278:. Social vulnerability refers to the inability of people, organizations, and societies to withstand adverse impacts from multiple stressors to which they are exposed. These impacts are due in part to characteristics inherent in social interactions, institutions, and systems of cultural values. It was also found that marital status, employment, and income have an impact on the level of vulnerability presented in individuals. In this respect, there is a need to place an increased emphasis on assets and entitlements for understanding 'catastrophe' as opposed to solely the strength or severity of shocks. The capacity of individuals, communities and systems to survive, adapt, transform, and grow in the face of stress and shocks increase when conditions require it. Building resilience is about making people, communities, and systems better prepared to withstand catastrophic events—both natural and man-made—and able to bounce back more quickly and emerge stronger from these shocks and stresses.
418:
of emotions, such as grief, shame, fear, and disappointment, but it is also the center and birthplace of love, belonging, authenticity, creativity, courage, and accountability. Selective reinforcement and modeling has been used to help children learn from a young age how to regulate and take accountability for their emotions. Unpleasant emotional states are managed by their subjective discomfort. Emotional vulnerability is also impacted by respondents that express feelings of sadness about the uncertainty of climate change. Increasing awareness and impact leads to heightened emotional responses. Along with this, emotional vulnerability can affect the physical well-being of older adults when they suppress their emotions in highly distressing situations. When these vulnerabilities are supported through conversation with an emotionally safe "other," this vulnerability can lead to resilience and the capacity to support others.
473:. In such stories, it is a quality that makes a character impervious to pain, damage or loss of health. There are many levels of invulnerability, just like there are many level of immortality (the highest level is absolute immortality). Many superheroes in comic books have invulnerability but it is often superhuman invulnerability (aka Strength-Based Invulnerability). It means that these superheroes develop a form of relative invulnerability, the user becoming impossible to harm by beings or forces less powerful than themselves. They are immune to most kinds of attacks but they can still be hurt or even killed by stronger characters.
488:". Generally, it does not protect the player from certain instant-death hazards, most notably "bottomless" pits from which, even if the player were to survive the fall, they would be unable to escape. As a rule, invulnerability granted by power-ups is temporary, and wears off after a set amount of time, while invulnerability cheats, once activated, remain in effect until deactivated, or the end of the level is reached. "Depending on the game in question, invulnerability to damage may or may not protect the player from non-damage effects, such as being immobilized or sent flying."
436:, the others being susceptibility and recoverability. Vulnerability is defined in various ways depending on the nation and service arm concerned, but in general it refers to the near-instantaneous effects of a weapon attack. In aviation it is defined as the inability of an aircraft to withstand the damage caused by the man-made hostile environment. In some definitions, recoverability (damage control, firefighting, restoration of capability) is included in vulnerability. Some military services develop their own concept of vulnerability.
384:
47:
500:
or a sense of being able to remain unaffected by negative thoughts and emotions. In order to test the effects of both types of invulnerability, the researchers used the
Adolescent Invulnerability Scale created by Lapsley and Hill in 2010, which includes twenty statements assessing to what extent the adolescents felt invulnerable psychologically and in danger situations.
239:. Many institutions are conducting interdisciplinary research on vulnerability. A forum that brings many of the current researchers on vulnerability together is the Expert Working Group (EWG). Researchers are currently working to refine definitions of "vulnerability", measurement and assessment methods, and effective communication of research to decision makers.
315:, cognitive vulnerability is constructed from schema models, hopelessness models, and attachment theory. The attachment theory states that humans need to develop a close bond with their caregivers. When there is a disruption in the child-parent bonding relationship it may be associated with cognitive vulnerability and depression
307:, or pattern of thought that is believed to predispose the individual to psychological problems. Cognitive vulnerability is in place before the symptoms of psychological disorders start to appear, such as high neuroticism. After the individual encounters a stressful experience, the cognitive vulnerability shapes a
499:
Hill, Duggan, and
Lapsley state in their article that it is commonly accepted that teenagers have no regard for physical danger, which might indicate that they have a sense of danger invulnerability. Additionally, they predicted that the teenagers might have a sense of psychological invulnerability,
449:
is a direct result of political vulnerability, and has been documented across the globe throughout history. Political vulnerability can also refer to elected officials' or political candidates' chances of election, with municipal and local elections often signifying a shift one way or the other on a
507:
Danger invulnerability highly correlated with illegal or criminal activity but had no correlation with mental health. However, danger invulnerability was able to effectively predict "delinquency, lifetime drug use, and drug use frequency." Gender differences in the data showed that adolescent males
503:
Hill et. al found that having a sense of psychological invulnerability benefitted adolescents in combatting negative emotions such as depression. Adolescents who rated themselves as more psychologically invulnerable demonstrated more effective coping mechanisms during times of stress or depression.
417:
defines vulnerability as "uncertainty, risk, and emotional exposure." Brown goes on to suggest that vulnerability is our most accurate measure of courage; we allow ourselves to be seen when we are vulnerable. Brené Brown teaches her followers that vulnerability is typically thought of as the center
182:
to social forces and institutions and the cultural values that sustain and contest them. "The concept of vulnerability expresses the multi-dimensionality of disasters by focusing attention on the totality of relationships in a given social situation which constitute a condition that, in combination
444:
Political vulnerability can be understood as "the weakness of the democratic system, with its negative effects on the efficiency of public policies, the legitimacy of the government action, limited participation of citizens and the private sector in national efforts, linkage with local governments
516:
In this study, Lapsley and Hill (2010) created the AIS for the purpose of studying the invulnerability of college students in
Barnett's emerging adulthood (hyperlink) stage of life. Researchers predicted a positive correlation between the adolescents' and emerging adults' scores and subsequently
190:
behind said research, namely measuring and assessing indicators of vulnerability. These include external—sudden shocks and continued stresses—and internal indicators, such as defenselessness or inability to cope with incapacities. Vulnerability research covers a complex,
183:
with environmental forces, produces a disaster". It is also the extent to which changes could harm a system, or to which the community can be affected by the impact of a hazard or exposed to the possibility of being attacked or harmed, either physically or emotionally.
1085:"Neuroticism's prospective association with mental disorders halves after adjustment for baseline symptoms and psychiatric history, but the adjusted association hardly decays with time: a meta-analysis on 59 longitudinal/prospective studies with 443 313 participants"
866:
520:
High danger invulnerability strongly correlated with social issues, such as risk behavior and substance use. Both types of invulnerability, psychological and danger invulnerability, proved to be high predictors of self-esteem problems in emerging adulthood.
146:
refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves the analysis of the
517:
found said correlation. They observed no significant differences in negative and positive optimism biases, which were other elements of the same study. But, as predicted, male participants scored higher on both areas of invulnerability.
322:
is a form of cognitive bias that can lead to cognitive vulnerability. Allocating a danger level to a threat depends on the urgency or intensity of the threshold. Anxiety is not associated with selective orientation.
2625:
766:"Promotion of Roma's access to Education [Social Impact]. WORKALĂ“. The creation of new occupational patterns for cultural minorities: the Gypsy Case (2001-2004). Framework Programme 5 (FP5)"
867:
Pre-industrial societies and strategies for the exploitation of resources. A theoretical framework for understanding why some settlements are resilient and some settlements are vulnerable to crisis
1316:
Sherbinin, Alex de; Bukvic, Anamaria; Rohat, Guillaume; Gall, Melanie; McCusker, Brent; Preston, Benjamin; Apotsos, Alex; Fish, Carolyn; Kienberger, Stefan; Muhonda, Park; Wilhelmi, Olga (2019).
628:
Sanchez-Gonzalez, D.; Egea-Jimenez, C. (2011). "Social
Vulnerability approach to investigate the social and environmental disadvantages. Its application in the study of elderly people".
1621:
366:. It differs within communities and also across societies, regions, and countries. It can increase or decrease over time. Vulnerability is generally a bigger problem for people in
1290:
Climate Change 2022: Impacts, Adaptation and
Vulnerability. Contribution of Working Group II to the Sixth Assessment Report of the Intergovernmental Panel on Climate Change
1281:
1878:
491:
In mythology, talismans, charms, and amulets were created by magic users for the purpose of making the wearer immune to injury from both mystic and mundane weapons.
2497:
508:
were more likely to feel invulnerable to danger and psychological effects. The researchers did not observe any difference between the ages of participants.
2461:
2233:
1565:
The responsibility of communicating difficult truths about climate influenced societal disruption and collapse: an introduction to psychological research.
358:
to be adversely affected" by climate change. It can apply to humans and also to natural systems (or ecosystems). Issues around the capacity to cope and
1928:
560:
1292:
445:
and civil organizations, the handling and management of emergencies, processing of citizen's demands and needs, and the capacity to meet them."
1586:
649:"Physical-social environments and aging population from environmental gerontology and geography. Socio-spatial implications in Latin America"
565:
235:). This research is of importance and interest for organizations trying to reduce vulnerability – especially as related to poverty and other
704:
Rumpf, Clemens M.; Lewis, Hugh G.; Atkinson, Peter M. (2017-03-27). "Population vulnerability models for asteroid impact risk assessment".
850:
1724:
2493:
1067:
972:
940:
130:
1567:
Institute for
Leadership and Sustainability (IFLAS) Occasional Papers Volume 7. University of Cumbria, Ambleside, UK..(Unpublished)
2596:
2544:
504:
This lead the researchers to believe that psychological invulnerability during adolescence is beneficial for identity formation.
599:
1278:
796:
Wolters, Michel L.; Kuenzer, Claudia (2015). "Vulnerability
Assessments of Coastal River Deltas – Categorization and Review".
2386:
2294:
68:
64:
35:
111:
83:
2472:
2455:
2311:
2274:
550:
485:
339:
333:
236:
208:
927:
2268:
2260:
2013:
90:
2512:
694:
Villa-gran, Juan Carlos. "Vulnerability: A conceptual and methodological review." SOURCE. No. 2/2006. Bonn, Germany.
2217:
1921:
1697:
2693:
2517:
2330:
2324:
2061:
570:
359:
31:
2522:
2483:
2299:
2044:
1914:
1055:
555:
355:
228:
97:
164:
2364:
2316:
2279:
294:
57:
2589:
1622:"A Matter of Development: How to Reduce Vulnerability in the Face of Natural Disasters | Publications"
2683:
2559:
2549:
1678:
1027:
545:
446:
351:
79:
2584:
2228:
1632:
1501:"Emotional Experience Across Adulthood: The Theoretical Model of Strength and Vulnerability Integration"
263:
1452:"Hope and Worry: Gendered Emotional Geographies of Climate Change in Three Vulnerable U.S. Communities"
1289:
2434:
2347:
2223:
2001:
1463:
1329:
805:
723:
540:
367:
300:
253:
196:
2564:
2507:
2502:
2488:
2409:
2379:
2306:
2289:
1982:
1965:
575:
179:
1238:
Mathews, Andrew; MacLeod, Colin (1 April 2005). "Cognitive
Vulnerability to Emotional Disorders".
2391:
2352:
2284:
2184:
2134:
2129:
1830:
1784:
1546:
1538:
1432:
1424:
1201:
1162:
1112:
1009:
900:
829:
747:
713:
2574:
846:
Luis Flores
Ballesteros. "What determines a disaster?" 54 Pesos May. 2008:54 Pesos 11 Sep 2008.
765:
186:
Within the body of literature related to vulnerability, one major research stream includes the
2662:
2569:
2533:
2478:
2419:
2374:
2255:
2095:
2066:
1776:
1720:
1582:
1530:
1481:
1416:
1347:
1255:
1193:
1154:
1104:
1063:
1001:
968:
946:
936:
908:
821:
739:
462:
224:
192:
2657:
2539:
2424:
2250:
2238:
2079:
1994:
1822:
1768:
1520:
1512:
1471:
1408:
1337:
1300:
1251:
1247:
1146:
1096:
892:
847:
813:
731:
727:
660:
580:
319:
271:
212:
159:, such as the elderly. The approach of vulnerability in itself brings great expectations of
1660:
104:
2645:
2554:
2449:
2414:
2401:
2335:
1937:
1645:
1525:
1296:
1285:
854:
312:
275:
232:
167:. Types of vulnerability include social, cognitive, environmental, emotional or military.
285:
is a time frame within which defensive measures are diminished, compromised, or lacking.
30:
For vulnerabilities in the computing field and cyber space (such as security holes), see
1741:
1467:
1333:
809:
2357:
2208:
2157:
2124:
2113:
2085:
2006:
1959:
414:
347:
304:
1131:
383:
2688:
2677:
2630:
2618:
2528:
2439:
2429:
2163:
2149:
2051:
2034:
1834:
1550:
833:
607:
433:
308:
204:
178:, vulnerability is a concept that links the relationship that people have with their
160:
156:
1788:
1166:
1116:
751:
665:
648:
2100:
2039:
2023:
1989:
1436:
1367:
Braving the
Wilderness: the Quest for True Belonging and the Courage to Stand Alone
363:
1872:
1858:
Community based vulnerability mapping in BĂşzi, Mozambique (GIS and Remote Sensing)
1579:
The Fundamentals of Aircraft Combat Survivability Analysis and Design, 2nd Edition
1219:"Time course of attentional bias for threat information in non-clinical anxiety".
929:
Towards a clearer understanding of 'vulnerability' in relation to chronic poverty
784:
Measuring Vulnerability to Natural Hazards – Towards Disaster Resilient Societies
258:
Social vulnerability is one dimension of vulnerability that responds to multiple
2640:
2579:
2189:
2144:
2139:
2119:
1977:
1811:"Subjective Invulnerability, Risk Behavior, and Adjustment in Early Adolescence"
1757:"Subjective invulnerability, optimism bias and adjustment in emerging adulthood"
535:
216:
187:
46:
1603:
2635:
2105:
2090:
2030:
1857:
1772:
1304:
1150:
1100:
817:
470:
466:
427:
1826:
1679:"6 in 10 Americans say US democracy is in crisis as the 'Big Lie' takes root"
1534:
1516:
1485:
1476:
1451:
1420:
1351:
1299:. Cambridge University Press, Cambridge, UK and New York, NY, USA, pp. 3–33,
1197:
1158:
1005:
825:
743:
2613:
2444:
2369:
2340:
1809:
Hill, Patrick L.; Duggan, Peter M.; Lapsley, Daniel K. (February 24, 2011).
1756:
950:
343:
220:
17:
1810:
1780:
1259:
1108:
912:
461:
is a common feature found in science fiction and fantasy, particularly in
2650:
2467:
2071:
1318:"Climate vulnerability mapping: A systematic review and future prospects"
477:
259:
175:
1542:
1500:
1428:
1396:
1013:
989:
2018:
1884:
1867:
1412:
1205:
1181:
904:
735:
530:
200:
880:
2179:
1890:
United Nations University Institute of Environment and Human Security
1862:
1450:
Bray, Margaret V. du; Wutich, Amber; Brewis, Alexandra (2017-04-01).
481:
171:
152:
1342:
1317:
990:"Cognitive-Emotional Conflict: Adversary Will and Social Resilience"
965:
The Vulnerability of Cities: Natural Disasters and Social Resilience
896:
1894:
1273:
1271:
1269:
1084:
718:
1906:
1717:
Handbook of Emergency Management Concepts: A Step-by-Step Approach
1058:. In Freeman, Arthur; Felgoise, Stephanie H.; et al. (eds.).
267:
148:
1910:
362:
are also part of this concept. Vulnerability is a component of
378:
40:
1889:
848:
http://54pesos.org/2008/09/11/what-determines-a-disaster/
484:; when activated via cheats, it is often referred to as "
1083:
Jeronimus B.F.; Kotov, R.; Riese, H.; Ormel, J. (2016).
682:
Mapping Vulnerability: Disasters, Development and People
1755:
Lapsley, Daniel K.; Hill, Patrick L. (April 16, 2009).
804:(3). Springer Science and Business Media LLC: 345–368.
395:
311:
response that may lead to a psychological disorder. In
1900:
432:
In military terminology, vulnerability is a subset of
879:
Turner, Heather A.; Turner, R. Jay (December 1999).
2606:
2400:
2207:
2172:
1951:
1944:
342:is a concept that describes how strongly people or
71:. Unsourced material may be challenged and removed.
1132:"Origins of Cognitive Vulnerability to Depression"
1397:"Emotional Regulation and Emotional Development"
600:"VULNERABILITY - English Definition and Meaning"
476:In video games, it can be found in the form of "
935:, Manchester: Chronic Poverty Research Centre,
881:"Gender, Social Status, and Emotional Reliance"
1922:
8:
2462:Hazard analysis and critical control points
1505:Current Directions in Psychological Science
1948:
1929:
1915:
1907:
1060:Encyclopedia of Cognitive Behavior Therapy
1028:"KBpedia: Vulnerability Reference Concept"
1897:(Verified Vulnerability Research Project)
1524:
1499:Charles, Susan T.; Luong, Gloria (2013).
1475:
1341:
717:
664:
561:Vulnerabilities exploited by manipulators
131:Learn how and when to remove this message
2435:Structured or semi-structured interviews
1698:"The Senate's Most Vulnerable Democrats"
1049:
1047:
370:than for those in high-income countries.
1563:Kieft, Jasmine and Bendell, Jem (2021)
1252:10.1146/annurev.clinpsy.1.102803.143916
1062:. New York: Springer. pp. 122–26.
1054:Riskind, John H.; Black, David (2005).
591:
1641:
1630:
1581:. AIAA Education Series. p. 603.
885:Journal of Health and Social Behavior
566:Vulnerability and care theory of love
7:
1881:RESIST Vulnerability Assessment Code
1240:Annual Review of Clinical Psychology
69:adding citations to reliable sources
770:SIOR, Social Impact Open Repository
706:Meteoritics & Planetary Science
680:Bankoff, Greg; et al. (2004).
262:(agent responsible for stress) and
2565:Bayesian statistics and Bayes nets
1696:Gabriel, Trip (21 February 2022).
1661:"The Vulnerabilities of Democracy"
512:Invulnerability in Emerging Adults
25:
2494:Failure mode and effects analysis
653:Revista de GeografĂa Norte Grande
2597:Multi-criteria decision analysis
2545:Reliability centered maintenance
1873:Survivability/Lethality Analysis
1815:The Journal of Early Adolescence
1761:Journal of Youth and Adolescence
1186:IRB: Ethics & Human Research
782:Birkmann, Joern (editor). 2006.
382:
350:. Its formal definition is the "
332:This section is an excerpt from
45:
1903:vulnerability database with API
798:Journal of Coastal Conservation
666:10.4067/S0718-34022015000100006
327:Environmental or climate change
56:needs additional citations for
2513:Cause and consequence analysis
2387:Occupational safety and health
2295:Identity and access management
1526:11858/00-001M-0000-0024-EC9F-7
1221:Behaviour Research and Therapy
1139:Cognitive Therapy and Research
1130:Ingram, Rick (February 2003).
967:. Earthscan Publications LTD.
495:Invulnerability in Adolescents
299:A cognitive vulnerability, in
36:Vulnerability (disambiguation)
1:
1456:Weather, Climate, and Society
1401:Educational Psychology Review
1182:"Psychological Vulnerability"
604:Lexico Dictionaries - English
346:are likely to be affected by
283:window of vulnerability (WOV)
2473:Structured What If Technique
2456:Hazard and operability study
2312:Business continuity planning
1885:Top Computer Vulnerabilities
865:See also Daniel R. Curtis, "
647:Sanchez-Gonzalez, D (2015).
551:Representativeness heuristic
340:Climate change vulnerability
334:Climate change vulnerability
237:Millennium Development Goals
2450:Preliminary hazard analysis
2269:Operational risk management
1742:"Lives of the Necromancers"
1715:Madigan, Michael L (2017).
1602:Carlo, Kopp (5 July 2005).
1369:. Sounds True. p. 154.
2710:
2534:Human reliability analysis
2218:Enterprise risk management
1395:Thompson, Ross A. (1991).
1382:The power of vulnerability
1180:Lawton, M. Powell (1980).
571:Vulnerability in computing
425:
331:
303:, is an erroneous belief,
292:
251:
29:
2523:Layer protection analysis
2518:Cause-and-effect analysis
2325:Financial risk management
2062:Vulnerability (computing)
1895:VULNERABILITY LABORATORY
1773:10.1007/s10964-009-9409-9
1305:10.1017/9781009325844.001
1101:10.1017/S0033291716001653
1056:"Cognitive Vulnerability"
818:10.1007/s11852-015-0396-6
465:, as depicted in novels,
32:Vulnerability (computing)
2484:Business impact analysis
2300:Vulnerability management
2246:Personal risk management
2045:Global catastrophic risk
1827:10.1177/0272431611400304
1517:10.1177/0963721413497013
1477:10.1175/WCAS-D-16-0077.1
1279:Summary for Policymakers
556:True self and false self
229:disaster risk management
2365:Precautionary principle
2317:Disaster risk reduction
1868:Satellite Vulnerability
1740:William Godwin (1876).
1604:"Warship Vulnerability"
1151:10.1023/a:1022590730752
926:Prowse, Martin (2003),
728:2017M&PS...52.1082R
295:Cognitive vulnerability
165:gerontological planning
2560:Monte Carlo simulation
2550:Sneak circuit analysis
1945:Risk type & source
1640:Cite journal requires
1089:Psychological Medicine
988:Wells, Linton (2017).
963:Pelling, Mark (2003).
546:Exploitation of labour
447:Democratic backsliding
34:. For other uses, see
2585:Cost/benefit analysis
2229:Regulatory compliance
1577:Ball, Robert (2003).
1380:Brown, Brene (2012).
1365:Brown, Brene (2019).
684:. London: Earth scan.
2348:Strategic management
2224:Corporate governance
2002:Anthropogenic hazard
1322:WIREs Climate Change
541:Emotional insecurity
368:low-income countries
301:cognitive psychology
254:Social vulnerability
157:disadvantaged groups
65:improve this article
2508:Event tree analysis
2503:Fault tree analysis
2489:Root cause analysis
2468:Toxicity assessment
2410:Exposure assessment
2380:Disaster management
2307:Incident management
2290:Security management
1983:Psychosocial hazard
1966:Reputational damage
1863:MunichRe Foundation
1468:2017WCS.....9..285D
1334:2019WIRCC..10E.600D
810:2015JCC....19..345W
610:on January 18, 2021
576:Vulnerability index
2590:Risk–benefit ratio
2392:Swiss cheese model
2353:Risk communication
2261:Disease management
2135:Exchange rate risk
2130:Interest rate risk
1702:The New York Times
1413:10.1007/bf01319934
1295:2022-03-18 at the
1284:2023-01-22 at the
853:2012-03-20 at the
736:10.1111/maps.12861
394:. You can help by
2671:
2670:
2663:Crisis management
2479:Scenario analysis
2420:Scenario planning
2375:Crisis management
2256:Stress management
2203:
2202:
2096:Reputational risk
1665:The Carter Center
1659:McCoy, Jennifer.
1588:978-1-56347-582-5
1095:(14): 2883–2906.
463:superhero fiction
412:
411:
225:political ecology
193:multidisciplinary
141:
140:
133:
115:
16:(Redirected from
2701:
2694:Military science
2658:Opportunity cost
2607:Related concepts
2540:Bow tie analysis
2425:Contingency plan
2251:Health insurance
2239:Internal control
2080:Operational risk
1995:Natural disaster
1949:
1931:
1924:
1917:
1908:
1846:
1845:
1843:
1841:
1806:
1800:
1799:
1797:
1795:
1752:
1746:
1745:
1737:
1731:
1730:
1712:
1706:
1705:
1693:
1687:
1686:
1675:
1669:
1668:
1656:
1650:
1649:
1643:
1638:
1636:
1628:
1626:
1618:
1612:
1611:
1599:
1593:
1592:
1574:
1568:
1561:
1555:
1554:
1528:
1496:
1490:
1489:
1479:
1447:
1441:
1440:
1392:
1386:
1385:
1377:
1371:
1370:
1362:
1356:
1355:
1345:
1313:
1307:
1275:
1264:
1263:
1235:
1229:
1228:
1216:
1210:
1209:
1177:
1171:
1170:
1136:
1127:
1121:
1120:
1080:
1074:
1073:
1051:
1042:
1041:
1039:
1038:
1024:
1018:
1017:
985:
979:
978:
960:
954:
953:
934:
923:
917:
916:
876:
870:
863:
857:
844:
838:
837:
793:
787:
780:
774:
773:
762:
756:
755:
721:
712:(6): 1082–1102.
701:
695:
692:
686:
685:
677:
671:
670:
668:
644:
638:
637:
625:
619:
618:
616:
615:
606:. Archived from
596:
581:Vulnerable adult
450:national scale.
407:
404:
386:
379:
320:Attentional bias
272:social exclusion
213:security studies
195:field including
136:
129:
125:
122:
116:
114:
73:
49:
41:
21:
2709:
2708:
2704:
2703:
2702:
2700:
2699:
2698:
2674:
2673:
2672:
2667:
2646:Problem solving
2602:
2555:Markov analysis
2415:Hazard analysis
2402:Risk assessment
2396:
2331:Diversification
2209:Countermeasures
2199:
2168:
2014:Technology risk
1940:
1938:Risk management
1935:
1854:
1849:
1839:
1837:
1808:
1807:
1803:
1793:
1791:
1754:
1753:
1749:
1739:
1738:
1734:
1727:
1714:
1713:
1709:
1695:
1694:
1690:
1677:
1676:
1672:
1658:
1657:
1653:
1639:
1629:
1624:
1620:
1619:
1615:
1608:ausairpower.net
1601:
1600:
1596:
1589:
1576:
1575:
1571:
1562:
1558:
1498:
1497:
1493:
1449:
1448:
1444:
1394:
1393:
1389:
1379:
1378:
1374:
1364:
1363:
1359:
1343:10.1002/wcc.600
1315:
1314:
1310:
1297:Wayback Machine
1286:Wayback Machine
1276:
1267:
1237:
1236:
1232:
1218:
1217:
1213:
1179:
1178:
1174:
1134:
1129:
1128:
1124:
1082:
1081:
1077:
1070:
1053:
1052:
1045:
1036:
1034:
1026:
1025:
1021:
987:
986:
982:
975:
962:
961:
957:
943:
932:
925:
924:
920:
897:10.2307/2676331
878:
877:
873:
864:
860:
855:Wayback Machine
845:
841:
795:
794:
790:
781:
777:
764:
763:
759:
703:
702:
698:
693:
689:
679:
678:
674:
646:
645:
641:
627:
626:
622:
613:
611:
598:
597:
593:
589:
527:
514:
497:
459:Invulnerability
456:
454:Invulnerability
442:
430:
424:
408:
402:
399:
392:needs expansion
377:
372:
371:
337:
329:
313:psychopathology
297:
291:
276:natural hazards
256:
250:
245:
233:risk management
209:climate studies
170:In relation to
137:
126:
120:
117:
80:"Vulnerability"
74:
72:
62:
50:
39:
28:
23:
22:
15:
12:
11:
5:
2707:
2705:
2697:
2696:
2691:
2686:
2676:
2675:
2669:
2668:
2666:
2665:
2660:
2655:
2654:
2653:
2643:
2638:
2633:
2628:
2623:
2622:
2621:
2610:
2608:
2604:
2603:
2601:
2600:
2594:
2593:
2592:
2582:
2577:
2572:
2567:
2562:
2557:
2552:
2547:
2542:
2537:
2531:
2526:
2520:
2515:
2510:
2505:
2500:
2491:
2486:
2481:
2476:
2470:
2465:
2459:
2453:
2447:
2442:
2437:
2432:
2427:
2422:
2417:
2412:
2406:
2404:
2398:
2397:
2395:
2394:
2389:
2384:
2383:
2382:
2372:
2367:
2362:
2361:
2360:
2358:Warning system
2350:
2345:
2344:
2343:
2338:
2333:
2321:
2320:
2319:
2314:
2309:
2304:
2303:
2302:
2297:
2287:
2282:
2277:
2265:
2264:
2263:
2258:
2253:
2243:
2242:
2241:
2236:
2231:
2226:
2213:
2211:
2205:
2204:
2201:
2200:
2198:
2197:
2192:
2187:
2182:
2176:
2174:
2170:
2169:
2167:
2166:
2161:
2158:Strategic risk
2154:
2153:
2152:
2147:
2142:
2137:
2132:
2127:
2125:Liquidity risk
2122:
2114:Financial risk
2110:
2109:
2108:
2103:
2098:
2093:
2088:
2086:Execution risk
2076:
2075:
2074:
2069:
2064:
2054:
2049:
2048:
2047:
2042:
2028:
2027:
2026:
2021:
2011:
2010:
2009:
2007:Political risk
1999:
1998:
1997:
1987:
1986:
1985:
1980:
1970:
1969:
1968:
1960:Business risks
1955:
1953:
1946:
1942:
1941:
1936:
1934:
1933:
1926:
1919:
1911:
1905:
1904:
1898:
1892:
1887:
1882:
1876:
1870:
1865:
1860:
1853:
1852:External links
1850:
1848:
1847:
1821:(4): 489–501.
1801:
1767:(8): 847–857.
1747:
1732:
1726:978-1351337472
1725:
1707:
1688:
1670:
1651:
1642:|journal=
1613:
1594:
1587:
1569:
1556:
1511:(6): 443–448.
1491:
1462:(2): 285–297.
1442:
1407:(4): 269–307.
1387:
1384:. Sounds True.
1372:
1357:
1308:
1265:
1246:(1): 167–195.
1230:
1211:
1172:
1122:
1075:
1068:
1043:
1019:
980:
973:
955:
941:
918:
891:(4): 360–373.
871:
858:
839:
788:
775:
757:
696:
687:
672:
659:(60): 97–114.
639:
636:(69): 151–185.
620:
590:
588:
585:
584:
583:
578:
573:
568:
563:
558:
553:
548:
543:
538:
533:
526:
523:
513:
510:
496:
493:
455:
452:
441:
438:
423:
420:
410:
409:
389:
387:
376:
373:
356:predisposition
348:climate change
338:
330:
328:
325:
305:cognitive bias
293:Main article:
290:
287:
252:Main article:
249:
246:
244:
241:
139:
138:
121:September 2018
53:
51:
44:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2706:
2695:
2692:
2690:
2687:
2685:
2684:Vulnerability
2682:
2681:
2679:
2664:
2661:
2659:
2656:
2652:
2649:
2648:
2647:
2644:
2642:
2639:
2637:
2634:
2632:
2631:Risk appetite
2629:
2627:
2624:
2620:
2619:ISO/IEC 31010
2617:
2616:
2615:
2612:
2611:
2609:
2605:
2598:
2595:
2591:
2588:
2587:
2586:
2583:
2581:
2578:
2576:
2573:
2571:
2568:
2566:
2563:
2561:
2558:
2556:
2553:
2551:
2548:
2546:
2543:
2541:
2538:
2535:
2532:
2530:
2529:Decision tree
2527:
2524:
2521:
2519:
2516:
2514:
2511:
2509:
2506:
2504:
2501:
2499:
2495:
2492:
2490:
2487:
2485:
2482:
2480:
2477:
2474:
2471:
2469:
2466:
2463:
2460:
2457:
2454:
2451:
2448:
2446:
2443:
2441:
2440:Delphi method
2438:
2436:
2433:
2431:
2430:Brainstorming
2428:
2426:
2423:
2421:
2418:
2416:
2413:
2411:
2408:
2407:
2405:
2403:
2399:
2393:
2390:
2388:
2385:
2381:
2378:
2377:
2376:
2373:
2371:
2368:
2366:
2363:
2359:
2356:
2355:
2354:
2351:
2349:
2346:
2342:
2339:
2337:
2334:
2332:
2329:
2328:
2327:
2326:
2322:
2318:
2315:
2313:
2310:
2308:
2305:
2301:
2298:
2296:
2293:
2292:
2291:
2288:
2286:
2283:
2281:
2278:
2276:
2273:
2272:
2271:
2270:
2266:
2262:
2259:
2257:
2254:
2252:
2249:
2248:
2247:
2244:
2240:
2237:
2235:
2232:
2230:
2227:
2225:
2222:
2221:
2220:
2219:
2215:
2214:
2212:
2210:
2206:
2196:
2195:Vulnerability
2193:
2191:
2188:
2186:
2183:
2181:
2178:
2177:
2175:
2171:
2165:
2164:Residual risk
2162:
2160:
2159:
2155:
2151:
2150:Systemic risk
2148:
2146:
2143:
2141:
2138:
2136:
2133:
2131:
2128:
2126:
2123:
2121:
2118:
2117:
2116:
2115:
2111:
2107:
2104:
2102:
2099:
2097:
2094:
2092:
2089:
2087:
2084:
2083:
2082:
2081:
2077:
2073:
2070:
2068:
2065:
2063:
2060:
2059:
2058:
2057:Security risk
2055:
2053:
2052:Safety hazard
2050:
2046:
2043:
2041:
2038:
2037:
2036:
2035:External risk
2032:
2029:
2025:
2022:
2020:
2017:
2016:
2015:
2012:
2008:
2005:
2004:
2003:
2000:
1996:
1993:
1992:
1991:
1988:
1984:
1981:
1979:
1976:
1975:
1974:
1973:Personal risk
1971:
1967:
1964:
1963:
1962:
1961:
1957:
1956:
1954:
1950:
1947:
1943:
1939:
1932:
1927:
1925:
1920:
1918:
1913:
1912:
1909:
1902:
1899:
1896:
1893:
1891:
1888:
1886:
1883:
1880:
1877:
1874:
1871:
1869:
1866:
1864:
1861:
1859:
1856:
1855:
1851:
1836:
1832:
1828:
1824:
1820:
1816:
1812:
1805:
1802:
1790:
1786:
1782:
1778:
1774:
1770:
1766:
1762:
1758:
1751:
1748:
1744:. p. 17.
1743:
1736:
1733:
1728:
1722:
1719:. CRC Press.
1718:
1711:
1708:
1703:
1699:
1692:
1689:
1684:
1680:
1674:
1671:
1666:
1662:
1655:
1652:
1647:
1634:
1623:
1617:
1614:
1609:
1605:
1598:
1595:
1590:
1584:
1580:
1573:
1570:
1566:
1560:
1557:
1552:
1548:
1544:
1540:
1536:
1532:
1527:
1522:
1518:
1514:
1510:
1506:
1502:
1495:
1492:
1487:
1483:
1478:
1473:
1469:
1465:
1461:
1457:
1453:
1446:
1443:
1438:
1434:
1430:
1426:
1422:
1418:
1414:
1410:
1406:
1402:
1398:
1391:
1388:
1383:
1376:
1373:
1368:
1361:
1358:
1353:
1349:
1344:
1339:
1335:
1331:
1327:
1323:
1319:
1312:
1309:
1306:
1302:
1298:
1294:
1291:
1287:
1283:
1280:
1274:
1272:
1270:
1266:
1261:
1257:
1253:
1249:
1245:
1241:
1234:
1231:
1226:
1222:
1215:
1212:
1207:
1203:
1199:
1195:
1191:
1187:
1183:
1176:
1173:
1168:
1164:
1160:
1156:
1152:
1148:
1144:
1140:
1133:
1126:
1123:
1118:
1114:
1110:
1106:
1102:
1098:
1094:
1090:
1086:
1079:
1076:
1071:
1069:9781429411738
1065:
1061:
1057:
1050:
1048:
1044:
1033:
1029:
1023:
1020:
1015:
1011:
1007:
1003:
999:
995:
991:
984:
981:
976:
974:1-85383-830-6
970:
966:
959:
956:
952:
948:
944:
942:1-904049-23-0
938:
931:
930:
922:
919:
914:
910:
906:
902:
898:
894:
890:
886:
882:
875:
872:
868:
862:
859:
856:
852:
849:
843:
840:
835:
831:
827:
823:
819:
815:
811:
807:
803:
799:
792:
789:
785:
779:
776:
771:
767:
761:
758:
753:
749:
745:
741:
737:
733:
729:
725:
720:
715:
711:
707:
700:
697:
691:
688:
683:
676:
673:
667:
662:
658:
654:
650:
643:
640:
635:
631:
624:
621:
609:
605:
601:
595:
592:
586:
582:
579:
577:
574:
572:
569:
567:
564:
562:
559:
557:
554:
552:
549:
547:
544:
542:
539:
537:
534:
532:
529:
528:
524:
522:
518:
511:
509:
505:
501:
494:
492:
489:
487:
483:
479:
474:
472:
468:
464:
460:
453:
451:
448:
439:
437:
435:
434:survivability
429:
421:
419:
416:
406:
397:
393:
390:This section
388:
385:
381:
380:
374:
369:
365:
361:
357:
353:
349:
345:
341:
335:
326:
324:
321:
318:
314:
310:
306:
302:
296:
288:
286:
284:
279:
277:
273:
269:
265:
261:
255:
247:
242:
240:
238:
234:
230:
226:
222:
218:
214:
210:
206:
205:public health
202:
198:
194:
189:
184:
181:
177:
173:
168:
166:
162:
161:social policy
158:
154:
150:
145:
144:Vulnerability
135:
132:
124:
113:
110:
106:
103:
99:
96:
92:
89:
85:
82: –
81:
77:
76:Find sources:
70:
66:
60:
59:
54:This article
52:
48:
43:
42:
37:
33:
19:
2323:
2275:Supply chain
2267:
2245:
2216:
2194:
2156:
2112:
2101:Country risk
2078:
2056:
2040:Extreme risk
1990:Natural risk
1972:
1958:
1838:. Retrieved
1818:
1814:
1804:
1792:. Retrieved
1764:
1760:
1750:
1735:
1716:
1710:
1701:
1691:
1682:
1673:
1664:
1654:
1633:cite journal
1616:
1607:
1597:
1578:
1572:
1564:
1559:
1508:
1504:
1494:
1459:
1455:
1445:
1404:
1400:
1390:
1381:
1375:
1366:
1360:
1325:
1321:
1311:
1277:IPCC, 2022:
1243:
1239:
1233:
1224:
1220:
1214:
1189:
1185:
1175:
1145:(1): 77–88.
1142:
1138:
1125:
1092:
1088:
1078:
1059:
1035:. Retrieved
1031:
1022:
997:
993:
983:
964:
958:
928:
921:
888:
884:
874:
861:
842:
801:
797:
791:
786:. UNU Press.
783:
778:
769:
760:
709:
705:
699:
690:
681:
675:
656:
652:
642:
633:
629:
623:
612:. Retrieved
608:the original
603:
594:
519:
515:
506:
502:
498:
490:
475:
458:
457:
443:
431:
413:
400:
396:adding to it
391:
364:climate risk
316:
298:
282:
280:
266:, including
257:
231:(as well as
185:
169:
143:
142:
127:
118:
108:
101:
94:
87:
75:
63:Please help
58:verification
55:
27:Risk of harm
18:Invulnerable
2641:Rare events
2580:Risk Matrix
2190:Uncertainty
2173:Risk source
2145:Profit risk
2140:Market risk
2120:Credit risk
1978:Health risk
1328:(5): e600.
1000:(2): 4–17.
630:Pap. Poblac
536:Gullibility
471:video games
467:comic books
415:Brené Brown
309:maladaptive
217:engineering
197:development
188:methodology
180:environment
2678:Categories
2636:Hazard map
2575:Risk index
2106:Legal risk
2091:Model risk
2031:Macro risk
1192:(8): 5–7.
1037:2019-11-21
719:1702.05798
614:2022-03-07
587:References
428:Paul Nitze
426:See also:
403:April 2024
352:propensity
344:ecosystems
91:newspapers
2614:ISO 31000
2496:(FMEA) /
2445:Checklist
2370:Insurance
2341:Risk pool
1952:Risk type
1875:– US Army
1840:March 27,
1835:145688280
1794:March 27,
1551:145454712
1535:0963-7214
1486:1948-8327
1421:1040-726X
1352:1757-7799
1198:0193-7758
1159:0147-5916
1006:2157-0663
834:127950375
826:1400-0350
744:1086-9379
478:power-ups
440:Political
375:Emotional
289:Cognitive
260:stressors
221:geography
203:studies,
176:disasters
2651:Security
2570:FN curve
2185:Conflict
2072:Accident
1789:18161557
1781:20596815
1543:44318703
1429:23359228
1293:Archived
1282:Archived
1260:17716086
1167:16148365
1117:23548727
1109:27523506
1014:26470514
951:53854016
913:10643161
851:Archived
752:49320450
525:See also
486:god mode
422:Military
2475:(SWIFT)
2464:(HACCP)
2458:(HAZOP)
2285:Quality
2280:Project
2019:IT risk
1901:Vulners
1464:Bibcode
1437:3560960
1330:Bibcode
1206:3563995
1032:KBpedia
905:2676331
806:Bibcode
724:Bibcode
531:Courage
201:poverty
172:hazards
105:scholar
2599:(MCDA)
2525:(LOPA)
2180:Hazard
2067:Threat
1879:RESIST
1833:
1787:
1779:
1723:
1585:
1549:
1541:
1533:
1484:
1435:
1427:
1419:
1350:
1288:. In:
1258:
1204:
1196:
1165:
1157:
1115:
1107:
1066:
1012:
1004:
971:
949:
939:
911:
903:
832:
824:
750:
742:
482:cheats
264:shocks
248:Social
227:, and
153:assets
107:
100:
93:
86:
78:
2536:(HRA)
2498:FMECA
2452:(PHA)
2336:Hedge
1831:S2CID
1785:S2CID
1625:(PDF)
1547:S2CID
1539:JSTOR
1433:S2CID
1425:JSTOR
1202:JSTOR
1163:S2CID
1135:(PDF)
1113:S2CID
1010:JSTOR
994:PRISM
933:(PDF)
901:JSTOR
830:S2CID
748:S2CID
714:arXiv
480:" or
360:adapt
268:abuse
243:Types
149:risks
112:JSTOR
98:books
2689:Risk
2626:COSO
1842:2023
1796:2023
1777:PMID
1721:ISBN
1646:help
1610:: 1.
1583:ISBN
1531:ISSN
1482:ISSN
1417:ISSN
1348:ISSN
1256:PMID
1194:ISSN
1155:ISSN
1105:PMID
1064:ISBN
1002:ISSN
969:ISBN
947:OCLC
937:ISBN
909:PMID
822:ISSN
740:ISSN
469:and
274:and
199:and
174:and
163:and
151:and
84:news
2234:GRC
1823:doi
1769:doi
1683:NPR
1521:hdl
1513:doi
1472:doi
1409:doi
1338:doi
1301:doi
1248:doi
1147:doi
1097:doi
893:doi
814:doi
732:doi
661:doi
398:.
354:or
155:of
67:by
2680::
2033:/
2024:AI
1829:.
1819:32
1817:.
1813:.
1783:.
1775:.
1765:39
1763:.
1759:.
1700:.
1681:.
1663:.
1637::
1635:}}
1631:{{
1606:.
1545:.
1537:.
1529:.
1519:.
1509:22
1507:.
1503:.
1480:.
1470:.
1458:.
1454:.
1431:.
1423:.
1415:.
1403:.
1399:.
1346:.
1336:.
1326:10
1324:.
1320:.
1268:^
1254:.
1242:.
1225:35
1223:.
1200:.
1188:.
1184:.
1161:.
1153:.
1143:27
1141:.
1137:.
1111:.
1103:.
1093:46
1091:.
1087:.
1046:^
1030:.
1008:.
996:.
992:.
945:,
907:.
899:.
889:40
887:.
883:.
828:.
820:.
812:.
802:19
800:.
768:.
746:.
738:.
730:.
722:.
710:52
708:.
657:60
655:.
651:.
634:17
632:.
602:.
281:A
270:,
223:,
219:,
215:,
211:,
207:,
1930:e
1923:t
1916:v
1844:.
1825::
1798:.
1771::
1729:.
1704:.
1685:.
1667:.
1648:)
1644:(
1627:.
1591:.
1553:.
1523::
1515::
1488:.
1474::
1466::
1460:9
1439:.
1411::
1405:3
1354:.
1340::
1332::
1303::
1262:.
1250::
1244:1
1227:.
1208:.
1190:2
1169:.
1149::
1119:.
1099::
1072:.
1040:.
1016:.
998:7
977:.
915:.
895::
869:"
836:.
816::
808::
772:.
754:.
734::
726::
716::
669:.
663::
617:.
405:)
401:(
336:.
317:.
134:)
128:(
123:)
119:(
109:·
102:·
95:·
88:·
61:.
38:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.