443 research outputs found
Towards durable multistakeholder-generated solutions: The pilot application of a problem-oriented policy learning protocol to legality verification and community rights in Peru
This paper reports and reflects on the pilot application of an 11-step policy learning protocol that was developed by Cashore and Lupberger (2015) based on several years of Cashore’s multi-author collaborations. The protocol was applied for the first time in Peru in 2015 and 2016 by the IUFRO Working Party on Forest Policy Learning Architectures (hereinafter referred to as the project team). The protocol integrates insights from policy learning scholarship (Hall 1993, Sabatier 1999) with Bernstein and Cashore’s (2000, 2012) four pathways of influence framework. The pilot implementation in Peru focused on how global timber legality verification interventions might be harnessed to promote local land rights. Legality verification focuses attention on the checking and auditing of forest management units in order to verify that timber is harvested and traded in compliance with the law. We specifically asked: How can community legal ownership of, and access to, forestland and forest resources be enhanced? The protocol was designed as a dynamic tool, the implementation of which fosters iterative rather than linear processes. It directly integrated two objectives: 1) identifying the causal processes through which global governance initiatives might be harnessed to produce durable results ‘on the ground’; 2) generating insights and strategies in collaboration with relevant stakeholders. This paper reviews and critically evaluates our work in designing and piloting the protocol. We assess what seemed to work well and suggest modifications, including an original diagnostic framework for nurturing durable change. We also assess the implications of the pilot application of the protocol for policy implementation that works to enhance the influence of existing international policy instruments, rather than contributing to fragmentation and incoherence by creating new ones
Metaphor and Materiality in Early Prehistory
In this paper we argue for a relational perspective based on metaphorical rather than semiotic understandings of human and hominin1 material culture. The corporeality of material culture and thus its role as solid metaphors for a shared experience of embodiment precedes language in the archaeological record. While arguments continue as to both the cognitive abilities that underpin symbolism and the necessary and sufficient evidence for the identification of symbolic material culture in the archaeological record, a symbolic approach will inevitably restrict the available data to sapiens or even to literate societies. However, a focus on material culture as material metaphor allows the consideration of the ways in which even the very earliest archaeological record reflects hominins’ embodied, distributed relationships with heterogeneous forms of agent, as will be demonstrated by two case studies
Football 4 Peace versus (v) Homophobia: A critical exploration of the links between theory, practice and intervention
In this chapter, we draw on our different past trajectories to explore the links between theories of sexualities and genders, and anti-homophobic, anti-transphobic and anti-biphobic intervention within UK University footballing contexts. Our critical reflections include over a decade of involvement with scholarship and campaigning surrounding gender and sexuality in football (Caudwell) and significant project development of the Football 4 Peace International reconciliation initiative (Spacey). We seek to plot the ways scholarship, especially theories of gender and sexualities, informs grassroots praxis. More specifically, we focus on the idea of making a difference when it comes to social divisions and inequalities vis-Ã -vis sexual orientation and gender identity (SOGI). During our discussions we draw from a range of research materials, including the voices of young people and students to demonstrate the ways participation in football can help, as well as hinder, anti-discriminatory policy and practice at the level of the locale
Accelerating Scientific Publication in Biology
Scientific publications enable results and ideas to be transmitted throughout
the scientific community. The number and type of journal publications also have
become the primary criteria used in evaluating career advancement. Our analysis
suggests that publication practices have changed considerably in the life
sciences over the past thirty years. More experimental data is now required for
publication, and the average time required for graduate students to publish
their first paper has increased and is approaching the desirable duration of
Ph.D. training. Since publication is generally a requirement for career
progression, schemes to reduce the time of graduate student and postdoctoral
training may be difficult to implement without also considering new mechanisms
for accelerating communication of their work. The increasing time to
publication also delays potential catalytic effects that ensue when many
scientists have access to new information. The time has come for life
scientists, funding agencies, and publishers to discuss how to communicate new
findings in a way that best serves the interests of the public and the
scientific community.Comment: 39 pages, 6 figures, 1 table, and a Q&A related to pre-print
A Formal Security Analysis of the Signal Messaging Protocol
The Signal protocol is a cryptographic messaging protocol that provides end-to-end encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among many others, serving well over 1 billion active users. Signal includes several uncommon security properties (such as future secrecy or post-compromise security ), enabled by a novel technique called *ratcheting* in which session keys are updated with every message sent.
We conduct a formal security analysis of Signal\u27s initial extended triple Diffie-Hellman (X3DH) key agreement and Double Ratchet protocols as a multi-stage authenticated key exchange protocol. We extract from the implementation a formal description of the abstract protocol, and define a security model which can capture the ratcheting key update structure as a multi-stage model where there can be a tree of stages, rather than just a sequence. We then prove the security of Signal\u27s key exchange core in our model, demonstrating several standard security properties. We have found no major flaws in the design, and hope that our presentation and results can serve as a foundation for other analyses of this widely adopted protocol
- …