6,373 research outputs found

    Russian approaches to energy security and climate change: Russian gas exports to the EU

    Get PDF
    The proposition that EU climate policy represents a threat to Russia’s gas exports to the EU, and therefore to Russia’s energy security, is critically examined. It is concluded that whilst the greater significance of climate-change action for Russian energy security currently lies not in Russia’s own emissions reduction commitments but in those of the EU, an even greater threat to Russia’s energy security is posed by the development of the EU internal gas market and challenges to Russia’s participation in that market. However, the coming decades could see Russia’s energy security increasingly influenced by climate-change action policies undertaken by current importers of Russian gas such as the EU, and potential importers such as China and India. The challenge for Russia will be to adapt to developments in energy security and climate-change action at the European and global levels

    From Sensor to Observation Web with Environmental Enablers in the Future Internet

    Get PDF
    This paper outlines the grand challenges in global sustainability research and the objectives of the FP7 Future Internet PPP program within the Digital Agenda for Europe. Large user communities are generating significant amounts of valuable environmental observations at local and regional scales using the devices and services of the Future Internet. These communities’ environmental observations represent a wealth of information which is currently hardly used or used only in isolation and therefore in need of integration with other information sources. Indeed, this very integration will lead to a paradigm shift from a mere Sensor Web to an Observation Web with semantically enriched content emanating from sensors, environmental simulations and citizens. The paper also describes the research challenges to realize the Observation Web and the associated environmental enablers for the Future Internet. Such an environmental enabler could for instance be an electronic sensing device, a web-service application, or even a social networking group affording or facilitating the capability of the Future Internet applications to consume, produce, and use environmental observations in cross-domain applications. The term ?envirofied? Future Internet is coined to describe this overall target that forms a cornerstone of work in the Environmental Usage Area within the Future Internet PPP program. Relevant trends described in the paper are the usage of ubiquitous sensors (anywhere), the provision and generation of information by citizens, and the convergence of real and virtual realities to convey understanding of environmental observations. The paper addresses the technical challenges in the Environmental Usage Area and the need for designing multi-style service oriented architecture. Key topics are the mapping of requirements to capabilities, providing scalability and robustness with implementing context aware information retrieval. Another essential research topic is handling data fusion and model based computation, and the related propagation of information uncertainty. Approaches to security, standardization and harmonization, all essential for sustainable solutions, are summarized from the perspective of the Environmental Usage Area. The paper concludes with an overview of emerging, high impact applications in the environmental areas concerning land ecosystems (biodiversity), air quality (atmospheric conditions) and water ecosystems (marine asset management)

    U.S. State Building and the Second Amendment

    Get PDF
    This dissertation used a comparative case study strategy employing a mixed methods thematic content analysis approach1 to explore U.S. government support for Second Amendment freedoms as compared to other freedoms in the U.S. Bill of Rights in American-led state-building projects in Cuba (1898-1901), Germany (1945-1949), and Iraq (2003-2005). The dissertation tested for Republican and Democratic political party support regarding Second Amendment freedoms in U.S. state-building projects. Findings from the three case studies showed that the American government did not support individual arms rights in its state-building efforts as it did with the other nine Bill of Rights freedoms. Findings showed support by the Republican and Democratic parties for all Bill of Rights freedoms with the exception of Second Amendment freedoms. ________________ 1Researchers have used other names, such as summative content analysis of text, for the identification of themes or major ideas in documents; see John Creswell, Research Design: Qualitative, Quantitative and Mixed-Methods Approaches, 3rd ed. (Thousand Oaks, CA: Sage Publications: 2009); John Creswell and Vicki Clark, Designing and Conducting Mixed Methods Research (Thousand Oaks, CA: Sage, 2007), 67- 69, for more information on the nested or embedded approach and page 12 for more information on defining mixed methods using content analysis. Although this dissertation is focusing on the qualitative nature of the evidence, quantitative steps of data collection and analysis, which is historically linked to content analysis, will be included. The quantitative data for this dissertation will be descriptive in nature with no regression analysis

    A Global Vision and Strategy for Organic Farming Research

    Get PDF
    TIPI, the Technology Innovation Platform of IFOAM – Organics International, aims to foster international collaboration in organic agriculture research, engage and involve all stakeholders that benefit from organic agriculture research, facilitate exchange of scientific knowledge of organic food and farming systems, and help disseminate, apply and implement innovations and scientific knowledge consistent with the principles of organic agriculture. This document lays down TIPI’s Global Vision and Strategy to advance organic agriculture through research, development, innovation and technology transfer. For more information about TIPI see www.organic‐research.net/tipi.htm

    Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services

    Get PDF
    The Internet of Things (IoT) has made it possible for devices around the world to acquire information and store it, in order to be able to use it at a later stage. However, this potential opportunity is often not exploited because of the excessively big interval between the data collection and the capability to process and analyse it. In this paper, we review the current IoT technologies, approaches and models in order to discover what challenges need to be met to make more sense of data. The main goal of this paper is to review the surveys related to IoT in order to provide well integrated and context aware intelligent services for IoT. Moreover, we present a state-of-the-art of IoT from the context aware perspective that allows the integration of IoT and social networks in the emerging Social Internet of Things (SIoT) term.This work has been partially funded by the Spanish Ministry of Economy and Competitiveness (MINECO/FEDER) under the granted Project SEQUOIA-UA (Management requirements and methodology for Big Data analytics) TIN2015-63502-C3-3-R, by the University of Alicante, within the program of support for research, under project GRE14-10, and by the Conselleria de Educación, Investigación, Cultura y Deporte, Comunidad Valenciana, Spain, within the program of support for research, under project GV/2016/087. This work has also been partially funded by projects from the Spanish Ministry of Education and Competitivity TIN2015-65100-R and DIIM2.0 (PROMETEOII/2014/001)

    IETF standardization in the field of the Internet of Things (IoT): a survey

    Get PDF
    Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities

    Managing Cybersecurity and Other Fraud Risks in Small and Medium Enterprises – A Framework to Build a Fraud Management Program in Times of Digitalization

    Get PDF
    Fraud, particularly cybercrime, is an emerging worldwide risk that targets not only large but also small and medium enterprises (SME). SMEs are especially vulnerable because they often have limited resources in terms of money, staff, and IT knowledge. Because of the role SMEs play in the European economy, reducing their vulnerability has gained more importance. Therefore, this study considers the question of how to minimize fraud in SME-related digital and socio-technical work environments. Based on a design science research approach, we developed a fraud management framework to allow SMEs to identify individual fraud risks and establish an individual fraud management program based on the framework at hand. To be adaptable to different industries and sizes of SMEs, we propose a modular concept of documents and workshop material that includes occupational and cyber-fraud cases because previous fraud management concepts often handled only one of them
    corecore