Spelling suggestions: "subject:"vulnerability anda risk"" "subject:"vulnerability ando risk""
1 |
Modeling of vulnerability, reliability and risk for route choice in urban freight transport / Modelagem da vulnerabilidade, confiabilidade e risco para escolha de rota no transporte urbano de cargaGeorge Vasconcelos Goes 06 April 2015 (has links)
CoordenaÃÃo de AperfeÃoamento de Pessoal de NÃvel Superior / The problems of urban mobility are related, among others, the spatial distribution of activities, the significant growth of automobile use, associated with a poor public transport system, and the occurrence of negative impacts caused by load handling activities in densely populated
areas. The population concentration in cities gives urban centers the role of consumption nuclei, which must be supplied continuously from streams of very different nature and origin. To estimate the reliability, risk and vulnerability associated with the route chosen from several
points of origin and destination can represent change in decision making. As the cost incurred on a route to greater risk, greater variability in travel time, or more vulnerable to incidents exceed the projected cost of a route optimized by time (based on the shortest path), such a
decision can be reviewed. The general objective of this study was to represent the generalized cost, incorporating the concept of vulnerability, reliability and risk of urban road network for decision making regarding the choice of route for cargo transportation. Thus, we developed a
method for modeling the generalized cost that incorporates the three attributes in different supply scenarios. The experiment showed the existence of trade-off (conflicting choice)between the average time variables trip, reliability / risk and the generalized cost. Only the information of time and cost of travel are not sufficient to meet the conditions of delivery of merchandise. For the driver, holds the knowledge of the reliability or the risk of delivery of the goods can be a strategic pillar cost reduction or the medium and long-term market gains. / Os problemas de mobilidade urbana estÃo relacionados, dentre outros, à distribuiÃÃo espacial das atividades, ao crescimento expressivo do uso do automÃvel, associado a um sistema deficiente de transporte pÃblico, e à ocorrÃncia de impactos negativos provocados pelas atividades de movimentaÃÃo de cargas nas Ãreas adensadas. A concentraÃÃo populacional nas
cidades confere aos centros urbanos papel de nÃcleos de consumo, que devem ser abastecidos continuamente a partir de fluxos de natureza e origem muito diversas. Estimar a confiabilidade, o risco e a vulnerabilidade associados à rota escolhida entre diversos pontos de origem e destino pode representar mudanÃa na tomada de decisÃo. Conforme o custo incorrido em uma rota de maior risco, maior variabilidade no tempo de viagem, ou mais vulnerÃvel à incidentes, supere o custo projetado de uma rota de otimizada pelo tempo (baseada no caminho mÃnimo), tal decisÃo pode ser reavaliada. O objetivo geral do presente trabalho fora representar o custo generalizado, incorporando o conceito da vulnerabilidade, da confiabilidade e do risco de uma rede viÃria urbana para tomada de decisÃo quanto à escolha de rota no transporte de carga. Para isso, desenvolveu-se um mÃtodo para modelagem do custo generalizado que incorpore os trÃs atributos em cenÃrios distintos de abastecimento. O experimento evidenciou a existÃncia de trade-off (escolha conflitante) entre as variÃveis de tempo mÃdio de viagem, confiabilidade/risco e o custo generalizado. Apenas as informaÃÃes de tempo e custo da viagem
nÃo sÃo suficientes para suprir as condiÃÃes de entrega da mercadoria. Para o transportador, deter o conhecimento da confiabilidade, ou do risco, da entrega da mercadoria pode ser um pilar estratÃgico de reduÃÃo de custos ou de ganho de mercado à mÃdio e longo prazo.
|
2 |
Vulnerability and abuse : an exploration of views of care staff working with people who have learning disabilitiesParley, Fiona Forbes January 2007 (has links)
In recent years there has been increased focus on vulnerability and abuse however greater attention has been paid to this in relation to children, elders and in domestic situations. Within learning disability service there has been increasing attention on physical and sexual abuse as well as attention being given to abuse as it is perceived by people with learning disabilities. The aim of this study was to explore the views of staff working within learning disability services regarding their views of vulnerability and abuse. A phenomenological approach was adopted, as this is a subject about which little is known and the lived experiences of care staff and the meanings that they attach to them were being explored. Semi-structured interview was the chosen method for data collection. Twenty informants shared their views in this study. The data generated were themed and the findings were presented in two different but complementary styles: case studies and themes representative across the entire sample. This research has highlighted a number of important issues. There is considerable difference in the meanings given to vulnerability by care staff and the range of meanings are further complicated when notions of risk are considered. A model is presented that illustrates experiences of vulnerability and confidence of the individual the impact of various experiences on those states. For example negative experience of bullying might increase vulnerability whilst positive family support might engender feelings of confidence. The study showed that staff are more influenced by personal and family values than by policy. Though this study focused on adult protection policy it was evident that this also applied in the case of other policy. The strong influence of personal values pervades all aspects of care. This was evident in the views of informants regarding abuse. Abuse is considered to range in severity from bullying, which is seen as prevalent but to an extent unpreventable, to sexual abuse which is considered by most to be taboo. Neglect and infringement of rights were in the main not seen as abuse with both being attributed to ignorance. Power, authority and/or control are felt to be essential in the management behaviour that challenges and is justified to that end. In the context of adult protection a model for safety planning is proposed that shifts the emphasis away from risk avoidance toward an enabling person centred approach that recognises the importance to the individual of excitement in life that also may involve risk.
|
3 |
Livelihood Changes Enabled by Mobile Phones : the case of Tanzanian fishermenNordström, Lars, Myhr, Jonas January 2006 (has links)
<p>Mobile phones have had a tremendous diffusion rate in Africa in recent years. This has brought access to telecommunication to new user groups, among them Tanzanian fishermen. But how does mobile phone use affect the way fishermen live their lives, how they pursue economic activities and how they protect themselves from vulnerability to risk?</p><p>During a field study in Tanzania, interviews with fish boat captains were conducted in order to investigate what impact mobile phone use has on the livelihood indicators empowerment, opportunity and vulnerability to risk. Our research shows that increased access to information, enabled by mobile phones brings positive effects to all indicators. Mobile phone use empowers, both through increased bargaining power and increased control over external events. Mobile phones give increased knowledge about market opportunities and a possibility to work more efficiently. Furthermore, mobile phones give fishermen a possibility to take measures to decrease the risks they are exposed to, such as emergencies out at sea. The negative effects are found negligible. These effects are most likely not isolated to Tanzanian fishermen. Communication through mobile phones can bring similar advantages to other groups that have earlier been excluded from the communication system.</p>
|
4 |
Livelihood Changes Enabled by Mobile Phones : the case of Tanzanian fishermenNordström, Lars, Myhr, Jonas January 2006 (has links)
Mobile phones have had a tremendous diffusion rate in Africa in recent years. This has brought access to telecommunication to new user groups, among them Tanzanian fishermen. But how does mobile phone use affect the way fishermen live their lives, how they pursue economic activities and how they protect themselves from vulnerability to risk? During a field study in Tanzania, interviews with fish boat captains were conducted in order to investigate what impact mobile phone use has on the livelihood indicators empowerment, opportunity and vulnerability to risk. Our research shows that increased access to information, enabled by mobile phones brings positive effects to all indicators. Mobile phone use empowers, both through increased bargaining power and increased control over external events. Mobile phones give increased knowledge about market opportunities and a possibility to work more efficiently. Furthermore, mobile phones give fishermen a possibility to take measures to decrease the risks they are exposed to, such as emergencies out at sea. The negative effects are found negligible. These effects are most likely not isolated to Tanzanian fishermen. Communication through mobile phones can bring similar advantages to other groups that have earlier been excluded from the communication system.
|
5 |
Estudo de vulnerabilidade à inundação no município de Ourinhos (SP) / Study of vulnerability to flood in the Ourinhos cityIelo, Estêvão Moraes [UNESP] 16 December 2015 (has links)
Submitted by Estêvão Moraes Ielo null (estevaokcond@hotmail.com) on 2016-02-15T13:17:12Z
No. of bitstreams: 1
EstevãoIelo_Dissertação.pdf: 5902545 bytes, checksum: 4c41f4b3404dbea883deafbbd5bc68b2 (MD5) / Rejected by Sandra Manzano de Almeida (smanzano@marilia.unesp.br), reason: Solicitamos que realize uma nova submissão seguindo as orientações abaixo:
No campo “Versão a ser disponibilizada online imediatamente” foi informado que seria disponibilizado o texto completo porém no campo “Data para a disponibilização do texto completo” foi informado que o texto completo deverá ser disponibilizado apenas 6 meses após a defesa.
Caso opte pela disponibilização do texto completo apenas 6 meses após a defesa selecione no campo “Versão a ser disponibilizada online imediatamente” a opção “Texto parcial”. Esta opção é utilizada caso você tenha planos de publicar seu trabalho em periódicos científicos ou em formato de livro, por exemplo e fará com que apenas as páginas pré-textuais, introdução, considerações e referências sejam disponibilizadas.
Se optar por disponibilizar o texto completo de seu trabalho imediatamente selecione no campo “Data para a disponibilização do texto completo” a opção “Não se aplica (texto completo)”. Isso fará com que seu trabalho seja disponibilizado na íntegra no Repositório Institucional UNESP.
Por favor, corrija esta informação realizando uma nova submissão.
Agradecemos a compreensão.
on 2016-02-15T17:44:18Z (GMT) / Submitted by Estêvão Moraes Ielo null (estevaokcond@hotmail.com) on 2016-02-16T03:45:08Z
No. of bitstreams: 1
EstevãoIelo_Dissertação.pdf: 5902545 bytes, checksum: 4c41f4b3404dbea883deafbbd5bc68b2 (MD5) / Approved for entry into archive by Sandra Manzano de Almeida (smanzano@marilia.unesp.br) on 2016-02-16T13:09:44Z (GMT) No. of bitstreams: 1
ielo_em_me_rcla.pdf: 5902545 bytes, checksum: 4c41f4b3404dbea883deafbbd5bc68b2 (MD5) / Made available in DSpace on 2016-02-16T13:09:44Z (GMT). No. of bitstreams: 1
ielo_em_me_rcla.pdf: 5902545 bytes, checksum: 4c41f4b3404dbea883deafbbd5bc68b2 (MD5)
Previous issue date: 2015-12-16 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / Com a elevação dos extremos climáticos ocorridos nos últimos anos (IPCC, 2012) junto às constantes mudanças climáticas globais, o número de desastres causados por tempestades e tornados no Brasil aumentou. O prognóstico climático da região Sudeste do país para os próximos anos (PBMC, 2013) indica um aumento de até 1°C e até 10% da precipitação acumulada somente até 2040, o que evidencia a probabilidade de maior ocorrência destes fenômenos/eventos. Nas áreas urbanas do município de Ourinhos não é diferente, os processos de alagamentos, inundações, enchentes e em contíguo ao aumento e/ou adensamento populacional em áreas mal planejadas adequadamente e sem resiliência potencializam grandes distúrbios, perdas materiais e humanas. Este estudo foi realizado com intuito de avaliar as áreas de vulnerabilidade à inundações, enxurradas e enchentes na área urbana de Ourinhos/SP. Foram utilizadas técnicas e ferramentas de geoprocessamento para determinar estas áreas através da cartografia digital do município. Como conclusão, encontramos áreas desprovidas de vegetação que poderiam auxiliar na desaceleração da água da chuva assim como moradias instaladas em áreas impróprias devido à alta vulnerabilidade à inundação, enxurrada e enchente. Almeja-se que a qualificação dos procedimentos e os mapeamentos sirvam de subsídio ao planejamento de políticas públicas, aos responsáveis pelo monitoramento e alerta dessas áreas e ordenamento territorial da cidade de Ourinhos/SP, sempre voltadas à sustentabilidade e melhora da qualidade de vida da população. / With the rise in weather extremes of recent years (IPCC, 2012) and the constant global climate change, the number of disasters caused by storms and tornadoes in Brazil has increased. The weather forecast of the country's southeastern region for the years to come (PBMC, 2013) shows an increase of up to 1 ° C and up to 10% of the accumulated precipitation only until 2040, which shows the probability of a higher incidence of these phenomena / events. In urban areas of Ourinhos city is no different, the flooding processes, inundations, floods and adjacent to the increase and / or population density in badly planned areas, without resilience worsen big disturbances, material and human losses. This study was designed to evaluate the areas of vulnerability to floods, mudslides and inundations in urban areas of Ourinhos / SP. Techniques and geoprocessing tools were used to determine those areas through digital cartography of the city. In conclusion, we found areas lacking of vegetation that could help slowdown rainwater as well as houses in unsuitable areas exposed to high vulnerability to flooding, torrent and overflow. One hopes that the qualification procedures and the mappings are going to be used as subsidy to planning policies, for those who are responsible for monitoring and alerting these areas and territorial organization of Ourinhos city/ SP, always focused on sustainability and improvement of the population's quality of life.
|
6 |
Development Of A Software For Seismic Damage Estimation: Case StudiesKucukcoban, Sezgin 01 July 2004 (has links) (PDF)
The occurrence of two recent major earthquakes, 17 August 1999 Mw = 7.4 Izmit and 12 November 1999 Mw = 7.1 Dü / zce, in Turkey prompted seismologists and geologists to conduct studies to predict magnitude and location of a potential earthquake that can cause substantial damage in Istanbul. Many scenarios are available about the extent and size of the earthquake. Moreover, studies have recommended rough estimates of risk areas throughout the city to trigger responsible authorities to take precautions to reduce the casualties and loss for the earthquake expected.
Most of these studies, however, adopt available procedure by modifying them for the building stock peculiar to Turkey. The assumptions and modifications made are too crude and thus are believed to introduce significant deviations from the actual case. To minimize these errors and use specific damage functions and capacity curves that reflect the practice in Turkey, a study was undertaken to predict damage pattern and distribution in Istanbul for a scenario earthquake proposed by Japan International Cooperation Agency (JICA). The success of these studies strongly depends on the quality and validity of building inventory and site property data.
Building damage functions and capacity curves developed from the studies conducted in Middle East Technical University are used. A number of proper attenuation relations are employed. The study focuses mainly on developing a software to carry out all computations and present results. The results of this study reveal a more reliable picture of the physical seismic damage distribution expected in Istanbul.
|
7 |
An Exploration of Wireless Networking and the Management of Associated Security RiskCollins, Helen Loretta 01 January 2015 (has links)
The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded the minimally accepted practices and standards for wireless networking. The security risk assessment and management model established the theoretical framework. The sample was 114 participants from small to medium IT organizations comprised of security engineers, managers, and end users. Data collection was via an online survey. Data analysis included both descriptive and inferential statistical methods. The results revealed that greater than 80% of participants conducted appropriate risk management and review assessments. This study underscored the need for a more comprehensive approach to managing IT security risks. IT managers can use the outcome of this study as a benchmark for evaluating their current risk assessment procedures. Experiencing security breaches in organizations may be inevitable. However, when organizations and industry leaders can greatly reduce the cost of a data breach by developing effective risk management plans that lead to better security outcomes, positive social change can be realized.
|
Page generated in 0.1018 seconds