1,771 research outputs found

    APFIC Regional Workshop on "Mainstreaming Fisheries Co-management"

    Get PDF
    This is the report of the APFIC regional workshop on "Mainstreaming fisheries co-management" held in Siem Reap, Cambodia from August 9-12, 2005 . The goal of the workshop was to provide a forum to learn from past experience and to promote devolved management of fisheries. Participants at the workshop had the opportunity to be exposed to a range of coastal and inland fisheries co-management interventions and the elaboration of approaches needed to make fisheries co-management a "mainstream" activity in developing countries. The objective of the workshop was to develop summary conclusions on the status of co-management in the region and provide some concrete recommendations for action towards mainstreaming fishery co-management in the Asia-Pacific region. The report contains the action plan and recommendations of the workshop. Many agencies (both governmental and non-governmental) are striving to improve the livelihoods of poor people that are dependent on aquatic resources by including these stakeholders in the planning and implementation of fisheries management. Many states have adopted decentralization as the way to implement future fisheries management, especially in developing countries, which often involves a partnership between government and the local communities, i.e. a co-management approach. The challenge is to find a way for co-management to become a mainstream practice of both government and non-government organizations and communities

    Lower Mekong Portfolio: Interim Evaluation

    Get PDF
    This report summarizes a portfolio evaluation of the MacArthur Foundation's conservation investments in the Lower Mekong region since 2011. It is explicitly a portfolio-level evaluation, focusing on common themes rather than individual grants. The evaluation involved understanding the portfolio context through reviewing relevant documents and speaking with donor partners; gathering data from MacArthur grantees; calibrating initial evaluation findings through consultations with independent regional experts and donor partner grantees; improving future evaluation ability by cooperating with NatureServe to improve the Lower Mekong Dashboard; and presenting results in this evaluation report and to MacArthur directly

    Robust Management, Risk and the Ecosystem Approach to Fisheries

    Get PDF
    Biodiversity has not been a prominent consideration in conventional fishery management, even though biological concerns and the concept of "sustainability" are long-established in fisheries. This is because traditionally, the focus of management has been on determining the harvest of fish that can be taken as a "sustainable yield" and then restricting the catch of fish to within this limit. Typically missing from the analysis have been (1) interactions of fishing with the broader marine ecosystem, and (2) interactions of the fishery with the broader coastal economy and coastal communities. Accordingly, there is a need to move toward a "big picture" perspective, a "Fishery System Approach", in which fisheries are understood and managed in the context of marine ecosystems and coastal human systems, thereby addressing the needs of both biodiversity conservation and integrated management of multiple ocean uses. This paper elaborates on these themes, exploring the duality of the Ecosystem Approach and the Livelihood Approach as means to move toward sustainable, resilient fishery systems, ones in which biodiversity values can be more fully included

    Advancing security information and event management frameworks in managed enterprises using geolocation

    Get PDF
    Includes bibliographical referencesSecurity Information and Event Management (SIEM) technology supports security threat detection and response through real-time and historical analysis of security events from a range of data sources. Through the retrieval of mass feedback from many components and security systems within a computing environment, SIEMs are able to correlate and analyse events with a view to incident detection. The hypothesis of this study is that existing Security Information and Event Management techniques and solutions can be complemented by location-based information provided by feeder systems. In addition, and associated with the introduction of location information, it is hypothesised that privacy-enforcing procedures on geolocation data in SIEMs and meta- systems alike are necessary and enforceable. The method for the study was to augment a SIEM, established for the collection of events in an enterprise service management environment, with geo-location data. Through introducing the location dimension, it was possible to expand the correlation rules of the SIEM with location attributes and to see how this improved security confidence. An important co-consideration is the effect on privacy, where location information of an individual or system is propagated to a SIEM. With a theoretical consideration of the current privacy directives and regulations (specifically as promulgated in the European Union), privacy supporting techniques are introduced to diminish the accuracy of the location information - while still enabling enhanced security analysis. In the context of a European Union FP7 project relating to next generation SIEMs, the results of this work have been implemented based on systems, data, techniques and resilient features of the MASSIF project. In particular, AlienVault has been used as a platform for augmentation of a SIEM and an event set of several million events, collected over a three month period, have formed the basis for the implementation and experimentation. A "brute-force attack" misuse case scenario was selected to highlight the benefits of geolocation information as an enhancement to SIEM detection (and false-positive prevention). With respect to privacy, a privacy model is introduced for SIEM frameworks. This model utilises existing privacy legislation, that is most stringent in terms of privacy, as a basis. An analysis of the implementation and testing is conducted, focusing equally on data security and privacy, that is, assessing location-based information in enhancing SIEM capability in advanced security detection, and, determining if privacy-enforcing procedures on geolocation in SIEMs and other meta-systems are achievable and enforceable. Opportunities for geolocation enhancing various security techniques are considered, specifically for solving misuse cases identified as existing problems in enterprise environments. In summary, the research shows that additional security confidence and insight can be achieved through the augmentation of SIEM event information with geo-location information. Through the use of spatial cloaking it is also possible to incorporate location information without com- promising individual privacy. Overall the research reveals that there are significant benefits for SIEMs to make use of geo-location in their analysis calculations, and that this can be effectively conducted in ways which are acceptable to privacy considerations when considered against prevailing privacy legislation and guidelines

    Security Analysis of System Behaviour - From "Security by Design" to "Security at Runtime" -

    Get PDF
    The Internet today provides the environment for novel applications and processes which may evolve way beyond pre-planned scope and purpose. Security analysis is growing in complexity with the increase in functionality, connectivity, and dynamics of current electronic business processes. Technical processes within critical infrastructures also have to cope with these developments. To tackle the complexity of the security analysis, the application of models is becoming standard practice. However, model-based support for security analysis is not only needed in pre-operational phases but also during process execution, in order to provide situational security awareness at runtime. This cumulative thesis provides three major contributions to modelling methodology. Firstly, this thesis provides an approach for model-based analysis and verification of security and safety properties in order to support fault prevention and fault removal in system design or redesign. Furthermore, some construction principles for the design of well-behaved scalable systems are given. The second topic is the analysis of the exposition of vulnerabilities in the software components of networked systems to exploitation by internal or external threats. This kind of fault forecasting allows the security assessment of alternative system configurations and security policies. Validation and deployment of security policies that minimise the attack surface can now improve fault tolerance and mitigate the impact of successful attacks. Thirdly, the approach is extended to runtime applicability. An observing system monitors an event stream from the observed system with the aim to detect faults - deviations from the specified behaviour or security compliance violations - at runtime. Furthermore, knowledge about the expected behaviour given by an operational model is used to predict faults in the near future. Building on this, a holistic security management strategy is proposed. The architecture of the observing system is described and the applicability of model-based security analysis at runtime is demonstrated utilising processes from several industrial scenarios. The results of this cumulative thesis are provided by 19 selected peer-reviewed papers
    • …
    corecore