On Vulnerability


Book Description

On Vulnerability maps out an array of perspectives for critically examining the nature of vulnerability, its unequal patterning across different social groups, alongside the everyday social processes that render us vulnerable – interactions, identity and group dynamics. Each chapter equips the reader with a particular sensitising framework for navigating and questioning what it means to be vulnerable or how people cope amid vulnerability. From deviance, stigma and the spoiling or fracturing of identity, to perspectives such as intersectionality, risk, emotions and the vulnerable body, the book traces the theoretical roots of these different analytical lenses, before applying these through illuminating examples and case studies. Drawing on scholarship across more interpretative, analytic and critical traditions, the chapters combine into a multi-dimensional toolkit which will enable the study of the cultural meanings of vulnerability, the political-economic factors that shape its patterning, with a critical sensibility for ‘unlearning’ many assumptions, therefore challenging our sense of who is, or who can be, vulnerable. This book is designed to equip undergraduate and post-graduate students and researchers across the social, health and human sciences, aiding them as they study and question the experiences and structures of vulnerability in our social world.




Critical Vulnerability


Book Description

Assistant U.S. Attorney Aroostine Higgins put her personal life on hold to join the Department of Justice's elite Criminal Division. Now she's prosecuting two men accused of attempting to bribe a foreign government official. But everything's going wrong. Her pretrial motion vanishes form the federal court's electronic docketing system. Her apartment catches fire. Routine dental surgery turns into a near-death experience. When Aroostine's past comes crashing into her present, her most critical vulnerability is exploited, and she finally admits she isn't simply suffering a string of bad luck. An unseen enemy is determined to destroy her--and the only man she's ever loved--unless she finds him first.




Vulnerability and Critical Theory


Book Description

In Vulnerability and Critical Theory, Estelle Ferrarese identifies contemporary developments on the theme of vulnerability within critical theory while also seeking to reconstruct an idea of vulnerability that enables an articulation of the political and demonstrates how it is socially produced. Philosophies that take vulnerability as a moral object contribute to rendering the political, as the site of a specific power and action, foreign to vulnerability and the notion of recognition offered by critical theory does not correct this deficit. Instead, Ferrarese argues that vulnerability, as susceptibility to a harmful event, is above all a breach of normative expectations. She demonstrates that these expectations are not mental phenomena but are situated between subjects and must even be conceived as institutions. On this basis she argues that the link between the political and vulnerability cannot be reduced to the institutional implementation of moral principles. Rather she seeks to rethink the political by taking vulnerability as the starting point and thereby understands the political as simultaneously referring to the advent of a world, the emergence of a relation, and the appearance of a political subject.




Vulnerable Systems


Book Description

The safe management of the complex distributed systems and critical infrastructures which constitute the backbone of modern industry and society entails identifying and quantifying their vulnerabilities to design adequate protection, mitigation, and emergency action against failure. In practice, there is no fail-safe solution to such problems and various frameworks are being proposed to effectively integrate different methods of complex systems analysis in a problem-driven approach to their solution. Vulnerable Systems reflects the current state of knowledge on the procedures which are being put forward for the risk and vulnerability analysis of critical infrastructures. Classical methods of reliability and risk analysis, as well as new paradigms based on network and systems theory, including simulation, are considered in a dynamic and holistic way. Readers of Vulnerable Systems will benefit from its structured presentation of the current knowledge base on this subject. It will enable graduate students, researchers and safety and risk analysts to understand the methods suitable for different phases of analysis and to identify their criticalities in application.




Rethinking Vulnerability and Exclusion


Book Description

This volume offers novel and provocative insights into vulnerability and exclusion, two concepts crucial for the understanding of contemporary political agency. In twelve critical essays, the contributors explore the dense theoretical content, complex histories and conceptual intersection of vulnerability and exclusion. A rich array of topics are covered as the volume searches for the ways that vulnerable and excluded groups relate to each other, where the boundary between the excluded and the included arises, and what the stakes of ‘invulnerability’ might be. Drawing on the works of Hegel (via Judith Butler), Helmuth Plessner and Hannah Arendt to situate the project in a solid historical context, the volume likewise tackles pressing and contemporary issues such as the state of human capital under neoliberalism, the flawed nature of democracy itself, and the vulnerability inherent in extreme precarity, extreme violence, and interdependence. The contributions come from philosophers with a range of backgrounds in social philosophy and critical social sciences, who use related conceptual tools to tackle the political challenges of the 21st century. Together, they present a ground-breaking overview of the main challenges which social exclusion presents to contemporary global societies.




Vulnerability Management


Book Description

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman’s more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks—including a new chapter on cloud vulnerabilities and risk management—from an interloper’s perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.




Critical Infrastructure


Book Description

This text brings together differing geographic perspectives in modeling and analysis in order to highlight infrastructure weaknesses or plan for their protection. Offering new methodological approaches, the book explores the potential consequences of critical infrastructure failure, stemming from both man-made and natural disasters. The approaches employed are wide-ranging, including geographic, economic and social perspectives.




Emerging Cyber Threats and Cognitive Vulnerabilities


Book Description

Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. - Explains psychological factors inherent in machine learning and artificial intelligence - Discusses the social psychology of online radicalism and terrorist recruitment - Examines the motivation and decision-making of hackers and "hacktivists" - Investigates the use of personality psychology to extract secure information from individuals




Gendered Vulnerability


Book Description

Gendered Vulnerability examines the factors that make women politicians more electorally vulnerable than their male counterparts. These factors combine to convince women that they must work harder to win elections—a phenomenon that Jeffrey Lazarus and Amy Steigerwalt term “gendered vulnerability.” Since women feel constant pressure to make sure they can win reelection, they devote more of their time and energy to winning their constituents’ favor. Lazarus and Steigerwalt examine different facets of legislative behavior, finding that female members do a better job of representing their constituents than male members.