Patient Vulnerability and Professional Vulnerability

2012 ◽  
Vol 4 (3) ◽  
pp. 167-170
Author(s):  
Leonardo D. de Castro
2013 ◽  
Vol 20 (1_suppl) ◽  
pp. 51-56 ◽  
Author(s):  
Aimé Kakudji Kyungu

This article presents an ethnographic study of the pseudonymous Saint Amand Hospital in Lubumbashi (Democratic Republic of Congo) and of the way in which struggles for control of the hospital’s resources contributed to shape certain practices that were damaging to the institution. We examine how, following the disengagement of both the State and a large bankrupt mining enterprise, the ‘atypical’ governance of the hospital and the institutional instability it generated led to professional vulnerability among care providers. We also look at how, in turn, this situation exacerbated the vulnerability of the helpless and uneducated patients attending that hospital.


Author(s):  
Patricia Ballamingie ◽  
Sherrill Johnson

This paper draws explicitly on the field experiences of two doctoral researchers in geography to elucidate some of the challenges and issues related to researcher vulnerability that are especially acute for graduate students. In spite of significant differences in context, both researchers experienced an unanticipated degree of professional vulnerability during their doctoral fieldwork that warrants further exploration, including a theoretical interrogation of the complex (and shifting) terrain of power relations within qualitative research projects. This paper addresses the lacuna in the qualitative methodological research literature on the topic of researcher vulnerability (in contrast to the well-developed discussion of participant vulnerability). Throughout, the authors suggest possible strategies for mitigating researcher vulnerability while protecting the overall integrity of the research process.


2020 ◽  
Vol 20 ◽  
pp. 6-11
Author(s):  
V. Balatska ◽  
M. Shabatura

For today, computer networks are an integral part of our daily lives. As the analysis shows, the network is ex-tremely vulnerable, it can serve as a place of information leakage, changes of configuration of settings and modification of data by the attackers. There are many more threats, and the security of the network requires a great deal of attention to ensure the security of the network in order to maintain the confidentiality and integrity of the data. Organizations must regularly assess the vulnerability of the entire network to test the security level and strengthen the network. We use vulnerability scanners to find weaknesses, which are useful for detecting security vulnerabilities on a case-by-case basis and across the network as a whole. The purpose of the work is to explore the computer network for vulnerabilities using the Nessus Professional scanner. Research Methods – network scanning by Nessus Professional vulnerability scanner. The Nessus Professional vulnerability scanner from Tenable Network Security, which is freely available, was used for the research. The Nessus Professional scanner has been found to have better functionality and performance than other available scanners. The only downside to the scanner is its cost per year, as well as scanning a large number of hosts on the network at a time (over 100 hosts). After the scanner was successfully installed, carried out it was in-spected from the moment it was launched to the generation of host test reports. For the work, the Lviv State University of Life Safety network was tested. In the post-scan report, which is displayed in HTML format, you can see scan details for each host; the number and nature of vulnerabilities; the error correction dashboard. According to the results of testing, vulnerabilities of low, medium and high levels of hazards were identified, totaling 376. Vulnerabilities were ana-lyzed based on the obtained results, namely: a brief description and a way to solve the problem.


2020 ◽  
pp. JNM-D-19-00013
Author(s):  
Deborah Hughes Warden ◽  
Ronda G. Hughes ◽  
Janice C. Probst ◽  
Swann Arp Adams ◽  
David N. Warden

Background and PurposeTurnover among nurse managers, directors, and executives is associated with staff nurse retention and patient outcomes. The purpose of this article is to describe the development of an instrument to evaluate factors associated with intent to leave among these leaders within acute care facilities.MethodsThe Nurse Leader Environment Support Survey (NLESS) was developed and evaluated using exploratory factor analysis and reliability testing (Cronbach’s α). Data was obtained as part of a large nationwide electronic survey (N = 1,903).ResultsFactors converged into three major themes (organizational culture, professional vulnerability, and workplace relationships) which were consistent across all three leadership groups. Factor subscales exhibited Cronbach’s α > .7.ConclusionsThe NLESS is a useful tool in comparing reasons for turnover among nursing leadership groups. Future refinement may prove useful in identifying and clarifying foundational causes of turnover.


Sign in / Sign up

Export Citation Format

Share Document