These factors and conditions should be considered on the level of state and local regulations to reduce and address vulnerability.doi:10.1186/s12910-023-00910-3Faissner, MirjamRuhr Univ BochumWerning, AnnaRuhr Univ BochumWinkelkoetter, MichaelFoullois, HolgerLoehr, MichaelGather, Jakov...
A major attention is paid to self- esteem in predispositional or vulnerability models of de- pression. ... G Richter 被引量: 0发表: 0年 Willingness to communicate: A cognitive view. The associations are examined of WTC with the predispositional factors of introversion, self-esteem, COM ...
A PB score is calculated by dividing the number of personal attributions by the sum of both personal and situational attributions for negative events. A PB score greater than 0.5 represents a tendency to blame others rather than situational factors for negative events. Kinderman and Bentall (...
The complexity of these equipment needs can also make it a point of vulnerability. At its core, cyberspace is data that are manipulated in a manner that gives it an illusion of logical objects in cyberspace. Compared to physical objects, data can also be created and transformed easily. For ...
We place our training emphasis on teaching every day people from all walks of life to identify and reduce personal vulnerability factors and identify and enhance personal protective factors within themselves. Equipped with this knowledge, individuals become empowered to independently minimize their risk ...
2 University of Ibadan ABSTRACTKnowledge of factors associated with school absenteeism among orphans and vulnerable children (OVC) who are at greater risk could facilitate effective policies to mitigate school dropouts. This study assessed the level of school absenteeism and its associated factors among ...
Objective Building a successful combination prevention program requires understanding the community's local epidemiological profile, the social community norms that shape vulnerability to HIV and access to care, and the available community resources. We carried out a situational analysis in order to shape...
The program utilized a multidisciplinary, integrated, and goal-orientated approach focused at the early screening of risk factors for functional decline and the provision of a patient-orientated reactivation program [37]. Hospital B, that participated with the units of internal medicine, respiratory ...
We narrate and describe the methods which have been designed to support cyber situational awareness in the context of smart cities. To this end, we consider three groups of methods: (i) interdependency models, (ii) risk and vulnerability assessment, and (iii) attack detection. ...
This ability to discover vulnerability paths between alerts is especially important because often only portions of overall adversary activities are alerted. In this way, CyGraph addresses the problem of missing alerts and extrapolates observed attacker presence to trace attack origins and next possible st...