302 resultados para Vulnerabilities


Relevância:

20.00% 20.00%

Publicador:

Resumo:

ABSTRACT OBJECTIVE To describe elements of vulnerability of victims of snakebite. METHODS This qualitative, descriptive, cross-sectional study had, as theoretical framework, the concept of vulnerability in individual, social, and programmatic dimensions. We interviewed 21 patients admitted into a hospital specialized in the care of accidents caused by venomous animals. The interviews were analyzed according to a discourse analysis technique. RESULTS Patients were mainly young men, living in remote countryside areas, where health services frequently have limited resources. We found social and individual conditions of vulnerability, such as precarious schooling, low professional qualification, housing without access to piped water, no sewage treated, and no regular garbage collection, and lack of knowledge on this health problem. Regarding the programmatic dimension, we found limited accessibility to the health services that could affect the prognosis and the frequency of sequelae and deaths. CONCLUSIONS Considering such vulnerabilities evoke the need to improve the program for control the Accidents by Venomous Animals and the training of health workers, we highlight the potential use of the concept of vulnerability, which may amplify the understanding and the recommendations for the practice and education related to snakebites.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

OBJECTIVE To identify vulnerabilities of elderly people with HIV/AIDS and the trajectory that they follow until reaching the diagnosis of the disease. METHOD Qualitative research conducted in specialized clinics in the state of São Paulo, from January to June 2011. Semi-structured interviews were conducted with 11 elderly people who were found to be infected with the virus at the age of 60 years or older. The interviews were analyzed using content analysis. RESULTS In this process four categories emerged, then analyzed with reference to the theoretical framework of vulnerability. CONCLUSION Late diagnosis of HIV infection or AIDS among the elderly happens in the secondary or tertiary service. Issues related to sexual life of the elderly are only questioned by health professionals after the diagnosis, also the time that condom use becomes absolute. It is believed that the investigation of the vulnerability of the elderly to HIV/AIDS allows for carrying out appropriate interventions for this population.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint sensor when confronted with fake fingerprints. The study has not been focused on the decision outcome of the biometric device, but essentially on the scores obtained following the comparison between a query (genuine or fake) and a template using an AFIS system. To do this, fake fingerprints of 12 subjects have been produced with and without their cooperation. These fake fingerprints have been used alongside with real fingers. The study led to three major observations: First, genuine fingerprints produced scores higher than fake fingers (translating a closer proximity) and this tendency is observed considering each subject separately. Second, scores are however not sufficient as a single measure to differentiate these samples (fake from genuine) given the variation due to the donors themselves. That explains why fingerprint readers without vitality detection can be fooled. Third, production methods and subjects greatly influence the scores obtained for fake fingerprints.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint sensor when confronted with fake fingerprints. The study has not been focused on the decision outcome of the biometric device, but essentially on the scores obtained following the comparison between a query (genuine or fake) and a template using an AFIS system. To do this, fake fingerprints of 12 subjects have been produced with and without their cooperation. These fake fingerprints have been used alongside with real fingers. The study led to three major observations: First, genuine fingerprints produced scores higher than fake fingers (translating a closer proximity) and this tendency is observed considering each subject separately. Second, scores are however not sufficient as a single measure to differentiate these samples (fake from genuine) given the variation due to the donors themselves. That explains why fingerprint readers without vitality detection can be fooled. Third, production methods and subjects greatly influence the scores obtained for fake fingerprints.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Maritime transports are very essential for Finland as over 80% of the foreign trade in the country is seaborne and possibilities to carry out these transports by are limited. Any disruption in maritime transports has negative consequences to many sectors in the Finnish economy. Maritime transport thus represents critical infrastructure for Finland. This report focuses on the importance of maritime transports on security of supply in Finland and for the so called critical industries in particular. The report summarizes the results of the Work Package 2 of the research project STOCA – “Study of cargo flows in the Gulf of Finland in emergency situations”. The aim of the research was to analyze the cargo flows and infrastructure that are vital for maintaining security of supply in Finland, as well as the consequences of disruptions in the maritime traffic for the Finnish critical industries and for the Finnish society. In the report we give a presentation of the infrastructure and transport routes which are critical for maintaining security of supply in Finland. We discuss import dependency of the critical industries, and the importance of the Gulf of Finland ports for Finland. We assess vulnerabilities associated with the critical material flows of the critical industries, and possibilities for alternative routings in case either one or several of the ports in Finland would be closed. As a concrete example of a transport disruption we analyze the consequences of the Finnish stevedore strike at public ports (4.3.–19.3.2010). The strike stopped approximately 80% of the Finnish foreign trade. As a result of the strike Finnish companies could not export their products and/or import raw materials, components and spare parts, or other essential supplies. We carried out personal interviews with representatives of the companies in Finnish critical industries to find out about the problems caused by the strike, how companies carried out they transports and how they managed to continue their operations during the strike. Discussions with the representatives of the companies gave us very practical insights about companies’ preparedness towards transport disruptions in general. Companies in the modern world are very vulnerable to transport disruptions because companies regardless of industries have tried to improve their performance by optimizing their resources and e.g. by reducing their inventory levels. At the same time they have become more and more dependent on continuous transports. Most companies involved in foreign trade have global operations and global supply chains, so any disruption anywhere in the world can have an impact on the operations of the company causing considerable financial loss. The volcanic eruption in Iceland in April 2010 stopping air traffic in the whole Northern Europe and most recently the earth quake causing a tsunami in Japan in March 2011 are examples of severe disruptions causing considerable negative impacts to companies’ supply chains. Even though the Finnish stevedore strike was a minor disruption compared to the natural catastrophes mentioned above, it showed the companies’ vulnerability to transport disruptions very concretely. The Finnish stevedore strike gave a concrete learning experience of the importance of preventive planning for all Finnish companies: it made them re-think their practical preparedness towards transport risks and how they can continue with their daily operations despite the problems. Many companies realized they need to adapt their long-term countermeasures against transport disruptions. During the strike companies did various actions to secure their supply chains. The companies raised their inventory levels before the strike began, they re-scheduled or postponed their deliveries, shifted customer orders between production plants among their company’s production network or in the extreme case bought finished products from their competitor to fulfil their customers’ order. Our results also show that possibilities to prepare against transport disruptions differ between industries. The Finnish society as a whole is very dependent on imports of energy, various raw materials and other supplies needed by the different industries. For many of the Finnish companies in the export industries and e.g. in energy production maritime transport is the only transport mode the companies can use due to large volumes of materials transported or due to other characteristics of the goods. Therefore maritime transport cannot be replaced by any other transport mode. In addition, a significant amount of transports are concentrated in certain ports. From a security of supply perspective attention should be paid to finding ways to decrease import dependency and ensuring that companies in the critical industries can ensure the continuity of their operations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increase of computational power and emergence of new computer technologies led to popularity of local communications between personal trusted devices. By-turn, it led to emergence of security problems related to user data utilized in such communications. One of the main aspects of the data security assurance is security of software operating on mobile devices. The aim of this work was to analyze security threats to PeerHood, software intended for performing personal communications between mobile devices regardless of underlying network technologies. To reach this goal, risk-based software security testing was performed. The results of the testing showed that the project has several security vulnerabilities. So PeerHood cannot be considered as a secure software. The analysis made in the work is the first step towards the further implementation of PeerHood security mechanisms, as well as taking into account security in the development process of this project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nicaragua is making progress towards the Millennium Development Goals, but is set to miss a number of targets in 2015. This paper’s general equilibrium analysis shows that it is unfeasible for the government to step up spending in order to meet these targets by the 2015 deadline. Any boost to public spending and financing would have to be front-loaded, which would entail pernicious macroeconomic trade-offs. A more realistic scenario would be to postpone meeting the goals until 2020. In that case, the allocation of public spending would spur economic growth without causing macroeconomic hardships, although the country would nevertheless remain highly vulnerable to external shocks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: To identify vulnerabilities of elderly people with HIV/AIDS and the trajectory that they follow until reaching the diagnosis of the disease. Method: Qualitative research conducted in specialized clinics in the state of Sao Paulo, from January to June 2011. Semi-structured interviews were conducted with 11 elderly people who were found to be infected with the virus at the age of 60 years or older. The interviews were analyzed using content analysis. Results: In this process four categories emerged, then analyzed with reference to the theoretical framework of vulnerability. Conclusion: Late diagnosis of HIV infection or AIDS among the elderly happens in the secondary or tertiary service. Issues related to sexual life of the elderly are only questioned by health professionals after the diagnosis, also the time that condom use becomes absolute. It is believed that the investigation of the vulnerability of the elderly to HIV/AIDS allows for carrying out appropriate interventions for this population.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Given the increased awareness and attention to human trafficking, including the establishment of federal laws and policies, federally funded task forces that provide law enforcement responses, and specialized victim services, it is important to assess the impact of these procedures and services on survivors/victims of international human trafficking and their immigrant children. By federal definition, certified victims of international human trafficking are eligible for all services provided to refugees in this country, including reunification with their minor children. This research is based on a qualitative study conducted in Austin and Houston, Texas with human trafficking victims/survivors. The project’s goal was to gain an understanding of the needs of human trafficking survivors after their rescue, their overall integration into American life, and the subsequent needs of their immigrant children after reunification. The project objectives examined the factors that either promote or hinder self-sufficiency, the determination of social service needs, and policy and practice recommendations to strengthen survivors, their children and their families living both locally and abroad. For this project, nine (n = 9) in-depth interviews were conducted with adult foreign-born victims of human trafficking. Researchers gathered data using a semi-structured questionnaire that queried about factors that promote or hinder victims’ services and needs. Interviews were conducted in participants’ homes using bilingual research staff and/or trained interpreters, were digitally-recorded, and subsequently transcribed. Participation in this study was completely voluntary. Specific steps were taken to ensure that the participants’ identities were protected. Open coding of data was utilized and the data were subsequently organized or grouped into properties and later developed into contextual themes around the research questions. The findings are grounded with the use of direct quotes from participants. As a result of progressive U.S. policy, many victims of human trafficking are being reunited with their minor children. Immigrant children are one of the largest and fastest growing populations in the U.S. and for a variety of reasons are vulnerable to exploitation. Research also indicates that victims of trafficking are identified by traffickers because of their perceived “vulnerabilities” or lack of opportunities (Clark, 2003). Therefore, it is important that practices and policies are developed to address the unique needs of these families with an eye toward positive outcomes for parent and child safety and well-being. Social service providers are provided a toolkit that may be utilized before and during the reunification period.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A commentary on Busch-Armendariz, Nsonwu, and Heffron’s article, “Human Trafficking Victims and Their Children: Assessing Needs, Vulnerabilities, Strengths, and Survivorship,” noting key findings and calling for further research.