×
10% Discount on All E-Books through IGI Global’s Online Bookstore Extended
(10% discount on all e-books cannot be combined with most offers. Discount is valid on purchases made directly through IGI Global Online Bookstore (
www.igi-global.com
)
and may not be utilized by booksellers and distributors. Offer does not apply to e-Collections and exclusions of select titles may apply. Offer expires June 30, 2022.)
Browse Titles
Login/Create Account
Language:
English
US
China
Cart
0
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
10% Discount on All E-Books through IGI Global’s Online Bookstore
With the continued paper shortages and supply chain issues, we have been informed by our partners that there will be substantial delays in printing and shipping publications, especially as we approach the holiday season. To help incentive the electronic format and streamline access to the latest research, we are offering a 10% discount on all our e-books through IGI Global’s Online Bookstore. Hosted on the InfoSci
®
platform, these titles feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Browse Titles
IGI Global to Convert an Additional 30 Journals to Full Gold Open Access for the 2022 Volume Year
IGI Global is to convert an additional 30 journals to full gold open access (OA) for their 2022 volume year, which will expand their OA collection to contain 60 gold open access and one (1) platinum open access journal.
Learn More
All IGI Global Scholarly Journals Shift to "Digital Preferred" Format
In response to the overwhelming demand for electronic content coupled with the mission to decrease the overall environmental impacts of print production and distribution, all IGI Global journals will shift into a digital preferred model for the 2022 volume year. Under this model, journals will become primarily available under electronic format and articles will be immediately available upon acceptance. Print subscriptions and print + electronic subscriptions will still be available, but for the print version, all articles that are published during the volume year will become available at the end of the year in a single (1) printed volume.
Learn More
IGI Global’s New DEI e-Book Collection
Acquire Over 320+ E-Books on Diversity, Equity, and Inclusivity from a publisher that has been dedicated to DEI since its inception over 30 years ago. Now, benefit from a collection of all of our DEI e-Books at a 90% Discount.
Learn More
Offering a
5% Pre-Publication Discount
on
All Reference Books Ordered Through IGI Global’s Online Bookstore*
To support customers with accessing the latest research, IGI Global is offering a 5% pre-publication discount on all hardcover, softcover, e-books, and hardcover + e-books titles.
*5% discount offer is eligible on hardcover, softcover, e-books, and hardcover + e-books titles and is automatically applied directly to the shopping cart. Discount offer only valid on purchases made directly through IGI Global’s Online Bookstore and offer expires 30 days after the publication’s release. This automatic discount is not intended for use by book distributors or wholesalers.
Browse Titles
Books
Books
Open Access Books
OnDemand Book Chapters
Journals
Journals
Open Access Journals
OnDemand Journal Articles
e-Collections
e-Collections
Transformative Open Access (Read & Publish)
Open Access
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
Author Services
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Vulnerability
1.
Vulnerability
is a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
Learn more in: A Comprehensive Perspective on Mobile Forensics: Process, Tools, and Future Trends
2.
Vulnerability
is the degree to which a system is susceptible to, or unable to cope with, adverse effects of climate change, including climate variability and extremes.
Vulnerability
is a function of the character, magnitude, and rate of climate change and variation to which a system is exposed, its sensitivity, and its adaptive capacity.
Learn more in: Climate Change Impact on the Water Resources of the Limpopo Basin: Simulations of a Coupled GCM and Hybrid Atmospheric-Terrestrial Water Balance (HATWAB) Model
3.
The quality of being easily hurt or attacked.
Learn more in: Global Wannacrypt Ransomware Attack: Tackling the Threat of Virtual Marauders
4.
The ability to set aside one’s preconceptions and deep-seated beliefs, to rethink processes, procedures, ways of viewing the world, and other aspects of the ways that a person preconceives living in the world and being of the world.
Learn more in: Considering Instructors' Philosophical Belief Systems and Potential Impact Upon eLearning Engagement: Transformative Social Learning Environments
5.
Condition of fragility of an individual, due to which, for example, he can receive damage or discrimination.
Learn more in: Science, Technocracy, and Artificial Intelligence: An Ethical-Juridical Reflection Prompted by the Current Pandemic
6.
A security weakness in a system that that could be exploited by an attacker to cause harm.
Learn more in: Security of Cloud Computing
7.
The state of being e asily persuadable or liable to yield to the impacts of environmental changes.
Learn more in: Potential Impacts of Climate Change on the Inland Fisheries of Arid and Semi-Arid Regions of Africa: Impacts of Climate Change on Inland Fisheries
8.
A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
Learn more in: National Security Policy and Strategy and Cyber Security Risks
9.
A
vulnerability
is a weakness or flaw that exists in a system due to design, operation procedures or implementation fault. A
vulnerability
may result in cyber-attack to compromise a system. Result may be data theft, denial of service, or an attempt to access and modify files.
Learn more in: A Machine Learning-Based Cyber Defence System for an Intelligent City
10.
Any weakness in a system (typically a computer system) that poses a risk of attack to the owner.
Learn more in: Disruptive Technology Impacts on Security
11.
Vulnerability
refers to the characteristics and circumstances of a community, system or asset that make it susceptible to the damaging effects of a hazard ( UNISDR, 2009 AU92: The citation "UNISDR, 2009" matches multiple references. Please add letters (e.g. "Smith 2000a"), or additional authors to the citation, to uniquely match references and citations. ).
Vulnerability
involves a combination of factors that determine the degree to which a person or community, livelihood, assets, ecosystem are put at risk by a discrete and identifiable event in the nature.
Learn more in: Urban Flood Management Under Changing Climate: A Land Use-Based Study of Kochi Urban Area, Kerala
12.
Refers to a flaw in the computer system, which creates a way open to the attack.
Learn more in: Threats and Vulnerabilities of Mobile Applications
13.
Weaknesses of an infrastructure towards security and safety threats due to lack of measures, policies or strategy.
Learn more in: Business Continuity of Critical Infrastructures for Safety and Security Incidents
14.
It is defined as a defect, imperfection, weakness, or inadequacy of a system.
Learn more in: Classification of Spamming Attacks to Blogging Websites and Their Security Techniques
15.
The conditions determined by physical, social, economic and environmental factors or processes which increase the susceptibility of an individual, a community, assets or systems to the impacts of hazards ( ISDR, 2009 ).
Learn more in: Managing Risk in Global Food Supply Chains: Improving Food Security and Sustainability
16.
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
Learn more in: Requirements and Life Cycle Model-Based Assessment of NPP I&C Systems Cyber Security and Safety
17.
A weakness to an asset or system that can be exploited by a threat actor.
Learn more in: The Challenge of Adequately Defining Technical Risk
18.
Potential for loss.
Learn more in: Impact of Sea Level Rise on Coastal Regions and Strategic Responses
19.
It is the acceptance of the crisis (e.g., generational succession in FF), and it includes the attributes of people and organizations to suffer and subsequently transform small accidents into disasters.
Learn more in: The Organizational Resilience in Family Firms Studies: Role and Impact in Generational Succession
20.
Refers to the inability to resist the effects of a hostile environment.
Learn more in: Vulnerability of Oasis Agriculture to Climate Change in Morocco
21.
The condition of susceptibility to harm resulting from developmental problems, personal incapacities, disadvantaged social status, inadequacy of interpersonal networks and supports, degraded environments, and the interactions of these factors over the life course.
Learn more in: The Effects of the COVID-19 Outbreak on Social Service-Providing Organizations in the Migration Sector in Turkey and the Digital Measures
22.
Inability to cope with shocks and adversity.
Learn more in: The Role of Social Protection Policies in Fighting Poverty and Inequality During COVID-19: Challenges and Consequences in the Developing World
23.
It is the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally.
Learn more in: Victimization, Cultural Imperatives, and Empowerment of People of Color in the United States
24.
Security weakness in software.
Learn more in: A Taxonomy of Browser Attacks
25.
This term describes the cognitive understanding of the instructional process, wherein the student engages in differentiated understanding and efforts associated with the subject matter being learned. The student’s comfortableness with the information, the student’s comfortableness and engagement within the instructional environment (including the level of trust that the student feels towards the teacher and the other students) can further enhance each student’s ability to openly articulate creative thoughts and ideas, feeling a sense of safety that the student will not be derided for potentially incorrect understandings or “thinking outside the box” creativity that may be unusual understandings and ideas implemented with the subject matter under study.
Learn more in: Implicit Cognitive Vulnerability
26.
Vulnerability
is a humanistic characteristic, an inevitable part of being human. Young children are more susceptible to being vulnerable than at other life stages.
Vulnerability
is defined as “the likelihood of being harmed by unforeseen events or as susceptibility to exogenous shocks” embedded in the broader spectrum of socio-economic, political, and institutionally interconnected relationships in micro-macro environments (Johnson Harbach, 2020; Better Care Network, 2004).
Learn more in: Societal Intersections and COVID-19 Effects on Young Children Vulnerability: A Transdisciplinary Approach to Holistic Integration
27.
is a broad multidimensional concept that can refer to the person, the family or the population group in which the
vulnerability
arises. In the context of
vulnerability
caused by unemployment, constant change and economic uncertainty, etc. The job training proposals for young people are very important.
Learn more in: Students in Socially Vulnerable Contexts: Discovering Their Entrepreneurial Potential
28.
Vulnerability
is a flaw or weakness in system security procedures, internal controls, or implementation that could be exercised (accidentally triggered or intentionally exploited) and result in loss or harm.
Learn more in: Information Systems Risk Management: An Audit and Control Approach
29.
A measured weakness or aspect of a system that can be exploited and cause significant harm.
Learn more in: Risk Engine Design as a Key Security Enhancement to the Standard Architecture for Cognitive Radio
30.
Propensity of poor health and/or lack of access to health care services.
Learn more in: Analytics: Unpacking AIDS Policy in the Black Community
31.
A
vulnerability
is a weakness in a network computer system’s security procedures, administrative controls, system design, implementation, internal controls, or so forth that could be exploited by a threat for one to gain unauthorized access to information, to disrupt critical processing, or to violate a system security policy. It is a flaw that may allow harm to occur to an information technology activity. A measurement of
vulnerability
, which includes the susceptibility of a particular system to a specific attack and the opportunities available to a threat agent to mount that attack, is known as
vulnerability
assessment.
Learn more in: Implementing a Sound Public Information Security Program
32.
Trafficking is linked to the abuse of people in vulnerable situations, which is defined in international and European law. It highlights the lack of alternatives for a victim when submitting to the abuse. Thus, the Council of Europe advocates that the notion of
vulnerability
is treated in a wide sense by including situations of poverty and economic deprivation.
Learn more in: The Place of Traditional Ethical Values in Curbing Human Trafficking and the Enhancement of Democratic Principles in Nigeria
33.
It is a term of art and a basis for assessment methods in several contexts, including climate impact analysis, disaster management, and food security analysis. ‘
Vulnerability
’ is used because food fraud ‘risks’ do not exactly fit with the accepted definition of risk as something that has occurred frequently, will occur again and for which there is enough data to make quantitative assessments.
Learn more in: Food Adulteration: A Challenge for Safer Food
34.
Is a weakness in the organization, network that can be exploited by a threat.
Learn more in: Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework
35.
Is a defect or weakness in information system’s assets or mechanisms, which could lead to a security breach when exploited by malicious entities.
Learn more in: Cost Estimation and Security Investment of Security Projects
36.
A
vulnerability
is any weakness in a product, process or system which could potentially be exploited to reduce the security or function of that product, process, or system.
Learn more in: How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?
37.
Trafficking is to a great extent linked to the various kind of abuse of people in vulnerable situations. It is defined in assortment of ways in statute books and international instruments. It highlights the lack of alternatives for a victim when submitting to the abuse. Thus, different groups advocates that the notion of
vulnerability
is treated in a wide sense by including situations of poverty and economic deprivation.
Learn more in: Commodification of Human Beings and Power Imbalance in Human Trafficking: Ethical Implications
38.
Trafficking is to a great extent linked to the various kind of abuse of people in vulnerable situations. It is defined in assortment of ways in statute books and international instruments. It highlights the lack of alternatives for a victim when submitting to the abuse. Thus different groups advocates that the notion of
vulnerability
is treated in a wide sense by including situations of poverty and economic deprivation.
Learn more in: Ethical Implications of the Logic of Economic Gain Devoid of Respect for Human Dignity: A Human Trafficking Experience
39.
A weakness or flaw in an organization’s system that might be exploited to compromise security.
Learn more in: Information Security and Risk Management
40.
A weakness or bug in software programs that could lead to a security compromise if exploited.
Learn more in: Network Worms
41.
Weakness of an asset or control that can be exploited by one or more threats. The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved.
Learn more in: Cyber-Physical Security in Healthcare
42.
The propensity or predisposition to be adversely affected.
Learn more in: The Importance of Proper Dam Maintenance Due to the Increase of Torrential Floods in the Face of Climate Change
43.
Condition of fragility of an individual, due to which, for example, he can receive damage or discrimination.
Learn more in: The Condition of Vulnerability in the Educational Context: Ethical Considerations and Juridical Perspectives
44.
Degree of exposure to unpredictable and serious disturbances, disorder, or hazards.
Learn more in: Managing Supply Chain Risk and Uncertainty in the Post-Pandemic Era: A Strategic Perspective
45.
Allowing others to view one’s fragileness and disruptive dissonance, especially throughout the learning process within this discussion.
Learn more in: Creativity and Impactful Learning Through Implicit Cognitive Vulnerability
46.
Taking risks with no guarantee of success, emotional exposure.
Learn more in: The Grand Connection: Leadership Is Connecting With Others Through a Greater Purpose
47.
A defect or weakness in information system’s assets or mechanisms, which could lead to a security breach when exploited by malicious entities.
Learn more in: Management and Cost Estimation of Security Projects
48.
A weakness in a network computer system security procedures, administrative controls, system design, implementation, internal controls, etc. that could be exploited by a threat to gain an unauthorized access to information, disrupt critical processing, or violate a system security policy.
Learn more in: E-Planning: Information Security Risks and Management Implications
49.
Situation that puts firm survival at risk, such as low performance, low levels of slack resources, and public pressure.
Learn more in: Preference Reversal Under Vulnerability: An Application of Neural Networks in Mexican Family Firms
50.
Vulnerability
, in this context, may be defined as the diminished capacity of an individual or group to anticipate, cope with, resist and recover from the impact of a natural or man-made hazard. The concept is relative and dynamic.
Vulnerability
is most often associated with poverty, but it can also arise when people are isolated, insecure and defenceless in the face of risk, shock or stress. People differ in their exposure to risk as a result of their social group, gender, ethnic or other identity, age and other factors.
Learn more in: Adaptation to Climate Change for Sustainable Development: A Survey
51.
Vulnerability
is the characteristics determined by either social, economic and/or environmental factors which increase the susceptibility of one to risk or the impacts of hazards. Traffickers look for people who are vulnerable and therefore easier to exploit. It is obvious that
vulnerability
is the primary human condition. To be human is to be vulnerable very many things such as disease, cold, poverty, hunger, coercion, manipulation or deception, and the disruption of social relationships on which we depend. In human trafficking for instance, most of the victims of human trafficking are vulnerable not just in the ‘ontological’ sense that all humans are vulnerable, but in the sense that their condition or particular situation makes them more vulnerable than others (Fineman, 2014).
Learn more in: Disproportional Influence and Vulnerability Infringement in Human Trafficking: Ethico-Economic Implications
52.
Condition of fragility of an individual, due to which, for example, he can receive damage or discrimination.
Learn more in: The Relational Dimension of Care at the Foundation of the Rights of Pupils With SEN: Between Inclusiveness and Substantive Equality
53.
A weakness in software that can be exploited by a threat to cause harm to the process the software is designed to perform.
Learn more in: Threat Modeling and Secure Software Engineering Process
54.
Vulnerability
is a security flaw in operating systems or applications that could be exploited to attack the host.
Learn more in: Malicious Software in Mobile Devices
55.
The inability (of a system or a unit) to withstand the effects of a hostile environment is referred to as
vulnerability
. It is a state of emotional
vulnerability
accompanied by a degree of uncertainty. A window of
vulnerability
is a period of time during which defensive measures are reduced, compromised, or absent.
Learn more in: Psychosocial Support and Education of Vulnerable Children: Implications for Policy and Implimentation
56.
This refers to the lack of capacity by a person, a group of persons, or a community to fend for itself. The inability to meet basic human needs.
Learn more in: Parental/Guardian Subsidization of Extra Tuition and the Marginalization of the Poor in Zimbabwe: Social Exclusion in Education Sector in Zimbabwe
57.
This is an inherent weakness associated with an enterprise asset. It is a condition that has the potential to allow a threat to occur with greater impact and greater frequency or both.
Learn more in: Enterprise Information System Security: A Life-Cycle Approach
58.
Vulnerability
describes a certain inability of a system to withstand the effects of an attack in a hostile environment.
Learn more in: Vulnerabilities of Secure and Reliable Low-Power Embedded Systems and Their Analysis Methods: A Comprehensive Study
59.
Weakness of an asset or control that can be exploited by a threat.
Learn more in: Cyber Security Assessment of NPP I&C Systems
60.
is a flaw or weakness that may allow harm to occur to an IT system or activity.
Learn more in: Information Security Policies: Precepts and Practices
61.
A security weakness in operating system or application software.
Learn more in: Malicious Software
62.
The source of many moral intuitions and responsibilities is the recognition that there are vulnerable individuals or groups who are susceptible to being harmed, i.e. who are less protected against a certain disposition or a status facing outer and inner impairment. This also refers to a failure of a selfregulating mechanism of the organism. Questions of informed consent require special attention in vulnerable populations who are particularly susceptible to injury or harm.
Learn more in: Ethical Conflicts Regarding Technical Assistance Systems for the Elderly
63.
A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard. Characteristic of location or security posture or of design, security procedures, internal controls, or the implementation of any of these that permit a threat or hazard to occur.
Vulnerability
(expressing degree of
vulnerability
): qualitative or quantitative expression of the level of susceptibility to harm when a threat or hazard is realized.
Learn more in: Cybersecurity and Electronic Services Oriented to E-Government in Europe
64.
Related to exposure, sensitivity, and resilience.
Learn more in: Composite Indicators as Decision Support Method for Flood Analysis: Flood Vulnerability Index Category
65.
The condition of a facility or a transportation link that is susceptible to disruption.
Learn more in: Assessment of Disruption Risks in Supply Chains
66.
The degree to which a system is susceptible to, or unable to cope with, adverse effects of climate change, including climate variability and extremes.
Learn more in: Addressing the Sustainable Development Goals Through Environmental Education
67.
Weakness leading to a threat.
Learn more in: A Hybrid Asset-Based IT Risk Management Framework
68.
A weakness which allows an attacker to reduce a system's information assurance.
Learn more in: Secure Architecture for Cloud Environment
69.
It is defined as a flaw, fault, or insufficiency of a system.
Learn more in: Taxonomy of Login Attacks in Web Applications and Their Security Techniques Using Behavioral Biometrics
70.
The state of being emotionally exposed.
Learn more in: Leaning In With Empathy: Leading Through a Global Pandemic
71.
Vulnerability
refers to the inability (of a system or a unit) to withstand the effects of a hostile environment.
Learn more in: Evolution of Malware in the Digital Transformation Age
72.
Refers to a known weakness of an asset that can be exploited by one or more attackers.
Vulnerability
can concern computers system, devices, networks or can also be at organizational level.
Learn more in: Crime and Victimization in Cyberspace: A Socio-Criminological Approach to Cybercrime
73.
A weakness in the organization, network that can be exploited by a threat.
Learn more in: Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002
74.
Vulnerability
is “the group of children that experience negative outcomes, such as the loss of their education, morbidity, and malnutrition, at higher rates than do their peers”.(4) The main categories of vulnerable children outlined in this toolkit are Street children, Children in the worst forms of child labor, Children affected by armed conflict, Children affected by HIV/AIDS, Children living with disabilities.
Learn more in: Representation of Syrian Children in Turkish Media From a Child-Oriented Rights Journalism Perspective
75.
Vulnerability
describes a certain inability of a system to withstand the effects of an attack in a hostile environment.
Learn more in: Industrial Applications of Emulation Techniques for the Early Evaluation of Secure Low-Power Embedded Systems
Find more terms and definitions using our
Dictionary Search
.
Vulnerability
appears in:
Confluence of AI, Machine, and Deep Learning in...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Vulnerability
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 167,400 titles for
Vulnerability
to find related research papers.
Learn More About Vulnerability in These Related Titles
Critical Perspectives on Social Justice in S...
Social Sciences & Humanities
Copyright 2021. 355 pages.
There is very little discussion of socially just a...
In Stock
$37.50 Individual Chapters
Handbook of Research on Clinical Application...
Medicine & Healthcare
Copyright 2020. 1356 pages.
In the past, individuals in the dentistry field ha...
In Stock
$37.50 Individual Chapters
Theory and Practice of Business Intelligence...
Medicine & Healthcare
Copyright 2020. 322 pages.
Business intelligence supports managers in enterpr...
In Stock
$37.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$37.50 Individual Chapters
Police Psychology and Its Growing Impact on...
Social Sciences & Humanities
Copyright 2017. 345 pages.
Police psychology has become an integral part of p...
In Stock
$37.50 Individual Chapters
Handbook of Research on Computerized Occlusa...
Medicine & Healthcare
Copyright 2015. 973 pages.
Modern medicine is changing drastically as new tec...
In Stock
$37.50 Individual Chapters
Modern Societal Impacts of the Model Minorit...
Social Sciences & Humanities
Copyright 2015. 403 pages.
The model minority stereotype is a form of racism...
In Stock
$37.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$37.50 Individual Chapters
Integrated Operations in the Oil and Gas Ind...
Business & Management
Copyright 2013. 457 pages.
The predicted “ICT revolution” has gained increasi...
In Stock
$37.50 Individual Chapters
Electronic Enterprise: Strategy and Architec...
Business & Management
Copyright 2003. 384 pages.
Enterprise evolution (or electronic enterprise) is...
In Stock
$37.50 Individual Chapters