207,193 research outputs found

    Disease Surveillance Networks Initiative Global: Final Evaluation

    Get PDF
    In August 2009, the Rockefeller Foundation commissioned an independent external evaluation of the Disease Surveillance Networks (DSN) Initiative in Asia, Africa, and globally. This report covers the results of the global component of the summative and prospective1 evaluation, which had the following objectives:[1] Assessment of performance of the DSN Initiative, focused on its relevance, effectiveness/impact, and efficiency within the context of the Foundation's initiative support.[2] Assessment of the DSN Initiative's underlying hypothesis: robust trans-boundary, multi-sectoral/cross-disciplinary collaborative networks lead to improved disease surveillance and response.[3] Assessment of the quality of Foundation management (value for money) for the DSN Initiative.[4] Contribute to the field of philanthropy by:a. Demonstrating the use of evaluations in grantmaking, learning and knowledge management; andb. Informing the field of development evaluation about methods and models to measure complex networks

    Green Plants in the Red: A Baseline Global Assessment for the IUCN Sampled Red List Index for Plants

    Get PDF
    Plants provide fundamental support systems for life on Earth and are the basis for all terrestrial ecosystems; a decline in plant diversity will be detrimental to all other groups of organisms including humans. Decline in plant diversity has been hard to quantify, due to the huge numbers of known and yet to be discovered species and the lack of an adequate baseline assessment of extinction risk against which to track changes. The biodiversity of many remote parts of the world remains poorly known, and the rate of new assessments of extinction risk for individual plant species approximates the rate at which new plant species are described. Thus the question ‘How threatened are plants?’ is still very difficult to answer accurately. While completing assessments for each species of plant remains a distant prospect, by assessing a randomly selected sample of species the Sampled Red List Index for Plants gives, for the first time, an accurate view of how threatened plants are across the world. It represents the first key phase of ongoing efforts to monitor the status of the world’s plants. More than 20% of plant species assessed are threatened with extinction, and the habitat with the most threatened species is overwhelmingly tropical rain forest, where the greatest threat to plants is anthropogenic habitat conversion, for arable and livestock agriculture, and harvesting of natural resources. Gymnosperms (e.g. conifers and cycads) are the most threatened group, while a third of plant species included in this study have yet to receive an assessment or are so poorly known that we cannot yet ascertain whether they are threatened or not. This study provides a baseline assessment from which trends in the status of plant biodiversity can be measured and periodically reassessed

    Attack-Surface Metrics, OSSTMM and Common Criteria Based Approach to “Composable Security” in Complex Systems

    Get PDF
    In recent studies on Complex Systems and Systems-of-Systems theory, a huge effort has been put to cope with behavioral problems, i.e. the possibility of controlling a desired overall or end-to-end behavior by acting on the individual elements that constitute the system itself. This problem is particularly important in the “SMART” environments, where the huge number of devices, their significant computational capabilities as well as their tight interconnection produce a complex architecture for which it is difficult to predict (and control) a desired behavior; furthermore, if the scenario is allowed to dynamically evolve through the modification of both topology and subsystems composition, then the control problem becomes a real challenge. In this perspective, the purpose of this paper is to cope with a specific class of control problems in complex systems, the “composability of security functionalities”, recently introduced by the European Funded research through the pSHIELD and nSHIELD projects (ARTEMIS-JU programme). In a nutshell, the objective of this research is to define a control framework that, given a target security level for a specific application scenario, is able to i) discover the system elements, ii) quantify the security level of each element as well as its contribution to the security of the overall system, and iii) compute the control action to be applied on such elements to reach the security target. The main innovations proposed by the authors are: i) the definition of a comprehensive methodology to quantify the security of a generic system independently from the technology and the environment and ii) the integration of the derived metrics into a closed-loop scheme that allows real-time control of the system. The solution described in this work moves from the proof-of-concepts performed in the early phase of the pSHIELD research and enrich es it through an innovative metric with a sound foundation, able to potentially cope with any kind of pplication scenarios (railways, automotive, manufacturing, ...)

    Lower Mekong Portfolio: Interim Evaluation

    Get PDF
    This report summarizes a portfolio evaluation of the MacArthur Foundation's conservation investments in the Lower Mekong region since 2011. It is explicitly a portfolio-level evaluation, focusing on common themes rather than individual grants. The evaluation involved understanding the portfolio context through reviewing relevant documents and speaking with donor partners; gathering data from MacArthur grantees; calibrating initial evaluation findings through consultations with independent regional experts and donor partner grantees; improving future evaluation ability by cooperating with NatureServe to improve the Lower Mekong Dashboard; and presenting results in this evaluation report and to MacArthur directly

    Distributed situation awareness in dynamic systems: Theoretical development and application of an ergonomics methodology

    Get PDF
    The purpose of this paper is to propose foundations for a theory of situation awareness based on the analysis of interactions between agents (i.e., both human and non-human) in subsystems. This approach may help promote a better understanding of technology-mediated interaction in systems, as well as helping in the formulation of hypotheses and predictions concerning distributed situation awareness. It is proposed that agents within a system each hold their own situation awareness which may be very different from (although compatible with) other agents. It is argued that we should not always hope for, or indeed want, sharing of this awareness, as different system agents have different purposes. This view marks situation awareness as a 1 dynamic and collaborative process that binds agents together on tasks on a moment-by-moment basis. Implications of this viewpoint for development of a new theory of, and accompanying methodology for, distributed situation awareness are offered

    State of Health Equity Movement, 2011 Update Part B: Catalog of Activities DRA Project Report No. 11-02

    Get PDF
    State of Health Equity Movement, 2011 Update Part B: Catalog of Activities DRA Project Report No. 11-0

    Toward optimal multi-objective models of network security: Survey

    Get PDF
    Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers

    Towards optimal multi-objective models of network security: survey

    Get PDF
    Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers
    • 

    corecore