Dissertations / Theses on the topic 'Vulnerability Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Vulnerability Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
White, Dominic Stjohn Dolin. "Limiting vulnerability exposure through effective patch management: threat mitigation through vulnerability remediation." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1006510.
Full textTeX output 2007.02.08:2212
Adobe Acrobat 9.51 Paper Capture Plug-in
Persson, Andreas, and Lukas Landenstad. "Explaining change : Comparing network snapshots for vulnerability management." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16710.
Full textBakgrund. Sårbarhetshantering underlättar arbetet för företag att hitta, hantera och korrigera sårbarheter i ett nätverk. Det görs genom att skanna nätverket efter kända sårbarheter. Mängden information som samlas under skanningar kan vara stor och medföra till att analysprocessen av upptäckterna försenas. Resultaten av de upptäckta sårbarheterna brukar vanligtvis presenteras som en trend av antalet funna sårbarheter över ett tidsintervall. Trenderna förklarar dock inte andledningen till de funna sårbarheterna. Syfte. Målet med denna avhandling är att undersöka hur det är möjligt att identifiera anledningen till skillnaden i funna sårbarheter genom att jämföra sårbarhetsrapporter från olika tidpunkter. Ett andra mål är att utveckla ett automatiskt system som kopplar skillnaderna i funna sårbarheter till specifika händelser i nätverket. Metod. En fallstudie utfördes där tre sårbarhetsrapporter, från Outpost24s interna testnätverk, undersöktes för att få förståelse kring strukturen av rapporterna samt för att koppla upptäckter i rapporterna till händelser. För att komplementera fallstudien satte vi upp ett nytt, simulerat testnätverk för att kunna utföra egna tester samt för att uppnå en högre precision vid identifiering av förändringar. Resultat. Utifrån fallstudien fick vi förståelse för hur vi skulle tolka informationen från rapporterna samt för hur man kan ge orsak till förändring genom ett regelbaserad system. Informationen från rapporterna tolkades och förändringarna delades in i tre olika kategorier; tillagda, borttagna eller modifierade. Utifrån testerna från det simulerade nätverket byggdes signaturer som identifierar orsak till föränding av funna sårbarheter. Signaturerna användes sedan för att göra regler, vilka implementerades i ett konceptverktyg. Konceptverktyget jämförde sårbarhetsrapporter i par för att upptäcka skillnader. De identifierade skillnaderna försökte sedan matchas ihop med reglerna och skulle skillnaden inte matcha någon regel så flaggas skillnaden som ''oförklarad''. Konceptverktyget användes slutligen för att finna orsak till förändringar i rapporterna från fallstudien. Ramverket validerates genom att utvärdera hur reglerna byggda utifrån det simulerade nätverket presterade för fallstudien. En domänexpert verifierade att händelserna som presenterades och orsaken till förändringarna var korrekta genom att analysera sårbarhetsrapporterna från fallstudien manuellt. Slutsatser. Det är möjligt att identifiera orsak till förändringar i upptäckta sårbarheter i sårbarhetsrapporter genom att identifiera signaturer för händelser, och använda dessa signaturer i ett reglerbaserat system. Systemet är också möjligt att implementera automatiskt, i form av mjukvara, för att kunna identifiera orsaken till förändring snabbare än om det skulle gjorts manuellt.
Yue, Yanchao. "Impact of Seismic Vulnerability on Bridge Management Systems." Doctoral thesis, Università degli studi di Trento, 2011. https://hdl.handle.net/11572/368074.
Full textYue, Yanchao. "Impact of Seismic Vulnerability on Bridge Management Systems." Doctoral thesis, University of Trento, 2011. http://eprints-phd.biblio.unitn.it/792/1/YUEthesis_final20120530.pdf.
Full textFlores, Ballesteros Luis. "Vulnerability and social risk management in India and Mexico." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45372.
Full textIncludes bibliographical references (p. 105-116).
The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals and groups, and the factors that foster the adoption of specific mechanisms of risk management and, thus, the elements that supports an efficient implementation process. This thesis contributes to this understanding in the context of communities in developing countries by using data from surveys conducted in the district of Kalahandi, state of Orissa, India, and three municipalities in Mexico, each with a different level of socioeconomic development: Villaflores, Chiapas; Ahome, Sinaloa; and Valle de Santiago, Guanajuato. Using regression modeling of binary response variables, I tested the statistical association between the adoption of formal social risk-management and a number of endogenous and exogenous household characteristics. The results indicate that the likelihood of adoption of formal risk-management strategies increases with the level of the household's association, i.e., its affiliation with local groups; in addition, proximity to roads, financial services and urban-mixed use areas (markets), is less strongly correlated with the likelihood of adoption of risk-management strategies than the level of association, particularly in less-developed environments. These findings are robust to a variety of socioeconomic and demographic characteristics and environmental contexts. Keywords: risk, social risk management, social capital, vulnerability
by Luis Flores Ballesteros.
M.C.P.
Washam, Ryan M. "Archaeology in Distress: Federal Land Management and Archaeological Vulnerability." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1406820452.
Full textLartey, Jerry. "Effective Vulnerability Management for Small Scale Organisations in Ghana." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75809.
Full textAfful-Dadzi, Anthony. "Robust Optimal Maintenance Policies and Charts for Cyber Vulnerability Management." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1354126687.
Full textMakoka, Donald. "Risk, risk management and vulnerability to poverty in rural Malawi /." Göttingen : Cuvillier, 2008. http://d-nb.info/99080948X/04.
Full textBarrère, Cambrún Martín. "Vulnerability management for safe configurations in autonomic networks and systems." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0048/document.
Full textOver the last years, the massive deployment of computing devices over disparate interconnected infrastructures has dramatically increased the complexity of network management. Autonomic computing has emerged as a novel paradigm to cope with this challenging reality. By specifying high-level objectives, autonomic computing aims at delegating management activities to the networks themselves. However, when changes are performed by administrators and self-governed entities, vulnerable configurations may be unknowingly introduced. Nowadays, vulnerabilities constitute the main entry point for security attacks. Therefore, vulnerability management mechanisms are vital to ensure safe configurations, and with them, the survivability of any autonomic environment. This thesis targets the design and development of novel autonomous mechanisms for dealing with vulnerabilities, in order to increase the security of autonomic networks and systems. We first present a comprehensive state of the art in autonomic computing and vulnerability management. Afterwards, we present our contributions which include autonomic assessment strategies for device-based vulnerabilities and extensions in several dimensions, namely, distributed vulnerabilities (spatial), past hidden vulnerable states (temporal), and mobile security assessment (technological). In addition, we present vulnerability remediation approaches able to autonomously bring networks and systems into secure states. The scientific approaches presented in this thesis have been largely validated by an extensive set of experiments which are also discussed in this manuscript
Barrère, Cambrún Martín. "Vulnerability management for safe configurations in autonomic networks and systems." Electronic Thesis or Diss., Université de Lorraine, 2014. http://www.theses.fr/2014LORR0048.
Full textOver the last years, the massive deployment of computing devices over disparate interconnected infrastructures has dramatically increased the complexity of network management. Autonomic computing has emerged as a novel paradigm to cope with this challenging reality. By specifying high-level objectives, autonomic computing aims at delegating management activities to the networks themselves. However, when changes are performed by administrators and self-governed entities, vulnerable configurations may be unknowingly introduced. Nowadays, vulnerabilities constitute the main entry point for security attacks. Therefore, vulnerability management mechanisms are vital to ensure safe configurations, and with them, the survivability of any autonomic environment. This thesis targets the design and development of novel autonomous mechanisms for dealing with vulnerabilities, in order to increase the security of autonomic networks and systems. We first present a comprehensive state of the art in autonomic computing and vulnerability management. Afterwards, we present our contributions which include autonomic assessment strategies for device-based vulnerabilities and extensions in several dimensions, namely, distributed vulnerabilities (spatial), past hidden vulnerable states (temporal), and mobile security assessment (technological). In addition, we present vulnerability remediation approaches able to autonomously bring networks and systems into secure states. The scientific approaches presented in this thesis have been largely validated by an extensive set of experiments which are also discussed in this manuscript
Goodwin, Michael S. "Wireless Local Area Network (WLAN) vulnerability assessment and security." Thesis, Monterey California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1939.
Full textAllodi, Luca. "Risk-Based Vulnerability Management. Exploiting the economic nature of the attacker to build sound and measurable vulnerability mitigation strategies." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/367758.
Full textAllodi, Luca. "Risk-Based Vulnerability Management. Exploiting the economic nature of the attacker to build sound and measurable vulnerability mitigation strategies." Doctoral thesis, University of Trento, 2015. http://eprints-phd.biblio.unitn.it/1431/1/phd-allodi-thesis.pdf.
Full textCorlett, Sandra. "Professionals becoming managers : personal predicaments, vulnerability and identity work." Thesis, Northumbria University, 2009. http://nrl.northumbria.ac.uk/2690/.
Full textEngqvist, Markus, and Soto Karen Mori. "Defining a Process for Statistical Analysis of Vulnerability Management using KPI." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14723.
Full textKoffa, Morris Tennesse. "Emergency Management: A Qualitative Study of Flood Disaster Vulnerability in Liberia." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5018.
Full textHanthorn, David Gordon. "Vulnerability analysis of an all-electric warship." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/10945/4942.
Full textApproved for public release; distribution is unlimited
Traditional design processes usually rely on cost as the metric the designer uses to select among different alternatives. Sometimes when costs cannot be calculated we use weight, volume and efficiency as surrogates for cost. However minimizing costs does not necessarily give us the best design for a particular mission; this is particularly true for military ships. Proposals to include such considerations as quality of service and survivability as metrics to be used in a multi objective design process or as constraints have appeared in the literature. A tool that analyzes survivability of distributed systems at early stage design does not exist. In this thesis we develop a metric for survivability suitable for early stage design of destroyers.
Rötzmeier-Keuper, Julia [Verfasser]. "Essays on consumer vulnerability in transformative service contexts / Julia Rötzmeier-Keuper." Paderborn : Universitätsbibliothek, 2020. http://d-nb.info/1221667726/34.
Full textBongiovanni, Ivano. "Assessing vulnerability to safety and security disruptions in Australian airports." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/95964/1/Ivano_Bongiovanni_Thesis.pdf.
Full textAuletta, Jamie Lynn. "Disaster Vulnerability of University Student Populations." Scholar Commons, 2012. http://scholarcommons.usf.edu/etd/3960.
Full textClouston, Beth. "Review of coastal vulnerability assessment for coastal zone management in metropolitan Adelaide /." Title page, contents and abstract only, 1995. http://web4.library.adelaide.edu.au/theses/09ENV/09envc647.pdf.
Full textRoder, Giulia. "Flood dynamics, social vulnerability and risk perception: challenges for flood risk management." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3427296.
Full textIl 2015 è stato un anno chiave nella politica globale con la pubblicazione di tre documenti fondamentali: il Quadro di Sendai per la Riduzione dei Rischi Naturali, gli Obiettivi di Sviluppo Sostenibile e l'Accordo di Parigi sui cambiamenti climatici. Il significato globale di tali documenti ha suscitato interesse riguardo l'interazione tra uomo, Terra e clima simultaneamente alla frequenza dei disastri. I paesaggi antropici sono uno degli ambienti più sensibili agli eventi climatici estremi, alle loro fluttuazioni e mutamenti. Qui, i disastri idrogeologici, come le alluvioni, sono considerati una delle maggiori minacce del nostro tempo con conseguenze negative sull’intero apparato sociale. Tuttavia, mentre i cambiamenti climatici e lo sviluppo socio-economico sono fattori chiave che incidono sull’impatto delle inondazioni, i comportamenti umani possono anch’essi alterare e talvolta esasperare le conseguenze di tali eventi. A tal riguardo, la percezione del rischio di un individuo costituisce un elemento strategico per la definizione delle politiche di gestione poiché influenza la capacità del singolo di adottare misure precauzionali. Questa conoscenza permette di identificare le motivazioni che spingono le popolazioni ad agire (o non agire) in protezione da questi eventi. Si esaminano così le componenti personali, ma anche la struttura sociale, culturale e politica della comunità, che influenza tutto il processo cognitivo relazionato alle alluvioni. Tra i caratteri personali, ci possono essere degli elementi che amplificano la vulnerabilità verso tali eventi, rendendo l’individuo più esposto al pericolo e limitando la capacità di reazione. Tutti questi elementi sottolineano la necessità di una gestione integrata del rischio alluvionale, atto a riconoscere le capacità locali, aumentando la comunicazione, sensibilizzando la popolazione ad una cultura del rischio affinché possa prepararsi e mitigare gli effetti di tali eventi. Per questa ragione, questa tesi mira a proporre un approccio integrato alla gestione del rischio, proponendo analisi di dinamiche di piena e di cambiamento di uso del suolo, valutando il comportamento dell’uomo in relazione a tali eventi, attraverso analisi storiche, di vulnerabilità sociale e anche attraverso l’uso di approcci partecipativi. Inoltre, questa tesi suggerisce possibili azioni e politiche di gestione del rischio alluvionale in diversi territori antropizzati. Le aree di studio analizzate si differenziano tra loro al fine di comprendere come il contesto socio-politico e culturale unico di ogni comunità possa influenzare la comprensione del rischio e come si sono evolute le dinamiche di piena.
DI, GUARDO ANDREA. "Environmental decision support systems (EDSS) for risk management of chemicals in agriculture." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2017. http://hdl.handle.net/10281/158191.
Full textThe three years PhD was intended to study, design and develop Environmental Decision Support Systems aiming at addressing some of the challenges that the introduction of chemical substances in agriculture poses to the environment and ultimately to human beings. Developed tools contain the main features an EDSS should expose: they define a finite domain where main environmental variables and parameters are described at the finest level; they rely on expert knowledge which describe the environmental processes by the means of expert judgements or environmental models; they represent processes at territorial level by the means of geographical information systems (GIS) and linked spatial databases; they can be used for planning, evaluating and optimising scenarios, hence they could be used to test the efficacy of policies, to evaluate the actual scenarios or to evaluate situations in the past. The first EDSS developed was ValorE, an expert system for the valorisation of manure from livestock with the clear objective to reduce the high values of nitrogen at the field in Lombardy region. Further, the EDSS VULPES for the identification of groundwater vulnerable areas to chemical substances has been implemented, taking advantage of actual modelling tools from the FOCUS workgroup coupled with GIS. Moreover, we developed a new methodology (moni-modelling approach) for the identification of vulnerable areas to chemical substances which couples modelling results from VULPES EDSS and existing monitoring data from public authorities. Again, VULPES has been coupled with the ValorE expert system in order to analyse the environmental fate of veterinary medicine products in the groundwater. Finally, we developed a new indicator to evaluate the impact of vineyard management practices in a perspective of farm sustainability.
Ozcan, Gulbin. "A Generic Risk And Vulnerability Assessment Framework For International Construction Projects." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12609721/index.pdf.
Full textzcan, Gü
lbin M.Sc., Department of Civil Engineering Supervisor: Assoc. Prof. Dr. /rem Dikmen Toker Co-Supervisor: Prof. Dr. M. Talat Birgö
nü
l July 2008, 105 pages Project Risk Management (PRM) comprises of identification and assessment, analysis and mitigation of risk factors in order to meet the project objectives. Risk identification and assessment process has the greatest importance as the risk models are constructed based on previously defined risk sources and their interrelations. Although previous studies have concentrated on the relation between risk events and their consequences, the link between them must be modeled by considering the various chains of risk events and the capacity of a &ldquo
system&rdquo
to react to risk events simultaneously. The concept of &ldquo
risk paths&rdquo
should be used to identify chains of risk events by means of a Hierarchical Risk Breakdown Structure (HRBS) rather than defining individual risk factors. The &ldquo
system&rdquo
consists of the characteristics of the project, company and involved parties. The word &ldquo
vulnerability&rdquo
is used to describe the degree v to which a project is susceptible to adverse effects of change. The aim of the current study is to develop a common vocabulary and design a HRBS that integrates vulnerability factors with risk factors. A generic risk and vulnerability assessment framework for international construction projects is presented in this research. The justification of the factors considered within the breakdown structure has been achieved by referring to real construction projects carried out by Turkish contractors in international markets.
Zamuee, Zanata Clarence. "International economic integration and financial contagion vulnerability : the case of South Africa." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/6409.
Full textENGLISH ABSTRACT: The phenomenon of globalisation has seen the closer integration of the world's countries and people. The result of this, is that overall, the world economy has grown substantially. On the flip side, globalisation has greatly increased the exposure of individual countries to occurrences elsewhere in the world. This latter statement is witnessed by the events such as the spread of financial crises from source countries to third party countries that do not seem to have any obvious ties with the crisis-source countries. This has been termed financial contagion. This study seeks to break new ground by focussing on trade-related issues of contagion rather than presenting the usual macro-economic, financial, and political perspectives. A model that considers the trade pattern of countries as linkages tying together countries around the world as a whole (network) is used. This study uses the network approach to international trade as an integration measure and ascertains the occurrence of contagion in South Africa. These parameters will then be used to establish whether trade network integration can be used to explain financial contagion affecting South Africa (and extended to other countries). Two hypotheses are designed and tested in order to establish this. Two measures are used to determine the level of integration of the four study countries. The two measures are country centrality and country importance index. Comparative analysis done showed that all four countries are relatively highly integrated and are in close proximity for both degree centrality and importance. A summary of both indicators of integration measures relative to other countries in the trade network indicate that Mexico, Russia, South Africa and Thailand are well integrated in the network. Secondly the difference in ranking amongst these countries is not significant. Three financial crises are used namely, the Mexican Tequila (1994), the Asian Flu (1997) and the Russian Virus (1998). The contagion testing methodology applied uses the cross-market correlation coefficients between crisis-country and test-country. It is shown that there is no evidence to suggest that South Africa (JSE) was contagiously affected by any of the three financial crises. Only interdependence seems to have existed between the South African market and the crises countries. Evidence shows that countries that are, relatively, highly integrated with the crisis epicentre in terms of the international trade are more immune to episodes of contagion. It is shown further that the relative position of the crisis-suspect country to the crisis epicentre countries, in terms of integration in the international economic landscape, can provide susceptibility indications of that particular country.
AFRIKAANSE OPSOMMING: Die fenomeen van globalisering het gelei tot 'n groter integrasie van die wereld se lande en mense. Die gevolg hiervan is, dat oor die algemeen die wereld ekonomie beduidend gegroei het. Aan die ander kant het globalisering gelei tot die toename in blootstelling van individuele lande aan gebeurtenisse elders in die wereld. Die laasgenoemde stelling getuig van die gebeure, soos die verspreiding van finansiele krisisse vanaf die land van oorsprong tot 'n derde party land wat op die oog af geen ooglopende bande met die krisis-bron lande gehad het nie. Hierdie verskynsel word finansiele besmetting genoem. Hierdie studie beoog om nuwe lig te werp op die saak deur om te fokus op handelsverwante kwessies van besmetting eerders as om die gewone makro-ekonomiese, finansiele en politieke perspektiewe voor te le. 'n Model word gebruik wat die handelspatrone van lande voorstel as 'n samesnoering van lande dwarsoor die wereld as 'n netwerk. Hierdie studie gebruik die netwerk uitgangspunt vir internasionale handel, as 'n integrasie maatstaf en stel vas wat die voorkoms van besmetting in Suid-Afrika is. Hierdie parameters sal dan gebruik word om vas te stel handelsnetwerk integrasie gebruik kan word om die finansiele besmetting wat Suid Alrika (en verspreiding na ander lande) affekteer. Twee hipotese (veronderstellings) word ontwerp en getoets om bogenoemde te bewys. Twee maatstawwe word gebruik om die vlak van integrasie van die vier studie-lande te bepaal. Die twee maatstawwe is 'n land se sentralisasie en die land se belangrikheidsindeks. Vergelykende analise het gewys dat al vier lande relatief hoogs geintegreer is en parallel is in beide sentralisasie en belangrikheid. 'n Opsomming van beide aanduidings t.o.v. integrasie maatstawwe, relatief tot ander lande in die handelsnetwerk, toon dat Meksiko, Rusland en Thailand goed geintegreer is in die netwerk. Tweedens die verskil in rang tussen die lande is nie beduidend nie. Drie finansiele krisisse word gebruik naamlik die Meksikaanse Tequila (1994), die Asiatiese Griep (1997) en die Russiese Virus (1998). Die besmettings waarnemings metodologie gebruik die krisismark korrelasie medewerkende faktore tussen die krisisland en die toets-land. Dit wys dat daar geen getuienis is wat te kenne gee dat Suid Afrika (JSE) besmet is deur enige van die drie krisisse nie. Slegs onderlinge afhanklikheid kom voor tussen die Suid Afrikaanse mark en die krisislande. Dit is bewys dat lande, wat relatief hoog geintegreer is met die krisis episenter, in terme van internasionale handel, meer immuun teen episodes van besmetting is. Verder het dit bewys dat die relatiewe posisie van die krisis-vermeende land tot die krisis episenter lande, in terme van integrasie in die internasionale ekonomiese landskap, vatbare indikasies vir daardie spesifieke land kan verskaf.
Mackenzie, Clara. "Future vulnerability of Modiolus modiolus reefs to climate change : from mechanisms to management." Thesis, Heriot-Watt University, 2017. http://hdl.handle.net/10399/3313.
Full textKodak, Cenkhan. "The vulnerability of technical secrets to reverse engineering : implications for company policy." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/43117.
Full textIncludes bibliographical references (leaf 81).
In this thesis I will explore the controversial topic of reverse engineering, illustrating with case examples drawn from the data storage industry. I will explore intellectual property rights issues including, users' fair-use provisions that permit reverse engineering. I will also explore the nature of the practice via several types of analyses including: the costs and benefits of reverse engineering; the practical limitations of reverse engineering; and a layered approach to reverse engineering as it applies to complex systems. I will conclude with a discussion of innovation and its relationship to reverse engineering
by Cenkhan Kodak.
S.M.
Valdivia, Marco Sr. "Development of a water infrastructure vulnerability index (WIVI) using publically available data in New Jersey." Thesis, New Jersey City University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3730741.
Full textThis research advances a water infrastructure vulnerability index (WIVI) in order to assess levels of susceptibility within the water sector and its respective infrastructure system(s). WIVI provides an assessment tool that can assist decision makers and policymakers in making better investment decisions supported by a prudent data-driven instrument. The index is dependent upon individual water utility data that are publically available, making it a transparent process that is repeatable and reproducible. Normalization of the data was used to establish baselines, and indicators were developed to represent the different levels of a functional water utility. WIVI provides a quantifiable snapshot of a water utility’s past and present state of vulnerability. WIVI is a supportive tool that assists in data-driven decision management, which will determine the direction and allocation of financial infrastructure upgrades pertaining to a water system’s need to rehabilitate, replace, or abandon current water system infrastructure.
McLaughlin, Suzanne. "Assessment and development of a coastal vulnerability index for Northern Ireland employing GIS techniques." Thesis, University of Ulster, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.232860.
Full textCénophat, Sadrac [Verfasser], Martin [Akademischer Betreuer] Eisend, and Tomás [Akademischer Betreuer] Bayón. "Customer Relationship Vulnerability: A New Concept in Relationship Marketing / Sadrac Cénophat ; Martin Eisend, Tomás Bayón." Frankfurt (Oder) : Europa-Universität Viadrina Frankfurt, 2018. http://d-nb.info/1160875626/34.
Full textKovarik, Johanna L. "A Composite Spatial Model Incorporating Groundwater Vulnerability and Environmental Disturbance to Guide Land Management." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5863.
Full textAryal, Komal. "Getting down to local level : exploring vulnerability to improve disaster management systems in Nepal." Thesis, Northumbria University, 2012. http://nrl.northumbria.ac.uk/9145/.
Full textTecchio, Samuele. "Mediterranean deep-sea ecosystems: Biodiversity, functioning and vulnerability = Ecosistemes profunds de la Mediterrània: Biodiversitat, funcionament i vulnerabilitat." Doctoral thesis, Universitat de Barcelona, 2013. http://hdl.handle.net/10803/124927.
Full textEn la presente tesis se han estudiado los patrones de biodiversidad, funcionamiento trófico y ecosistémico de los sistemas bentónicos de gran profundidad en el Mar Mediterráneo. El objetivo principal fue de describir y caracterizar los hábitats profundos, relacionando su biodiversidad y sus procesos de funcionamiento con los gradientes ambientales a lo largo de los ejes longitudinal, batimétrico y estacional. El estudio de la composición de comunidades y la respectiva recogida de muestras para los análisis tróficos se han realizado a través de arrastres profundos. Los resultados de análisis de composición de comunidades hallaron una correlación significativa entre las dinámicas de las capas oceánicas de superficie, la cantidad de alimento disponible en el fondo marino, y la composición de la megafauna estudiada. A escala reducida y considerando las variaciones estacionales, la biomasa bentónica mostró un patrón a U-invertida, con un pico a profundidades de 1000-1400 m. Una posible explicación de este fenómeno podría ser la combinación de forzajes ecológicos ligados a las diferentes distribuciones batimétricas de las especies. Para estudiar las relaciones tróficas en los ejes batimétricos y geográficos de gran escala, se utilizó el análisis de isotopos estables de las componentes bentónicas, de superficie, y de capas pelágicas intermedias. El amplitud de los nichos tróficos de las comunidades bentónicas se encontraron relacionados con indicadores de productividad de superficie, tanto primaria como secundaria. Asimismo, los procesos de utilización mesopelágica del carbono orgánico se hallaron en posición intermedia entre los de superficie y los del bentos profundo. Finalmente, un análisis ecosistémico a través de “Ecopath with Ecosim”, reveló que los ecosistemas de los taludes continentales del Mediterráneo son el resultado de un largo proceso de sucesión ecológica, han alcanzado un estado de estabilidad, y son particularmente vulnerables a factores de impacto humano, entre ellos, la explotación pesquera.
Hale, Nathan, Kate E. Beatty, and Michael Smith. "The Intersection of Residence, Community Vulnerability, and Premature Mortality." Digital Commons @ East Tennessee State University, 2019. https://doi.org/10.1111/jrh.12318.
Full textBrien, Lynn Ferrara. "Modeling eutrophication vulnerability in coastal Louisiana wetlands impacted by freshwater diversion: a remote sensing approach." Diss., Kansas State University, 2015. http://hdl.handle.net/2097/18999.
Full textDepartment of Geography
Kevin P. Price
A major strategy in response to rapid degradation and loss of Louisiana’s coastal wetlands has been the construction of siphon diversion projects. The diversions are designed to reintroduce nutrient enriched freshwater from the Mississippi River into wetland ecosystems to combat saltwater intrusion and stimulate marsh growth. The lack of consensus regarding the effects of river diversions on nutrient enrichment of wetland ecosystems is coupled with major concerns about eutrophication. Locating, assessing, and monitoring eutrophic marsh vegetation represent major challenges to understanding the impacts of freshwater diversions. As a result, this study was undertaken to investigate the feasibility of modeling eutrophication vulnerability of a coastal Louisiana marsh receiving turbid Mississippi River water. The major objective was to integrate remotely sensed data with field measurements of vegetation biophysical characteristics and historical ecosystem survey data to delineate landscape patterns suggestive of vulnerability to eutrophication. The initial step in accomplishing this goal was to model the spatial distribution of freshwater impacts using satellite image-based turbidity frequency data associated with siphon diversion operation. Secondly, satellite and spectroradiometer band combinations and vegetation indices optimal for modeling marsh biophysical characteristics related to nutrient enrichment were identified. Finally, satellite image data were successfully integrated with measures of historical and concurrent marsh biophysical characteristics to model the spatial distribution of eutrophication vulnerability and to elucidate the impacts of freshwater diversions.
Jiang, Fan. "Three Essays on the Behavioral Responses to Coastal Hazards and Vulnerability." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3759.
Full textHaas, Alysa Dupuy. "The Hidden Healing of Hot-Spotting| Addressing Structural Vulnerability at the Ground Level." Thesis, University of Colorado at Denver, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1563560.
Full textIt has been shown on both local and national scales in the US that there is a small number of people whose healthcare costs make up a significantly disproportionate amount of total healthcare costs. Much of the costs that these "high-utilizers of care" incur come from emergency department visits and inpatient hospital admissions for health problems that would be treated more economically by primary and specialist care. Numerous "hot-spotting" intervention programs have been created over the last decade in attempts to both lower costs and improve the quality of care and health outcomes of "high-utilizers" by actively connecting patients with the existing primary and specialist care system and the social services system. Initial quantitative analyses have shown that this approach appears to largely accomplish these aims. However, there is a need for complementary research that seeks to understand the processes behind such important outcomes.
This study takes a closer look at one program's process of connecting patients to services, using "structural vulnerability" theory to frame its findings. Qualitative data from open-ended, semi-structured interviews with 17 participants (including patients, patient family members, program staff, and healthcare providers) were coded using qualitative analysis software. Resulting themes are used to first describe the problems faced by both patients and providers, emphasizing how these problems are exacerbated or caused by structural factors. Second, the program's process of connecting patients and providers is illustrated, paying particular attention to themes that showed discrepancies in participant responses and that point to the existence of incidental services provided by outreach workers. Ultimately, results show how the connection process is more than simply training patients and providers to work together, but in fact requires bandaging and sometimes healing "structural wounds" and other systemic problems before productive connections can be made and sustained.
Helton, Erin King. "Archaeological Site Vulnerability Modeling for Cultural Resources Management Based on Historic Aerial Photogrammetry and LiDAR." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804925/.
Full textWilliams, Brian Don. "An Investigation of the Impact of Social Vulnerability Research on the Practice of Emergency Management." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc1011783/.
Full textMa, Jia Ji Wei. "A geospatial methodology for assessing wetland vulnerability under anthropogenic pressures at a watershed scale." Diss., UMK access, 2006.
Find full text"A dissertation in geoscience and software architecture." Advisor: Wei Ji. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Nov. 13, 2007. Includes bibliographical references (leaves 248-261). Online version of the print edition.
Smith, Jason Richard. "Seral stage, site conditions, and the vulnerability of understory plant communities to forest harvesting /." Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/2024.
Full textTheses (School of Resource and Environmental Management) / Simon Fraser University. Research Project (School of Resource and Environmental Management) / Simon Fraser University.
Smith, Erica Rose. "High Place at The Water’S Edge: A Coastal Vulnerability Assessment of the Kiskiak Landscape." W&M ScholarWorks, 2017. https://scholarworks.wm.edu/etd/1530192381.
Full textIndrakanti, Saratchandra. "Computational Methods for Vulnerability Analysis and Resource Allocation in Public Health Emergencies." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804902/.
Full textLioupras, Ioannis, and Eleni Manthou. "Don’t let my Heart bleed! : An event study methodology in Heartbleed vulnerability case." Thesis, Umeå universitet, Institutionen för informatik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-90126.
Full textBrewster, Fozlo Leo Stanley. "Application of littoral vulnerability assessment into the integrated coastal zone management process of Barbados, West Indies." Thesis, Cardiff University, 2005. http://orca.cf.ac.uk/55962/.
Full textLane, Lucille Richards. "Hazard Vulnerability in Socio-Economic Context: An Example from Ecuador." [Tampa, Fla. : s.n.], 2003. http://purl.fcla.edu/fcla/etd/SFE0000076.
Full textSenavattanagul, Thanahathai. "Vulnerability and Resilience of the Bang Luang Community to Flooding from the Chao Phraya River." The University of Waikato, 2008. http://hdl.handle.net/10289/2297.
Full textOzyurt, Gulizar. "Fuzzy Vulnerability Assessment Model Of Coastal Areas To Sea Level Rise." Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612653/index.pdf.
Full textksu, Gö
cek and Amasra regions of Turkey that have different geological, ecological and socio-economical properties. The results of the site studies show that Gö
ksu has high vulnerability, Gö
cek has moderate vulnerability and Amasra shows low vulnerability to sea level rise. These results are in accordance with the general literature on impacts of sea level rise at different geomorphological coastal areas thus the applicability of fuzzy vulnerability assessment model (FCVI) to coastal areas is validated.
Wherry, Susan Amelia. "Climate Change Effects and Water Vulnerability in the Molalla Pudding River Basin, Oregon, USA." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/556.
Full text