5,444 research outputs found

    Geoengineering: A war on climate change?

    Get PDF
    Geoengineering; specifically Solar Radiation Management ; has been proposed to effect rapid influence over the Earth’s climate system in order to counteract Anthropogenic Global Warming. This poses near-term to long-term governance challenges; some of which are within the planning horizon of current political administrations. Previous discussions of governance of SRM have focused primarily on two scenarios: an isolated “Greenfinger” individual; or state; acting independently ; versus more consensual; internationalist approaches. I argue that these models represent a very limited sub-set of plausible deployment scenarios. To generate a range of alternative models; I offer a short; relatively unstructured discussion of a range of different types of warfare – each with an analogous SRM deployment regime

    Social-Costs Perspective Impacts of Cybercrime in World-Economy, Country-Wise: Policy-Guidance under Piecemeal Approach

    Get PDF
    Today’s technology-driven human-society(s) country-wise are counted more than ever before where UAE-society is no exception. Tech-users here compete for comparative time-saving options for marginalizing operating costs. It has resulted in huge data usages, a high number of users & devices, which has attracted criminals for taking advantage, which is called cybercrime. Addressing cybercrime, the UAE, like many countries, is not out of control by-laws. However, laws like cybercrime for its society are not always for absolutely eliminating the crime. Thus, besides cybercrime law in place, UAE needs a piecemeal approach in practice where one department may vary from approaches of other-department. With awareness about risky online behaviors & options, tech-users as defenders are needed to invest their efforts. This study has laid out the foundation of the proposal, Akim’s Model-2021, using the Theory of Consumer Choice & Behaviors and Welfare Analysis. Tech-user’s actual utility-received is the sum of utility-received from awareness & own-effort and utility-received from cybercrime-law. Any changes to services received from joint efforts may risk tech-user, to be a victim. Welfare analysis shows tech user's actions - awareness & own-effort, besides cybercrime-law can create, Net Social-gain, which largely depends on tech user's actions. Tech-user’s economic surplus is greater than government expenses for implementation of cybercrime law in UAE. Net-loss to the UAE is the sum of deadweight loss and net-loss to tech producers for underutilized resources

    Comparative Analysis of National Emergency Management Charters: A Pilot Study Towards Achieving a Standardized Global Emergency Management Framework

    Get PDF
    The world is facing increasing risks from a variety of threats, especially those related to extreme weather and natural disasters. The substantial and sustained impacts of major disasters are reinforcing the calls for global collaboration. Nevertheless, worldwide emergency assistance efforts are confronted with several challenges that negatively affect the disaster victims, stress international diplomatic relations, and threaten the social and national security of nations. These challenges arise from the unique nature of each national emergency management framework and the lack of global standardization and governing rules. We conducted this qualitative study. Using a variety of qualitative analytical methods. we examined and compared the national emergency management charters of China, the US, the Maldives, Bangladesh, and Ethiopia. We used a variety of data sources, including national emergency management laws and strategiesas well as published studies. The findings showed substantial differences between the five national emergency management charters. Among those findings are the government entity overseeing emergency management activities, the levels and categories of disasters, the structure, organization, and operations of the emergency management system, and the commitment to international directives and frameworks. One striking finding was the lack of any global emergency management ethics code. The challenges of global response call for countries to work closely to standardize the types, levels, and categories of disasters. Additionally, they need to develop a process to facilitate and expedite the acceptance of international aid and assistance. Countries also need to commit to international regulations and frameworks and establish a code for global emergency ethics

    BIMSTEC for Countering Terrorism and Transnational Crime: An Insight from Bangladesh Perspectives

    Get PDF
    Terrorism and Transnational crime are a domestic, regional as well as a global issue. No nation can combat terrorism without the global as well as regional cooperation. The aim of this paper is to explore the activities BIMSTEC for countering terrorism and transnational crime with individual prominence given to Bangladesh. Synchronic approach has used to accomplish the study and it has conducted through content analysis techniques. BIMSTEC has made considerable progress but yet it needs to accomplish comprehensive approaches within the regions to combat against both the domestic as well as transnational terrorism and crime. Keywords: BIMSTEC, CTTC, and Banglades

    Facing west, facing north: Canada and Australia in East Asia

    Get PDF
    This report, published by the Centre for International Governance Innovation (CIGI) and the Australian Strategic Policy Institute (ASPI), calls for Canada and Australia to deepen their regional security cooperation in East Asia. The risk of regional instability is growing, due to China’s re-emergence, continued speculation about US strategic engagement in Asia and increased competition over disputed maritime boundaries. These developments provide opportunities for collaboration between countries like Canada and Australia. Non-traditional security threats, including natural disasters, climate change, food security and cyber security, point to a range of areas where the two countries can work more closely together. The report contains several policy recommendations for Canada and Australia to: strengthen regional security bolster regional governance mechanisms enhance bilateral defence cooperation boost defence industry and economic cooperation

    Simplifying Cyber Security Maturity Models through National Culture: A Fuzzy Logic Approach

    Get PDF
    Different assessment models exist to measure a country's cyber security maturity levels. These levels serve as a benchmark for indicating how well prepared a nation is against a cyber security attack and how resilient it would be in recovering from such an attack. However, results from these maturity assessments are either too general, overly complex, or resource intensive to apply and guide important national cyber security strategies and frameworks. To address this we propose a model to link national culture with a country's cyber security maturity through fuzzy logic mapping to ensure that a more uniform reflection of the cyber security maturity level within a country can be measured. In this paper, we present additional research towards optimising our model. The extended model incorporates input from two cyber security assessment models, and validates the refined output models on 11 countries to compare the maturity levels from the traditional assessment model with our optimised fuzzy model. Our results show that it is viable to reduce the resources required to conduct a national cyber security maturity assessment
    corecore