نتایج جستجو برای: unsafe behavior

تعداد نتایج: 624331  

Journal: :International journal of occupational safety and ergonomics : JOSE 2014
Yahya Khosravi Hassan Asilian-Mahabadi Ebrahim Hajizadeh Narmin Hassanzadeh-Rangi Hamid Bastani Amir H Behzadan

OBJECTIVE Construction is a hazardous occupation due to the unique nature of activities involved and the repetitiveness of several field behaviors. The aim of this methodological and theoretical review is to explore the empirical factors influencing unsafe behaviors and accidents on construction sites. METHODS In this work, results and findings from 56 related previous studies were investigat...

2007
Christopher Small

The boundary between application and system is becoming increasingly permeable. Extensible database systems, operating systems, and applications, such as web browsers, are demonstrating the value of allowing end-users to extend and modify the behavior of what formerly was considered to be a static, inviolate system. Unfortunately, flexibility often comes with a cost: systems unprotected from mi...

Journal: :Clinical infectious diseases : an official publication of the Infectious Diseases Society of America 2005
Andri Rauch Martin Rickenbach Rainer Weber Bernard Hirschel Philip E Tarr Heiner C Bucher Pietro Vernazza Enos Bernasconi Annelies S Zinkernagel John Evison Hansjakob Furrer

BACKGROUND Data on the incidence of hepatitis C virus (HCV) infection among human immunodeficiency virus (HIV)-infected persons are sparse. It is controversial whether and how frequently HCV is transmitted by unprotected sexual intercourse. METHODS We assessed the HCV seroprevalence and incidence of HCV infection in the Swiss HIV Cohort Study between 1988 and 2004. We investigated the associa...

2002
Yutaka Oiwa Tatsurou Sekiguchi Eijiro Sumii Akinori Yonezawa

It is well known that programs written in C are apt to suffer from nasty errors due to dangling pointers and/or buffer overflow. In particular, such errors in Internet servers are often exploited by malicious attackers to “crack” an entire system, which becomes even social problems nowadays. Nevertheless, it is yet unrealistic to throw away the C language at once because of legacy programs and ...

2006
Antoine Girard George J. Pappas

Verification and simulation have always been complementary, if not competing, approaches to system design. In this paper, we present a novel method for so-called metric transition systems that bridges the gap between verification and simulation, enabling system verification using a finite number of simulations. The existence of metrics on the system state and observation spaces, which is natura...

Journal: :Alcoholism, clinical and experimental research 2005
Michael Stein Debra S Herman Elizabeth Trisvan Paul Pirraglia Patricia Engler Bradley J Anderson

BACKGROUND This study was undertaken to determine if alcohol use is associated with sexual risk taking among human immunodeficiency virus (HIV)-infected persons. METHODS Cross-sectional interviews of 262 HIV-infected patients in the Brown University AIDS Program were performed. Factors associated with any sexual activity, unsafe sexual activity, and a 4-fold typology of sexual risk were exami...

2013
Iqbal H. Shah Elisabeth Åhman

Each year throughout the world, approximately 205 million women become pregnant and some 133 million of them deliver live-born infants [1]. Among the remaining 72 million pregnancies, 30 million end in stillbirth or spontaneous abortion and 42 million end in induced abortion. An estimated 22 million induced abortions occur within the national legal systems; another 20 million take place outside...

Journal: :Clinical infectious diseases : an official publication of the Infectious Diseases Society of America 2014
Joseph S Doyle Louisa Degenhardt Alisa E Pedrana Emma S McBryde Rebecca J Guy Mark A Stoové Emma R Weaver Andrew E Grulich Ying-Ru Lo Margaret E Hellard

BACKGROUND Increased global access and use of antiretroviral therapy (ART) for human immunodeficiency virus (HIV) has been postulated to undermine HIV prevention efforts by changing individual risk-taking behavior. This review aims to determine whether ART use is associated with changes in sexual or injecting risk-taking behavior or diagnosis of sexually transmitted infections (STIs). METHODS...

2006
Jonathon T. Giffin

Eighteen years after the original Internet worm of 1988, software still suffers from vulnerabilities that allow attackers to gain illicit access to computer systems. Attackers exploit vulnerabilities to hijack control of a process’ execution as a means to access or alter a system as they desire. In this dissertation, we argue that model-based anomaly detectors can retrofit efficient attack dete...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید