51,874 research outputs found
Improving water resource management in Bangladesh
As populations expand and make various uses of water, its growing scarcity becomes a serious issue in developing countries such as Bangladesh. Water can no longer be considered a totally free resource and plans must be developed for its efficient use through better management and rules that preserve everybody's access to it and interest in its development. Because it is a common resource, its development and management should involve all beneficiaries. The government's role in this process is to establish the ground rules for water use and conservation through a policy and legal framework and a monitoring system that ensure its continued safety of supply to--and responsible water use by--every sector and user in the economy. National water policy must set the ground rules for allocation to different users, water rights, pricing, and environmental safety. Bangladesh's water strategy should start with a national water policy that spells out key objectives such as priority of use by critical economic sectors, approaches to water pricing and cost recovery for development, and shared public- and private-sector water management. An apex public planning organization is needed to perform overall planning for water resources and to advise the National Water Counsel on policy and legislation. Also needed are agencies to implement public water plans for the development of infrastructure, the monitoring of water regimes, and the enforcement of regulations.Water Conservation,Water Resources Law,Water and Industry,Environmental Economics&Policies,Decentralization,Water Supply and Sanitation Governance and Institutions,Town Water Supply and Sanitation,Water and Industry,Water Conservation,Environmental Economics&Policies
Recommended from our members
Current Legal and Institutional Frameworks for Investing in Lower Carbon Electricity in China
Letter to colleagues regarding UNDP actions in China
Letter from Bob Seidman containing an abbreviated proposal written by himself and Ann Seidman for a United Nations Development Programme (UNDP) and Chinese Committee on International Cooperation, Exchanges, and Trade (CICET) project on bill legislation, and a brief report written by the Seidmans after four weeks spent in Beijing
Electronic security - risk mitigation in financial transactions : public policy issues
This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators
Negative Results in Computer Vision: A Perspective
A negative result is when the outcome of an experiment or a model is not what
is expected or when a hypothesis does not hold. Despite being often overlooked
in the scientific community, negative results are results and they carry value.
While this topic has been extensively discussed in other fields such as social
sciences and biosciences, less attention has been paid to it in the computer
vision community. The unique characteristics of computer vision, particularly
its experimental aspect, call for a special treatment of this matter. In this
paper, I will address what makes negative results important, how they should be
disseminated and incentivized, and what lessons can be learned from cognitive
vision research in this regard. Further, I will discuss issues such as computer
vision and human vision interaction, experimental design and statistical
hypothesis testing, explanatory versus predictive modeling, performance
evaluation, model comparison, as well as computer vision research culture
A Careful Design for a Tool to Detect Child Pornography in P2P Networks
This paper addresses the social problem of child pornography on peer-to-peer (P2P) networks on the Internet and presents an automated system with effective computer and telematic tools for seeking out and identifying data exchanges with pedophilic content on the Internet. The paper analyzes the social and legal context in which the system must operate and describes the processes by which the system respects the rights of the persons investigated and prevents these tools from being used to establish processes of surveillance and attacks on the privacy of Internet users
Cybercrime Pervasiveness, Consequences, and Sustainable Counter Strategies
As our connectivity and dependency on technology increases, so does our vulnerability.
Technology has provided not only new tools, but also new opportunities
for criminals in the digital world. The abuse of new technologies has been threatening
economic and Jinancial security and actually devastating the lives of affected indivicluals. In Nigeria, cybercrime has recorded mostly foregin-based individuals
and organizations as victims thereby getting Nigeria ranked among
the nations with notorious pemasiveness of high-tech crimes. Indeed, adequately
formulating a strategy to contain the menace of cybercrime presents aformidable
challenge to law enforcement. This paper x-rays noted instances of cybercrime
pervasiveness, its devastating consequences, and up-to-date countermeasures in
Nigeria It develops an enforceable/sustainable framework to determine how critical
infrastructures are put at risk snd how law enforcement should react in responding
to the threats
Levels of inquiry: Hierarchies of pedagogical practices and inquiry processes
Provides pedagogical insight concerning the skill of inquiry The resource being annotated is: http://www.dlese.org/dds/catalog_COSEE-1808.htm
- …