• Title/Summary/Keyword: Vulnerability Level

Search Result 390, Processing Time 0.025 seconds

Vulnerability to human immunodeficiency virus infection and associated factors among married women in northwest Ethiopia: a cross-sectional study

  • Asiya Hussien;Abdissa Boka;Asnake Fantu
    • Women's Health Nursing
    • /
    • v.28 no.4
    • /
    • pp.307-316
    • /
    • 2022
  • Purpose: This study investigated the vulnerability to human immunodeficiency virus (HIV) infection and associated factors among married women in northwest Ethiopia. Methods: A community-based cross-sectional survey (n=657) was conducted from April 1 to 15, 2020, in Metema District, northwest Ethiopia, in four randomly selected kebele administrations (the lowest level of local government). The inclusion criteria were married women aged ≥18 years residing with their husbands. Logistic regression analysis was conducted to identify factors associated with married women's vulnerability to HIV infection. Results: Participants were on average 33.70±9.50 years and nearly one-fourth (n=148, 22.5%) were identified as vulnerable to HIV infection (i.e., experienced sexually transmitted disease symptoms or an extramarital affair of either spouse within the past 12 months). Only 18.9% reported sexual communication with their husband. Respondents who did not discuss the risk of HIV infection with their husbands had fivefold odds of vulnerability (adjusted odds ratio [AOR], 5.02; 95% confidence interval [CI], 1.43-17.5). Those who did not have premarital sex (AOR, 0.20; 95% CI, 0.05-0.77) had no worries about HIV infection (AOR, 0.27; 95% CI, 0.08-0.94), sufficient income (AOR, 0.56; 95% CI, 0.16-0.86), and less than four children (AOR, 0.69; 95% CI, 0.50-0.97) had decreased odds of being vulnerable to HIV than their counterparts. Conclusion: Not discussing risk of HIV infection with husband was a major factor of vulnerability to HIV infection as was premarital sex, worry about HIV, income, and number of children. Measures to strengthen couple's sexual communication and support economical stability is important for decreasing HIV vulnerability.

Assessment of Flood Vulnerability: Baramarae Intertidal Area in Anmyeondo, Korea (침수 취약성 평가: 안면도 바람아래 조간대 지역을 사례로)

  • KIM, Jang-soo;JANG, Dong-Ho
    • Journal of The Geomorphological Association of Korea
    • /
    • v.17 no.2
    • /
    • pp.29-39
    • /
    • 2010
  • Climate change recently causes rapid rises in sea level in Baramarae intertidal area and the rises present several socio-economic impacts to the affected area. We have assessed the vulnerability of the region by the rise of the sea level. Using quantitative GIS method on multi-temporal satellite images, we have first estimated the elevation (Digital Elevation Model: DEM) of Baramarae intertidal area and hence we were possibly able to identify the flooded areas under the IPCC SRES scenarios. As sea level rises by 20cm, 30cm, 40cm, 50cm and 60 cm, the estimated flooded areas of the tidal flat are 68ha, 85ha, 103ha, 121ha and 139ha, respectively. The most affected area is the tidal flat in Gagyeongju Village (Gonam-li, Gonam-myeon, Taean, Chungnam), because it has not only lower altitude but also, perhaps more significantly smooth slope. The potential affected areas are currently populated by farming of oysters and short-necked clams and therefore the areas expect significant economic loss by rise of sea level.

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

Evaluation of Regional Drought Vulnerability Assessment Based on Agricultural Water and Reservoirs (지역기반 농업용수의 가뭄재해 취약성 평가)

  • Mun, Young-Sik;Nam, Won-Ho;Jeon, Min-Gi;Kim, Han-Joong;Kang, Ku;Lee, Jung-Chul;Ha, Tae-Hyun;Lee, Kwangya
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.62 no.2
    • /
    • pp.97-109
    • /
    • 2020
  • Drought is one of the most influential disasters in sustainable agriculture and food security of nations. In order to preemptively respond to agricultural droughts, vulnerability assessments were conducted to predict the possibility of drought in the region, the degree of direct or indirect damage, and the ability to cope with the damage. Information on agricultural drought vulnerability status of different regions is extremely useful for implementation of long term drought management measures. The purpose of this study is to develop and implement a quantitative approach for measuring agricultural drought vulnerability at sub-district level based on agricultural water and reservoirs. To assess the vulnerability in a quantitative manner and also to deal with different physical and socioeconomic data on the occurrence of agricultural drought, we selected the appropriate factors for the assessment of agricultural drought vulnerability through preceding studies, and analyzed the meteorological and agricultural reservoir data from 2015 to 2018. Each item was weighted using AHP (Analytic Hierarchy Process) analysis and evaluated through the agricultural drought vulnerability estimation. The entire national vulnerability assessments showed that Ganghwa, Naju, and Damyang were the most vulnerable to agricultural droughts. As a result of analyzing spatial expression, Gyeongsang-do is relatively more vulnerable to drought than Gangwon-do and Gyeonggi-do. The results revealed that the methodology and evaluation items achieved good performance in drought response. In addition, vulnerability assessments based on agricultural reservoir are expected to contribute supporting effective drought decisions in the field of agricultural water management.

Evaluating the Performance of Housing Service Centers by NGOs in Housing Welfare Delivery System - An Implication of Collaboration with Lower Level Local Governments - (주거복지전달체계에서 주거복지센터의 활동 평가 - 기초지자체와의 협력가능성을 중심으로 -)

  • Nam, Won-Seok
    • Journal of the Korean housing association
    • /
    • v.21 no.5
    • /
    • pp.63-72
    • /
    • 2010
  • The purpose of this study is to evaluate the performance of Housing Service Centers in terms of a new attempt made by NGOs and to then determine the implication of collaboration with lower level local governments in a housing welfare delivery system. The evaluation of the performance of the Housing Service Centers focused on three aspects: the performance outcomes for three years, comparative advantages to lower level local governments, and the vulnerability as an NGO. As a result of evaluating the outcome of Housing Service Centers and comparative advantages of Housing Service Centers to the local government, it is expected that a more effective housing welfare delivery system is able to be constructed when Housing Service Centers and lower level local governments collaborate. However, fiscal vulnerability of Housing Service Centers as NGO's will restrict the sustainability of the collaboration of both organizations. Therefore, as a conclusion, this study proposed that the governments should make use of Housing Service Centers as a public policy agency and projects should be based on a contract.

A Study on the Methodologies to Assess Network Vulnerability (네트워크 위험 분석 및 취약점 점검 방법에 관한 연구)

  • Seo Dong-Il;Park Won-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.107-114
    • /
    • 2005
  • This paper proposes to analyze a security level about information property systems. This method uses objective and quantitative risk level assessment. The method analyzes administrative, physical and technical aspects of information property system commonly. This method also uses administrative, physical and technical weights. Individually according to requirements security assessment purpose. And it shows risks weighting mean and importance of information property by graph. The most right and up systems in maps is prior to other systems. Also, Quantitative analysis presents more objective and efficient results for security level assessment of information system.

  • PDF

Household Over-indebtedness and Financial Vulnerability in Korea: Evidence from Credit Bureau Data

  • KIM, YOUNG IL;KIM, HYOUNG CHAN;YOO, JOO HEE
    • KDI Journal of Economic Policy
    • /
    • v.38 no.3
    • /
    • pp.53-77
    • /
    • 2016
  • Financial soundness in the household sector matters for financial stability and for the real economy. The level of household debt in Korea raises concern about the financial soundness of the household sector due to its size, growth rate and quality. Against this backdrop, we assess the financial vulnerability of borrowers based on an analysis of credit bureau (CB) data, in which the actual credit activities of most individuals are recorded at a high frequency in Korea. We construct over-indebtedness indicators from the CB data and then assess the predictability of forthcoming defaults. Based on the over-indebtedness indicators, we show how borrowers are distributed in terms of over-indebtedness and how the over-indebted differ from average borrowers in terms of their characteristics. Furthermore, we show how the aggregate credit risk in the household sector would change under macroeconomic distress by analyzing how each borrower's credit quality would be affected by adverse shocks. The findings of this paper may contribute to assessing household debt vulnerability and to enhancing regulatory and supervisory practices for financial stability.

  • PDF

Impact spectrum of flood hazard on seismic vulnerability of bridges

  • Yilmaz, Taner;Banerjee, Swagata
    • Structural Engineering and Mechanics
    • /
    • v.66 no.4
    • /
    • pp.515-529
    • /
    • 2018
  • Multiple hazards (multihazard) conditions may cause significant risk to structures that are originally designed for individual hazard scenarios. Such a multihazard condition arises when an earthquake strikes to a bridge pre-exposed to scour at foundations due to flood events. This study estimates the impact spectrum of flood-induced scour on seismic vulnerability of bridges. Characteristic river-crossing highway bridges are formed based on the information obtained from bridge inventories. These bridges are analyzed under earthquake-only and the abovementioned multihazard conditions, and bridge fragility curves are developed at component and system levels. Research outcome shows that bridges having pile shafts as foundation elements are protected from any additional seismic vulnerability due to the presence of scour. However, occurrence of floods can increase seismic fragility of bridges at lower damage states due to the adverse impact of scour on bridge components at superstructure level. These findings facilitate bridge design under the stated multihazard condition.

Debris Flow Risk Evaluation and Ranking Method for Drainage Basin adjacent to Road (도로인근 유역의 토석류 위험평가 및 등급화 방안)

  • Kim, Kyung-Suk;Jang, Hyun-Ick
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.279-290
    • /
    • 2010
  • Technical countermeasures against debris flow should be established upon the risk level of the target location. Risk of debris flow should consider the hazard imposed by debris flow and vulnerability of the facilities to debris flow. In this research, we have defined the target location for risk evaluation and suggested scoring method of hazard of debris flow and vulnerability of road to debris flow. By defining risk rank into 6 categories in terms of possibility of damage during rainfall and using the risk scores of 46 debris flow cases, we have suggested risk ranking matrix. The method can be used in ranking the drainage basin adjacent to road by simply determining the hazard with vulnerability score and can be used for planning the debris flow countermeasures.

  • PDF

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.