{"id":"https://openalex.org/W2577525438","doi":"https://doi.org/10.3233/978-1-61499-716-0-123","title":"Sustainable Development as a Tool Against Environmental Vulnerability","display_name":"Sustainable Development as a Tool Against Environmental Vulnerability","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2577525438","doi":"https://doi.org/10.3233/978-1-61499-716-0-123","mag":"2577525438"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-716-0-123","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-716-0-123","pdf_url":null,"source":{"id":"https://openalex.org/S4210202636","display_name":"NATO science for peace and security series. D, Information and communication security","issn_l":"1874-6268","issn":["1874-6268","1879-8292"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NATO Science for Peace and Security Series - D: Information and Communication Security","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116320444","display_name":"Galatchi Liviu-Daniel","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Galatchi Liviu-Daniel","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5116320444"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23278476,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12013","display_name":"Sustainable Development and Environmental Policy","score":0.32679998874664307,"subfield":{"id":"https://openalex.org/subfields/2308","display_name":"Management, Monitoring, Policy and Law"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12013","display_name":"Sustainable Development and Environmental Policy","score":0.32679998874664307,"subfield":{"id":"https://openalex.org/subfields/2308","display_name":"Management, Monitoring, Policy and Law"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7479202747344971},{"id":"https://openalex.org/keywords/sustainable-development","display_name":"Sustainable development","score":0.5974560379981995},{"id":"https://openalex.org/keywords/environmental-planning","display_name":"Environmental planning","score":0.45831769704818726},{"id":"https://openalex.org/keywords/environmental-science","display_name":"Environmental science","score":0.4200690984725952},{"id":"https://openalex.org/keywords/environmental-resource-management","display_name":"Environmental resource management","score":0.4167674481868744},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.362604558467865},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2360689640045166},{"id":"https://openalex.org/keywords/ecology","display_name":"Ecology","score":0.10565030574798584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08370193839073181},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.08216789364814758}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7479202747344971},{"id":"https://openalex.org/C552854447","wikidata":"https://www.wikidata.org/wiki/Q131201","display_name":"Sustainable development","level":2,"score":0.5974560379981995},{"id":"https://openalex.org/C91375879","wikidata":"https://www.wikidata.org/wiki/Q15473274","display_name":"Environmental planning","level":1,"score":0.45831769704818726},{"id":"https://openalex.org/C39432304","wikidata":"https://www.wikidata.org/wiki/Q188847","display_name":"Environmental science","level":0,"score":0.4200690984725952},{"id":"https://openalex.org/C107826830","wikidata":"https://www.wikidata.org/wiki/Q929380","display_name":"Environmental resource management","level":1,"score":0.4167674481868744},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.362604558467865},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2360689640045166},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.10565030574798584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08370193839073181},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.08216789364814758}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/978-1-61499-716-0-123","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-716-0-123","pdf_url":null,"source":{"id":"https://openalex.org/S4210202636","display_name":"NATO science for peace and security series. D, Information and communication security","issn_l":"1874-6268","issn":["1874-6268","1879-8292"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NATO Science for Peace and Security Series - D: Information and Communication Security","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2095999892","https://openalex.org/W2018764758","https://openalex.org/W2383689843","https://openalex.org/W1550668881","https://openalex.org/W617913288","https://openalex.org/W2062873522","https://openalex.org/W2319323865","https://openalex.org/W2951745010","https://openalex.org/W2347958299","https://openalex.org/W2359982472"],"abstract_inverted_index":{"Sustainable":[0],"development":[1],"can":[2,13,63],"be":[3,14,64],"used":[4],"as":[5,66,139],"a":[6,87],"tool":[7],"against":[8,131],"environmental":[9],"vulnerability.":[10],"Environmental":[11],"vulnerability":[12,123],"identified":[15],"by":[16,77],"applying":[17],"risk":[18,53,76],"analysis":[19,47],"and":[20,27,45,73,79,83,101,110,114,124,134],"assessment":[21],"to":[22,25,74],"define":[23],"hazards":[24],"persons":[26],"the":[28,31,38,57,60,94,102,121,132],"environment,":[29,122],"determine":[30],"probability":[32,88,95],"of":[33,35,41,48,59,71,89,93,96,98,105],"occurrence":[34,97],"these":[36],"hazards,":[37],"possible":[39,103],"magnitude":[40],"events,":[42],"consequence":[43],"analysis,":[44],"quantitative":[46],"system":[49],"failure":[50],"probability).":[51],"Identifying":[52],"limits":[54],"entails":[55],"defining":[56],"acceptability":[58],"risk,":[61],"(which":[62],"classified":[65],"acceptable":[67],"or":[68],"in":[69],"need":[70],"reduction),":[72],"reduce":[75],"designing":[78],"implementing":[80],"risk-reduction":[81],"measures":[82],"controls.":[84],"Risk":[85],"is":[86],"an":[90,99],"adverse":[91,108],"combination":[92],"event,":[100],"extent":[104],"that":[106],"event's":[107],"effects":[109],"consequences":[111],"on":[112],"ecosystems":[113],"persons.":[115],"There":[116],"are":[117],"important":[118],"links":[119],"between":[120],"threats.":[125],"Such":[126],"risks":[127],"include":[128],"terrorist":[129],"acts":[130],"environment":[133],"human":[135],"beings":[136],"using":[137],"resources":[138],"tools":[140],"and/or":[141],"targets.":[142]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
