exploitation

(redirected from exploitations)
Also found in: Dictionary, Thesaurus, Legal, Encyclopedia.

exploitation

Social medicine The taking unfair advantage of a situation or person(s). See Sexual exploitation.

exploitation

the situation in which one organism gains at the expense of another.
References in periodicals archive ?
Since then, tackling the exploitations of vulnerable people has become a priority for Northumbria Police and Newcastle City Council.
TWENTY-FIVE taxi drivers have had their licences removed as the shockwaves from Tyneside's biggest exploitation investigation continue.
Pas moins de 470 exploitations agricoles ont ete creees dans le cadre de l'APFA, dont 290 exploitations au niveau du perimetre Oued El Jaz, 111 a celui de Hassi Amar, 28 autres a Grair El Harth, 25 a Oudiat Oum Rakba, Oued M'hiya (13), et perimetre d'Oum Laassel (3 exploitations), a-t-on detaille.
According to police sources, investigations into a number of heinous crimes like murder, attempted murder, robbery, dacoit, drug peddling etc have revealed that they originated from the complications arising out of the exploitations of debtors by loan sharks.
KOHAT -- Kohat Police has launched a campaign against the practice of illegal money lending on exorbitant interest rates and the subsequent exploitation of the debtors by the loan sharks.
Surveys were carried out from the end of March to the end of May in six exploitations of citrus fruit areas of Mitidja [station of department of agronomy of Blida (1), Guerrouaou (2), Hadjout (3), Boufarik (4),Mouzaia (5) andSoumaa (6)].
spiraecola was prevalent in three exploitations of citrus fruit areas of Mitidja (2), (5), and (1).
Although the traditional planning instruments, such as roadmaps and scenario analysis, take into account information on technologies and markets in general, their main focus is nearly always on product markets, that is, internal technology exploitations (12,13).
Indonesia will need around US$ 7 billion to finance explorations and exploitations of natural gas in various areas.
To use this technique, an attacker overflows a vulnerable buffer, but does not place executable code in the buffer, as with more common exploitations.
Tenders are invited for: Eo exploitation platforms common architecture 2018-2022