860 resultados para Securing Tenure


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The majority of women in Third World countries depend on land for their livelihood. Security of tenure is important for them to ensure sustainable development, especially in rural areas. In most parts of Africa, land ownership is affected by traditional values, inheritance rights, and government influence. These forces have provided varying types of tenure which are detrimental to the women in rural and urban areas. Land acquisition and its development has been an emotive issue due to traditional pressures and the law as regards the process of land certification. The government and traditional administrations are highly involved in the way women own land and subsequently develop it in Anglophone Cameroon. State authority over land acquisition is important, but the process for obtaining land title is herculean especially for the rural woman. This study illustrates that land acquisition and development by women constitute a problem because of traditional pressures and the law guiding the process of land certification. There is need to exhume the barriers of government’s legal instrument (The Land Consultative Board) that regulates the ownership of land and to revisit some traditional practices as regards land ownership that impact negatively on women in a changing and globalizing world. A compromise approach is advocated for land acquisition that can transcend traditional barriers as well as render the process of land registration more realistic especially for women.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The report of the proceedings of the New Delhi workshop on the SSF Guidelines (Voluntary Guidelines for Securing Sustainable Small-scale Fisheries in the Context of Food Security and Poverty Eradication). The workshop brought together 95 participants from 13 states representing civil society organizations. governments, FAO, and fishworker organizations from both the marine and inland fisheries sectors. This report will be found useful for fishworker organizations, researchers, policy makers, members of civil society and anyone interested in small-scale fisheries, tenure rights, social development, livelihoods, post harvest and trade and disasters and climate change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim. Data were collected on tenure, mobility and retention of the nursing workforce in Queensland to aid strategic planning by the Queensland Nurses Union (QNU). Background. Shortages of nurses negatively affect the health outcomes of patients. Population rise is increasing the demand for nurses in Queensland. The supply of nurses is affected by recruitment of new and returning nurses, retention of the existing workforce and mobility within institutions. Methods. A self-reporting, postal survey was undertaken by the QNU members from the major employment sectors of aged care, public acute and community health and private acute and community health. Results. Only 60% of nurses had been with their current employer more than 5 years. In contrast 90% had been in nursing for 5 years or more and most (80%) expected to remain in nursing for at least another 5 years. Breaks from nursing were common and part-time positions in the private and aged care sectors offered flexibility. Conclusion. The study demonstrated a mobile nursing workforce in Queensland although data on tenure and future time in nursing suggested that retention in the industry was high. Concern is expressed for replacement of an ageing nursing population.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Critical Infrastructures became more vulnerable to attacks from adversaries as SCADA systems become connected to the Internet. The open standards for SCADA Communications make it very easy for attackers to gain in-depth knowledge about the working and operations of SCADA networks. A number of Intenrnet SCADA security issues were raised that have compromised the authenticity, confidentiality, integrity and non-repudiation of information transfer between SCADA Components. This paper presents an integration of the Cross Crypto Scheme Cipher to secure communications for SCADA components. The proposed scheme integrates both the best features of symmetric and asymmetric encryptiontechniques. It also utilizes the MD5 hashing algorithm to ensure the integrity of information being transmitted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is well known that, unless worker-firm match quality is controlled for, returns to firm tenure (RTT) estimated directly via reduced form wage (Mincer) equations will be biased. In this paper we show that even if match quality is properly controlled for there is a further pervasive source of bias, namely the co-movement of firm employment and firm wages. In a simple mechanical model where human capital is absent and separation is exogenous we show that positively covarying shocks (either aggregate or firm level) to firms employment and wages cause downward bias in OLS regression estimates of RTT. We show that the long established procedures for dealing with "traditional" RTT bias do not circumvent the additional problem we have identified. We argue that if a reduced form estimation of RTT is undertaken, firm-year fixed effects must be added in order to eliminate this bias. Estimates from two large panel datasets from Portugal and Germany show that the bias is empirically important. Adding firm-year fixed effects to the regression increases estimates of RTT in the two respective countries by between 3.5% and 4.5% of wages at 20 years of tenure over 80% (50%) of the estimated RTT level itself. The results extend to tenure correlates used in macroeconomics such as the minimum unemployment rate since joining the firm. Adding firm-year fixed effects changes estimates of these effects also.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Levelling up - Securing Health Improvement by Promoting Social Inclusion - A Cross Border Action Plan for the North West of Ireland  Vision - The aim of 'Levelling Up' is to work towards a society where all voices are heard, where the vulnerable and those on the margins are supported to be involved and in which plans developed for the people are shaped by the people. Their vision is of a region in which organisations and politicians actively demonstrate a commitment to equity – equity both within the North West and between the North West and the rest of Ireland North and South.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two nonmutually exclusive hypotheses can explain why divorce is an adaptive strategy to improve reproductive success. Under the 'better option hypothesis', only one of the two partners initiates divorce to secure a higher-quality partner and increases reproductive success after divorce. Under the 'incompatibility hypothesis', partners are incompatible and hence they may both increase reproductive success after divorce. In a long-term study of the barn owl (Tyto alba), we address the question of whether one or the two partners derive fitness benefits by divorcing. Our results support the hypothesis that divorce is adaptive: after a poor reproductive season, at least one of the two divorcees increase breeding success up to the level of faithful pairs. By breeding more often together, faithful pairs improve coordination and thereby gain in their efficiency to produce successful fledglings. Males would divorce to obtain a compatible mate rather than a mate of higher quality: a heritable melanin-based signal of female quality did not predict divorce (indicating that female absolute quality may not be the cause of divorce), but the new mate of divorced males was less melanic than their previous mate. This suggests that, at least for males, a cost of divorce may be to secure a lower-quality but compatible mate. The better option hypothesis could not be formally rejected, as only one of the two divorcing partners commonly succeeded in obtaining a higher reproductive success after divorce. In conclusion, incompatible partners divorce to restore reproductive success, and by breeding more often together, faithful partners improve coordination.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.