constituée de personnes adultes qui ont survécu à une maladie grave (cancer) pendant leur enfance ou leur adolescence. Enfin, ces trois populations sont comparées à des groupes contrôle. La prise en considération de différents types de traumatismes a permis de relever : premièrement, qu'un événement à portée traumatique de nature différente, peut influencer de manière semblable les structures neuronales, par exemple l'hypocortisolémie ; deuxièmement, qu'un dysfonctionnement de l'axe HPA n'aboutit pas nécessairement à la présence de signes de souffrance mentale ; enfin, des effets protecteurs ont été mis en évidence. Ces facteurs sont sous-tendus, d'un point de vue psychologique, par les représentations d'attachement et, d'un point de vue physiologique, par la sécrétion d'ocytocjne périphérique. Traumatismes précoces et réponses de stress, leur association avec la santé mentale, l'attachement et l'ocytocine -- When an individual is faced by a stressful situation, one of the most notable responses is the activation of the HPA axis, which is characterized by a heightened level of glucocortisoids in the blood. In general, this is an adaptive hormonal response which prepares the individual both physically and cognitively for a specific action (Axelrod & Reisine, 1984; Chrousos & Gold, 1992; N. M. Kaplan, 1988; McEwen, 2004). However, should a person be confronted to stressful situations very early and repeatedly in their development, this physiologic response may be altered and become maladapted (Anand, 1993; Bremner et al., 1995; Meaney et al., 1996; Mirescu et al., 2004; Plotsky & Meaney, 1993; Sapolsky, 2000) which can be associated to emotional (McEwen, 2000) and cognitive disorders(McEwen & Sapolsky, 1995). Throughout adulthood, the result of these psychoneuroendocrine alterations affects the activation of the HPA axis and are noticeable during less intense stressful situations (Graham et al., 1999; Mirescu et al., 2004; Stam et al., 2000; A. Taylor et al., 2000). HPA axis dysregulation appears to represent a factor of vulnerability linked to psychological and physical disorders in adults (Heim, Ehlert, et al., 2000; Heim & Nemeroff, 1999; Heim, Newport, et al., 2008). Nonetheless, these vulnerabilities may be influenced by further protection factors. The literature, based on translational studies (animals and humans), suggests that relationships formed in the context of the individual's environment are fundamental in the development of their physiological and psychological vulnerabilities. Thus, attachment relationships have been particularly studied. In adulthood, for example, the quality of attachment representations appear to influence directly the expression of genes involved in the hormonal responses to stress (Biagini et al., 1998; Caldji et al., 2000; Dallman, 2000; De Kloet et al., 1988; Rincon-Cortes & Sullivan, 2014; Romeo et al., 2009; van Oers et al., 1998). With the goal to study these dimensions, two principal objectives define these doctoral study. The first is to understand how an event considered to be traumatic, which took place during early infancy, infancy, or adolescence, could influence physiology (HPA axis), psychopathology or emotional regulation during adulthood. Therefore we have evaluated the presence of psychopathologies (relative to axis I of the DSM), physiological responses (such as Cortisol, ACTH and oxytocin) and emotional responses (such as perception of stress) throughout a psychosocial stress situation, conducted in a laboratory setting. The second objective of this study is to understand if attachment representations can mediate these effects, in individuals exposed to three different types of traumatic events. Therefore, three populations have been considered. The first is young adults who were born prematurely; the second concerns adult women who have suffered sexual abuse, on one or more occasions, during their childhood or adolescence; finally the third group is constituted of people who have survived a grave childhood illness. These populations were all compared to control groups. The consideration of different types of traumatic events has demonstrated, firstly, that different events which are considered to be traumatic can similarly influence neuronal structures, for example hypocortisolism. Secondly, that an HPA axis disorder does not necessarily lead to the presence of mental signs of distress, as is the case for those born very prematurely. Finally, protective effects were demonstrated, distinctively from a psychological point of view, by attachment representations and furthermore by peripheral oxytocin secretion from a physiological perspective.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Frequent emergency department (ED) users meet several of the criteria of vulnerability, but this needs to be further examined taking into consideration all vulnerability's different dimensions. This study aimed to characterize frequent ED users and to define risk factors of frequent ED use within a universal health care coverage system, applying a conceptual framework of vulnerability. METHODS: A controlled, cross-sectional study comparing frequent ED users to a control group of non-frequent users was conducted at the Lausanne University Hospital, Switzerland. Frequent users were defined as patients with five or more visits to the ED in the previous 12 months. The two groups were compared using validated scales for each one of the five dimensions of an innovative conceptual framework: socio-demographic characteristics; somatic, mental, and risk-behavior indicators; and use of health care services. Independent t-tests, Wilcoxon rank-sum tests, Pearson's Chi-squared test and Fisher's exact test were used for the comparison. To examine the -related to vulnerability- risk factors for being a frequent ED user, univariate and multivariate logistic regression models were used. RESULTS: We compared 226 frequent users and 173 controls. Frequent users had more vulnerabilities in all five dimensions of the conceptual framework. They were younger, and more often immigrants from low/middle-income countries or unemployed, had more somatic and psychiatric comorbidities, were more often tobacco users, and had more primary care physician (PCP) visits. The most significant frequent ED use risk factors were a history of more than three hospital admissions in the previous 12 months (adj OR:23.2, 95%CI = 9.1-59.2), the absence of a PCP (adj OR:8.4, 95%CI = 2.1-32.7), living less than 5 km from an ED (adj OR:4.4, 95%CI = 2.1-9.0), and household income lower than USD 2,800/month (adj OR:4.3, 95%CI = 2.0-9.2). CONCLUSIONS: Frequent ED users within a universal health coverage system form a highly vulnerable population, when taking into account all five dimensions of a conceptual framework of vulnerability. The predictive factors identified could be useful in the early detection of future frequent users, in order to address their specific needs and decrease vulnerability, a key priority for health care policy makers. Application of the conceptual framework in future research is warranted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We expose the ubiquitous interaction between an information screen and its’ viewers mobile devices, highlights the communication vulnerabilities, suggest mitigation strategies and finally implement these strategies to secure the communication. The screen infers information preferences’ of viewers within its vicinity transparently from their mobile devices over Bluetooth. Backend processing then retrieves up-to-date versions of preferred information from content providers. Retrieved content such as sporting news, weather forecasts, advertisements, stock markets and aviation schedules, are systematically displayed on the screen. To maximise users’ benefit, experience and acceptance, the service is provided with no user interaction at the screen and securely upholding preferences privacy and viewers anonymity. Compelled by the personal nature of mobile devices, their contents privacy, preferences confidentiality, and vulnerabilities imposed by screen, the service’s security is fortified. Fortification is predominantly through efficient cryptographic algorithms inspired by elliptic curves cryptosystems, access control and anonymity mechanisms. These mechanisms are demonstrated to attain set objectives within reasonable performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

[cat] En un context de canvi climàtic cal estudiar les vulnerabilitats del territori a escala local. En aquest treball s'analitza la producció d'oli de qualitat en un indret de la Catalunya seca, Cabacés (el Priorat), i es posa en relació amb la variabilitat climàtica. Els resultats mostren que el clima té una influència important en la producció d'olives, sobretot les temperatures màximes del mes d'abril i les precipitacions del mes més sec, juliol. S'obté un model de regressió múltiple a partir d'aquestes dues variables climàtiques més influents en la producció. No obstant això, els valors del model s'allunyen dels reals a partir de l'any 2003 a causa d'un creixement molt elevat de la producció per l'extensió del reg de suport. Les futures vulnerabilitats no només depenen del canvi climàtic, sinó dels efectes del canvi global, fenomen que també engloba tots aquells canvis en els usos, hàbits i consums del territori.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ydinvoimateollisuudessa irtokappaleella tarkoitetaan prosessiin kuulumatonta materiaalia, joka ei luonnostaan kuulu prosessiin ja jolla prosessiin jäädessään voi olla haitallinen vaikutus sen toimintaan, komponentteihin tai kemiaan. Irtokappaleet voivat aiheuttaa monenlaisia haittoja ydinvoimalaitoksen turvalliselle ja taloudelliselle käytölle. Vaikka ydinvoimalaitoksen käytössä turvallisuus on aina etusijalla, negatiiviset vaikutukset turvallisuuteen heijastuvat usein myös talouteen. Diplomityössä arvioitiin erilaisia irtokappaleiden aiheuttamia riskejä ydinvoimalan toiminnalle käyttötapahtumia analysoimalla. Erilaisiin tapahtumiin, niiden aiheuttajiin ja vaikutusmekanismeihin tutustumisen jälkeen tutkittiin Loviisan voimalaitoksen käyttämiä toimintatapoja irtokappaleiden hallitsemiseksi. Irtokappaleiden hallintaan pyritään sekä hallinnollisilla että käytännön menetelmillä. Hallinnollisia menetelmiä ovat esimerkiksi ohjeistojärjestelmä ja johtaminen, käytännön menettelytapoja esimerkiksi työtavat ja koulutus. Irtokappaleiden hallinnan menetelmiin tutustuttiin sekä tehoajolla että vuosihuollon aikana. Nykytilan arvioinnin perusteella esitettiin toimenpide-ehdotuksia irtokappaleiden hallinnan kehittämiseksi. Toimenpide-ehdotukset muodostettiin sekä korjaamaan havaittuja haavoittuvuuksia että kehittämään toimintaa kansainvälisesti hyviksi tunnistettujen käytäntöjen mukaisiksi.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Prostate cancers form a heterogeneous group of diseases and there is a need for novel biomarkers, and for more efficient and targeted methods of treatment. In this thesis, the potential of microarray data, RNA interference (RNAi) and compound screens were utilized in order to identify novel biomarkers, drug targets and drugs for future personalized prostate cancer therapeutics. First, a bioinformatic mRNA expression analysis covering 9873 human tissue and cell samples, including 349 prostate cancer and 147 normal prostate samples, was used to distinguish in silico prevalidated putative prostate cancer biomarkers and drug targets. Second, RNAi based high-throughput (HT) functional profiling of 295 prostate and prostate cancer tissue specific genes was performed in cultured prostate cancer cells. Third, a HT compound screen approach using a library of 4910 drugs and drug-like molecules was exploited to identify potential drugs inhibiting prostate cancer cell growth. Nine candidate drug targets, with biomarker potential, and one cancer selective compound were validated in vitro and in vivo. In addition to androgen receptor (AR) signaling, endoplasmic reticulum (ER) function, arachidonic acid (AA) pathway, redox homeostasis and mitosis were identified as vital processes in prostate cancer cells. ERG oncogene positive cancer cells exhibited sensitivity to induction of oxidative and ER stress, whereas advanced and castrate-resistant prostate cancer (CRPC) could be potentially targeted through AR signaling and mitosis. In conclusion, this thesis illustrates the power of systems biological data analysis in the discovery of potential vulnerabilities present in prostate cancer cells, as well as novel options for personalized cancer management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Supply chain risk management has emerged as an increasingly important issue in logistics as disruptions in the supply chain have become critical issues for many companies. The scientific literature on the subject is developing and in many respects the understanding of it is still in its infancy. Thus, there is a need for more information in order for scholars and practitioners to understand the causalities and interrelations that characterise the phenomenon. The aim of this dissertation is to narrow this gap by exploring key aspects of supply chain risk management through two maritime supply chains in the immediate region of the Gulf of Finland. The study contributes to the field in three different ways. Firstly, it facilitates the identification of risks on different levels of the supply chain through a systematic analysis of the processes and actors, and of the cognitive barriers that limit the actors’ visibility and their understanding of the operations and the risks involved. There is a clear need to increase collaboration and information exchange in order to improve visibility in the chain. Risk management should be a collaborative effort among the individual actors, aimed at obtaining a holistic picture. Secondly, the study contributes to the literature on risk analysis through the use of systemic frameworks that illustrate the causalities and linkages in the system, thereby making it easier to perceive the vulnerabilities. Thirdly, the study enhances current knowledge of risk control in identifying actor roles, risk visibility and risk controllability as being among the key factors determining risk-management effectiveness against supply-chain vulnerability. This dissertation is divided into two parts. The first part gives a general overview of the relevant literature, the research design and the conclusions of the study, and the second part comprises six research publications. Case-study methodology with systematic combining approach is used, where in-depth interviews, questionnaires and expert panel sessions are the main data collection methods. The study illustrates the current state of risk management in multimodal maritime supply chains, and develops frameworks for further analysis. The results imply that there are major differences between organizations in their ability to execute supply chain risk management. Further collaboration should be considered in order to facilitate the development of systematic and effective management processes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Personalised ubiquitous services have rapidly proliferated due technological advancements in sensing, ubiquitous and mobile computing. Evolving societal trends, business and the economic potential of Personal Information (PI) have overlapped the service niches. At the same time, the societal thirst for more personalised services has increased and are met by soliciting deeper and more privacy invasive PI from customers. Consequentially, reinforcing traditional privacy challenges and unearthed new risks that render classical safeguards ine ective. The absence of solutions to criticise personalised ubiquitous services from privacy perspectives, aggravates the situation. This thesis presents a solution permitting users' PI, stored in their mobile terminals to be disclosed to services in privacy preserving manner for personalisation needs. The approach termed, Mobile Electronic Personality Version 2 (ME2.0), is compared to alternative mechanisms. Within ME2.0, PI handling vulnerabilities of ubiquitous services are identi ed and sensitised on their practices and privacy implications. Vulnerability where PI may leak through covert solicits, excessive acquisitions and legitimate data re-purposing to erode users privacy are also considered. In this thesis, the design, components, internal structures, architectures, scenarios and evaluations of ME2.0 are detailed. The design addresses implications and challenges leveraged by mobile terminals. ME2.0 components and internal structures discusses the functions related to how PI pieces are stored and handled by terminals and services. The architecture focusses on di erent components and their exchanges with services. Scenarios where ME2.0 is used are presented from di erent environment views, before evaluating for performance, privacy and usability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ongoing global financial crisis has demonstrated the importance of a systemwide, or macroprudential, approach to safeguarding financial stability. An essential part of macroprudential oversight concerns the tasks of early identification and assessment of risks and vulnerabilities that eventually may lead to a systemic financial crisis. Thriving tools are crucial as they allow early policy actions to decrease or prevent further build-up of risks or to otherwise enhance the shock absorption capacity of the financial system. In the literature, three types of systemic risk can be identified: i ) build-up of widespread imbalances, ii ) exogenous aggregate shocks, and iii ) contagion. Accordingly, the systemic risks are matched by three categories of analytical methods for decision support: i ) early-warning, ii ) macro stress-testing, and iii ) contagion models. Stimulated by the prolonged global financial crisis, today's toolbox of analytical methods includes a wide range of innovative solutions to the two tasks of risk identification and risk assessment. Yet, the literature lacks a focus on the task of risk communication. This thesis discusses macroprudential oversight from the viewpoint of all three tasks: Within analytical tools for risk identification and risk assessment, the focus concerns a tight integration of means for risk communication. Data and dimension reduction methods, and their combinations, hold promise for representing multivariate data structures in easily understandable formats. The overall task of this thesis is to represent high-dimensional data concerning financial entities on lowdimensional displays. The low-dimensional representations have two subtasks: i ) to function as a display for individual data concerning entities and their time series, and ii ) to use the display as a basis to which additional information can be linked. The final nuance of the task is, however, set by the needs of the domain, data and methods. The following ve questions comprise subsequent steps addressed in the process of this thesis: 1. What are the needs for macroprudential oversight? 2. What form do macroprudential data take? 3. Which data and dimension reduction methods hold most promise for the task? 4. How should the methods be extended and enhanced for the task? 5. How should the methods and their extensions be applied to the task? Based upon the Self-Organizing Map (SOM), this thesis not only creates the Self-Organizing Financial Stability Map (SOFSM), but also lays out a general framework for mapping the state of financial stability. This thesis also introduces three extensions to the standard SOM for enhancing the visualization and extraction of information: i ) fuzzifications, ii ) transition probabilities, and iii ) network analysis. Thus, the SOFSM functions as a display for risk identification, on top of which risk assessments can be illustrated. In addition, this thesis puts forward the Self-Organizing Time Map (SOTM) to provide means for visual dynamic clustering, which in the context of macroprudential oversight concerns the identification of cross-sectional changes in risks and vulnerabilities over time. Rather than automated analysis, the aim of visual means for identifying and assessing risks is to support disciplined and structured judgmental analysis based upon policymakers' experience and domain intelligence, as well as external risk communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this dissertation is to develop a theory on intercultural caring to deepen the understanding of caring between nurses and patients who have different cultural backgrounds. The research questions are: 1) What is intercultural caring? 2) How is intercultural caring described and understood? 3) How is intercultural caring described and understood in a maternity care context from the patients’ perspective? 4) What is the substance in a theory on intercultural caring? 5) What is the substance in a theory on intercultural caring in maternity care from the patients’ perspective? The theoretical perspective is based on caritative theory and the caring science-tradition (Eriksson, 2001, 2002) and has a hermeneutic approach. In the first study, 19 texts of Campinha-Bacote, Kim-Godwin, Leininger and Ray are analysed through content analysis. A model for intercultural caring is then created abductively. The second study is a metasynthesis of 40 studies on intercultural caring in maternity care research. The third study is a focused ethnography, in which 17 immigrant mothers are interviewed and observed. The theory on intercultural caring is created through a hermeneutic synthesis of the three studies. A synthesis of the studies with a maternity context results in five patterns of interpretation: the experience of caring is related to power; the family is always present; childbearing and change of culture can give women multiple vulnerabilities; both the mother and the nurse change when they meet; conflicts can cause change. The theory and patterns of interpretation consolidate into a contextual theory on intercultural caring for clinical maternity praxis. In this theory, caring consists of four dimensions: universal, cultural, contextual, and unique caring, which permeate each other. Universal caring is nondependent of time and space. Cultural caring considers the cultural background, the acculturation and the equality of each mother. In the maternity care culture, cultural competence, cultural safety, and acculturation of the nurse are emphasised. Contextual caring considers the specific cultural features of the childbearing mother. In this respect, the nurse is expected to be an expert and to clarify cultural assumptions in maternity care. In unique caring, the mother expects good communication, respect for the family, goodwill and somebody who cares for her and meets her needs, in order for trust to be built. In this respect, the nurse listens to the woman’s narrative, is flexible, open, courageous, and non-judgemental. The nurse shows an understanding for the life situation of the woman, and strives for continuity to preserve the care relationship. It was found that external circumstances affect intercultural caring. Moreover, intercultural caring is expected to decrease misunderstandings and conflicts, alleviate suffering and promote health and life. The theory adds knowledge to the phenomenon of intercultural caring for the nursing and caring sciences, and for the nursing care of patients with other cultural backgrounds than the nurses. The theory can be used in nursing, education, research and administration.