نتایج جستجو برای: vulnerability risk
تعداد نتایج: 976669 فیلتر نتایج به سال:
BACKGROUND A prospective study, covering just over a 1-year period, sought to confirm an earlier finding that around 40% of women who experience a severe life event in the presence of two ongoing psychosocial vulnerability factors, (negative close relationships and low self-esteem) will develop a major depressive episode. Distal risk factors were examined to see if they improved prediction. M...
The COVID-19 pandemic has changed the lives of people worldwide. Considering that no specific pharmaceutical treatment exists for this disease, the best way to deal with it is through prevention. However, many people in the community do not implement preventive behaviors. It is necessary to pay attention to the effective psychological and social factors of preventive behaviors. The present stud...
The work group on cardiovascular and endocrine effects was asked to review the current state of knowledge about children's windows of vulnerability to developmental toxicants and to recommend how that information may be used to improve risk assessment and public health. We considered differences between structural defects, where periods of vulnerability are rather well defined, and functional d...
As a disaster prone country, Bangladesh is regularly hit by natural hazards, including devastating cyclones, such as in 1970, 1991 and 2007. Although the number of cyclones' fatalities reduced from 0.3 million in 1970 to a few thousand or fewer in recent events, loss of lives and impact on livelihoods remains a concern. It depends on the meteorological characteristics of cyclone and the general...
Resolving vulnerability identification errors using security requirements on business process models
Purpose – In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors – wrongly identified or unidentified vulnerabilities – can occur as uncertain data are used. Furthermore, businesses’ security needs are not considered sufficiently. Hence, security functions may not protect business asse...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید