digplanet beta 1: Athena
Share digplanet:

Agriculture

Applied sciences

Arts

Belief

Business

Chronology

Culture

Education

Environment

Geography

Health

History

Humanities

Language

Law

Life

Mathematics

Nature

People

Politics

Science

Society

Technology

For vulnerability in the computing field and cyber space (such as security holes), see Vulnerability (computing).

Vulnerability refers to the inability (of a system or a unit) to withstand the effects of a hostile environment. A window of vulnerability (WoV) is a time frame within which defensive measures are diminished, compromised or lacking.[citation needed]

Common applications[edit]

In relation to hazards and disasters, vulnerability is a concept that links the relationship that people have with their environment to social forces and institutions and the cultural values that sustain and contest them. “The concept of vulnerability expresses the multi-dimensionality of disasters by focusing attention on the totality of relationships in a given social situation which constitute a condition that, in combination with environmental forces, produces a disaster”.[1]

It's also the extent to which changes could harm a system, or to which the community can be affected by the impact of a hazard or exposed to the possibility of being attacked or harmed, either physically or emotionally: "we were in a vulnerable position".

Research[edit]

Within the body of literature related to vulnerability, major research streams include questions of methodology, such as: measuring and assessing vulnerability, including finding appropriate indicators for various aspects of vulnerability, up- and down scaling methods, and participatory methods.[2][clarification needed] Vulnerability research covers a complex, multidisciplinary field including development and poverty studies, public health, climate studies, security studies, engineering, geography, political ecology, and disaster risk management. This research is of importance and interest for organizations trying to reduce vulnerability – especially as related to poverty and other Millennium Development Goals. Many institutions are conducting interdisciplinary research on vulnerability. A forum that brings many of the current researchers on vulnerability together is the Expert Working Group (EWG). Researchers are currently working to refine definitions of “vulnerability”, measurement and assessment methods, and effective communication of research to decision makers.[3][4]

Types[edit]

Social[edit]

Main article: Social vulnerability

In its sense, social vulnerability is one dimension of vulnerability to multiple stressors (agent responsible for stress) and shocks, including abuse, social exclusion and natural hazards. Social vulnerability refers to the inability of people, organizations, and societies to withstand adverse impacts from multiple stressors to which they are exposed. These impacts are due in part to characteristics inherent in social interactions, institutions, and systems of cultural values.[5][6]

Cognitive[edit]

A cognitive vulnerability, in cognitive psychology, is an erroneous belief, cognitive bias, or pattern of thought that is believed to predispose the individual to psychological problems.[7] It is in place before the symptoms of psychological disorders start to appear; after the individual encounters a stressful experience, the cognitive vulnerability shapes a maladaptive response that may lead to a psychological disorder.[7] In psychopathology, cognitive vulnerability is constructed from schema models, hopelessness models, and attachment theory.[8] Attentional bias is one mechanism leading to faulty cognitive bias that leads to cognitive vulnerability. Allocating a danger level to a threat depends on the urgency or intensity of the threshold. Anxiety is not associated with selective orientation.[9]

Military[edit]

See also: Paul Nitze

In military terminology, vulnerability is a subset of survivability, the others being susceptibility and recoverability. Vulnerability is defined in various ways depending on the nation and service arm concerned, but in general it refers to the near-instantaneous effects of a weapon attack. In aviation it is defined as the inability of an aircraft to withstand the damage caused by the man-made hostile environment.[10] In some definitions, recoverability (damage control, firefighting, restoration of capability) is included in vulnerability. Some military services develop their own concept of vulnerability.[11]

Invulnerability[edit]

Invulnerability is a common feature found in video games. It makes the player impervious to pain, damage or loss of health. It can be found in the form of "power-ups" or cheats; when activated via cheats, it is often referred to as "god mode". Generally, it does not protect the player from certain instant-death hazards, most notably "bottomless" pits from which, even if the player were to survive the fall, they would be unable to escape. As a rule, invulnerability granted by power-ups is temporary, and wears off after a set amount of time, while invulnerability cheats, once activated, remain in effect until deactivated, or the end of the level is reached. Depending on the game in question, invulnerability to damage may or may not protect the player from non-damage effects, such as being immobilized or sent flying.

In comic books, some superheroes are considered invulnerable, though this usually only applies up to a certain level. (e.g. Superman is invulnerable to physical attacks from normal people but not to the extremely powerful attacks of Doomsday).

In mythology talismans charms and amulets were created by magic users for the purpose of making the wearer immune to injury from both mystic and mundane weapons.[12]

See also[edit]

References[edit]

  1. ^ Bankoff, Greg; et al. (2004). Mapping Vulnerability: Disasters, Development and People. London: Earth scan. 
  2. ^ Villagran, Juan Carlos. "“Vulnerability: A conceptual and methodological review." SOURCE. No. 2/2006. Bonn, Germany.
  3. ^ Birkmann, Joern (editor). 2006. Measuring Vulnerability to Natural Hazards – Towards Disaster Resilient Societies. UNU Press.
  4. ^ Wolters, M., Kuenzer, C., 2015: Vulnerability Assessments of Coastal River Deltas – Categorization and Review. Journal of Coastal Conservation, DOI 10.1007/s11852-015-0396-6
  5. ^ Luis Flores Ballesteros. "What determines a disaster?" 54 Pesos May. 2008:54 Pesos 11 Sep 2008. http://54pesos.org/2008/09/11/what-determines-a-disaster/
  6. ^ See also Daniel R. Curtis, 'Pre-industrial societies and strategies for the exploitation of resources. A theoretical framework for understanding why some settlements are resilient and some settlements are vulnerable to crisis', http://www.academia.edu/1932627/Pre-industrial_societies_and_strategies_for_the_exploitation_of_resources._A_theoretical_framework_for_understanding_why_some_settlements_are_resilient_and_some_settlements_are_vulnerable_to_crisis
  7. ^ a b Riskind, John H.; Black, David (2005). "Cognitive Vulnerability". In Freeman, Arthur, Felgoise, Stephanie H.; et al. Encyclopedia of Cognitive Behavior Therapy. New York: Springer. pp. 122–26. ISBN 9781429411738. 
  8. ^ Ingram, Rick (February 2003). "Origins of Cognitive Vulnerability to Depression" (PDF). Cognitive Therapy and Research 27 (1): 77–88. doi:10.1023/a:1022590730752. ISSN 0147-5916. 
  9. ^ Mathews, Andrew; MacLeod, Colin (1 April 2005). "Cognitive Vulnerability to Emotional Disorders". Annual Review of Clinical Psychology 1 (1): 167–195. doi:10.1146/annurev.clinpsy.1.102803.143916. 
  10. ^ Ball, Robert (2003). The Fundamentals of Aircraft Combat Survivability Analysis and Design, 2nd Edition. AIAA Education Series. p. 603. ISBN 1-56347-582-0. 
  11. ^ Warship Vulnerability
  12. ^ William Godwin (1876). "Lives of the Necromancers". p. 17. 

External links[edit]


Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Vulnerability — Please support Wikipedia.
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
215106 videos foundNext > 

The Power of Vulnerability | Brene Brown | TED Talks

http://www.ted.com Brene Brown studies human connection -- our ability to empathize, belong, love. In a poignant, funny talk at TEDxHouston, she shares a ...

Brené Brown - Embracing Vulnerability

The Power of Vulnerability Live with Brené Brown http://bit.ly/WoBmDZ The Courage to be Vulnerable – Tami Simon interviews Dr. Brené Brown Download on ...

RSA Replay - The Power of Vulnerability

This is the full webcast from the RSA event including Q&A from the audience on Thursday 4 July at 1pm BST. There is also an edited HD video available at ...

The price of invulnerability: Brené Brown at TEDxKC

TEDxKC talk synopsis: In our anxious world, we often protect ourselves by closing off parts of our lives that leave us feeling most vulnerable. Yet invulnerability ...

The Power of Vulnerability - Brene Brown

Influential author and speaker Dr Brené Brown tackles the myth that vulnerability is a weakness. Instead, she argues, it is the clearest path to courage and ...

Brené Brown: Listening to shame

http://www.ted.com Shame is an unspoken epidemic, the secret behind many forms of broken behavior. Brené Brown, whose earlier talk on vulnerability became ...

Dr. Brené Brown's Vulnerability Breakdown | Super Soul Sunday | Oprah Winfrey Network

In 2007, Dr. Brené Brown was researching and writing about living a wholehearted life when she realized for the first time she wasn't walking the walk.

How To Find Your Power Through Vulnerability

Are You Willing To Face Your Greatest Fear? :-) Instagram: infinitewaters Feel Alive by Ralph Smart. The New Book Now Available Below: ...

Honoring and working with male vulnerability | David Hatfield | TEDxEdmonton

This talk was given at a local TEDx event, produced independently of the TED Conferences. Many voices are calling for a new kind of 21st century masculinity.

An Art Made of Trust, Vulnerability and Connection | Marina Abramović | TED Talks

Marina Abramović's art pushes the boundary between audience and artist in pursuit of heightened consciousness and personal change. In her groundbreaking ...

215106 videos foundNext > 

7868137 news items

Lifehacker Australia

Lifehacker Australia
Sat, 06 Feb 2016 18:15:00 -0800

Information about the critical vulnerability in WinRAR self-extracting archives published in news in September and October 2015 is incorrect. Unfortunately mass media failed to recognize that what was described as WinRAR vulnerability is Windows OLE ...

Softpedia News

Softpedia News
Sun, 07 Feb 2016 07:38:41 -0800

Four vulnerabilities in the Graphite (or libgraphite) font processing library allow attackers to compromise machines by supplying them with malicious fonts. In its description, Graphite's authors describe the library as a tool capable of creating ...

The Daily Dot

The Next Web
Wed, 03 Feb 2016 11:05:27 -0800

In mid-December, researchers at security firm Check Point Software reported a security vulnerability to EBay. This vulnerability is an appropriately-named (JSFUCK) exploit that bypasses restrictions by eBay on how it handles hosted JavaScript within ...
 
Forbes
Wed, 03 Feb 2016 13:27:48 -0800

He's been called a bigot, a hero, and the candidate America deserves. Now, Donald Trump has been nominated for an unlikely title — winner of the Nobel Peace Prize. It's surprisingly easy to put someone forward for the prize, so it's easily misused as ...

Fortune

Fortune
Tue, 02 Feb 2016 06:00:41 -0800

Tod Beardsley, the security research manager at Rapid7 who coordinated the vulnerability disclosures, described the flaws as “pretty stock web API vulnerabilities” that more tech-savvy companies probably would have caught before going to market. He did ...
 
Forbes
Wed, 03 Feb 2016 10:00:00 -0800

eBay EBAY +0.00% is an odd beast when it comes to security. Though it's said before that malicious content on the marketplace is uncommon, it takes risks in providing certain functionality. This week, the Silicon Valley e-commerce giant was accused of ...

Business 2 Community

Business 2 Community
Sat, 06 Feb 2016 08:12:18 -0800

Coming across as “human” is valuable, especially since people do people with people. While this may seem like a weakness to the individual, to the audience, being human makes it easier to connect with you. Turning Weaknesses to Strengths. Identify.

IT PRO

IT PRO
Thu, 04 Feb 2016 00:15:00 -0800

Malwarebytes has disclosed a vulnerability in its Anti-Malware product which may take abother four weeks to fully resolve. The problem was found by Google researcher Tavis Ormandy, who discovered the anti-malware software doesn't use new encryption ...
Loading

Oops, we seem to be having trouble contacting Twitter

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!

Searchlight Group

Digplanet also receives support from Searchlight Group. Visit Searchlight