873 resultados para security management
Resumo:
This handbook provides detailed information for a wide range of legal instruments relevant to fisheries and fishworkers. It covers 114 legal instruments, categorized into the following seven themes: Theme I. Human Rights, Food Security, Women and Development. Theme II. Environment and Sustainable Development. Theme III. Oceans and Fisheries Management. Theme IV. Environmental Pollution Theme V. Fishing Vessels and Safety at Sea Theme VI. Labour Theme VII. Trade The handbook also includes the working of the instruments (decision-making bodies, monitoring and implementation agencies, periodicity of meetings, rules for participation in meetings of the decision-making bodies and implementation agencies for States and non-governmental organizations), regional instrument and agencies. Apart from being a ready reckoner to the instruments, it highlights the important sections of relevance to fisheries or small-scale fisheries and fishworkers. The companion CD-ROM provides the full texts of the instruments in a searchable database. The handbook will be useful for fishworker and non-governmental organizations, and also for researchers and others interested in fisheries issues.
Resumo:
This handbook provides detailed information for a wide range of legal instruments relevant to fisheries and fishworkers. It covers 114 legal instruments, categorized into the following seven themes: Theme I. Human Rights, Food Security, Women and Development. Theme II. Environment and Sustainable Development. Theme III. Oceans and Fisheries Management. Theme IV. Environmental Pollution Theme V. Fishing Vessels and Safety at Sea Theme VI. Labour Theme VII. Trade The handbook also includes the working of the instruments (decision-making bodies, monitoring and implementation agencies, periodicity of meetings, rules for participation in meetings of the decision-making bodies and implementation agencies for States and non-governmental organizations), regional instrument and agencies. Apart from being a ready reckoner to the instruments, it highlights the important sections of relevance to fisheries or small-scale fisheries and fishworkers. The companion CD-ROM provides the full texts of the instruments in a searchable database. The handbook will be useful for fishworker and non-governmental organizations, and also for researchers and others interested in fisheries issues.
Resumo:
The Adaptive Collaborative Management of Fisheries Training workshop was held in Sekondi, Western Region of Ghana as part of the project “Integrated Coastal and Fisheries Governance Initiative” locally referred to as “H n Mpoano”. The aim of the project is to support the government of Ghana achieve its development objective of poverty reduction, food security, sustainable fisheries management and biodiversity conservation and contributes to its vision: Ghana’s coastal and marine ecosystems are sustainably managed to provide goods and services that generate long-term socioeconomic benefit to communities while sustaining biodiversity.
Resumo:
Small indigenous fish species (SIS) are an important source of essential macro- and micronutrients that can play an important role in the elimination of malnutrition and micronutrient deficiencies in the populations of many South and Southeast Asian countries. Of the 260 freshwater fish species in Bangladesh, more than 140 are classified as SIS and are an integral part of the rural Bangladeshi diet. As many SIS are eaten whole, with organs and bones, they contain high amounts of vitamins and minerals, including calcium, and iron and zinc. Some SIS, such as mola, are also rich in vitamin A. SIS are often cooked with vegetables and a little oil, so they contribute to the food diversity of the rural poor.SIS are recognized as a major animal-source food group, contributing to improved food and nutrition security and livelihoods of the people of South and Southeast Asia. The purpose of this workshop is to bring together policy makers, extension agents, researchers, non-governmental and development organizations to share knowledge about small fish, their contribution to better nutrition, production technologies, and strategies for wider dissemination of pond culture and wetland based-production and conservation technologies. The workshop is expected to generate ideas for further research and development of sustainable technologies for production, management and conservation of SIS for the benefit of the people of Bangladesh as well as the South and Southeast Asian region.
Resumo:
The Republic of Kiribati is a vast South Pacific island group with one of the largest exclusive economic zones (EEZs) in the world. Kiribati waters support a wealth of marine fisheries activities. These activities occur in oceanic, coastal and inshore environments and range from large, foreign, industrial-scale oceanic fishing operations to small-scale, domestic, inshore subsistence fisheries, aquaculture and recreational fisheries. Kiribati has developed a framework of domestic and international governance arrangements that are designed to sustainably manage its wealth of marine resources. The report provides background information for fisheries projects in Kiribati that aim to build food security, improve artisanal livelihoods and strengthen community engagement in fisheries governance. It provides information on the current status of Kiribati fishery resources (oceanic and coastal), their current governance and future challenges. Fish and fisher alike pay little heed to maritime boundaries and bureaucratic distinctions. This report covers both sides of the oceanic/coastal boundary because of the I-Kiribati communities’ interest in oceanic fisheries such as tuna and their heavy dependence on its fisheries resources for food security and economic development. The report focuses on two potential pilot sites for community-based fisheries management projects: North Tarawa and Butaritari.
Resumo:
The brochure is to contribute to the overall goal of stimulating the adaptation of pro-poor agri-food systems innovations to improve food security and sustainable natural resource management among rural poor farmers. The paper seeks to identify and exploit opportunities for expanding market access for minor crops and NRM products. The minor crops studied included cow pea, sorghum, groundnut, sweet potato and yam.
Resumo:
This paper discusses various techniques that may be used to combat counterfeiting in the pharmaceutical supply chain. These include the use of electronic pedigrees (to ensure the integrity of the supply chain), together with mass-serialization (to provide for a unique lifecycle history of each individual package) and authentication of the product (to check for any discrepancies in the various attributes of the product and its packaging are as intended for that individual package). Management of the pedigree process and product authentication is discussed in some detail, together with various other learnings from the Drug Security Network, including identification of some remaining vulnerabilities and suggestions for tightening these loopholes. © 2008 Springer-Verlag Berlin Heidelberg.
Resumo:
Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the physical location of the offending party, as opposed to its possibly spoofed (MAC addresses) identity in cyber space. Traditional Wireless Network Security Systems are still heavily anchored in the digital plane of "cyber space" and hence cannot be used reliably or effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts, for example by escorting an intruder off the premises based on physical evidence. In this paper, we argue that Embedded Sensor Networks could be used effectively to bridge the gap between digital and physical security planes, and thus could be leveraged to provide reciprocal benefit to surveillance and security tasks on both planes. Toward that end, we present our recent experience integrating wireless networking security services into the SNBENCH (Sensor Network workBench). The SNBENCH provides an extensible framework that enables the rapid development and automated deployment of Sensor Network applications on a shared, embedded sensing and actuation infrastructure. The SNBENCH's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the SNBENCH framework, while high-level languages and compilers allow novice SN programmers to compose SN service logic, unaware of the lower-level implementation details of tools on which their services rely. In this paper we convey the simplicity of the service composition through concrete examples that illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.
Resumo:
Open environments involve distributed entities interacting with each other in an open manner. Many distributed entities are unknown to each other but need to collaborate and share resources in a secure fashion. Usually resource owners alone decide who is trusted to access their resources. Since resource owners in open environments do not have a complete picture of all trusted entities, trust management frameworks are used to ensure that only authorized entities will access requested resources. Every trust management system has limitations, and the limitations can be exploited by malicious entities. One vulnerability is due to the lack of globally unique interpretation for permission specifications. This limitation means that a malicious entity which receives a permission in one domain may misuse the permission in another domain via some deceptive but apparently authorized route; this malicious behaviour is called subterfuge. This thesis develops a secure approach, Subterfuge Safe Trust Management (SSTM), that prevents subterfuge by malicious entities. SSTM employs the Subterfuge Safe Authorization Language (SSAL) which uses the idea of a local permission with a globally unique interpretation (localPermission) to resolve the misinterpretation of permissions. We model and implement SSAL with an ontology-based approach, SSALO, which provides a generic representation for knowledge related to the SSAL-based security policy. SSALO enables integration of heterogeneous security policies which is useful for secure cooperation among principals in open environments where each principal may have a different security policy with different implementation. The other advantage of an ontology-based approach is the Open World Assumption, whereby reasoning over an existing security policy is easily extended to include further security policies that might be discovered in an open distributed environment. We add two extra SSAL rules to support dynamic coalition formation and secure cooperation among coalitions. Secure federation of cloud computing platforms and secure federation of XMPP servers are presented as case studies of SSTM. The results show that SSTM provides robust accountability for the use of permissions in federation. It is also shown that SSAL is a suitable policy language to express the subterfuge-safe policy statements due to its well-defined semantics, ease of use, and integrability.
Resumo:
This article examines Greek-Turkish crisis behaviour in the Eastern Mediterranean over the past two decades. Crises are first defined and classified, after which a number of common misperceptions are then addressed in light of recent experience. Three broad categories of foreign policy crises are analyzed: 1) those involving ethnically related minorities across the border; 2) those with 'alien' minorities within borders; and 3) those with third countries involving territories and resources. The article examines whether crises are simply elite-driven or partly endorsed and motivated by mass publics in both countries, and whether Greek-Turkish crisis behaviour reflects enduring ethnic rivalries, 'genuine' security interests, or domestic political needs and norms. The article draws upon the Greek-Turkish experience of the past two decades to illuminate contemporary dilemmas and issues which policymakers face in this region.
Resumo:
Recent and emerging security policies and practices claim a mutual vulnerability that closely links human insecurity in failed states with the threat to powerful states from illicit flows. This article first examines this ‘emerging orthodoxy’ of transnational security issues that reinforces the securitisation of poverty and the poor. It then subjects this orthodoxy to theoretical and empirical critique. Theoretically it shows that this orthodoxy is formed as a ‘geopolitical imagination’ that associates and stabilises particular views of weak states and illicit flows in a ‘netwar imagination’ by reasserting and reconfiguring traditional assumptions of the spatiality and nature of threats. A final empirical section, focusing on drug production and nuclear smuggling, argues that those assumptions and their assemblage are a partial, incomplete and often self-referential reading of illicit flows.
Resumo:
The susceptibility of WiFi networks to Rogue Access Point attacks derives from the lack of identity for 802.11 devices. The most common means of detecting these attacks in current research is through tracking the credentials or the location of unauthorised and possibly malicious APs. In this paper, the authors outline a method of distinguishing WiFi Access Points using 802.11 MAC layer management frame traffic profiles. This system does not require location estimation or credential tracking techniques as used in current research techniques, which are known to be inaccurate. These characteristic management traffic profiles are shown to be unique for each device, tantamount to a MAC identity. The application of this technique to solving Rogue AP attacks under the constraints of an open access, public WiFi environment is discussed with the conclusion that the identity is practically very difficult to forge