Academic literature on the topic 'Vulnerability of self'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vulnerability of self.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Vulnerability of self"

1

Berry, Amanda, and Tom Russell. "Self-study and Vulnerability." Studying Teacher Education 12, no. 2 (2016): 115–16. http://dx.doi.org/10.1080/17425964.2016.1197498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maroda, Karen. "Self-Disclosure and Vulnerability." Psychoanalytic Social Work 10, no. 2 (2003): 43–52. http://dx.doi.org/10.1300/j032v10n02_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

DeMaria, Alfred T. "Vulnerability Self Assessment Checklist." Management Report for Nonunion Organizations 41, no. 11 (2018): 4. http://dx.doi.org/10.1002/mare.30440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Morf, Carolyn C., and Walter Mischel. "Self-Concept, Self-Regulation, and Psychological Vulnerability." Self and Identity 1, no. 2 (2002): 103–4. http://dx.doi.org/10.1080/152988602317319267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

CUNHA, THIAGO, and VOLNEI GARRAFA. "Vulnerability." Cambridge Quarterly of Healthcare Ethics 25, no. 2 (2016): 197–208. http://dx.doi.org/10.1017/s096318011500050x.

Full text
Abstract:
Abstract:Collating the concepts of vulnerability through five regional perspectives on bioethics from the United States, Europe, Latin America, Africa, and Asia, this article proposes a means of integration between the different approaches in order to seek a theoretical and normative basis for the field of global bioethics. It argues that only through opening continuous, critical, and self-critical dialogue within the international bioethical community will it be possible to achieve a sufficiently global understanding of vulnerability that is capable of identifying the means needed for address
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Jianhua, Xiaoming Xu, Liu Hong, Shuliang Wang, and Qi Fei. "Attack vulnerability of self-organizing networks." Safety Science 50, no. 3 (2012): 443–47. http://dx.doi.org/10.1016/j.ssci.2011.10.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Luxton, David, and Richard Wenzlaff. "Self-esteem uncertainty and depression vulnerability." Cognition & Emotion 19, no. 4 (2005): 611–22. http://dx.doi.org/10.1080/02699930441000355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Patel, Pankaj C. "Automation vulnerability, voting, and self-employment." Journal of Business Venturing Insights 19 (June 2023): e00389. http://dx.doi.org/10.1016/j.jbvi.2023.e00389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sautereau, Cyndie. "Subjectivité et vulnérabilité chez Ricœur et Levinas." Études Ricoeuriennes / Ricoeur Studies 4, no. 2 (2014): 8–24. http://dx.doi.org/10.5195/errs.2013.190.

Full text
Abstract:
In what sense is the self, as Ricœur conceives it, a vulnerable self? We shall argue that vulnerability, as far as it concerns the self, can be approached on three levels: reflexive, of human abilities and ontological. However, if Ricœur helps us think human fragility and thus define a new concept of self, vulnerability remains understood in the framework of a reflection on human acting (agir) of which it is, in a certain way, the negative. Autonomy, as the culminating point of acting, remains the ultimate goal. For us, approaching vulnerability from such a reference point ought to be put into
APA, Harvard, Vancouver, ISO, and other styles
10

Fawcett, Barbara. "Vulnerability." International Social Work 52, no. 4 (2009): 473–84. http://dx.doi.org/10.1177/0020872809104251.

Full text
Abstract:
English Vulnerability is a policy and practice concept which is often ascribed a fixed meaning with universal connotations. In this article, different conceptualizations of vulnerability are examined. It is argued that this exploration militates against the erosion of self-determination and autonomy and revitalizes working relationships between service users and professionals. French Vulnérabilité est un concept de politique et de pratique auquel est souvent attribuée une signification fixe aux connotations universelles. Dans cet article, les conceptualisations différentes de la vulnérabilité
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Vulnerability of self"

1

Casimer, Lisa A. "Vulnerability as key to sacramentality." Online full text .pdf document, available to Fuller patrons only, 2002. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilson, Frances Carol. "Self-Concept Uncertainty and Self-Esteem Liability: Vulnerability Factors for Depression?" W&M ScholarWorks, 1997. https://scholarworks.wm.edu/etd/1539626139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Franche, Renée-Louise. "Self-criticism and dependency as vulnerability factors to depression." Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/30809.

Full text
Abstract:
The present study investigated the interpersonal schemata of self-criticism and interpersonal dependency as cognitive vulnerability factors to depression. The study's primary hypothesis was that dependency and self-criticism schemata remain stable at remission and that they are independent of mood. Stability in these two factors was related both to their self-report at remission and to their endurance as components influencing the information processing of patients during remission. Twenty clinically depressed individuals, 20 remitted depressives, and 20 normal controls were compared on memory
APA, Harvard, Vancouver, ISO, and other styles
4

Stange, Jonathan P. "Inflexibility and Vulnerability to Depression." Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/346556.

Full text
Abstract:
Psychology<br>Ph.D.<br>Although existing research has evaluated various cognitive, behavioral, physiological, and environmental risk factors for depression (Johnson, Cuellar, & Miller, 2009), previous studies have typically focused on the content of cognitive styles and coping styles when evaluating vulnerability to depression (e.g., Alloy et al., 2006; Compas et al., 2009). However, recent research has suggested that the ability to flexibly engage in different thoughts, strategies, and behaviors that fit situational demands may be most indicative of psychological health (Bonanno & Burton, 201
APA, Harvard, Vancouver, ISO, and other styles
5

Saxton, Brandon T. "Perceived Burdensomeness: Exploring Potential Vulnerability Factors." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29895.

Full text
Abstract:
Suicide affects hundreds of thousands of people around the world each year. Despite many coordinated efforts to address this problem, in multiple domains, these numbers have risen over the last decade. The Interpersonal Theory of Suicide is a relatively recent theory that has received considerable attention and investigation. Perceived burdensomeness is one of the constructs from this theory. The belief that you are a burden on others is a robust predictor of suicidal ideation and, to a less understood extent, suicidal behavior. To my knowledge, few studies have looked at the factors that lead
APA, Harvard, Vancouver, ISO, and other styles
6

Pulido, Manuel D. "Self-Reported Emotional State as a Measure of Interpersonal Vulnerability." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10601962.

Full text
Abstract:
<p> This study was conducted to explicate and measure the concept of vulnerability from an interpersonal communication perspective. Frequent but varied use of the term &ldquo;vulnerability&rdquo; within communication studies and other related disciplines (e.g., sociology, psychology) has resulted in conceptual, and consequently, operational confusion. To ameliorate these concerns, this study presents the notion of <i>vulnerability in interpersonal moments </i> as a means of differentiating the emotional state of vulnerability experienced in real or anticipated interpersonal interactions from e
APA, Harvard, Vancouver, ISO, and other styles
7

Hoshi, Miwako. "Self-Transcendence, Vulnerability, and Well-Being in Hospitalized Japanese Elders." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/196094.

Full text
Abstract:
The primary purpose of this study was to explore the relationships among vulnerability, self-transcendence, and well-being in Japanese hospitalized elders. With their declining functional health and diminishing social network, elderly people are considered as a vulnerable population, which require special care and attention in the field of nursing. Self-Transcendence is identified as one of the developmental resources that promote well-being in later adulthood during increased vulnerability; however, applicability of the concept of self-transcendence as well as its theory has never been tested
APA, Harvard, Vancouver, ISO, and other styles
8

Mortlock, Alex. "Attention Training, Self-Focus, and Stress-Vulnerability: The Influence of Self-Esteem, Self-Esteem Range, and Social Anxiety." Thesis, University of Canterbury. Psychology, 2009. http://hdl.handle.net/10092/2654.

Full text
Abstract:
Attention training (AT) is a therapeutic intervention developed by Adrian Wells that involves the training of attentional skills to treat emotional disorders (Wells, 1990). This study investigated whether the AT technique works as theorised to reduce anxiety and other symptoms by reducing self-focus. In a laboratory setting, seventy-one student participants were exposed to a single session of either an AT analogue or a control treatment to see if AT would reduce their self-focus and vulnerability to a subsequent stressor task. AT was not found to decrease self-focus or reduce vulnerability to
APA, Harvard, Vancouver, ISO, and other styles
9

McCarthy, Catherine M. "Latent Vulnerability Among Low-Risk Adolescents." Diss., Temple University Libraries, 2010. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/95153.

Full text
Abstract:
Educational Psychology<br>Ph.D.<br>This longitudinal study assessed education achievement outcomes among a cohort of eighth graders for whom future college-level academic success would be predicted. The sample was drawn from the NELS:88 database and was comprised of students who scored in the top quintile on a mathematics achievement test and who were identified as representing the top two quartiles of a measurement of socio-economic status. This group, identified as low-risk for academic failure, was predicted to attain a bachelor's degree by the age of twenty-six. A subgroup from among this
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Salloum, Ziyad. "Topology-aware vulnerability mitigation worms." Thesis, Royal Holloway, University of London, 2011. http://repository.royalholloway.ac.uk/items/eec735f4-4649-4b31-285f-604bdaa4799c/10/.

Full text
Abstract:
In very dynamic Information and Communication Technology (ICT) infrastructures, with rapidly growing applications, malicious intrusions have become very sophisticated, effective, and fast. Industries have suffered billions of US dollars losses due only to malicious worm outbreaks. Several calls have been issued by governments and industries to the research community to propose innovative solutions that would help prevent malicious breaches, especially with enterprise networks becoming more complex, large, and volatile. In this thesis we approach self-replicating, self-propagating, and self-con
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Vulnerability of self"

1

Rajasekhar, D. Effectiveness of micro-finance programmes in reducing vulnerability to debt bondage in Andhra Pradesh. Institute for Social and Economic Change in collaboration with Poverty Learning Foundation, Hyderabad, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1949-, Gianotti Patricia, ed. Listening with purpose: Entry points into shame and narcissistic vulnerability. Jason Aronson, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

J, Mitchell John. Adolescent vulnerability: A sympathetic look at the frailties and limitations of youth. Detselig Enterprises Ltd., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marcetti, Corrado, Giancarlo Paba, Anna Lisa Pecoriello, and Nicola Solimano, eds. Housing Frontline. Firenze University Press, 2012. http://dx.doi.org/10.36253/978-88-6655-082-2.

Full text
Abstract:
Over recent years, there has been a sharp increase in the various possible forms of poverty and housing vulnerability: from the total lack of shelter of the homeless to the risk of losing their home that now threatens numerous families in medium-low income brackets. At the same time, the traditional linear and standardised housing policies appear no longer adequate to address these phenomena. This book contains the results of a study entrusted by the Tuscan Regional Authority to a working group from the University of Florence and the Fondazione Giovanni Michelucci. The research explores the fi
APA, Harvard, Vancouver, ISO, and other styles
5

Wilkinson, Amber. Our Bedroom: Intimacy & Vulnerability Journal. Oh Hey Void, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wilkinson, Amber. Our Bedroom: Intimacy & Vulnerability Journal. Oh Hey Void, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guisinger, Alexandra. Economic Vulnerability, Self-Interest, and Individual Trade Preferences. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190651824.003.0004.

Full text
Abstract:
Chapter 4 provides an original explanation both for why women and minorities are more likely to express protectionist sentiments and for why those protectionist sentiments are not reflected in their voting. The chapter provides an extension of standard models of individual economic well-being to consider trade’s effect not only on wages but also on employment volatility, which is increased by openness to foreign trade. The chapter offers analysis of original survey data from 2006 and 2010 and three decades of American National Election Studies to confirm the previously observed gender gap and
APA, Harvard, Vancouver, ISO, and other styles
8

Exposing Vulnerability: Self-Mediation in Scandinavian Films by Women. Intellect, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Freedom, Vulnerability, And Love: A Journey Of Self Discovery. Balboa Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jensen, Riley. PURE UNADULTERATED GUTS: Insights for Bravery, Courage, and Vulnerability. BEYOND PUBLISHING, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Vulnerability of self"

1

Brown, Jason W. "Vulnerability and Value." In Self and Process. Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4612-3138-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rungapadiachy, Dev M. "Stress, Vulnerability, and Self-Awareness." In Self-Awareness in Health Care. Macmillan Education UK, 2008. http://dx.doi.org/10.1007/978-1-137-06710-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dietz, Chris. "Vulnerability in medical institutions." In Self-Declaration in the Legal Recognition of Gender. Routledge, 2022. http://dx.doi.org/10.4324/9780429288203-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yeng, Sokthan. "Vulnerability, Volatility, and the No-Self." In Buddhist Feminism. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51162-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Doerr, Christian, Paul Smith, and David Hutchison. "Network Heterogeneity and Cascading Failures – An Evaluation for the Case of BGP Vulnerability." In Self-Organizing Systems. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10865-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

McDonough, Sharon, and Narelle Lemon. "Stepping into a shared vulnerability." In Creating a Place for Self-care and Wellbeing in Higher Education. Routledge, 2021. http://dx.doi.org/10.4324/9781003144397-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Henke, Julia. "A Structural Equation Model for Self-Assessed Economic Vulnerability." In Revisiting Economic Vulnerability in Old Age. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-36323-9_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Park, Donghyuk. "Bangladeshi Fruit Vendors in the Streets of Paris: Vulnerable Asylum Seekers or Self-Imposed Victims of Exploitation?" In Vulnerability, Exploitation and Migrants. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137460417_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nakano, Ryoko. "Between Self-Esteem and Self-Respect: Vulnerability in Japanese Foreign Policy." In The Vulnerable Subject. Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137292148_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bartos, Karel, Martin Rehak, and Michal Svoboda. "Self-organized Collaboration of Distributed IDS Sensors." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37300-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Vulnerability of self"

1

Yang, Shaojie, Haoran Xu, Fangliang Xu, and Yongjun Wang. "S2Vul: Vulnerability Analysis Based on Self-supervised Information Integration." In 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2024. https://doi.org/10.1109/issre62328.2024.00019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jambhorkar, Sagar. "Open Port Vulnerability Assessment For Self-Defense Using Open-Source Tool." In 2024 International Conference on Innovations and Challenges in Emerging Technologies (ICICET). IEEE, 2024. http://dx.doi.org/10.1109/icicet59348.2024.10616350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Dongjie, Jinfu Chen, Saihua Cai, Qiaowei Feng, Yuhao Chen, and Xinyi Hu. "SCVD-SA: A Smart Contract Vulnerability Detection Method Based on Hybrid Deep Learning Model and Self-attention Mechanism." In 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C). IEEE, 2024. http://dx.doi.org/10.1109/saner-c62648.2024.00034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Feng, Xiangyang, and Wen Chen. "SC-CCA: A Deep Learning Framework for Smart Contract Vulnerability Detection Based on CNN, BiLSTM, and Self-Attention Mechanism." In 2024 6th International Conference on Frontier Technologies of Information and Computer (ICFTIC). IEEE, 2024. https://doi.org/10.1109/icftic64248.2024.10913127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Musliner, David J., Jeffrey M. Rye, and Tom Marble. "Using Concolic Testing to Refine Vulnerability Profiles in FUZZBUSTER." In 2012 IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW). IEEE, 2012. http://dx.doi.org/10.1109/sasow.2012.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Majumder, Rana, Subhranil Som, and Ritu Gupta. "Vulnerability prediction through self-learning model." In 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS). IEEE, 2017. http://dx.doi.org/10.1109/ictus.2017.8286040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gan, Hong, and Dan Pan. "A Self-Rollback System for Vulnerability Attack." In 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE). IEEE, 2012. http://dx.doi.org/10.1109/iccsee.2012.468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Costa Júnior, Edmilson P. da, Silas T. Medeiros, Carlos Eduardo da Silva, and Marcos Madruga. "An Architecture for Self-adaptive Distributed Firewall." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19318.

Full text
Abstract:
The notion of secure perimeter given by border firewalls ignores the possibility of attacks originating from inside the network. Although distributed firewalls allow the protection of individual hosts, the provided services might still be susceptible to attacks, as firewalls usually do not analyze application protocols. In this way, software vulnerabilities may be exploited until the problem has been fixed. From vulnerability discovery to the application of patches there is an exposure window that should be reduced. In this context, this paper presents an architecture for a distributed firewal
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Salloum, Ziyad S., and Stephen D. Wolthusen. "A link-layer-based self-replicating vulnerability discovery agent." In 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2010. http://dx.doi.org/10.1109/iscc.2010.5546723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Long, Fei, Fei Gao, Zhiyong Zha, et al. "PoC Self-Generation Technology Based on Vulnerability Verification Program." In 2023 IEEE 4th Annual Flagship India Council International Subsections Conference (INDISCON). IEEE, 2023. http://dx.doi.org/10.1109/indiscon58499.2023.10270363.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Vulnerability of self"

1

for Development Programme, Knowledge. Using Indices to Capture Vulnerability for Development Finance in SIDS. Institute of Development Studies (IDS), 2019. http://dx.doi.org/10.19088/k4d.2021.066.

Full text
Abstract:
This rapid review examines evidence on indices to capture vulnerability for development finance in Small Island Developing States (SIDS). A key issue when it comes to aid allocation to Small Island Developing States (SIDS) is whether current measures of development – such as income per capita - are truly able to reflect the unique set of challenges that these countries face. Inability to accurately measure development in SIDS can lead to substantial risk. On the one hand, aid allocation that solely relies on income levels may result in an unsustainable reduction in external support to SIDS, le
APA, Harvard, Vancouver, ISO, and other styles
2

Xourafi, Lydia, Polyxeni Sardi, and Anastasia Kostaki. Exploring psychological vulnerability and responses to the COVID-19 lockdown in Greece. Verlag der Österreichischen Akademie der Wissenschaften, 2022. http://dx.doi.org/10.1553/populationyearbook2022.dat.5.

Full text
Abstract:
This study explores the psychosocial impact of the COVID-19 pandemic on the population in Greece during the general lockdown period. Specifically, depression, anxiety and stress scores, as well as the factors associated with vulnerability to developing mental health conditions during this period, were investigated. A total of 911 adults participated in an online survey by completing a self-reporting questionnaire that included demographic questions, DASS-42 items (anxiety, stress and depression scales) and other questions related to personal experience. Regression modelling uncovered a signifi
APA, Harvard, Vancouver, ISO, and other styles
3

Brown, Charlotte, and Costanza Torre. Key Considerations: Food Assistance Prioritisation in Refugee Settlements in Uganda and its Impacts. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/sshap.2024.054.

Full text
Abstract:
This brief provides considerations around the humanitarian and policy implications of the general food and cash assistance (GFA) prioritisation strategy in Uganda’s refugee settlements. In light of ongoing cuts to humanitarian funding, the considerations in this brief are relevant to refugee-hosting countries in and beyond East Africa. Globally, protracted emergencies and displacement situations are increasingly undergoing severe and chronic underfunding.1 In the face of ever-shrinking funding, humanitarian settings have recently seen the introduction of ‘prioritisation exercises’. These exerc
APA, Harvard, Vancouver, ISO, and other styles
4

Winters, Paul, Lina Salazar, Julián Aramburu, and Mario González. Food Security and Productivity: Impacts of Technology Adoption in Small Subsistence Farmers in Bolivia. Inter-American Development Bank, 2015. http://dx.doi.org/10.18235/0012280.

Full text
Abstract:
This paper presents the impact evaluation of CRIAR program, implemented in rural areas in Bolivia. The objective of CRIAR is to increase smallholders' agricultural income and food security through productivity improvements triggered by technological adoption. In this study, we use data from a sample of 1,287 households-817 beneficiaries and 470 controls- interviewed specifically for this evaluation. The econometric approach to estimate the program's impact is an instrumental variable model. This approach addresses possible endogeneity and self-selection issues that might arise from program's i
APA, Harvard, Vancouver, ISO, and other styles
5

Puffer, Shellie, Laura Tennant, Jeffrey Lovich, et al. Birds not in flight : using camera traps to observe ground use of birds at a wind-energy facility. Engineer Research and Development Center (U.S.), 2025. https://doi.org/10.21079/11681/49590.

Full text
Abstract:
Camera trapping is increasingly used to collect information on wildlife occurrence and behaviour remotely. This provides insights into habitat use by species of interest and gathers information on non-target species. We implemented ground-based camera trapping to investigate behaviours of ground-dwelling birds and to monitor activities of Agassiz’s desert tortoises at their self-constructed burrows in a wind-energy facility near Palm Springs, California. While doing so, we collected data on numerous burrow commensals, including birds. Monitoring from late spring to midautumn showed regular use
APA, Harvard, Vancouver, ISO, and other styles
6

Fabiani, Beatrice, Marco Stampini, Natalia Aranco, Fiorella Benedetti, and Pablo Ibarrarán. Caregivers for Older People: Overburdened and Underpaid: Evidence from an Inter-American Development Bank Survey in Latin America and the Caribbean. Version 1: June 2024. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013053.

Full text
Abstract:
Human resources are essential to ensure the quality of long-term care. Yet, there are many things we do not know about the wellbeing, the working conditions, and the training of the caregivers for older people. Our work aims to fill some of the existing knowledge gaps by analyzing new data on the conditions of paid and unpaid caregivers in Latin America and the Caribbean. The new data is generated by a continuous self-administered online survey created by the Inter-American Development Bank, implemented since November 2023 in English, Portuguese, and Spanish in 25 countries. The results highli
APA, Harvard, Vancouver, ISO, and other styles
7

Helping family planning clients self-assess HIV vulnerability: User testing a waiting area chatbot in Zambia. Population Council, 2021. http://dx.doi.org/10.31899/hiv13.1016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!