1,761 research outputs found

    Coping Mechanisms in South Sudan in Relation to Different Types of Shock

    Get PDF
    This helpdesk report provides an assessment of the negative and positive coping mechanisms of different groups (based on wealth (below the poverty line/elites), gender, age, (dis)abilities, geographies (rural/urban), and ethnicity of people in South Sudan in relation to different types of shock. The report highlights that coping strategies are varied and multifaceted, they are a product of the vulnerability of particular individuals, households and communities and are the product of responses to shocks and stressors that may be acute or chronic. It is important to note that coping strategies in the South Sudanese context have often been developed in response to food insecurity, climatic change and conflict and that new shocks may undermine these existing strategies, necessitate evolution of these or the adoption of new strategies. Given the complexity and broad nature of the subject, the report is broad in its scope and structured into the following three sections: Context, Vulnerability and Coping strategies

    Worm Control for Small Ruminants in Tropical Asia

    Get PDF
    Livestock Production/Industries,

    Survival in the e-conomy: 2nd Australian information warfare & security conference 2001

    Get PDF
    This is an international conference for academics and industry specialists in information warfare, security, and other related fields. The conference has drawn participants from national and international organisations

    All Bark and No Byte: A Case Study on Nuclear Weapons\u27 Role in Cyber Deterrence

    Get PDF
    In what some scholars consider a marked departure from its traditional policy, the U.S.\u27 2018 Nuclear Deterrence Posture Review declared that the U.S. would consider the use of nuclear weapons in response to significant, non-nuclear strategic attacks. However, despite real-world examples of the type of significant cyberattacks on U.S., allied, or partner civilian population or infrastructure alluded to in the Review, the factors that might trigger multidomain escalation remain underexplored, which creates a credibility gap in the U.S.\u27 deterrence policy. This paper explores these factors by providing a case study of the North Korean WannaCry and Russian NotPetya cyberattacks and compares the potential flashpoints caused by each attack with declared U.S. nuclear policy. In so doing, it examines how the presence of a traditional nuclear deterrent affects a state\u27s ability to deter cyberattacks

    Preliminaries of orthogonal layered defence using functional and assurance controls in industrial control systems

    Get PDF
    Industrial Control Systems (ICSs) are responsible for the automation of different processes and the overall control of systems that include highly sensitive potential targets such as nuclear facilities, energy-distribution, water-supply, and mass-transit systems. Given the increased complexity and rapid evolvement of their threat landscape, and the fact that these systems form part of the Critical National infrastructure (CNI), makes them an emerging domain of conflict, terrorist attacks, and a playground for cyberexploitation. Existing layered-defence approaches are increasingly criticised for their inability to adequately protect against resourceful and persistent adversaries. It is therefore essential that emerging techniques, such as orthogonality, be combined with existing security strategies to leverage defence advantages against adaptive and often asymmetrical attack vectors. The concept of orthogonality is relatively new and unexplored in an ICS environment and consists of having assurance control as well as functional control at each layer. Our work seeks to partially articulate a framework where multiple functional and assurance controls are introduced at each layer of ICS architectural design to further enhance security while maintaining critical real-time transfer of command and control traffic

    Evaluation of UK sheep farmers’ attitudes and behaviours towards sustainable roundworm control

    Get PDF
    One of the major constraints limiting the efficiency of sheep production is the control of gastrointestinal nematode parasites. Parasite control by strategic use of anthelmintics is threatened by the emergence of nematode populations that are resistant to the drugs available. It is therefore increasingly apparent that steps toward maintaining sustainable productivity in the growing face of anthelmintic resistance (AR) is required by farmers. To facilitate the uptake of sustainable approaches to parasite management, a comprehensive understanding of the various factors that may influence farmers’ decision-making processes is required. In order to establish which factors are influential, and determine their impact on farmers’ roundworm control behaviours, both qualitative and quantitative research methods were used including focus groups as well as attitudinal and behavioural questionnaires. A retrospective analysis was initially conducted of historical surveys designed to identify farm specific characteristics and parasite management practices including anthelmintic usage. The objectives of the analysis were to identify factors associated with uptake of best practice advice including farm characteristics and information sourcing. In addition, the implementation of sustainable roundworm control practices was investigated using two surveys conducted in 2000 and 2010. Logistic regression models were applied for univariable and multivariable analysis of dependent and independent variables. The next step was to conduct a series of focus groups in different geographic regions of Scotland. The main purposes were to explore sheep farmers’ attitudes towards different aspects of roundworm management, as well as to identify potential motivators and barriers to uptake of sustainable parasite control practices. The findings aided in the development of an attitudinal questionnaire used to canvass opinions representative on a national level. The concluding study involved a telephone survey of 400 Scottish sheep farmers, designed to elicit attitudes regarding roundworm control, AR and sustainable roundworm control practices. A quantitative statistical analysis technique (Structural Equation Modelling) was then used to test the relationships between socio-psychological factors and the uptake of sustainable roundworm control practices. The analysis of historical questionnaire data demonstrated evidence of a shift towards the use of practices to reduce the rate of AR development, most notably a decline in the practice of ‘dose and move’ as well as an overall reduction in treatment frequency. Statistical analysis identified significant associations between farm characteristics and specific treatment strategies. For example, larger farms were more likely to adopt a set treatment regimen (P=0.036), compared with smaller farms, which were more likely to treat based on clinical signs of infection (P=0.021). Sourcing of roundworm control information primarily from veterinarians was most associated with treatment timings with no parallels between time points. From the qualitative focus group studies conducted we identified four overarching themes impacting on sheep producers’ attitudes to roundworm control and best practice advice. These themes comprised: a lack of perceived need to change, the complexity of advice, the ease of implementation of recommended practices and the effectiveness of extension approaches. Additionally, the most important and implementable guidelines identified by sheep farmers were: ‘working out a roundworm control strategy with an advisor’ and ‘administering anthelmintics effectively’ with regard to correct drenching practice i.e. appropriate dosing, administration and drug storage procedures. These findings exhibited similarities with veterinarians’ rankings with also, ‘testing for AR’, ‘preserving susceptible parasites’ and ‘reducing dependence on anthelmintics’ receiving the lowest rankings for importance and implementability. The quantitative analysis from the attitudinal/behavioural questionnaire identified eleven factors with significant influences on the adoption of sustainable roundworm control practices. The key influences on overall adoption were farmers’ baseline understanding about roundworm control and self-reported confirmation of anthelmintic resistance in their flock. Additional positive influences included, positive attitudes to veterinary services, enterprise type and perceived risk of AR. Factors that were shown to have the greatest relative effects on individual parasite control practices included; the perceived resource requirements for implementing a quarantine strategy, farmers’ AR suspicions for instigating AR testing and the confirmation of AR for adopting faecal egg count monitoring. The findings have highlighted several factors which can influence sheep farmers’ decisions to reject or adopt recommended roundworm control practices. It is evident that the perceived complexity, lack of need and practicality of the current recommendations necessitates changes to how extension is designed and disseminated to farmers. The findings also suggest that improving farmers’ acceptance and uptake of diagnostic testing and improving underlying knowledge and awareness about nematode control is a significant target to influencing adoption of best practice behaviours. The importance of veterinarians as highly-trusted information resources validates the need for further engagement with veterinarians concerning sustainable parasite control approaches, to facilitate collaboration with farmers. The need for interaction between farmers and their advisors is key to resolving the issues raised to enable the necessary explanation, justification and execution of recommended practices to suit farmers’ needs and farming conditions

    Offensive cyber: What are the possibilities of the use of offensive cyber as an offensive capability within the existing international legal framework?

    Get PDF
    Cyber is hot. Although the international community, scientists, military and NATO primarily focus on how to defend themselves against cyber attacks, this study mainly focuses on the offensive side of cyber. The thesis analyses the possibilities of the use of offensive cyber as a capability within the existing international legal framework. The thesis consists of two parts. The first part discusses what offensive cyber is and what its possibilities and capabilities are. Offensive use of cyber is new within modern warfare. Therefore it is important to describe and explain cyber attacks and offensive cyber operations thoroughly. In this part the definitions are set, and the base characteristics of cyber attack are discussed. Not only the possibilities of offensive cyber are described, but also dilemmas for the use of offensive cyber are explained. This first part concludes with possible scenarios for the use of offensive cyber operations. The second part of this thesis is a case study and analyses whether and how offensive cyber fits in, and complies with the existing international legal framework. Firstly, the aspects in the existing international legal framework are discussed, which are unambiguous for regular war scenarios, but seem difficult to interpret when it comes to cyber operations. Secondly, the case study is conducted by analysing the three main principles within the Laws of Armed Conflict (LoAC), proportionality, necessity and distinction, on the four recent cyber cases of Estonia 2007, Georgia 2008, Stuxnet 2010 and Libya 2011. The conclusion of the thesis is that the existing international legal framework is not fully suitable for the use of cyber as an offensive capability. Especially the attribution problem, collateral damage, and distinction between military and civil objects are problematic. As long as there is no consensus on international accepted cyber law that sets the boundaries for the use of offensive cyber, the existing international legal framework is applicable, and the use of offensive cyber will have its challenges and grey areas. A new international accepted legal cyber framework should limit, and set boundaries for the use of offensive cyber. On the other hand, developing a new international accepted legal framework, in which offensive cyber is appointed, is also an opportunity to exploit the optimum use of offensive cyber, within that framework
    • …
    corecore