• No results found

Structural Vulnerability

The Eurozone Crisis: Institutional Setting, Structural Vulnerability, and Policies

The Eurozone Crisis: Institutional Setting, Structural Vulnerability, and Policies

... To date the institutional framework of the EZ has been focused on monetary integration and common fiscal parameters, leaving to loosely coordinated national initiatives banking and finance regulation as well as ...

32

Transmission Linked to Structural Vulnerability: How Low-Income Countries Endured the Great Recession

Transmission Linked to Structural Vulnerability: How Low-Income Countries Endured the Great Recession

... Using development theory, it then reviews the interrelated structural vulnerabilities of many LICs that helped determine the severity of the transmission, including narrow exports that[r] ...

114

Susceptibility versus resilience to mountain hazards in Austria - paradigms of vulnerability revisited

Susceptibility versus resilience to mountain hazards in Austria - paradigms of vulnerability revisited

... of vulnerability presented in the previous sections have different roots, different scien- tific objects, and therefore different informative ...of vulnerability in natural sciences, a functional re- lation ...

16

Measuring Structural Economic Vulnerability in Africa: A contribution to the Handbook of Africa and Economics

Measuring Structural Economic Vulnerability in Africa: A contribution to the Handbook of Africa and Economics

... country vulnerability: the size of exogenous shocks ; the country’s exposure to those shocks ...resilience. Structural vulnerability mainly results from the size of the shocks and the country’s ...

21

Deriving damage indices for concrete girder bridges subjected to flood loading

Deriving damage indices for concrete girder bridges subjected to flood loading

... critical flood velocity to satisfy this condition could be read from the above structural vulnerability curve. For the bridge considered in this case study, the critical flood velocity is read as 2.75 m/s. ...

7

Developing fragility functions for the areas affected by the 2009 Samoa earthquake and tsunami

Developing fragility functions for the areas affected by the 2009 Samoa earthquake and tsunami

... ate structural vulnerability in the areas affected by the 2009 Samoa earthquake and ...the vulnerability of a coastal region in American Samoa characterized by steep ter- rains and ria ...

11

Vulnerability Assessment: The Role of Coastal Informal Settlement Growth to Social Vulnerability in Genuk Sub-District, Semarang City

Vulnerability Assessment: The Role of Coastal Informal Settlement Growth to Social Vulnerability in Genuk Sub-District, Semarang City

... of vulnerability; there are even more than ten definitions mostly debated in the ...of vulnerability into 18 definitions according to the scientists’ proposed ...on vulnerability terminology began in ...

13

A Novel Framework for Security Requirement Prioritization

A Novel Framework for Security Requirement Prioritization

... Octave model [32] made the organizations understand, assess and address their information security risks from the organization’s point of view. The analysis team had been formed of the people from operational, business ...

6

Lab_6_BufferOverflow.pdf

Lab_6_BufferOverflow.pdf

... Exploit Integer Overflow vulnerability in order to buy the iPhone for free.. Try to fix or mitigate the vulnerability..[r] ...

21

1696 0 cyberissue2002 20 pdf

1696 0 cyberissue2002 20 pdf

... potential vulnerability/impact, identified patches/workarounds/alerts, common name of the vulnerability, potential risk, and an indication of whether attacks have utilized this vulnerability or an ...

44

Vulnerability handling DK-CERT

Vulnerability handling DK-CERT

... Vulnerability database Customer Customer Vulnerability Service (database) Vulnerability Service (database) UNIX, Linux, other OS UNIX, Linux, other OS Microsoft Microsoft NIST, [r] ...

28

Modeling the Specific Seismic Risk Considering the Weight of Determining Variables

Modeling the Specific Seismic Risk Considering the Weight of Determining Variables

... Geological risks are events or circumstances that occur in the geological environment and can cause damage or harm to communities or infrastructure that are occupying a territory vulnerable areas [1]. According to Galbán ...

11

Mesopredator trophodynamics on thermally stressed coral reefs

Mesopredator trophodynamics on thermally stressed coral reefs

... Ann N Y Acad Sci 1162:136–186 Rogers A, Blanchard JL, Mumby PJ 2014 Vulnerability of coral reef fisheries to a loss of structural complexity.. Shpigel M, Fishelson L 1989 Food habits and[r] ...

27

Assessment of Physical Vulnerability in Santo Domingo De Heredia, Costa Rica, Central America

Assessment of Physical Vulnerability in Santo Domingo De Heredia, Costa Rica, Central America

... Physical Vulnerability in Santo Domingo, in order that work to minimize such risk factor can begin and most importantly, to protect the vulnerable from the impact of the ...

7

Non-structural and Functional Vulnerability of Rehabilitation Centers of Tehran Welfare Organization in Disaster

Non-structural and Functional Vulnerability of Rehabilitation Centers of Tehran Welfare Organization in Disaster

... In another study performed in 14 hospitals in North- ridge of California, electricity disconnection was the main cause of patients discharge in 14 hospitals. This study result was inconsistent with our study results, too ...

8

Smart home appliance security and malware

Smart home appliance security and malware

... Vulnerability #1: Weak authentication design Vulnerability #2: Weak MAC authentication Vulnerability #3: NULL MAC authentication Vulnerability #4: iPhone MAC authentication Installing a[r] ...

45

Structural neuroimaging differentiates vulnerability from disease manifestation in Colombian families with Huntington's disease

Structural neuroimaging differentiates vulnerability from disease manifestation in Colombian families with Huntington's disease

... differentiates vulnerability versus overt HD, and their asso- ciation with cognitive, functional, and behavioral indicators in HD patients and their first-degree ...

13

Vulnerability Assessment of Landscapes of the Kaliningrad Oblast for Environmental Management and Spatial Planning Optimization

Vulnerability Assessment of Landscapes of the Kaliningrad Oblast for Environmental Management and Spatial Planning Optimization

... The first stage in the development of the said methodology centered around two cognate terms, sensitivity and sustainability. While the concepts share similar features in describing structural characteristics of ...

7

Fear and Cheating in Atlanta: Evidence for the Vulnerability Thesis

Fear and Cheating in Atlanta: Evidence for the Vulnerability Thesis

... Callahan’s insistent question, “Why, why did they do it?” is one of the questions asked and addressed in the Bowers et al. (2011) report on test-tampering (cheating) in Atlanta Public Schools. The investigative report ...

12

The Effects of Extreme Media on Political Behavior, Attitudes, and Media Selection

The Effects of Extreme Media on Political Behavior, Attitudes, and Media Selection

... early vulnerability hypothesis, and given the theoretical and empirical evidence for an early cognitive vulnerability to radiation treatment, it is hypothesized that younger age at diagnosis of brain tumor ...

45

Show all 10000 documents...

Related subjects