SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
(far) beyond the
      edge…




    Magdalena, Kurnik
“second brain”




      ?
“second brain”
“second brain”
ENS
ENS
Braak’s Hipothesis




--- Braak H. et al. Idiopathic Parkinson’s disease: possible routes by which vulnerableneuronal types my be subject to
neuroinvasion by an unknown pathogen, 2003 ---
---Hawkes C.H. et al. Review: Parkinson’s disease: a dual hit hypothesis, 2007 ---
Hacker (?)
Hacker (computer security) or cracker, who accesses
 a computer system by circumventing its security
 system
Hacker (hobbyist), who makes innovative
 customizations or combinations of retail electronic
 and computer equipment
Hacker (programmer subculture), who shares an anti-
 authoritarian approach to software development
 now associated with the free software movement



                      --- Wikipedia ---
Confidence
 is generally described as a state of being certain either
 that a hypothesis or prediction is correct or that a
 chosen course of action is the best or most effective




                       --- Wikipedia ---
Safety
 the condition of being protected against physical, social,
 spiritual, financial, political, emotional, occupational,
 psychological, educational or other types or
 consequences of failure, damage, error, accidents,
 harm or any other event which could be considered
 non-desirable
  the control of recognized hazards to achieve an
 acceptable level of risk. This can take the form of being
 protected from the event or from exposure to something
 that causes health or economical losses



                       --- Wikipedia ---
Health

The World Health Organization (1946)
"a state of complete physical, mental, and
  social well-being and not merely the
  absence of disease or infirmity"
-  In 2000, an estimated 9.6 million children aged less
   than 5 years died worldwide, from pneumonia,
   prematurity, diarrhoeal disease, malaria, measles. By
   2010, annual child deaths had been reduced to 7.6
   million.
-  Somewhere in the world every two minutes, a woman
   dies from pregnancy or childbirth- related causes. One
   third of all these maternal deaths take place in just two
   countries: India with 20% and Nigeria with 14% of the
   global total deaths.
-  Worldwide, 2.8 million people die each year as a result
   of being overweight or obese. Between 1980 and
   2008, the worldwide prevalence of obesity (body mass
   index ≥30 kg m2) almost doubled.
A new report on the Health Behaviour in School-aged
Children (HBSC) study, published by the WHO Regional
            Office for Europe (May, 2012)

http://www.euro.who.int/en/what-we-publish/
  information-for-the-media/sections/latest-press-
  releases/who-report-reveals-teenagers-do-not-
  get-a-fair-deal-on-health




                       --- WHO ---
Cancer – key facts
- Cancer is a leading cause of death worldwide,
accounting for 7.6 million deaths (around 13% of all
deaths) in 2008.
- Lung, stomach, liver, colon and breast cancer cause
the most cancer deaths each year.
- About 70% of all cancer deaths in 2008 occurred in
low- and middle-income countries.
- Deaths from cancer worldwide are projected to
continue rising, with an estimated 13.1 million deaths
in 2030.
Risk factors for cancer
- tobacco use
 - chronic infections with viruses such as hepatitis B
(liver cancer) and human papilloma (cervical cancer)
- being overweight or obese
- radiation
- some dietary factors
- physical inactivity
- harmful use of alcohol
- some occupational exposures
- various environmental chemicals

                        --- WHO ---
-  In 2009, average per capita expenditures varied
   substantially from US$ 25 in low-income countries to
   US$ 4692 in high-income countries.
-  The High Level Taskforce on Innovative International
   Financing for Health Systems suggested that, on
   average, a low-income country would have to spend a
   minimum of US$ 44 per capita to ensure all people
   had access to a set of essential health services.
   However, 29 countries spent less than this minimum
   recommended amount…




                        --- WHO ---
…concusions?!


          …perspectives?!


                   …resolutions?!
Thank you

Contenu connexe

En vedette

Manipulating memory for fun and profit
Manipulating memory for fun and profitManipulating memory for fun and profit
Manipulating memory for fun and profit
Yury Chemerkin
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
Yury Chemerkin
 
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Yury Chemerkin
 
Black berry playbook security part two - blackberry bridge
Black berry playbook security   part two - blackberry bridgeBlack berry playbook security   part two - blackberry bridge
Black berry playbook security part two - blackberry bridge
Yury Chemerkin
 
Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013
Yury Chemerkin
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
Yury Chemerkin
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd ns
Yury Chemerkin
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromise
Yury Chemerkin
 

En vedette (8)

Manipulating memory for fun and profit
Manipulating memory for fun and profitManipulating memory for fun and profit
Manipulating memory for fun and profit
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
 
Black berry playbook security part two - blackberry bridge
Black berry playbook security   part two - blackberry bridgeBlack berry playbook security   part two - blackberry bridge
Black berry playbook security part two - blackberry bridge
 
Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd ns
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromise
 

Similaire à Magdalena kurnik. discussion panel – en – hackers. beyond the edge

Harvard global economic burden non communicable diseases 2011
Harvard global economic burden non communicable diseases  2011Harvard global economic burden non communicable diseases  2011
Harvard global economic burden non communicable diseases 2011
paulovseabra
 
Global%20disease
Global%20diseaseGlobal%20disease
Global%20disease
Paul Vidal
 

Similaire à Magdalena kurnik. discussion panel – en – hackers. beyond the edge (20)

Alternative mental health therapies in prolonged lockdowns: narratives from C...
Alternative mental health therapies in prolonged lockdowns: narratives from C...Alternative mental health therapies in prolonged lockdowns: narratives from C...
Alternative mental health therapies in prolonged lockdowns: narratives from C...
 
COVID-19: What went right, what went wrong and how do we learn from this?
COVID-19: What went right, what went wrong and how do we learn from this?  COVID-19: What went right, what went wrong and how do we learn from this?
COVID-19: What went right, what went wrong and how do we learn from this?
 
INTG Project (1)
INTG Project (1)INTG Project (1)
INTG Project (1)
 
Harvard global economic burden non communicable diseases 2011
Harvard global economic burden non communicable diseases  2011Harvard global economic burden non communicable diseases  2011
Harvard global economic burden non communicable diseases 2011
 
Health system
Health systemHealth system
Health system
 
IE: Question A
IE: Question AIE: Question A
IE: Question A
 
What is public health?
What is public health? What is public health?
What is public health?
 
Medico Economic Correlation- World
Medico Economic Correlation- WorldMedico Economic Correlation- World
Medico Economic Correlation- World
 
15 Role of epidemiology in public health
15 Role of epidemiology in public health15 Role of epidemiology in public health
15 Role of epidemiology in public health
 
Mundo Offshore - Coronavirus update - Luigi Wewege article (English)
Mundo Offshore - Coronavirus update - Luigi Wewege article (English)Mundo Offshore - Coronavirus update - Luigi Wewege article (English)
Mundo Offshore - Coronavirus update - Luigi Wewege article (English)
 
Fairer world for a healthier and safer world
Fairer world for a healthier and safer worldFairer world for a healthier and safer world
Fairer world for a healthier and safer world
 
Stienstra - Cooperation in public health good for global economy
Stienstra - Cooperation in public health good for global economyStienstra - Cooperation in public health good for global economy
Stienstra - Cooperation in public health good for global economy
 
The practice of predictive analytics in healthcare
The practice of predictive analytics in healthcareThe practice of predictive analytics in healthcare
The practice of predictive analytics in healthcare
 
2020 09 01 Vaccination
2020 09 01 Vaccination2020 09 01 Vaccination
2020 09 01 Vaccination
 
Save the planet or save the NHS?
Save the planet  or save the NHS?Save the planet  or save the NHS?
Save the planet or save the NHS?
 
The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...
The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...
The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...
 
A brief on coronavirus
A brief on coronavirusA brief on coronavirus
A brief on coronavirus
 
Neglected Tropical Diseases (NTDs)
Neglected Tropical Diseases (NTDs)Neglected Tropical Diseases (NTDs)
Neglected Tropical Diseases (NTDs)
 
Global%20disease
Global%20diseaseGlobal%20disease
Global%20disease
 
Review of Recent COVID-19 Science ~ Denis G. Rancourt, PhD
Review of Recent COVID-19 Science ~ Denis G. Rancourt, PhDReview of Recent COVID-19 Science ~ Denis G. Rancourt, PhD
Review of Recent COVID-19 Science ~ Denis G. Rancourt, PhD
 

Plus de Yury Chemerkin

Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware description
Yury Chemerkin
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readme
Yury Chemerkin
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificates
Yury Chemerkin
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5s
Yury Chemerkin
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
Yury Chemerkin
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...
Yury Chemerkin
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...
Yury Chemerkin
 
Stuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesStuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realities
Yury Chemerkin
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
Yury Chemerkin
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirus
Yury Chemerkin
 
Six months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesSix months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sites
Yury Chemerkin
 
Security configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesSecurity configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devices
Yury Chemerkin
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of this
Yury Chemerkin
 
Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...
Yury Chemerkin
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
Yury Chemerkin
 
Krzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesKrzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comes
Yury Chemerkin
 
John “captain crunch” draper. history of hacking
John “captain crunch” draper. history of hackingJohn “captain crunch” draper. history of hacking
John “captain crunch” draper. history of hacking
Yury Chemerkin
 
How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
Yury Chemerkin
 

Plus de Yury Chemerkin (20)

Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware description
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readme
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificates
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5s
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
 
Jp3 13
Jp3 13Jp3 13
Jp3 13
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...
 
Stuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesStuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realities
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirus
 
Six months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesSix months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sites
 
Security configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesSecurity configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devices
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of this
 
Msft oracle brief
Msft oracle briefMsft oracle brief
Msft oracle brief
 
Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
 
Krzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesKrzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comes
 
John “captain crunch” draper. history of hacking
John “captain crunch” draper. history of hackingJohn “captain crunch” draper. history of hacking
John “captain crunch” draper. history of hacking
 
How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
 

Dernier

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Magdalena kurnik. discussion panel – en – hackers. beyond the edge

  • 1. (far) beyond the edge… Magdalena, Kurnik
  • 5. ENS
  • 6. ENS
  • 7. Braak’s Hipothesis --- Braak H. et al. Idiopathic Parkinson’s disease: possible routes by which vulnerableneuronal types my be subject to neuroinvasion by an unknown pathogen, 2003 --- ---Hawkes C.H. et al. Review: Parkinson’s disease: a dual hit hypothesis, 2007 ---
  • 8. Hacker (?) Hacker (computer security) or cracker, who accesses a computer system by circumventing its security system Hacker (hobbyist), who makes innovative customizations or combinations of retail electronic and computer equipment Hacker (programmer subculture), who shares an anti- authoritarian approach to software development now associated with the free software movement --- Wikipedia ---
  • 9. Confidence is generally described as a state of being certain either that a hypothesis or prediction is correct or that a chosen course of action is the best or most effective --- Wikipedia ---
  • 10. Safety the condition of being protected against physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error, accidents, harm or any other event which could be considered non-desirable the control of recognized hazards to achieve an acceptable level of risk. This can take the form of being protected from the event or from exposure to something that causes health or economical losses --- Wikipedia ---
  • 11. Health The World Health Organization (1946) "a state of complete physical, mental, and social well-being and not merely the absence of disease or infirmity"
  • 12. -  In 2000, an estimated 9.6 million children aged less than 5 years died worldwide, from pneumonia, prematurity, diarrhoeal disease, malaria, measles. By 2010, annual child deaths had been reduced to 7.6 million. -  Somewhere in the world every two minutes, a woman dies from pregnancy or childbirth- related causes. One third of all these maternal deaths take place in just two countries: India with 20% and Nigeria with 14% of the global total deaths. -  Worldwide, 2.8 million people die each year as a result of being overweight or obese. Between 1980 and 2008, the worldwide prevalence of obesity (body mass index ≥30 kg m2) almost doubled.
  • 13. A new report on the Health Behaviour in School-aged Children (HBSC) study, published by the WHO Regional Office for Europe (May, 2012) http://www.euro.who.int/en/what-we-publish/ information-for-the-media/sections/latest-press- releases/who-report-reveals-teenagers-do-not- get-a-fair-deal-on-health --- WHO ---
  • 14. Cancer – key facts - Cancer is a leading cause of death worldwide, accounting for 7.6 million deaths (around 13% of all deaths) in 2008. - Lung, stomach, liver, colon and breast cancer cause the most cancer deaths each year. - About 70% of all cancer deaths in 2008 occurred in low- and middle-income countries. - Deaths from cancer worldwide are projected to continue rising, with an estimated 13.1 million deaths in 2030.
  • 15. Risk factors for cancer - tobacco use - chronic infections with viruses such as hepatitis B (liver cancer) and human papilloma (cervical cancer) - being overweight or obese - radiation - some dietary factors - physical inactivity - harmful use of alcohol - some occupational exposures - various environmental chemicals --- WHO ---
  • 16. -  In 2009, average per capita expenditures varied substantially from US$ 25 in low-income countries to US$ 4692 in high-income countries. -  The High Level Taskforce on Innovative International Financing for Health Systems suggested that, on average, a low-income country would have to spend a minimum of US$ 44 per capita to ensure all people had access to a set of essential health services. However, 29 countries spent less than this minimum recommended amount… --- WHO ---
  • 17. …concusions?! …perspectives?! …resolutions?!