846 resultados para Security and Development
Resumo:
Food security is the main concern in Africa as the production and productivity of crops are under continuous threat. Indigenous crops also known as orphan- or as underutilized- crops provide key contributions to food security under the present scenario of increasing world population and changing climate. Hence, these crops which belong to the major categories of cereals, legumes, fruits and root crops play a key role in the livelihood of the resource-poor farmers and consumers since they perform better than the major world crops under extreme soil and climate conditions prevalent in the continent. These indigenous crops have the major advantage that they fit well into the general socio-economic and ecological context of the region. However, despite their huge importance, African crops have generally received little attention by the global scientific community. With the current production systems, only a fraction of yield potential was achieved for most of these crops. In order to devise strategies towards boosting crop productivity in Africa, the current production constraints should be investigated and properly addressed. Key traits known to increase productivity and/or improve nutrition and diverse conventional and modern crop improvement techniques need to be implemented. Commitments in the value-chain from the research, production, marketing to distribution of improved seeds are required by relevant national and international institutions as well as African governments to promote food security in a sustainable manner. The review also presents major achievements and suggestions for stakeholders interested in African agriculture.
Resumo:
This research addressed the development of a consolidated model designed especially to cover the security and usability attributes of a software product. As a starting point, we built a new usability model on the basis of well-known quality standards and models. We then used an existing security model to analyse the relationship between these two approaches. This analysis consisted of a systematic mapping study of the relationship between security and usability as global quality factors. We identified five relationship types: inverse, direct, relative, one-way inverse, and no relationship. Most authors agree that there is an inverse relationship between security and usability. However, this is not a unanimous finding, and this study unveils a number of open questions, like application domain dependency and the need to explore lower-level relationships between attribute subcharacteristics. In order to clarify the questions raised during the research, we conducted a second systematic mapping to further analyse the finer-grained structure of these factors, such as authentication as a subset of security and user efficiency as a subset of usability. The most relevant finding is that efficiency does not depend on the security level during the authentication process. There are other subfactors that require analysis. Accordingly, this research is the first part of a larger project to develop a full-blown consolidated model for security and usability.
Resumo:
For many years the European Union has been improving the efficient use of energy resources and yet the demand for energy in the EU continues to increase. When Europe belonged to one of the world’s key energy markets with relatively easy access to energy resources, growing energy needs were not seen as a source of concern. Today, however, as the competition for energy resources is intensifying and the global position of the EU energy market is being challenged by growing economies in the developing countries, above all China and India, the EU needs to adopt bold policies to guarantee the sustainable supply of energy. This report argues the EU needs to develop a fully-fledged external energy policy; i.e. a common, coherent, strategic approach that build bridges between the interests and needs of the EU integrated energy market on the one hand and supplier countries on the other. The EU’s external energy policy has two main objectives. The first one is to ensure a sustainable, stable and cost-effective energy supply. The second is to promote energy market integration and regulatory convergence with neighbouring countries (often but not always this supports the achievement of the first objective). However, in order to improve its effectiveness, the EU’s external energy policy needs to be seen in a broader economic and political context. Any progress in energy cooperation with third countries is contingent upon the EU’s general stance and offer to those countries.
Resumo:
"October 1991."
Resumo:
This article builds on the securitisation and post-development literature and it scrutinises the Czech and Hungarian legitimising discourses of the two countries’ respective Provincial Reconstruction Teams (PRTs) in the Logar and Baghlan provinces of Afghanistan from 2007 to 2013. In spite of the hybrid civil–military character of the PRTs, their security–development nexus was absent and they were respectively securitised and “developmentalised” only indirectly and to a varying extent. The PRTs were mostly justified by the Czech Republic's NATO membership as an identity issue and they were justified as a Hungarian national interest and as both an obligation and an opportunity. Rather than merely importing NATO's arguments as suggested by the previous literature, the depoliticisation and positive connotation of the intervention in Afghanistan was constructed by the domestic NATO-related identities and interests in the Czech Republic and Hungary.
Resumo:
This article tells about the relationship between resource politics and security in international relations. Using the Mekong River Basin as its case study, the article examines the place of resource and development issues in attempts to develop regional institutions. The question of whether a resource development regime with apparently low productivity in terms of technical output, but high levels of resilience and longevity, should be considered a failure or not, is considered. This question is examined within the broader context of Southeast Asian politics during the First, Second, and Third Indochina conflicts as well as the post-cold war era. The article argues that survival and a capacity to change to meet the challenges of extreme broader events are clear evidence of regime success. From this standpoint, the article explores ways in which the Mekong resource regime is linked to more general concerns for political security and stability and may in fact reflect political concerns for subregional neighborhood maintenance.
Resumo:
This study explores the impact of Turkey's likely entry in the European Union (EU) in terms of the EU's foreign, security and defense policies. It reviews Turkish capabilities, namely its military capabilities, which could provide the EU with valuable defense assets. There are differences related to Turkey's relations with the EU, which have increasingly spilled over into the NATO, hindering the development of cooperation over crisis management operations. The article then delves in the implications of Turkey's strategic geographical location to EU policies. It reviews how far the EU and Turkey may have convergent interests in some of the neighboring regions, especially in the Middle East.
Resumo:
There is no doubt about the necessity of protecting digital communication: Citizens are entrusting their most confidential and sensitive data to digital processing and communication, and so do governments, corporations, and armed forces. Digital communication networks are also an integral component of many critical infrastructures we are seriously depending on in our daily lives. Transportation services, financial services, energy grids, food production and distribution networks are only a few examples of such infrastructures. Protecting digital communication means protecting confidentiality and integrity by encrypting and authenticating its contents. But most digital communication is not secure today. Nevertheless, some of the most ardent problems could be solved with a more stringent use of current cryptographic technologies. Quite surprisingly, a new cryptographic primitive emerges from the ap-plication of quantum mechanics to information and communication theory: Quantum Key Distribution. QKD is difficult to understand, it is complex, technically challenging, and costly-yet it enables two parties to share a secret key for use in any subsequent cryptographic task, with an unprecedented long-term security. It is disputed, whether technically and economically fea-sible applications can be found. Our vision is, that despite technical difficulty and inherent limitations, Quantum Key Distribution has a great potential and fits well with other cryptographic primitives, enabling the development of highly secure new applications and services. In this thesis we take a structured approach to analyze the practical applicability of QKD and display several use cases of different complexity, for which it can be a technology of choice, either because of its unique forward security features, or because of its practicability.
Resumo:
Recent studies of the current state of rural education and training (RET) systems in sub-Saharan Africa have assessed their ability to provide for the learning needs essential for more knowledgeable and productive small-scale rural households. These are most necessary if the endemic causes of rural poverty (poor nutrition, lack of sustainable livelihoods, etc.) are to be overcome. A brief historical background and analysis of the major current constraints to improvement in the sector are discussed. Paramount among those factors leading to its present 'malaise' is the lack of a whole-systems perspective and the absence of any coherent policy framework in most countries. There is evidence of some recent innovations, both in the public sector and through the work of non-governmental organisations (NGOs), civil society organisations (CSOs) and other private bodies. These provide hope of a new sense of direction that could lead towards meaningful 'revitalisation' of the sector. A suggested framework offers 10 key steps which, it is argued, could largely be achieved with modest internal resources and very little external support, provided that the necessary leadership and managerial capacities are in place. (C) 2006 Elsevier Ltd. All rights reserved.
Resumo:
Life-history theories of the early programming of human reproductive strategy stipulate that early rearing experience, including that reflected in infant-parent attachment security, regulates psychological, behavioral, and reproductive development. We tested the hypothesis that infant attachment insecurity, compared with infant attachment security, at the age of 15 months predicts earlier pubertal maturation. Focusing on 373 White females enrolled in the National Institute of Child Health and Human Development Study of Early Child Care and Youth Development, we gathered data from annual physical exams from the ages of 9½ years to 15½ years and from self-reported age of menarche. Results revealed that individuals who had been insecure infants initiated and completed pubertal development earlier and had an earlier age of menarche compared with individuals who had been secure infants, even after accounting for age of menarche in the infants’ mothers. These results support a conditional-adaptational view of individual differences in attachment security and raise questions about the biological mechanisms responsible for the attachment effects we discerned.