75,844 research outputs found

    Environmental pollutants from the Scott and Shackleton expeditions during the ‘Heroic Age’ of Antarctic exploration

    Get PDF
    Early explorers to Antarctica built wooden huts and brought huge quantities of supplies and equipment to support their geographical and scientific studies for several years. When the expeditions ended and relief ships arrived, a rapid exodus frequently allowed only essential items to be taken north. The huts and thousands of items were left behind. Fuel depots with unused containers of petroleum products, asbestos materials, and diverse chemicals were also left at the huts. This investigation found high concentrations of polyaromatic hydrocarbons in soils under and around the historic fuel depots, including anthracene, benzo[b]fluoranthene, benzo[k]fluoranthene, chrysene, fluorene, and pyrene, as well as benzo[a]anthracene, benzo[a]pyrene, and fluoranthene, which are recognized carcinogens. Asbestos materials within the huts have been identified and extensive amounts of fragmented asbestos were found littering the ground around the Cape Evans hut. These materials are continually abraded and fragmented as tourists walk over them and the coarse scoria breaks and grinds down the materials. A chemical spill, within the Cape Evans hut, apparently from caustic substances from one of the scientific experiments, has caused an unusual deterioration and defibration on affected woods. Although these areas are important historic sites protected by international treaties, the hazardous waste materials left by the early explorers should be removed and remedial action taken to restore the site to as pristine a condition as possible. Recommendations are discussed for international efforts to study and clean up these areas, where the earliest environmental pollution in Antarctica was produced

    Why Invest in Collaborative Leadership Development? Summary Report

    Get PDF
    The Casey Foundation values skillful leadership in creating sustained social change. The Foundation partnered with the University of Maryland, School of Public Policy in sculpting a new approach to match leadership ability with constructive results for children, families and communities -- a collaborative leadership style for complex social issues. Readers, especially other foundations and nonprofit investors, get a look at the findings, lessons learned and recommendations from three years of collaborative leadership capacity-building effort

    Global Trade Impacts: Addressing the Health, Social and Environmental Consequences of Moving International Freight Through Our Communities

    Get PDF
    Examines freight transportation industry trends; the impact of global trade on workers, the environment, and health in both exporting and importing countries; and organizing strategies and policy innovations for minimizing the damage and ensuring health

    On the inability of existing security models to cope with data mobility in dynamic organizations

    Get PDF
    Modeling tools play an important role in identifying threats in traditional\ud IT systems, where the physical infrastructure and roles are assumed\ud to be static. In dynamic organizations, the mobility of data outside the\ud organizational perimeter causes an increased level of threats such as the\ud loss of confidential data and the loss of reputation. We show that current\ud modeling tools are not powerful enough to help the designer identify the\ud emerging threats due to mobility of data and change of roles, because they\ud do not include the mobility of IT systems nor the organizational dynamics\ud in the security model. Researchers have proposed security models that\ud particularly focus on data mobility and the dynamics of modern organizations,\ud such as frequent role changes of a person. We show that none\ud of the current security models simultaneously considers the data mobility\ud and organizational dynamics to a satisfactory extent. As a result, none\ud of the current security models effectively identifies the potential security\ud threats caused by data mobility in a dynamic organization

    Comparison of advanced authorisation infrastructures for grid computing

    Get PDF
    The widespread use of grid technology and distributed compute power, with all its inherent benefits, will only be established if the use of that technology can be guaranteed efficient and secure. The predominant method for currently enforcing security is through the use of public key infrastructures (PKI) to support authentication and the use of access control lists (ACL) to support authorisation. These systems alone do not provide enough fine-grained control over the restriction of user rights, necessary in a dynamic grid environment. This paper compares the implementation and experiences of using the current standard for grid authorisation with Globus - the grid security infrastructure (GSI) - with the role-based access control (RBAC) authorisation infrastructure PERMIS. The suitability of these security infrastructures for integration with regard to existing grid technology is presented based upon experiences within the JISC-funded DyVOSE project
    corecore