Academic literature on the topic 'Vulnerability of self'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vulnerability of self.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Vulnerability of self"
Berry, Amanda, and Tom Russell. "Self-study and Vulnerability." Studying Teacher Education 12, no. 2 (2016): 115–16. http://dx.doi.org/10.1080/17425964.2016.1197498.
Full textMaroda, Karen. "Self-Disclosure and Vulnerability." Psychoanalytic Social Work 10, no. 2 (2003): 43–52. http://dx.doi.org/10.1300/j032v10n02_04.
Full textDeMaria, Alfred T. "Vulnerability Self Assessment Checklist." Management Report for Nonunion Organizations 41, no. 11 (2018): 4. http://dx.doi.org/10.1002/mare.30440.
Full textMorf, Carolyn C., and Walter Mischel. "Self-Concept, Self-Regulation, and Psychological Vulnerability." Self and Identity 1, no. 2 (2002): 103–4. http://dx.doi.org/10.1080/152988602317319267.
Full textCUNHA, THIAGO, and VOLNEI GARRAFA. "Vulnerability." Cambridge Quarterly of Healthcare Ethics 25, no. 2 (2016): 197–208. http://dx.doi.org/10.1017/s096318011500050x.
Full textZhang, Jianhua, Xiaoming Xu, Liu Hong, Shuliang Wang, and Qi Fei. "Attack vulnerability of self-organizing networks." Safety Science 50, no. 3 (2012): 443–47. http://dx.doi.org/10.1016/j.ssci.2011.10.005.
Full textLuxton, David, and Richard Wenzlaff. "Self-esteem uncertainty and depression vulnerability." Cognition & Emotion 19, no. 4 (2005): 611–22. http://dx.doi.org/10.1080/02699930441000355.
Full textPatel, Pankaj C. "Automation vulnerability, voting, and self-employment." Journal of Business Venturing Insights 19 (June 2023): e00389. http://dx.doi.org/10.1016/j.jbvi.2023.e00389.
Full textSautereau, Cyndie. "Subjectivité et vulnérabilité chez Ricœur et Levinas." Études Ricoeuriennes / Ricoeur Studies 4, no. 2 (2014): 8–24. http://dx.doi.org/10.5195/errs.2013.190.
Full textFawcett, Barbara. "Vulnerability." International Social Work 52, no. 4 (2009): 473–84. http://dx.doi.org/10.1177/0020872809104251.
Full textDissertations / Theses on the topic "Vulnerability of self"
Casimer, Lisa A. "Vulnerability as key to sacramentality." Online full text .pdf document, available to Fuller patrons only, 2002. http://www.tren.com.
Full textWilson, Frances Carol. "Self-Concept Uncertainty and Self-Esteem Liability: Vulnerability Factors for Depression?" W&M ScholarWorks, 1997. https://scholarworks.wm.edu/etd/1539626139.
Full textFranche, Renée-Louise. "Self-criticism and dependency as vulnerability factors to depression." Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/30809.
Full textStange, Jonathan P. "Inflexibility and Vulnerability to Depression." Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/346556.
Full textSaxton, Brandon T. "Perceived Burdensomeness: Exploring Potential Vulnerability Factors." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29895.
Full textPulido, Manuel D. "Self-Reported Emotional State as a Measure of Interpersonal Vulnerability." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10601962.
Full textHoshi, Miwako. "Self-Transcendence, Vulnerability, and Well-Being in Hospitalized Japanese Elders." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/196094.
Full textMortlock, Alex. "Attention Training, Self-Focus, and Stress-Vulnerability: The Influence of Self-Esteem, Self-Esteem Range, and Social Anxiety." Thesis, University of Canterbury. Psychology, 2009. http://hdl.handle.net/10092/2654.
Full textMcCarthy, Catherine M. "Latent Vulnerability Among Low-Risk Adolescents." Diss., Temple University Libraries, 2010. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/95153.
Full textAl-Salloum, Ziyad. "Topology-aware vulnerability mitigation worms." Thesis, Royal Holloway, University of London, 2011. http://repository.royalholloway.ac.uk/items/eec735f4-4649-4b31-285f-604bdaa4799c/10/.
Full textBooks on the topic "Vulnerability of self"
Rajasekhar, D. Effectiveness of micro-finance programmes in reducing vulnerability to debt bondage in Andhra Pradesh. Institute for Social and Economic Change in collaboration with Poverty Learning Foundation, Hyderabad, 2006.
Find full text1949-, Gianotti Patricia, ed. Listening with purpose: Entry points into shame and narcissistic vulnerability. Jason Aronson, 2012.
Find full textJ, Mitchell John. Adolescent vulnerability: A sympathetic look at the frailties and limitations of youth. Detselig Enterprises Ltd., 1996.
Find full textMarcetti, Corrado, Giancarlo Paba, Anna Lisa Pecoriello, and Nicola Solimano, eds. Housing Frontline. Firenze University Press, 2012. http://dx.doi.org/10.36253/978-88-6655-082-2.
Full textWilkinson, Amber. Our Bedroom: Intimacy & Vulnerability Journal. Oh Hey Void, 2022.
Find full textWilkinson, Amber. Our Bedroom: Intimacy & Vulnerability Journal. Oh Hey Void, 2022.
Find full textGuisinger, Alexandra. Economic Vulnerability, Self-Interest, and Individual Trade Preferences. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190651824.003.0004.
Full textExposing Vulnerability: Self-Mediation in Scandinavian Films by Women. Intellect, Limited, 2019.
Find full textJensen, Riley. PURE UNADULTERATED GUTS: Insights for Bravery, Courage, and Vulnerability. BEYOND PUBLISHING, 2023.
Find full textBook chapters on the topic "Vulnerability of self"
Brown, Jason W. "Vulnerability and Value." In Self and Process. Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4612-3138-7_7.
Full textRungapadiachy, Dev M. "Stress, Vulnerability, and Self-Awareness." In Self-Awareness in Health Care. Macmillan Education UK, 2008. http://dx.doi.org/10.1007/978-1-137-06710-4_2.
Full textDietz, Chris. "Vulnerability in medical institutions." In Self-Declaration in the Legal Recognition of Gender. Routledge, 2022. http://dx.doi.org/10.4324/9780429288203-5.
Full textYeng, Sokthan. "Vulnerability, Volatility, and the No-Self." In Buddhist Feminism. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51162-3_3.
Full textDoerr, Christian, Paul Smith, and David Hutchison. "Network Heterogeneity and Cascading Failures – An Evaluation for the Case of BGP Vulnerability." In Self-Organizing Systems. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10865-5_19.
Full textMcDonough, Sharon, and Narelle Lemon. "Stepping into a shared vulnerability." In Creating a Place for Self-care and Wellbeing in Higher Education. Routledge, 2021. http://dx.doi.org/10.4324/9781003144397-17.
Full textHenke, Julia. "A Structural Equation Model for Self-Assessed Economic Vulnerability." In Revisiting Economic Vulnerability in Old Age. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-36323-9_22.
Full textPark, Donghyuk. "Bangladeshi Fruit Vendors in the Streets of Paris: Vulnerable Asylum Seekers or Self-Imposed Victims of Exploitation?" In Vulnerability, Exploitation and Migrants. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137460417_10.
Full textNakano, Ryoko. "Between Self-Esteem and Self-Respect: Vulnerability in Japanese Foreign Policy." In The Vulnerable Subject. Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137292148_9.
Full textBartos, Karel, Martin Rehak, and Michal Svoboda. "Self-organized Collaboration of Distributed IDS Sensors." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37300-8_13.
Full textConference papers on the topic "Vulnerability of self"
Yang, Shaojie, Haoran Xu, Fangliang Xu, and Yongjun Wang. "S2Vul: Vulnerability Analysis Based on Self-supervised Information Integration." In 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2024. https://doi.org/10.1109/issre62328.2024.00019.
Full textJambhorkar, Sagar. "Open Port Vulnerability Assessment For Self-Defense Using Open-Source Tool." In 2024 International Conference on Innovations and Challenges in Emerging Technologies (ICICET). IEEE, 2024. http://dx.doi.org/10.1109/icicet59348.2024.10616350.
Full textWang, Dongjie, Jinfu Chen, Saihua Cai, Qiaowei Feng, Yuhao Chen, and Xinyi Hu. "SCVD-SA: A Smart Contract Vulnerability Detection Method Based on Hybrid Deep Learning Model and Self-attention Mechanism." In 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C). IEEE, 2024. http://dx.doi.org/10.1109/saner-c62648.2024.00034.
Full textFeng, Xiangyang, and Wen Chen. "SC-CCA: A Deep Learning Framework for Smart Contract Vulnerability Detection Based on CNN, BiLSTM, and Self-Attention Mechanism." In 2024 6th International Conference on Frontier Technologies of Information and Computer (ICFTIC). IEEE, 2024. https://doi.org/10.1109/icftic64248.2024.10913127.
Full textMusliner, David J., Jeffrey M. Rye, and Tom Marble. "Using Concolic Testing to Refine Vulnerability Profiles in FUZZBUSTER." In 2012 IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW). IEEE, 2012. http://dx.doi.org/10.1109/sasow.2012.12.
Full textMajumder, Rana, Subhranil Som, and Ritu Gupta. "Vulnerability prediction through self-learning model." In 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS). IEEE, 2017. http://dx.doi.org/10.1109/ictus.2017.8286040.
Full textGan, Hong, and Dan Pan. "A Self-Rollback System for Vulnerability Attack." In 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE). IEEE, 2012. http://dx.doi.org/10.1109/iccsee.2012.468.
Full textCosta Júnior, Edmilson P. da, Silas T. Medeiros, Carlos Eduardo da Silva, and Marcos Madruga. "An Architecture for Self-adaptive Distributed Firewall." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19318.
Full textAl-Salloum, Ziyad S., and Stephen D. Wolthusen. "A link-layer-based self-replicating vulnerability discovery agent." In 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2010. http://dx.doi.org/10.1109/iscc.2010.5546723.
Full textLong, Fei, Fei Gao, Zhiyong Zha, et al. "PoC Self-Generation Technology Based on Vulnerability Verification Program." In 2023 IEEE 4th Annual Flagship India Council International Subsections Conference (INDISCON). IEEE, 2023. http://dx.doi.org/10.1109/indiscon58499.2023.10270363.
Full textReports on the topic "Vulnerability of self"
for Development Programme, Knowledge. Using Indices to Capture Vulnerability for Development Finance in SIDS. Institute of Development Studies (IDS), 2019. http://dx.doi.org/10.19088/k4d.2021.066.
Full textXourafi, Lydia, Polyxeni Sardi, and Anastasia Kostaki. Exploring psychological vulnerability and responses to the COVID-19 lockdown in Greece. Verlag der Österreichischen Akademie der Wissenschaften, 2022. http://dx.doi.org/10.1553/populationyearbook2022.dat.5.
Full textBrown, Charlotte, and Costanza Torre. Key Considerations: Food Assistance Prioritisation in Refugee Settlements in Uganda and its Impacts. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/sshap.2024.054.
Full textWinters, Paul, Lina Salazar, Julián Aramburu, and Mario González. Food Security and Productivity: Impacts of Technology Adoption in Small Subsistence Farmers in Bolivia. Inter-American Development Bank, 2015. http://dx.doi.org/10.18235/0012280.
Full textPuffer, Shellie, Laura Tennant, Jeffrey Lovich, et al. Birds not in flight : using camera traps to observe ground use of birds at a wind-energy facility. Engineer Research and Development Center (U.S.), 2025. https://doi.org/10.21079/11681/49590.
Full textFabiani, Beatrice, Marco Stampini, Natalia Aranco, Fiorella Benedetti, and Pablo Ibarrarán. Caregivers for Older People: Overburdened and Underpaid: Evidence from an Inter-American Development Bank Survey in Latin America and the Caribbean. Version 1: June 2024. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013053.
Full textHelping family planning clients self-assess HIV vulnerability: User testing a waiting area chatbot in Zambia. Population Council, 2021. http://dx.doi.org/10.31899/hiv13.1016.
Full text