Loading ...

Blob

Smart Reasoning:

C&E

See more*

Qaagi - Book of Why

Causes

Effects

past bullying experiences(passive) caused bysocial vulnerability and trust issues

the social variables ... complex inter - connectionscontributeto overall social vulnerability

personal factors , social factors and environmental factors(passive) is caused bySocial vulnerability to flood

by lack of consistent set of metrics for assessing social vulnerability(passive) prompted bysocial vulnerability assessment

by lack of consistent set of metrics for assessing social vulnerability [ 13(passive) prompted bysocial vulnerability assessment

by lack of consistent set of metrics(passive) prompted bysocial vulnerability assessment

Major factorsinfluencesocial vulnerability Access

Students ... companiesmight causesocial harm

conductcausessocial harm

behaviourcausessocial harm

gambling(passive) caused bysocial harm

a profit and companiescausesocial harm

misusecausessocial harm

financial divestment from companies ... activitiescausesocial harm

his concern about recent findings ... social mediacausessocial harm

alcohol consumption , drug use and gambling(passive) caused bysocial harm

take down your server's causingsocial harm

if it becomes clearis causingsocial harm

virtual agents(passive) caused bysocial harm

market - driven housing developments(passive) caused bysocial harm

the addictive nature of some video gamescausessocial harm

the addictive nature of some video gamesCAN causesocial harm

the addictive nature of some video gamesWILL causesocial harm

cannabis use(passive) caused bysocial harm

betting shops(passive) can be caused bysocial harm

the product strategywas causingsocial harm

rising house pricesare causingsocial harm

the IGas planswill causesocial harm

even if we can distinguish good from bad faithare causingsocial harm

welfare - fuelled alcohol abuse and drug abuse(passive) caused bysocial harm

because the actus reus of the attempt creates fear and apprehension in othersthus causingsocial harm

how major advancements in computer technology have been abusedto causesocial harm

factorsinfluencingindividuals vulnerability

the individual factorscontributingto social vulnerability

that the Conservative plans will signify a return to 1930s levels of public servicescausingsocial harm

factorsinfluencingsocial vulnerability

the factorscontributeto social vulnerability

Factorscontributeto social vulnerability

other factorscan contributeto social vulnerability

the factorscontributingto social vulnerability

a community?s ability to sustain itself against changes to the SESinfluencea community?s ability to sustain itself against changes to the SES

the way peopleinfluencethe way people

its ability to prepare for , respond to , and recover from hazard eventsinfluencesits ability to prepare for , respond to , and recover from hazard events

to connection and over - sharing in ways intended to manipulate an audienceleadto connection and over - sharing in ways intended to manipulate an audience

something negative to happencausesomething negative to happen

OR , 1.36 ... 95 % CI , 1.06 to 1.74ledOR , 1.36 ... 95 % CI , 1.06 to 1.74

the ability to prepare for , respond to , and recover from disastersinfluencesthe ability to prepare for , respond to , and recover from disasters

healthcare issues(passive) caused byhealthcare issues

the ability to prepare forinfluencesthe ability to prepare for

to increased drug consumptionleadingto increased drug consumption

to instabilitycan contributeto instability

to antisocial behavioreventually leadingto antisocial behavior

different agitation in the past around the worldinfluenceddifferent agitation in the past around the world

from food insecurityresultingfrom food insecurity

to their insecure existenceleadingto their insecure existence

the ability to prepare for , respond to , and recover from disastersinfluencesthe ability to prepare for , respond to , and recover from disasters

healthcare issues ... , lack of basic infrastructures(passive) caused byhealthcare issues ... , lack of basic infrastructures

how the family bears the chronic conditioninfluenceshow the family bears the chronic condition

the high frequency of disasters in China 2017 - 12 - 27causedthe high frequency of disasters in China 2017 - 12 - 27

the ability of parents to provide access to adequate care , which affects the health status of their children3434influencesthe ability of parents to provide access to adequate care , which affects the health status of their children3434

the susceptibility of the various groups and also govern their responsiveness ( CUTTER , 2003influencethe susceptibility of the various groups and also govern their responsiveness ( CUTTER , 2003

to a total of 7069356983040 hits by Programleadsto a total of 7069356983040 hits by Program

in unauthorized creation , deletion or modification access to critical data or all Java SE accessible datacan resultin unauthorized creation , deletion or modification access to critical data or all Java SE accessible data

an affected device to reload when the affected device processes a malformed BGP update that has been crafted to trigger the issuecould causean affected device to reload when the affected device processes a malformed BGP update that has been crafted to trigger the issue

to denial - of - service ( DoS ) attackscould leadto denial - of - service ( DoS ) attacks

to a malicious user gaining full administrative accessmay leadto a malicious user gaining full administrative access

to arbitrary code execution in the context of the current usercould leadto arbitrary code execution in the context of the current user

Remote command execution and privilege escalation vulnerabilitiesdiscoveredRemote command execution and privilege escalation vulnerabilities

to code execution memory corruption vulnerabilities that could lead to code executioncould leadto code execution memory corruption vulnerabilities that could lead to code execution

to Remote Command Execution Unauthenticated File Disclosure Unauthenticated Server Side Request Forgeryleadsto Remote Command Execution Unauthenticated File Disclosure Unauthenticated Server Side Request Forgery

to escalation of privileges , denial of service , or assistance disclosuremay ... leadto escalation of privileges , denial of service , or assistance disclosure

a denial of service via a crafted ELF fileto causea denial of service via a crafted ELF file

to remote execution of the arbitrary code in system ( RCEcould leadto remote execution of the arbitrary code in system ( RCE

to barrierscontributingto barriers

to a Windows stop error ( kernel panic , or blue screen error ) , or to arbitrary code executionwill leadto a Windows stop error ( kernel panic , or blue screen error ) , or to arbitrary code execution

to code execution ... while the other six are out - of - bounds read vulnerabilities that could lead to information disclosurecould leadto code execution ... while the other six are out - of - bounds read vulnerabilities that could lead to information disclosure

an affected device to reloadcould causean affected device to reload

in takeover of Java SEcan resultin takeover of Java SE

to medium - integrity code execution vulnerabilityleadingto medium - integrity code execution vulnerability

in the wild Vulnerability corrected by vendordiscoveredin the wild Vulnerability corrected by vendor

Blob

Smart Reasoning:

C&E

See more*