51,874 research outputs found

    Improving water resource management in Bangladesh

    Get PDF
    As populations expand and make various uses of water, its growing scarcity becomes a serious issue in developing countries such as Bangladesh. Water can no longer be considered a totally free resource and plans must be developed for its efficient use through better management and rules that preserve everybody's access to it and interest in its development. Because it is a common resource, its development and management should involve all beneficiaries. The government's role in this process is to establish the ground rules for water use and conservation through a policy and legal framework and a monitoring system that ensure its continued safety of supply to--and responsible water use by--every sector and user in the economy. National water policy must set the ground rules for allocation to different users, water rights, pricing, and environmental safety. Bangladesh's water strategy should start with a national water policy that spells out key objectives such as priority of use by critical economic sectors, approaches to water pricing and cost recovery for development, and shared public- and private-sector water management. An apex public planning organization is needed to perform overall planning for water resources and to advise the National Water Counsel on policy and legislation. Also needed are agencies to implement public water plans for the development of infrastructure, the monitoring of water regimes, and the enforcement of regulations.Water Conservation,Water Resources Law,Water and Industry,Environmental Economics&Policies,Decentralization,Water Supply and Sanitation Governance and Institutions,Town Water Supply and Sanitation,Water and Industry,Water Conservation,Environmental Economics&Policies

    Some Problems in the Formulation of a Disability Insurance Program

    Get PDF

    Letter to colleagues regarding UNDP actions in China

    Get PDF
    Letter from Bob Seidman containing an abbreviated proposal written by himself and Ann Seidman for a United Nations Development Programme (UNDP) and Chinese Committee on International Cooperation, Exchanges, and Trade (CICET) project on bill legislation, and a brief report written by the Seidmans after four weeks spent in Beijing

    Electronic security - risk mitigation in financial transactions : public policy issues

    Get PDF
    This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators

    Negative Results in Computer Vision: A Perspective

    Full text link
    A negative result is when the outcome of an experiment or a model is not what is expected or when a hypothesis does not hold. Despite being often overlooked in the scientific community, negative results are results and they carry value. While this topic has been extensively discussed in other fields such as social sciences and biosciences, less attention has been paid to it in the computer vision community. The unique characteristics of computer vision, particularly its experimental aspect, call for a special treatment of this matter. In this paper, I will address what makes negative results important, how they should be disseminated and incentivized, and what lessons can be learned from cognitive vision research in this regard. Further, I will discuss issues such as computer vision and human vision interaction, experimental design and statistical hypothesis testing, explanatory versus predictive modeling, performance evaluation, model comparison, as well as computer vision research culture

    A Careful Design for a Tool to Detect Child Pornography in P2P Networks

    Get PDF
    This paper addresses the social problem of child pornography on peer-to-peer (P2P) networks on the Internet and presents an automated system with effective computer and telematic tools for seeking out and identifying data exchanges with pedophilic content on the Internet. The paper analyzes the social and legal context in which the system must operate and describes the processes by which the system respects the rights of the persons investigated and prevents these tools from being used to establish processes of surveillance and attacks on the privacy of Internet users

    Cybercrime Pervasiveness, Consequences, and Sustainable Counter Strategies

    Get PDF
    As our connectivity and dependency on technology increases, so does our vulnerability. Technology has provided not only new tools, but also new opportunities for criminals in the digital world. The abuse of new technologies has been threatening economic and Jinancial security and actually devastating the lives of affected indivicluals. In Nigeria, cybercrime has recorded mostly foregin-based individuals and organizations as victims thereby getting Nigeria ranked among the nations with notorious pemasiveness of high-tech crimes. Indeed, adequately formulating a strategy to contain the menace of cybercrime presents aformidable challenge to law enforcement. This paper x-rays noted instances of cybercrime pervasiveness, its devastating consequences, and up-to-date countermeasures in Nigeria It develops an enforceable/sustainable framework to determine how critical infrastructures are put at risk snd how law enforcement should react in responding to the threats

    Levels of inquiry: Hierarchies of pedagogical practices and inquiry processes

    Get PDF
    Provides pedagogical insight concerning the skill of inquiry The resource being annotated is: http://www.dlese.org/dds/catalog_COSEE-1808.htm
    • …
    corecore