Showing 1 - 10 of 99
In the leading chapter of this dissertation, "Unemployment, Vulnerability and Poverty: A New Class of Measures, Its … that, unlike the standard measures of unemployment or poverty, account for the amount of vulnerability that exists in … Axiomatic Properties and Applications," we, Kaushik Basu and myself, derive a new class of measures for unemployment or poverty …
Persistent link: https://www.econbiz.de/10009466172
The scope and extent of home-based businesses and the determination of the method by which the greater portion of household income is generated, in poor neighbourhoods, is the crux ofthis study.The study was undertaken among the 2245 households in the Kleinvlei sub-economic housing area located...
Persistent link: https://www.econbiz.de/10009447190
' vulnerability to energy supply disruptions. Crude oil is stored in geologic formations, or salt domes, located under these …
Persistent link: https://www.econbiz.de/10009435453
For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass...
Persistent link: https://www.econbiz.de/10009435516
important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil … countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus … proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations …
Persistent link: https://www.econbiz.de/10009435670
The CFE Treaty will provide for limits on NATO and WTO forces, particularly tanks, armored personnel carriers, artillery, and helicopters. In addition to the overall limits on TLEs in the ATTU zone, there are expected to be secondary limits on single country forces, limits on forces based in...
Persistent link: https://www.econbiz.de/10009435974
systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research …
Persistent link: https://www.econbiz.de/10009436080
The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While...
Persistent link: https://www.econbiz.de/10009436221
pressure and other variables related to damage by pyroclastic flow into underground structures, and vulnerability criteria for …
Persistent link: https://www.econbiz.de/10009436263
assets using the ECIP program and ultimately produced individual protective measure and vulnerability values through the … protective measure and vulnerability indices (PMI/VI). The PMI/VI assess the protective measures posture of individual facilities …
Persistent link: https://www.econbiz.de/10009436387