1,771 research outputs found
APFIC Regional Workshop on "Mainstreaming Fisheries Co-management"
This is the report of the APFIC regional workshop on "Mainstreaming fisheries co-management" held in Siem Reap, Cambodia from August 9-12, 2005 . The goal of the workshop was to provide a forum to learn from past experience and to promote devolved management of fisheries. Participants at the workshop had the opportunity to be exposed to a range of coastal and inland fisheries co-management interventions and the elaboration of approaches needed to make fisheries co-management a "mainstream" activity in developing countries. The objective of the workshop was to develop summary conclusions on the status of co-management in the region and provide some concrete recommendations for action towards mainstreaming fishery co-management in the Asia-Pacific region. The report contains the action plan and recommendations of the workshop. Many agencies (both governmental and non-governmental) are striving to improve the livelihoods of poor people that are dependent on aquatic resources by including these stakeholders in the planning and implementation of fisheries management. Many states have adopted decentralization as the way to implement future fisheries management, especially in developing countries, which often involves a partnership between government and the local communities, i.e. a co-management approach. The challenge is to find a way for co-management to become a mainstream practice of both government and non-government organizations and communities
Lower Mekong Portfolio: Interim Evaluation
This report summarizes a portfolio evaluation of the MacArthur Foundation's conservation investments in the Lower Mekong region since 2011. It is explicitly a portfolio-level evaluation, focusing on common themes rather than individual grants. The evaluation involved understanding the portfolio context through reviewing relevant documents and speaking with donor partners; gathering data from MacArthur grantees; calibrating initial evaluation findings through consultations with independent regional experts and donor partner grantees; improving future evaluation ability by cooperating with NatureServe to improve the Lower Mekong Dashboard; and presenting results in this evaluation report and to MacArthur directly
Robust Management, Risk and the Ecosystem Approach to Fisheries
Biodiversity has not been a prominent consideration in conventional fishery management, even though biological concerns and the concept of "sustainability" are long-established in fisheries. This is because traditionally, the focus of management has been on determining the harvest of fish that can be taken as a "sustainable yield" and then restricting the catch of fish to within this limit. Typically missing from the analysis have been (1) interactions of fishing with the broader marine ecosystem, and (2) interactions of the fishery with the broader coastal economy and coastal communities. Accordingly, there is a need to move toward a "big picture" perspective, a "Fishery System Approach", in which fisheries are understood and managed in the context of marine ecosystems and coastal human systems, thereby addressing the needs of both biodiversity conservation and integrated management of multiple ocean uses. This paper elaborates on these themes, exploring the duality of the Ecosystem Approach and the Livelihood Approach as means to move toward sustainable, resilient fishery systems, ones in which biodiversity values can be more fully included
Advancing security information and event management frameworks in managed enterprises using geolocation
Includes bibliographical referencesSecurity Information and Event Management (SIEM) technology supports security threat detection and response through real-time and historical analysis of security events from a range of data sources. Through the retrieval of mass feedback from many components and security systems within a computing environment, SIEMs are able to correlate and analyse events with a view to incident detection. The hypothesis of this study is that existing Security Information and Event Management techniques and solutions can be complemented by location-based information provided by feeder systems. In addition, and associated with the introduction of location information, it is hypothesised that privacy-enforcing procedures on geolocation data in SIEMs and meta- systems alike are necessary and enforceable. The method for the study was to augment a SIEM, established for the collection of events in an enterprise service management environment, with geo-location data. Through introducing the location dimension, it was possible to expand the correlation rules of the SIEM with location attributes and to see how this improved security confidence. An important co-consideration is the effect on privacy, where location information of an individual or system is propagated to a SIEM. With a theoretical consideration of the current privacy directives and regulations (specifically as promulgated in the European Union), privacy supporting techniques are introduced to diminish the accuracy of the location information - while still enabling enhanced security analysis. In the context of a European Union FP7 project relating to next generation SIEMs, the results of this work have been implemented based on systems, data, techniques and resilient features of the MASSIF project. In particular, AlienVault has been used as a platform for augmentation of a SIEM and an event set of several million events, collected over a three month period, have formed the basis for the implementation and experimentation. A "brute-force attack" misuse case scenario was selected to highlight the benefits of geolocation information as an enhancement to SIEM detection (and false-positive prevention). With respect to privacy, a privacy model is introduced for SIEM frameworks. This model utilises existing privacy legislation, that is most stringent in terms of privacy, as a basis. An analysis of the implementation and testing is conducted, focusing equally on data security and privacy, that is, assessing location-based information in enhancing SIEM capability in advanced security detection, and, determining if privacy-enforcing procedures on geolocation in SIEMs and other meta-systems are achievable and enforceable. Opportunities for geolocation enhancing various security techniques are considered, specifically for solving misuse cases identified as existing problems in enterprise environments. In summary, the research shows that additional security confidence and insight can be achieved through the augmentation of SIEM event information with geo-location information. Through the use of spatial cloaking it is also possible to incorporate location information without com- promising individual privacy. Overall the research reveals that there are significant benefits for SIEMs to make use of geo-location in their analysis calculations, and that this can be effectively conducted in ways which are acceptable to privacy considerations when considered against prevailing privacy legislation and guidelines
Socioeconomics and values of resources in great Lake-Tonle Sap and Mekong-Bassac area : results from a sample survey in Kampong Chhnang, Siem Reap and Kandal provinces, Cambodia
Socioeconomics aspects, Fishery economics, Cambodia,
Security Analysis of System Behaviour - From "Security by Design" to "Security at Runtime" -
The Internet today provides the environment for novel applications and
processes which may evolve way beyond pre-planned scope and
purpose. Security analysis is growing in complexity with the increase
in functionality, connectivity, and dynamics of current electronic
business processes. Technical processes within critical
infrastructures also have to cope with these developments. To tackle
the complexity of the security analysis, the application of models is
becoming standard practice. However, model-based support for security
analysis is not only needed in pre-operational phases but also during
process execution, in order to provide situational security awareness
at runtime.
This cumulative thesis provides three major contributions to modelling
methodology.
Firstly, this thesis provides an approach for model-based analysis and
verification of security and safety properties in order to support
fault prevention and fault removal in system design or redesign.
Furthermore, some construction principles for the design of
well-behaved scalable systems are given.
The second topic is the analysis of the exposition of vulnerabilities
in the software components of networked systems to exploitation by
internal or external threats. This kind of fault forecasting allows
the security assessment of alternative system configurations and
security policies. Validation and deployment of security policies
that minimise the attack surface can now improve fault tolerance and
mitigate the impact of successful attacks.
Thirdly, the approach is extended to runtime applicability. An
observing system monitors an event stream from the observed system
with the aim to detect faults - deviations from the specified
behaviour or security compliance violations - at runtime.
Furthermore, knowledge about the expected behaviour given by an
operational model is used to predict faults in the near
future. Building on this, a holistic security management strategy is
proposed. The architecture of the observing system is described and
the applicability of model-based security analysis at runtime is
demonstrated utilising processes from several industrial scenarios.
The results of this cumulative thesis are provided by 19 selected
peer-reviewed papers
- …