53 research outputs found
A review of commercialisation mechanisms for carbon dioxide removal
The deployment of carbon dioxide removal (CDR) needs to be scaled up to achieve net zero emission pledges. In this paper we survey the policy mechanisms currently in place globally to incentivise CDR, together with an estimate of what different mechanisms are paying per tonne of CDR, and how those costs are currently distributed. Incentive structures are grouped into three structures, market-based, public procurement, and fiscal mechanisms. We find the majority of mechanisms currently in operation are underresourced and pay too little to enable a portfolio of CDR that could support achievement of net zero. The majority of mechanisms are concentrated in market-based and fiscal structures, specifically carbon markets and subsidies. While not primarily motivated by CDR, mechanisms tend to support established afforestation and soil carbon sequestration methods. Mechanisms for geological CDR remain largely underdeveloped relative to the requirements of modelled net zero scenarios. Commercialisation pathways for CDR require suitable policies and markets throughout the projects development cycle. Discussion and investment in CDR has tended to focus on technology development. Our findings suggest that an equal or greater emphasis on policy innovation may be required if future requirements for CDR are to be met. This study can further support research and policy on the identification of incentive gaps and realistic potential for CDR globally
The Emerald handbook of research management and administration around the world
Over past decades, scholars and practitioners around the world observed an emergence of professionals, research managers and administrators (RMAs) who play an essential role in the advancement of academic research. RMAs have extensive knowledge of the research ecosystem, including funding opportunities, proposals, budgeting and pricing, ethics, open research, project management, finance, negotiation, strategy, systems, and assessment. Until now, limited efforts have been made to investigate RMAs in a cross-regional, comparative manner, or to understand the recent surge of the profession in a larger policy context.
Addressing this gap, an international group of experts share diverse perspectives to provide a comprehensive account of RMA as a profession, offer an analytical framework to understand their role in higher education and academic science. Covering countries in Africa, Australasia, East Asia and India, Western Europe, Central and Eastern Europe, the Middle East, North America, and South America, the work provides trans-cultural coverage of the profession. Drawing on theories from related fields, it also provides insights and understanding of RMAs as a social phenomenon.
The Emerald Handbook of Research Management and Administration Around the World is the most comprehensive book about practitioners working in research management and administration. The book provides basic knowledge for students and professionals considering a career in this field, and serves as reference material for policymakers as well as academic researchers. By presenting evidence-based observations from around the world and discussing global trends, this text promotes social awareness of RMAs, shares state-of-the-art knowledge on the profession, and offers insights into the future of academic research
Bibliographic Control in the Digital Ecosystem
With the contributions of international experts, the book aims to explore the new boundaries of universal bibliographic control. Bibliographic control is radically changing because the bibliographic universe is radically changing: resources, agents, technologies, standards and practices. Among the main topics addressed: library cooperation networks; legal deposit; national bibliographies; new tools and standards (IFLA LRM, RDA, BIBFRAME); authority control and new alliances (Wikidata, Wikibase, Identifiers); new ways of indexing resources (artificial intelligence); institutional repositories; new book supply chain; “discoverability” in the IIIF digital ecosystem; role of thesauri and ontologies in the digital ecosystem; bibliographic control and search engines
Signs of Water
Water is more important than ever before. It is increasingly controversial in direct proportion to its scarcity, demand, neglect, and commodification. There is no place on the planet where water is not, or will not be, of critical concern. Signs of Water brings together scholars and experts from five continents in an interdisciplinary exploration of the theoretical approaches, social and political issues, and anthropogenic hazards surrounding water in the twenty-first century. From the kitchen taps of Detroit, Michigan to the water-harvesting infrastructure of Tokyo, from the Upper Xingu Basin of Brazil to the Sunda Deep of the Java Trench, these essays flow through time and place to uncover the many issues surrounding water today. Asking key theoretical questions, exposing threats to vital water systems, and proposing paths forward, Signs of Water brims with histories, ontologies, and political struggles. Bringing together local experiences to tell a global story, it centers water as history, as politics, and as a human right
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well
- …