929 resultados para private security military company


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In The Climate Change Review, Ross Garnaut emphasised that ‘Climate change and climate change mitigation will bring about major structural change in the agriculture, forestry and other land use sectors’. He provides this overview of the effects of climate change on food demand and supply: ‘Domestic food production in many developing countries will be at immediate risk of reductions in agricultural productivity due to crop failure, livestock loss, severe weather events and new patterns of pests and diseases.’ He observes that ‘Changes to local climate and water availability will be key determinants of where agricultural production occurs and what is produced.’ Gert Würtenberger has commented that modern plant breeding is particularly concerned with addressing larger issues about nutrition, food security and climate change: ‘Modern plant breeding has an increasing importance with regard to the continuously growing demand for plants for nutritional and feeding purposes as well as with regard to renewal energy sources and the challenges caused by climate changes.’ Moreover, he notes that there is a wide array of scientific and technological means of breeding new plant varieties: ‘Apart from classical breeding, technologies have an important role in the development of plants that satisfy the various requirements that industrial and agricultural challenges expect to be fulfilled.’ He comments: ‘Plant variety rights, as well as patents which protect such results, are of increasingly high importance to the breeders and enterprises involved in plant development programmes.’ There has been larger interest in the intersections between sustainable agriculture, environmental protection and food security. The debate over agricultural intellectual property is a polarised one, particularly between plant breeders, agricultural biotechnology companies and a range of environmentalist groups. Susan Sell comments that there are complex intellectual property battles surrounding agriculture: 'Seeds are at the centre of a complex political dynamic between stakeholders. Access to seeds concerns the balance between private rights and public obligations, private ownership and the public domain, and commercial versus humanitarian objectives.' Part I of this chapter considers debates in respect of plant breeders’ rights, food security and climate change in relation to the UPOV Convention 1991. Part II explores efforts by agricultural biotechnology companies to patent climate-ready crops. Part III considers the report of the Special Rapporteur for Food, Olivier De Schutter. It looks at a variety of options to encourage access to plant varieties with climate adaptive or mitigating properties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"It could easily provide the back-drop for a James Bond movie. Deep inside a mountain near the North Pole, down a fortified tunnel, and behind airlocked doors in a vault frozen to -18 degrees Celsius, scientists are squirreling away millions of seed samples. The samples constitute the very foundation of agriculture, the biological diversity needed so the world's major food crops can adapt to the next pest or disease, or to climate change. It's little wonder that the Svalbard Global Seed Vault has captured the public's imagination more than almost any agricultural topic in recent years. Popular press reports about the ‘Doomsday Vault,’ however, typically mask the complexity of the endeavor and, if anything, underestimate its practical utility." Cary Fowler This chapter considers the use of seed banks to address concerns about intellectual property, climate change and food security. It has a number of themes. First of all, it is interested in the use of ‘Big Science’ projects to address pressing global scientific concerns and Millennium Development Goals. Second, it highlights the increasing use of banks as a means of managing both property and intellectual property across a wide range of fields of agriculture and biotechnology. Third, it considers the linkage of intellectual property, access to genetic resources and benefit sharing. There are a variety of positions in this debate. Some see requirements in respect of access to genetic resources and benefit sharing as an inconvenient burden for science and commerce. Others defend access to genetic resources and benefit sharing as meaningful and productive. Those inclined to somewhat more conspiratorial views suggest that access to genetic resources and benefit sharing are a ruse to facilitate biopiracy. This chapter has a number of components. Section I focuses upon the Consultative Group on International Agricultural Research (CGIAR) network – often raised as a model for Climate Innovation Centres. Section II considers the Svalbard Global Seed Vault – the so-called Doomsday Vault. After a consideration of the World Summit on Food Security in 2009, it is concluded in this chapter that any future international agreement on climate change needs to address intellectual property, plant genetic resources and food security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines a series of controversies within the life sciences over data sharing. Part 1 focuses upon the agricultural biotechnology firm Syngenta publishing data on the rice genome in the journal Science, and considers proposals to reform scientific publishing and funding to encourage data sharing. Part 2 examines the relationship between intellectual property rights and scientific publishing, in particular copyright protection of databases, and evaluates the declaration of the Human Genome Organisation that genomic databases should be global public goods. Part 3 looks at varying opinions on the information function of patent law, and then considers the proposals of Patrinos and Drell to provide incentives for private corporations to release data into the public domain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper offers one explanation for the institutional basis of food insecurity in Australia, and argues that while alternative food networks and the food sovereignty movement perform a valuable function in building forms of social solidarity between urban consumers and rural producers, they currently make only a minor contribution to Australia’s food and nutrition security. The paper begins by identifying two key drivers of food security: household incomes (on the demand side) and nutrition-sensitive, ‘fair food’ agriculture (on the supply side). We focus on this second driver and argue that healthy populations require an agricultural sector that delivers dietary diversity via a fair and sustainable food system. In order to understand why nutrition-sensitive, fair food agriculture is not flourishing in Australia we introduce the development economics theory of urban bias. According to this theory, governments support capital intensive rather than labour intensive agriculture in order to deliver cheap food alongside the transfer of public revenues gained from rural agriculture to urban infrastructure, where the majority of the voting public resides. We chart the unfolding of the Urban Bias across the twentieth century and its consolidation through neo-liberal orthodoxy, and argue that agricultural policies do little to sustain, let alone revitalize, rural and regional Australia. We conclude that by observing food system dynamics through a re-spatialized lens, Urban Bias Theory is valuable in highlighting rural–urban socio-economic and political economy tensions, particularly regarding food system sustainability. It also sheds light on the cultural economy tensions for alternative food networks as they move beyond niche markets to simultaneously support urban food security and sustainable rural livelihoods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the gap in economic theory underlying the multidimensional concept of food security and observed data by deriving a composite food security index using the latent class model. The link between poverty and food security is then examined using the new food security index and the robustness of the link is compared with two unidimensional measures often used in the literature. Using Vietnam as a case study, it was found that a weak link exists for the rural but not for the urban composite food security index. The unidimensional measures on the other hand show a strong link in both the rural and urban regions. The results on the link are also different and mixed when two poverty types given by persistent and transient poverty are considered. These findings have important policy implications for a targeted approach to addressing food security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background There is no legal requirement for Iranian military truck drivers to undergo regular visual checkups as compared to commercial truck drivers. Objectives This study aimed to evaluate the impact of drivers’ visual checkups by comparing the visual function of Iranian military and commercial truck drivers. Patients and Methods In this comparative cross-sectional study, two hundred military and 200 commercial truck drivers were recruited and their Visual Acuity (VA), Visual Field (VF), color vision and Contrast Sensitivity (CS) were assessed and compared using the Snellen chart, confrontation screening method, D15 test and Pelli-Robson letter chart, respectively. A questionnaire regarding driving exposure and history of motor-vehicle crashes (MVCs) was also filled by drivers. Results were analyzed using an independent samples t-test, one-way ANOVA (assessing difference in number of MVCs across different age groups), chi-square test and Pearson correlation at statistical significance level of P < 0.05. Results Mean age was 41.6 ± 9.2 for the military truck drivers and 43.4 ± 10.9 for commercial truck drivers (P > 0.05). No significant difference between military and commercial drivers was found in terms of driving experience, number of MVCs, binocular VA, frequency of color vision defects and CS scores. In contrast, the last ocular examination was significantly earlier in military drivers than commercial drivers (P < 0.001). In addition, 4% of military drivers did not meet the national standards to drive as opposed to 2% of commercial drivers. There was a significant but weak correlation between binocular VA and age (r = 0.175, P < 0.001). However, CS showed a significantly moderate correlation with age (r = -0.488, P < 0.001). Conclusions The absence of legal requirement for regular eye examination in military drivers caused the incompetent drivers to be missed in contrast to commercial drivers. The need for scientific revision of VA standard for Iranian drivers is also discussed. The CS measurement in visual checkups of older drivers deserves to be investigated more thoroughly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2015 the UN Secretary-General established an External Independent Review to review how the United Nations has responded to allegations of child sexual exploitation and child sexual abuse, and to make recommendations concerning how the United Nations should respond to allegations in the future. This submission to the Review Panel draws on literature regarding children's rights, the nature of child sexual abuse, international instruments and policy, the nature of institutional child sexual abuse, and the CAR case itself. It makes recommendations for reform of UN protocols and procedures to better prevent child sexual abuse, and to improve responses to future occurrences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The power system network is assumed to be in steady-state even during low frequency transients. However, depending on generator dynamics, and toad and control characteristics, the system model and the nature of power flow equations can vary The nature of power flow equations describing the system during a contingency is investigated in detail. It is shown that under some mild assumptions on load-voltage characteristics, the power flow equations can be decoupled in an exact manner. When the generator dynamics are considered, the solutions for the load voltages are exact if load nodes are not directly connected to each other

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fashion and war don’t seem an obvious pairing, but the military jacket is a fashion staple. It may take the form of a double-breasted dress uniform with brass buttons and epaulettes, trimmed in rock star braid, or it may be a khaki combat jacket, worn with Doc Martens and a scowl. Here I explore how these two forms of the military jacket were frogmarched into fashion...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tuure Junnila, PhD (1910-1999) was one of Finland's most renowned conservative politicians of the post-war period. Junnila is remembered primarily as a persistent opponent of Urho Kekkonen, a long-term Member of Parliament, a conspicuous opposition member and a prolific political writer. Junnila's ideologies and political views were conservative, and he is one of the most outstanding figures in the history of the National Coalition Party. Junnila also made an extensive career outside of politics, first as an economist and then as an executive of Finland's leading commercial bank Kansallis-Osake-Pankki. The Young Conservative is a partial biography written using traditional historical research methods, which examines Junnila's personal history and his activity in public life up to 1956. The study begins by investigating Junnila's background through his childhood, school years, university studies and early professional career. It also looks at Junnila's work as an economist and practical banker. Particular attention is paid to Junnila's political work, constantly focusing on the following five often overlapping areas: (1) economic policy, (2) domestic policy, (3) foreign and security policy, (4) Junnila and Urho Kekkonen, (5) Junnila, the Coalition Party and Finnish conservatism. In his economic policy, Junnila emphasised the importance of economic stability, opposed socialisation and the growth of public expenditure, defended the free market system and private entrepreneurship, and demanded tax cuts. This policy was very popular within the Coalition Party during the early 1950s, making Junnila the leading conservative economic politician of the time. In terms of domestic policy, Junnila demanded as early as the 1940s that a "third force" should be established in Finland to counterbalance the agrarian and labour parties by uniting conservative and liberal ideologies under the same roof. Foreign and security policy is the area of Junnila's political activity which is most clearly situated after the mid-1950s. However, Junnila's early speeches and writings already show a striving towards the unconditional neutrality modelled by Switzerland and Sweden and a strong emphasis on Finland's right to internal self-determination. Junnila, as did the Coalition Party as a whole, adopted a consistently critical approach towards Urho Kekkonen between 1951 and 1956, but this attitude was not as bluntly negative and all-round antagonistic as many previous studies have implied. Junnila was one of the leading Finnish conservatives of the early 1950s and in all essence his views were analogous to the general alignment of the Coalition Party at the time: conservative in ideology and general policy, and liberal in economic policy.