56,155 research outputs found

    Comparative analysis of spring flood risk reduction measures in Alaska, United States and the Sakha Republic, Russia

    Get PDF
    Thesis (Ph.D.) University of Alaska Fairbanks, 2017River ice thaw and breakup are an annual springtime phenomena in the North. Depending on regional weather patterns and river morphology, breakups can result in catastrophic floods in exposed and vulnerable communities. Breakup flood risk is especially high in rural and remote northern communities, where flood relief and recovery are complicated by unique geographical and climatological features, and limited physical and communication infrastructure. Proactive spring flood management would significantly minimize the adverse impacts of spring floods. Proactive flood management entails flood risk reduction through advances in ice jam and flood prevention, forecasting and mitigation, and community preparedness. With the goal to identify best practices in spring flood risk reduction, I conducted a comparative case study between two flood-prone communities, Galena in Alaska, United States and Edeytsy in the Sakha Republic, Russia. Within a week from each other, Galena and Edeytsy sustained major floods in May 2013. Methods included focus groups with the representatives from flood managing agencies, surveys of families impacted by the 2013 floods, observations on site, and archival review. Comparative parameters of the study included natural and human causes of spring floods, effectiveness of spring flood mitigation and preparedness strategies, and the role of interagency communication and cooperation in flood risk reduction. The analysis revealed that spring flood risk in Galena and Edeytsy results from complex interactions among a series of natural processes and human actions that generate conditions of hazard, exposure, and vulnerability. Therefore, flood risk in Galena and Edeytsy can be reduced by managing conditions of ice-jam floods, and decreasing exposure and vulnerability of the at-risk populations. Implementing the Pressure and Release model to analyze the vulnerability progression of Edeytsy and Galena points to common root causes at the two research sites, including colonial heritage, unequal distribution of resources and power, top-down governance, and limited inclusion of local communities in the decision-making process. To construct an appropriate flood risk reduction framework it is important to establish a dialogue among the diverse stakeholders on potential solutions, arriving at a range of top-down and bottom-up initiatives and in conjunction selecting the appropriate strategies. Both communities have progressed in terms of greater awareness of the hazard, reduction in vulnerabilities, and a shift to more reliance on shelter-in-place. However, in neither community have needed improvements in levee protection been completed. Dialogue between outside authorities and the community begins earlier and is more intensive for Edeytsy, perhaps accounting for Edeytsy's more favorable rating of risk management and response than Galena's

    The SmartAG partner: CCAFS East Africa Bi-Annual Newsletter, July - December 2019

    Get PDF
    We are pleased to share with you our SmartAg Partner bi-annual newsletter, highlighting policy engagement, ongoing research, field updates and activities with partners from the second half of 2019

    Responding to Climate Change: The Economy and Economics - Part of the Problem and Solution

    Get PDF
    The Climate Change Starter’s Guide provides an introduction and overview for education planners and practitioners on the wide range of issues relating to climate change and climate change education, including causes, impacts, mitigation and adaptation strategies, as well as some broad political and economic principles. The aim of this guide is to serve as a starting point for mainstreaming climate change education into school curricula. It has been created to enable education planners and practitioners to understand the issues at hand, to review and analyse their relevance to particular national and local contexts, and to facilitate the development of education policies, curricula, programmes and lesson plans. The guide covers four major thematic areas: 1. the science of climate change, which explains the causes and observed changes; 2. the social and human aspects of climate change including gender, health, migration, poverty and ethics; 3. policy responses to climate change including measures for mitigation and adaptation; and 4. education approaches including education for sustainable development, disaster reduction and sustainable lifestyles. A selection of key resources in the form of publication titles or websites for further reading is provided after each of the thematic sections

    Outcomes of CCAFS Work in Vietnam

    Get PDF
    The study explored how CCAFS SEA outputs have helped the country achieve its development outcomes in the agricultural sector. The assessment showed that CCAFS SEA, although still on-going, has contributed to specific outcomes in Vietnam, which include changes in knowledge, approaches, practices, and strategies related to climate change, particularly in the agricultural sector. These outcomes were observed among decision makers, policymakers, technical staff, and farmers

    The Australian Cyber Security Centre threat report 2015

    Get PDF
    Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for malicious activities even if they do not think the information held on their networks is valuable, or that their business would be of interest to cyber adversaries. This first unclassified report by the ACSC describes the range of cyber adversaries targeting Australian networks, explains their motivations, the malicious activities they are conducting and their impact, and provides specific examples of activity targeting Australian networks during 2014. This report also offers mitigation advice on how organisations can defend against these activities. The ACSC’s ability to detect and defend against sophisticated cyber threats continues to improve. But cyber adversaries are constantly improving their tradecraft in their attempts to defeat our network defences and exploit the new technologies we embrace. There are gaps in our understanding of the extent and nature of malicious activity, particularly against the business sector. The ACSC is reaching out to industry to build partnerships to improve our collective understanding. Future iterations of the Threat Report will benefit from these partnerships and help to close gaps in our knowledge

    Introduction: Legal Scholarship, the Disaster Cycle, and the Fukushima Accident

    Get PDF

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users
    • …
    corecore