article thumbnail

Covid-19: Elements of a Scenario

Emergency Planning

It is now more than ten years since there was a general push to induce countries to plan for pandemics (WHO 2005). US Homeland Security Council 2005, UK Government 2008), while in others it did not. For example, civil aviation is particularly vulnerable. US Homeland Security Council 2005. Jonathan Cape, London, 352 pp.

Pandemic 130
article thumbnail

The 2019 Global Assessment Report (GAR)

Emergency Planning

One of the most intransigent problems with the predecessor of the Sendai Framework, Hyogo Framework for Action, 2005-2015, was its resolute reliance on a 'top-down' approach. UNISDR 2005. Hyogo Framework for Action 2005-2015: Building the Resilience of Nations and Communities. Surminski and J-A. Linnerooth-Bayer (eds) 2019.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A developer’s guide to programatically overcome fear of failure by Mandeep Kaur

PagerDuty

“From this perspective, the function of shame is to evoke behavior designed to hide the self from the scrutiny of significant others, thus minimizing the likelihood of loss of love and rejection.” ( McGregor & Elliot, 2005 ). Have leaders be willing to be vulnerable. We can visualize this through the shame/failure loop.

Capacity 145
article thumbnail

Towards a Taxonomy of Disasters

Emergency Planning

While not independent of the magnitude of physical forces involved, it is not linearly related to them because it depends on the nature and size of the vulnerabilities that the physical forces act upon. Caffrey 2005. Disaster is fundamentally a social phenomenon. The health sciences also have a different perspective (Myrtle et al.

article thumbnail

Book Review: Resilience Matters;Flourishing in an Era of Extremes

Recovery Diva

In the aftermath of Hurricane Katrina in 2005, 70 percent of those who died were over 65. What those neighborhoods had in common were dense social networks—block groups, church clubs and neighbors who checked on the most vulnerable.

article thumbnail

Why All CISOs Need to Prioritize Quantum Tech Today

FS-ISAC

Consider the SHA1 (Secure Hash Algorithm 1), whose weaknesses were discovered in 2005. The US Department of defense is investing in quantum sensing because both troop movements and weaponry are dependent on GPS, which is vulnerable to jamming by enemies. It takes a decade to replace cryptographic standards.

article thumbnail

Guest Post: “I’ve Upgraded My Credentials. My Facility Is Safe Now, Right?”

Security Industry Association

Most employees will take their credentials home with them when they leave their facility, and once the employees are outside the secured environment, a secure credential is protected from many of the types of attacks vulnerable credentials are prone to.