Vulnerability of Aila 2009, Affected Women.

In: Social Issues

Submitted By atikdu124
Words 4754
Pages 20
Vulnerability of Aila 2009 Affected Women, Ailapur, Khulna, Bangladesh.

Atikul Islam
Department of Sociology.
University of Dhaka.
March, 2011.

Causes of Aila:
Aila of May, 2009:
Consequences of Aila:
Present situation of Ailapur Village Women:
Housing and habitation:
Loss of Livelihoods:
Change in Livelihoods:
Food Crisis:
Drinking Water Crisis:
Warm cloths crisis:
Cold wave and diseases:
Sanitation problem:
Water borne Diseases:
Women specific health problem:
Reproductive Health.
Gender Violence:

Introduction: The Bay of Bengal, a northern and extended arm of the Indian Ocean and covering about 510,000 square km, is probably the "rebellious daughter" of the ocean who often turns too angry and smashes the lives of thousands along its huge coastlines particularly in the months of May and October each year. Actually, the coast of Bangladesh is known as a zone of multiple vulnerabilities. It is prone to severe natural disasters, such as cyclones, storm surges, and floods(The daily star, June 1, 2009). Aila of May 2009 is one of the most vulnerable disasters that causes hundreds of people’s death, massive damage of crops, domestic animals etc. Evan after two years of Aila, Aila affected people particularly women are in vulnerable situation. Their vulnerability are discussed in the below.
Sources of data and methodology: The data for this study have been collected from the field Using qualitative research methods. On the basis of several criteria on Aila affected village named Ailapur of Shutarkhali Union, Dakop upuzilla in Khulna district was selected. The data has been drawn from 10 to 16 March 2011. One FGD and ten case studies have been conducted with women to understand conditions of women and their households. Most of the women lived with poverty and saught their suatenance.…...

Similar Documents

Us Finanical Crisis 2009

...sell at a profit 4. Housing prices seem to be steadily rising, and thus occupancy seems secure 5. “Ownership” is as a way of accumulating assets for households 6. The economic value of owning a home is one created by the owner’s hard work, proof of personal achievement and moral worth; 7. Public policy has provided substantial economic incentives for homeownership through the mansion tax subsidy, the deduction from income taxes of mortgage interest and real property taxes; and 8. The experience of any kind of supportive collective or communal ownership and residential facilities is minimal. (p. 5) These beliefs are significant to the understanding of American’s strong desire for a home and their vulnerability to the offers related to it. Barnes (2008) provides an overview of how the housing bubble developed. He traces it to the late 2001, the same year that 9/11 occurred, and when America was just recovering from the recession created by the bubble of the 1990s. The Federal Reserve wanted to reinvigorate the economy by expanding money supply and encouraging economic activities (buying and investing). The Federal Reserve reduced rates significantly until the fed funds reached 1% in 2003. This translates to the availability of cheap credit. People saw the opportunity to pursue the American dream, and began making loans to purchase their homes. In 2002, the prices of homes increased dramatically. The high......

Words: 9783 - Pages: 40

Security Vulnerabilities and the

...Employee’s Security Vulnerabilities and the Affects on Organization’s Information Technology University Maryland University College Employee’s Security Vulnerabilities and the Affects on Organization’s Information Technology Cyber security vulnerabilities and threats are real and constant. Information technology breakthroughs have given our adversaries cheaper and often effective cyber weapons to harm U.S. computer networks and systems (Gen Alexander, 2011). Unfortunately, our adversaries are not our greatest vulnerability to cyber security or cyber space. Cyber security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Cyber space is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures. (Ruquet, 2011). The government has been coordinating with private organizations and the public sector to protect information technology. They have been working to detect, prevent, and mitigate cyber threats and vulnerabilities. There are multiple vulnerabilities which adversely affect information technology but this paper will focus on the human factor. ......

Words: 2131 - Pages: 9

Women and Diabetes

...Women and Diabetes: An Examination of Quality of Care for Medicare Recipients Abstract In recent years, diabetes has become one of the top 10 causes of death among women. Research has revealed that women 65 years and older account for 40% of the population and numbers are expected to increase exponentially. Vigorous medication management and coordination of care is instrumental in treating diabetes effectively. The patchwork of health insurance that exist today, particularly Medicare Part D, is culpable in allowing unequivocal disparities among race, gender, and socioeconomic status. This paper will examine quality of care among Medicare beneficiaries, particularly women, and implications for revision in social policy. Maintaining an active and healthy lifestyle is a necessity for achieving longevity. A nutritional, well balanced diet coupled with regular exercise is a simple, yet effective way to sustain healthy living. Neglecting to address diet and exercise, as part of a weekly regimen, is a precursor to the onset of an acute, lifelong illness. Diabetes is one of the largest and fastest growing causes of chronic disease mortality, morbidity, and disability in the United States (Robbins & Webb, 2006). Currently, there is no vaccine to prevent diabetes and no cure for the disease once acquired. According to the American Diabetes Association, more than twenty-three million Americans have diabetes. Patients age 65 years or older......

Words: 3809 - Pages: 16


...Vulnerability Assessment Scan Using Nessus CNT 4403 Anthony de Cardenas Patricia McDermott-Wells 1. Zenmap GUI is a multi-platform application that provides advanced experience network mapping. It would be used by beginners to understand how the network functions. The software probes computer networks by sending packets and analyzes its responses. It is useful when you want to understand the system’s vulnerabilities or detect specific services running on the network. 2. When describing the risks and vulnerabilities of an information system, it has to start where security of data is compromised. Protecting the user names and passwords of a system is vital. When there are vulnerabilities, the system’s sensitive data is at risk. That is the reason you need to secure your information when transferred through the network. 3. The application that is used for Step 2 in the hacking process is Nessus. 4. If you are to conduct an ethical hacking, you have to make sure that you have the proper authorization. Without it, any probing could be considered malicious and would be subject to prosecution. 5. A CVE, or a Common Vulnerabilities & Exposure, is a list of all the known vulnerabilities in the system. They also provide a way to close or patch them up to limit the risk of security leaks. The CVE database is sponsored by the Mitre Corporation under the control of Homeland Security. 6. The Zenmap GUI can definitely detect the operating system......

Words: 328 - Pages: 2

Social-Cultural and Economic Factors Affecting the Vulnerability of Women to Hiv/Aids

...increase women’s vulnerability to HIV/AIDS. Introduction Women, especially in sub-Saharan Africa not only have the highest HIV-prevalence rates, compared to men, but also are greatly affected by the social and economic constraints that prevent them from evading high risk situations. Context-specific factors associated with women’s vulnerability to HIV infection include: Cultural Norms Cultural norms often place a high value on motherhood; attach a negative stigma to HIV-infected women, and view women and girls as primary caregivers. This places a significant burden on them. Other cultural practices such as widow inheritance and female genital mutilation (FGM) also increase women’s risk of contracting HIV/AIDS. Polygamy and early marriages are also very prevalent cultural practices in some societies in the world and most especially in Africa. These setups in most cases disadvantage the women and put them at greater risk of contracting the virus and disease. Poverty Poverty sometimes prompts women to engage in risky behavior, such as exchanging sex for gifts, money or food. As a result, women are more vulnerable to contracting the virus because they are unable to negotiate safe sex. This behavior is commonly seen among transport routes as well as refugee camps, where women and children exchange sex for money or gifts with high risk men. Economic Dependency Women's economic dependency on men increases their vulnerability to HIV infection. Dependent women are hesitant......

Words: 1752 - Pages: 8

Pepsico 2009

...0   1 2 0 1 3 0    3 2009 Annual Report WHAT IS At PepsiCo, Performance with Purpose means delivering sustainable growth by investing in a healthier future for people and our planet. As a global food and beverage company with brands that stand for quality and are respected household names—Quaker Oats, Tropicana, Gatorade, Lay’s and Pepsi-Cola, to name a few—we will continue to build a portfolio of enjoyable and wholesome foods and beverages, find innovative ways to reduce the use of energy, water and packaging, and provide a great workplace for our associates. Additionally, we will respect, support and invest in the local communities where we operate, by hiring local people, creating products designed for local tastes and partnering with local farmers, governments and community groups. Because a healthier future for all people and our planet means a more successful future for PepsiCo. This is our promise. PerFormance To all our investors… It’s a promise to strive to deliver superior, sustainable financial performance.* Our GOals and COmmitments toP line: • Grow international revenues at two times real global GdP growth rate. • Grow savory snack and liquid refreshment beverage market share in the top 20 markets. • Sustain or improve brand equity scores for Pepsico’s 19 billion-dollar brands in top 10 markets. • rank among the top two suppliers in customer (retail partner) surveys where third-party measures exist. bottom line: • continue to expand......

Words: 53842 - Pages: 216

Vulnerability Report

...(Port) ms-wbt-server (3389/tcp) ms-wbt-server (3389/tcp) ms-wbt-server (3389/tcp) general/CPE-T general/HOST-T general/tcp ssh (22/tcp) Threat Level High Low Log Log Log Log Log Host scan start Host scan end 2.1.1 High ms-wbt-server (3389/tcp) High (CVSS: 6.4) NVT: Microsoft RDP Server Private Key Information Disclosure Vulnerability Summary: This host is running Remote Desktop Protocol server and is prone . . . continues on next page . . . 2 RESULTS PER HOST 5 . . . continued from previous page . . . to information disclosure vulnerability. Vulnerability Insight: The flaw is due to RDP server which stores an RSA private key used for signing a terminal server’s public key in the mstlsapi.dll library, which allows remote attackers to calculate a valid signature and further perform a man-in-the-middle (MITM) attacks to obtain sensitive information. Impact: Successful exploitation could allow remote attackers to gain sensitive information. Impact Level: System/Application Affected Software/OS: Microsoft RDP 5.2 and below Solution: No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one. A Workaround is to connect only to terminal services over trusted networks. OID of test routine: References......

Words: 12714 - Pages: 51


...Page 1 Chapter 1 Vulnerability Assessment Solutions in this Chapter: I What Is a Vulnerability Assessment? I Automated Assessments I Two Approaches I Realistic Expectations Summary Solutions Fast Track Frequently Asked Questions 1 285_NSS_01.qxd 2 8/10/04 10:40 AM Page 2 Chapter 1 • Vulnerability Assessment Introduction In the war zone that is the modern Internet, manually reviewing each networked system for security flaws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack. Each technical advance brings wave after wave of security holes. A new protocol might result in dozens of actual implementations, each of which could contain exploitable programming errors. Logic errors, vendor-installed backdoors, and default configurations plague everything from modern operating systems to the simplest print server.Yesterday’s viruses seem positively tame compared to the highly optimized Internet worms that continuously assault every system attached to the global Internet. To combat these attacks, a network administrator needs the appropriate tools and knowledge to identify vulnerable systems and resolve their security problems before they can be exploited. One of the most powerful tools available today is the vulnerability assessment, and......

Words: 9203 - Pages: 37

Hazards & Vulnerability

...Hazard & Vulnerability of Dhaka City 5 page ■ Dhaka City Population Area Urbanization River ■ Recent few incidents case study ■ Historical Hazard ■ Analysis and severity of hazards & vulnerability Bangladesh is a unitary, independent and sovereign Republic known as the People’s Republic of Bangladesh. Bangladesh emerged as an independent country on March 26, 1971. The war of liberation ended on 16 December 1971 with the victory of Bangladesh forces and the surrender of the occupying Pakistani Army in Dhaka, the capital of Bangladesh. From its beginning as a small city with a few thousand people, Dhaka actually experienced dramatic turns upward and today it has become one of the fastest growing mega cities of the world. Its existence as a major urban agglomeration has been consistent over a period of 400 years. Even the most developed cities in the world today cannot boast 400 years of uninterrupted and organised existence that Dhaka does as a historic city. In the 16th century during the reign of Mughal Emperor Akbar it was a thana or military outpost having a population of only 3000 people with an area of 2 km² (UNEP, 2005). Then turning Dhaka into a capital city of the eastern province in 1608 by Subedar Islam Khan was epoch making. Since then Dhaka has experienced actual urbanisation and trends of development. Area Dhaka is located in central Bangladesh at 23°42′0″N 90°22′30″E, on the eastern banks of the Buriganga River. The...

Words: 4332 - Pages: 18

Security Vulnerability

... Matrix Of Vulnerability Attributes And System Object Types Student name Professor Date of submission Matrix of Vulnerability Attributes and System Object Types   | Object of Vulnerability | | Physical | Cyber | Human/Social | Enabling Infrastructure |   |    Attributes | Hardware (datastorage,input/output,clients,servers),networkandcommunications,locality |  Software,data,information,knowledge | Staff,command,management,policies,procedures,training,authentication |  Ship,building,power,water,air,environment | Design/Architecture | Singularity |  Network and communications affected | Software as well as data has been compromised |  Centralized management system as well as procedures and authentication needed to access | Hardware and software | | Uniqueness |  Was not thoroughly taken care of leading to the vulnerability of the system |  Result of a vulnerability |   |   | | Centrality |  Centralized control system |  Fed from a centralized system of control |  Centralized management of the organization |   | | Homogeneity |  Vulnerabilities requiring patches happen from time to time |  Occurences such as this have never been witnessed before |   |   | | Separability |  Can be easily separated from the system |  Cannot be easily isolated from the system |  One with the system as they need each other to perform |   | | Logic/......

Words: 1132 - Pages: 5

Measuring Vulnerability

...Studies Surian sa mga Pag-aaral Pangkaunlaran ng Pilipinas Toward Measuring Household Vulnerability to Income Poverty in the Philippines Jose Ramon G. Albert, Lilia V Elloso . and Andrei Philippe Ramos DISCUSSION PAPER SERIES NO. 2007-16 The PIDS Discussion Paper Series constitutes studies that are preliminary and subject to further revisions. They are being circulated in a limited number of copies only for purposes of soliciting comments and suggestions for further refinements. The studies under the Series are unedited and unreviewed. The views and opinions expressed are those of the author(s) and do not necessarily reflect those of the Institute. Not for quotation without permission from the author(s) and the Institute. December 2007 For comments, suggestions or further inquiries please contact: The Research Information Staff, Philippine Institute for Development Studies 5th Floor, NEDA sa Makati Building, 106 Amorsolo Street, Legaspi Village, Makati City, Philippines Tel Nos: (63-2) 8942584 and 8935705; Fax No: (63-2) 8939589; E-mail: Or visit our website at Toward Measuring Household Vulnerability to Income Poverty in the Philippines♦ Jose Ramon G. Albert,µ Lilia V. Elloso* and Andrei Philippe Ramos∂ Abstract: Concomitant to the analysis of poverty is the measurement of vulnerability. Estimates of household vulnerability to income poverty are developed using a modified probit model that considers......

Words: 10762 - Pages: 44


...conduct vulnerability assessments is of the upmost importance if a company or organization has information that is confidential or vital in nature. The need to conduct penetration testing should be an ongoing task for organizations as new technologies emerge. Even with security measures in place hackers continue to find ways around the roadblocks which are put in place to secure our networks. Just this month alone the Federal Bureau of Investigation’s network was compromised as a hacker was able to penetrate the emails of one of the organization’s special agents (Brito, 2012). The FBI has some of the most sophisticated computer security measures in place known to man and if their systems can be hacked I assure you that no one is safe. In order to properly examine a computer network for vulnerabilities a company’s information systems manager needs to determine whether such testing can be completed in house or should be outsourced to a penetration testing contractor. It is my belief that penetration testing is best left to contractors whose sole function is in conducting these types of tests, as they are better equipped with the tools and knowledge needed to get an accurate overview of a business network. However, penetration testing should be completed periodically by a business internal IT staff as they can apply updates to prevent vulnerabilities throughout the year and can assist a third party vendor in getting the best snapshot of a network’s vulnerabilities. ......

Words: 1998 - Pages: 8

Vulnerabilities of a Workgroup

...There are several vulnerabilities that exist for any workgroup but the five I have chosen are a remote code execution, an elevation of privileges, an uninitialized memory corruption, a hacker could hijack an active OWA session, information disclosure vulnerability. Several of the vulnerabilities include privilege elevation. This is a very serious type of attack because if a person can elevate there privileges they could completely take over your system and do some serious damage. This particular attack is a remote code execution vulnerability which could allow an attacker to remotely take over your system. The vulnerability is caused by a memory corruption error while handling malformed strings in a Microsoft Office document. The attacker would create specially crafted MS Office files send them as email attachments, or they could host a web site and lure you into visiting by simply clicking on a link. Opening the email attachment could corrupt the system memory and allow the attacker to execute arbitrary code. The workaround for this attack is do not open or save files received from unknown sources or that come unexpectedly from trusted sources. The cure is to apply appropriate patches. The next attack is in Outlook Web Access and it could allow Elevation of Privileges. The attacker could hijack the OWA session and perform actions on behalf of the authenticated user without the user’s knowledge. This vulnerability affects Microsoft exchange server 2000, 2003, 2007 so......

Words: 350 - Pages: 2


...Article on Vulnerablity Nur 440 August 22, 2011 Vulnerability Article As cited by De, and Anderson (2008), according to Aday (2001), “vulnerable populations are those at risk for poor physical, psychological, or social health. Anyone can be vulnerable at any given point in time as a result of life circumstances or response to illness or events” (p. 3). This particular article will look at the groups who are vulnerable to influenza. As stated by Hutchins, Truman, Merlin, and Redd (2009) “the US national strategy for pandemic influenza preparedness and response assigns roles to governments, businesses, civic and community-based organizations, individuals, and families” (para. 1). Looking at the group that would have a greater risk there are many barriers. One of the barriers is ensuring that all levels from government, right down to the individual act efficiently and swiftly with the plan of action. Others may be transportation, lack of insurance, lack of knowledge, and the list goes on. There are many vulnerable groups when looking at containing or minimizing an outbreak of influenza. Some of the top groups are newborn’s/infants, poverty/poor class of society (no insurance), and the elderly (>65 years-old). A person then can break the groups down even more and say; anyone within these groups that are compromised with other health problems may be at an even greater risk. With influenza very easily contracted from person to person along with looking at these......

Words: 427 - Pages: 2

The Global Financial Crisis: Assessing Vulnerability for Women and Children, Identifying Policy Responses

...Global Financial Crisis: Assessing Vulnerability for Women and Children, Identifying Policy Responses Mayra Buvinic World Bank February 2009 The current global financial crisis, on top of recent food price increases (which, while down from their peak last year continue to affect the poor in developing countries), will have serious gender specific consequences for women in poor countries and their children. While women (and men) in most developing countries are vulnerable to increased risk of poverty and hardship, exposure to gender-specific negative impacts are particularly high in a subset of countries. These are countries where pre-existing high infant mortality rates and/or low rates of female schooling, combined with decelerating growth rates, substantially raise the vulnerability of women and girls to the deleterious effects of the crisis. Their situation is even more precarious in the sub-set of countries where limited fiscal resources constrain governments’ ability to cushion human impacts. If left unchecked, these crisis consequences on women will reverse progress in gender equality and women’s empowerment (and in meeting the MDGs), increase current poverty and imperil future development. Fortunately, policy responses which build on women’s roles as economic agents and their preference for investing resources in child well-being can go a long way towards mitigating these negative effects. These responses are good for women and for development–......

Words: 1801 - Pages: 8

Oroszlánfejű herceg - Argai herceg | 第68集 | Robbery (Movie)