8 resultados para resilience management

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

40.00% 40.00%

Publicador:

Resumo:

In today’s world, supply chains are becoming more complex and more vulnerable due to increased interdependency of multiple threats. This paper investigates the vulnerability sources in context of sustainable supply chain in order to minimize the impact of uncertain events. The capability-based perspective is discussed in this paper to understand the strategies to improve the resilience of the supply chain. Paper argues that organisations must think beyond their boundaries to accumulate or integrate network resources and develop critical collaborative capabilities across the supply chain to successfully encounter future disruptions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ancient stone monuments (ASMs), such as standing stones and rock art panels, are powerful and iconic expressions of Britain’s rich prehistoric past that have major economic and tourism value. However, ASMs are under pressure due to increasing anthropogenic exposure and changing climatic conditions, which accelerate their rates of disrepair. Although scientific data exists on the integrity of stone monuments, most applies to “built” systems; therefore, additional work specific to ASMs in the countryside is needed to develop better-informed safeguarding strategies. Here, we use Neolithic and Bronze Age rock art panels across Northern England as a case study for delineating ASM management actions required to enhance monument preservation. The state of the rock art is described first, including factors that led to current conditions. Rock art management approaches then are described within the context of future environments, which models suggest to be more dynamic and locally variable. Finally, a Condition Assessment and Risk Evaluation (CARE) scheme is proposed to help prioritise interventions; an example of which is provided based on stone deterioration at Petra in Jordon. We conclude that more focused scientific and behavioural data, specific to deterioration mechanisms, are required for an ASM CARE scheme to be successful.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Explanations for the causes of famine and food insecurity often reside at a high level of aggregation or abstraction. Popular models within famine studies have often emphasised the role of prime movers such as population stress, or the political-economic structure of access channels, as key determinants of food security. Explanation typically resides at the macro level, obscuring the presence of substantial within-country differences in the manner in which such stressors operate. This study offers an alternative approach to analyse the uneven nature of food security, drawing on the Great Irish famine of 1845–1852. Ireland is often viewed as a classical case of Malthusian stress, whereby population outstripped food supply under a pre-famine demographic regime of expanded fertility. Many have also pointed to Ireland's integration with capitalist markets through its colonial relationship with the British state, and country-wide system of landlordism, as key determinants of local agricultural activity. Such models are misguided, ignoring both substantial complexities in regional demography, and the continuity of non-capitalistic, communal modes of land management long into the nineteenth century. Drawing on resilience ecology and complexity theory, this paper subjects a set of aggregate data on pre-famine Ireland to an optimisation clustering procedure, in order to discern the potential presence of distinctive social–ecological regimes. Based on measures of demography, social structure, geography, and land tenure, this typology reveals substantial internal variation in regional social–ecological structure, and vastly differing levels of distress during the peak famine months. This exercise calls into question the validity of accounts which emphasise uniformity of structure, by revealing a variety of regional regimes, which profoundly mediated local conditions of food security. Future research should therefore consider the potential presence of internal variations in resilience and risk exposure, rather than seeking to characterise cases based on singular macro-dynamics and stressors alone.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

When implementing autonomic management of multiple non-functional concerns a trade-off must be found between the ability to develop independently management of the individual concerns (following the separation of concerns principle) and the detection and resolution of conflicts that may arise when combining the independently developed management code. Here we discuss strategies to establish this trade-off and introduce a model checking based methodology aimed at simplifying the discovery and handling of conflicts arising from deployment-within the same parallel application-of independently developed management policies. Preliminary results are shown demonstrating the feasibility of the approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim of this paper is to analyse vulnerability and robustness of small and medium size enterprises (SMEs) supply chains and to consider contextual factors that might influence the success of their disturbance management: Risky product and business environment. By using an exploratory case study it is shown how these contextual factors attribute vulnerability sources, contribute to the robustness of a company’s performance and supply chain vulnerability, as well as how a company seeks to manage internal and external vulnerability sources. The exploratory case is based on a fresh food supply chain of a manufacturing SME operating in a developing market.
Case findings suggest that fresh food supply chains of a manufacturing SME in developing markets are prone to disruptions of their logistics and production processes due to ‘riskiness’ of fresh food products, the ‘riskiness’ of developing markets, as well as ‘riskiness’ of SMEs themselves. However, this does not necessarily indicate the vulnerability of an SME and its entire supply chain. Findings indicate that SMEs can be very successful in disturbance management by selective use of redesign strategies that aim to prevent or reduce the impact of disturbances. More precise, it is likely that an SME can achieve robust performance by employing preventive redesign strategies in managing disturbances that result from internal, company related vulnerability sources, while impact reduction strategies are likely to contribute to robust performance of an SME if used to manage disturbances that result from internal, supply chain related vulnerability sources, as well as external vulnerability sources.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As modern power grids move towards becoming a smart grid, there is an increasing reliance on the data that is transmitted and processed by ICT systems. This reliance introduces new digital attack vectors. Many of the proposed approaches that aim to address this problem largely focus on applying well-known ICT security solutions. However, what is needed are approaches that meet the complex concerns of the smart grid as a cyber-physical system. Furthermore, to support the automatic control loops that exist in a power grid, similarly automatic security and resilience mechanisms are needed that rely on minimal operator intervention. The research proposed in this paper aims to develop a framework that ensures resilient smart grid operation in light of successful cyber-attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over the past decade the concept of ‘resilience’ has been mobilised across an increasingly wide range of policy arenas. For example, it has featured prominently within recent discussions on the nature of warfare, the purpose of urban and regional planning, the effectiveness of development policies, the intent of welfare reform and the stability of the international financial system. The term’s origins can be traced back to the work of the ecologist Crawford S. Holling and his formulation of a science of complexity. This paper reflects on the origins of these ideas and their travels from the field of natural resource management, which it now dominates, to contemporary social practices and policy arenas. It reflects on the ways in which a lexicon of complex adaptive systems, grounded in an epistemology of limited knowledge and uncertain futures, seeks to displace ongoing ‘dependence’ on professionals by valorising self-reliance and responsibility as techniques to be applied by subjects in the making of the resilient self. In so doing, resilience is being mobilised to govern a wide range of threats and sources of uncertainty, from climate change, financial crises and terrorism, to the sustainability of development, the financing of welfare and providing for an aging population. As such, ‘resilience’ risks becoming a measure of its subjects’ ‘fitness’ to survive in what are pre-figured as natural, turbulent orders of things.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mobility increased the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Since, key management plays an important role in securing both information and connectivity, a proper authentication and key management scheme is required in mobility enabled applications where the authentication of a node with the network is a critical issue. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous WSN that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution by using MATLAB (analytically) and by simulation (OMNET++ simulator) to show that it has less memory requirement and has good network connectivity and resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.