113,900 research outputs found

    Making space for proactive adaptation of rapidly changing coasts: a windows of opportunity approach

    Get PDF
    Coastlines are very often places where the impacts of global change are felt most keenly, and they are also often sites of high values and intense use for industry, human habitation, nature conservation and recreation. In many countries, coastlines are a key contested territory for planning for climate change, and also locations where development and conservation conflicts play out. As a “test bed” for climate change adaptation, coastal regions provide valuable, but highly diverse experiences and lessons. This paper sets out to explore the lessons of coastal planning and development for the implementation of proactive adaptation, and the possibility to move from adaptation visions to actual adaptation governance and planning. Using qualitative analysis of interviews and workshops, we first examine what the barriers are to proactive adaptation at the coast, and how current policy and practice frames are leading to avoidable lock-ins and other maladaptive decisions that are narrowing our adaptation options. Using examples from UK, we then identify adaptation windows that can be opened, reframed or transformed to set the course for proactive adaptation which links high level top-down legislative requirements with local bottom-up actions. We explore how these windows can be harnessed so that space for proactive adaptation increases and maladaptive decisions are reduced

    Leaving Nothing to Chance: Modeling the Proactive Structuration of a New Technology

    Get PDF
    Adaptive structuration theory (AST, DeSanctis and Poole 1994) describes how people come to understand and use a technology. In this paper we develop the idea of proactive structuration--how social networking can be proactively managed in order to speed the comprehensive adaptation of a technology within a community of users. We examine two facets of proactive structuration--formal institutionalization of a community of practice and socialization of users--and stochastically model the impact of proactive structuration on comprehensive adaptation latency. Implications for the effective management of new technology adoption are discussed.

    Towards critical event monitoring, detection and prediction for self-adaptive future Internet applications

    No full text
    The Future Internet (FI) will be composed of a multitude of diverse types of services that offer flexible, remote access to software features, content, computing resources, and middleware solutions through different cloud delivery models, such as IaaS, PaaS and SaaS. Ultimately, this means that loosely coupled Internet services will form a comprehensive base for developing value added applications in an agile way. Unlike traditional application development, which uses computing resources and software components under local administrative control, FI applications will thus strongly depend on third-party services. To maintain their quality of service, those applications therefore need to dynamically and autonomously adapt to an unprecedented level of changes that may occur during runtime. In this paper, we present our recent experiences on monitoring, detection, and prediction of critical events for both software services and multimedia applications. Based on these findings we introduce potential directions for future research on self-adaptive FI applications, bringing together those research directions

    National security: A propositional study to develop resilience indicators as an aid to personnel vetting

    Get PDF
    Within the National Security domain there is a convergence of security responsibility across the national security agencies, law enforcement and private security sectors. The sensitivity of this environment requires individuals operating in the domain to be honest, trustworthy and loyal. Personnel vetting is a formal process used to determine an individual’s suitability for access to this domain. Notwithstanding this process, significant breaches of trust, security, and corruption still occur. In psychology, resilience is a well researched phenomenon that is considered a multidimensional construct where individual attributes, family aspects and social environment interact in aiding individuals to deal with vulnerability. There are many understandings and definitions of resilience based on theorists’ different perspectives; however, most agree that resilience is represented by a minimum of two aspects. The first is adversity and second, how the individual deals with adversity that demonstrates situational adaptation in a positive manner. The study is a work in progress and proposes the use of a recently developed Lifespan Resilience Scale. This scale will use resilience markers as an aid to National Security by providing vetting agencies with an additional tool for proactive intervention. The Lifespan Resilience Scale is currently undergoing reliability and validity testing within a student population. Once validated within this population, the scale will be adjusted and tested within the vetting environment using cross validated cohorts and expert opinion. Such a tool will assist National Security through better personnel risk management

    Vulnerabilities and responsibilities: dealing with monsters in computer security

    Get PDF
    Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.\ud \ud Design/methodology/approach – Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.\ud \ud Findings – It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.\ud \ud Research limitations/implications – The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.\ud \ud Practical implications – The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.\ud \ud Originality/value – This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk

    What drives farmers to make top-down or bottom-up adaptation to climate change and fluctuations?:A comparative study on 3 cases of apple farming in Japan and South Africa

    Get PDF
    Agriculture is one of the most vulnerable sectors to climate change. Farmers have been exposed to multiple stressors including climate change, and they have managed to adapt to those risks. The adaptation actions undertaken by farmers and their decision making are, however, only poorly understood. By studying adaptation practices undertaken by apple farmers in three regions: Nagano and Kazuno in Japan and Elgin in South Africa, we categorize the adaptation actions into two types: farmer initiated bottom-up adaptation and institution led top-down adaptation. We found that the driver which differentiates the type of adaptation likely adopted was strongly related to the farmers' characteristics, particularly their dependence on the institutions, e.g. the farmers' cooperative, in selling their products. The farmers who rely on the farmers' cooperative for their sales are likely to adopt the institution-led adaptation, whereas the farmers who have established their own sales channels tend to start innovative actions by bottom-up. We further argue that even though the two types have contrasting features, the combinations of the both types of adaptations could lead to more successful adaptation particularly in agriculture. This study also emphasizes that more farm-level studies for various crops and regions are warranted to provide substantial feedbacks to adaptation policy

    Resilience and adaptation of small and medium-sized enterprises to flood risk

    Get PDF
    Purpose – The UK has experienced a number of flood events in recent years, and the intensity and frequency of such events are forecast to further increase in future due to changing climatic conditions. Accordingly, enhancing the resilience of small and medium-sized enterprises (SMEs) – which form an important segment in a society – to flood risk, has emerged as an important issue. However, SMEs often tend to underestimate the risk of flooding which tends to have a low priority in their business agenda. The purpose of this paper is to undertake an investigation of adaptation to the risk of flooding considering community-level measures, individual-level property protection, and business continuity and resilience measures. Design/methodology/approach – A total of four short case studies were conducted among SMEs to identify their response to flood risk, and what measures have been undertaken to manage the risk of flooding. Findings – It was observed that SMEs have implemented different property-level protection measures and generic business continuity/risk management measures, based on their requirements, to achieve a desired level of protection. Practical implications – SMEs are likely to positively respond to property-level adaptation following a post-flood situation. It is important that information such as costs/benefits of such measures and different options available are made accessible to SMEs affected by a flood event. Social implications – Implementation of property-level adaptation measures will contribute towards the long term adaptation of the existing building stock to changing climatic conditions. Originality/value – The paper contributes towards policy making on flood risk adaptation and SME decision making, and informs policy makers and practitioners

    Is agile project management applicable to construction?

    Get PDF
    This paper briefly summarises the evolution of Agile Project Management (APM) and differentiates it from lean and agile production and ‘leagile’ construction. The significant benefits being realized through employment of APM within the information systems industry are stated. The characteristics of APM are explored, including: philosophy, organizational attitudes and practices, planning, execution and control and learning. Finally, APM is subjectively assessed as to its potential contribution to the pre-design, design and construction phases. In conclusion, it is assessed that APM offers considerable potential for application in predesign and design but that there are significant hurdles to its adoption in the actual construction phase. Should these be overcome, APM offers benefits well beyond any individual project

    UK emergency preparedness: a holistic local response?

    Get PDF
    Purpose – This paper aims to argue that to address the consequences of climate change and variability a greater focus on pre-emergency planning that engages a wider stakeholder group must be adopted. Design/methodology/approach – The paper discusses UK emergency management and approaches to climate change and climate variability risk. Findings – The internal focus of UK emergency management inhibits the contribution that it can make to societal resilience and public preparedness. Effective risk reduction requires that all actors, including the public, are engaged in the social learning process. From a UK emergency management perspective this requires a culture shift to an outward proactive focus. Originality/value – This paper offers insights into emergency preparedness in the UK
    • 

    corecore