Return to Article Details On consumption and vulnerability Download Download PDF