4,723 research outputs found

    The Global Risks Report 2016, 11th Edition

    Get PDF
    Now in its 11th edition, The Global Risks Report 2016 draws attention to ways that global risks could evolve and interact in the next decade. The year 2016 marks a forceful departure from past findings, as the risks about which the Report has been warning over the past decade are starting to manifest themselves in new, sometimes unexpected ways and harm people, institutions and economies. Warming climate is likely to raise this year's temperature to 1° Celsius above the pre-industrial era, 60 million people, equivalent to the world's 24th largest country and largest number in recent history, are forcibly displaced, and crimes in cyberspace cost the global economy an estimated US$445 billion, higher than many economies' national incomes. In this context, the Reportcalls for action to build resilience – the "resilience imperative" – and identifies practical examples of how it could be done.The Report also steps back and explores how emerging global risks and major trends, such as climate change, the rise of cyber dependence and income and wealth disparity are impacting already-strained societies by highlighting three clusters of risks as Risks in Focus. As resilience building is helped by the ability to analyse global risks from the perspective of specific stakeholders, the Report also analyses the significance of global risks to the business community at a regional and country-level

    Community experiences of organised crime in Scotland

    Get PDF
    The research explored community experiences of serious organised crime in Scotland (SOC). The report provides information on the nature and extent of the impact of SOC on everyday life in the community, as well as offering suggestions for policy development. The study sought to answer the following questions: 1)What are the relationships that exist between SOC and communities in Scotland? 2)What are the experiences and perceptions of residents, stakeholders and organisations of the scope and nature of SOC within their local area? and 3)How does SOC impact on community wellbeing, and to what extent can the harms associated with SOC be mitigated

    Global Risks 2014, Ninth Edition.

    Get PDF
    The Global Risks 2014 report highlights how global risks are not only interconnected but also have systemic impacts. To manage global risks effectively and build resilience to their impacts, better efforts are needed to understand, measure and foresee the evolution of interdependencies between risks, supplementing traditional risk-management tools with new concepts designed for uncertain environments. If global risks are not effectively addressed, their social, economic and political fallouts could be far-reaching, as exemplified by the continuing impacts of the financial crisis of 2007-2008

    On the Use of Migration to Stop Illicit Channels

    Get PDF
    Side and covert channels (referred to collectively as illicit channels) are an insidious affliction of high security systems brought about by the unwanted and unregulated sharing of state amongst processes. Illicit channels can be effectively broken through isolation, which limits the degree by which processes can interact. The drawback of using isolation as a general mitigation against illicit channels is that it can be very wasteful when employed naively. In particular, permanently isolating every tenant of a public cloud service to its own separate machine would completely undermine the economics of cloud computing, as it would remove the advantages of consolidation. On closer inspection, it transpires that only a subset of a tenant's activities are sufficiently security sensitive to merit strong isolation. Moreover, it is not generally necessary to maintain isolation indefinitely, nor is it given that isolation must always be procured at the machine level. This work builds on these observations by exploring a fine-grained and hierarchical model of isolation, where fractions of a machine can be isolated dynamically using migration. Using different units of isolation allows a system to isolate processes from each other with a minimum of over-allocated resources, and having a dynamic and reconfigurable model enables isolation to be procured on-demand. The model is then realised as an implemented framework that allows the fine-grained provisioning of units of computation, managing migrations at the core, virtual CPU, process group, process/container and virtual machine level. Use of this framework is demonstrated in detecting and mitigating a machine-wide covert channel, and in implementing a multi-level moving target defence. Finally, this work describes the extension of post-copy live migration mechanisms to allow temporary virtual machine migration. This adds the ability to isolate a virtual machine on a short term basis, which subsequently allows migrations to happen at a higher frequency and with fewer redundant memory transfers, and also creates the opportunity of time-sharing a particular physical machine's features amongst a set of tenants' virtual machines

    Whistleblowing as a countermeasure strategy against food crime

    Get PDF
    Purpose The purpose of this paper is to undertake a two-phase desktop review of literature sources in order to conceptualise, frame, and critique existing whistleblowing models and strategies and consider how whistleblowing strategies form part of an effective food crime management system (FCMS) especially for small and medium sized organisations. Design/methodology/approach Existing literature from academic sources, financial, healthcare, food industries has been reviewed and critiqued in order to construct a conceptual framework that can inform future empirical research. Findings Whistleblowing strategies can form an effective part of a FCMS. Appropriate regulatory protection of those who whistleblow is crucial to not only safeguard individuals but also to mitigate food crime and protect consumers from loss and potential harm. Barriers to whistleblowing exist and if these are not addressed then individuals will be reluctant to report food crime. Further empirical research is required to assess the influence of these and other factors identified in this research and how they can be overcome. Originality/value The framework will provide food industry practitioners with guidance on the effective application of whistleblowing strategies within a FCMS

    Securing Safe Supply During COVID-19 and Beyond: Scoping Review and Knowledge Mobilization

    Get PDF
    Background Safe supply is defined as the legal and regulated provision of drugs with mind and/or body altering properties that have been typically accessible only through the illegal drug market. In response to the coronavirus disease 2019 (COVID-19) pandemic and related social/physical distancing measures, efforts have been made to scale up and increase access to safe supply programs in an effort to reduce overdose and other drug- and drug policy-related risks. However, it remains unclear whether these efforts taken thus far have meaningfully mitigated the barriers to safe supply experienced by People Who Use Drugs (PWUD), both during and beyond the context of COVID-19. We thus undertook a scoping review to identify key concepts, strategies and gaps in evidence with respect to the provision of safe supply during pandemics and other emergencies. Methods We conducted three searches across Scopus, Medline, Embase, CINAHL, and The Cochrane Central Register of Controlled Trials (CENTRAL) for peer-reviewed and grey literature articles to understand barriers/facilitators to both accessing and prescribing legal, pharmaceutical-grade drugs, including opioids, benzodiazepines, and/or stimulants during public health emergencies from January 1 2002 to June 30 2020. We also included opioid agonist therapies (OAT) during emergency conditions. All potential sources underwent title/abstract screening and duplicate full- text review to determine eligibility for inclusion. Three reviewers extracted characteristics and barriers/facilitators to accessing or prescribing drugs for each study, and these were then inductively analyzed to identify common themes. Key stakeholders (PWUD, prescribers, and policymakers/regulators) informed the search strategy and validated findings and interpretations. Input from PWUD and prescribers was gathered through Advisory Committee meetings and one-on-one consultations, respectively. Results We screened 9,839 references and included 169 studies (135 peer-reviewed articles and 36 grey literature reports). From 119 articles, we identified 35 themes related to barriers/facilitators to prescribing safe supply or OAT. Few studies (n=24) focused on emergency or pandemic contexts. Among the most frequently reported barriers were restrictive laws or policies (n= 33; 28%). The most frequently cited facilitator was temporary legal or regulatory exemptions (n= 16; 13%). Further stakeholder consultation identified barriers/facilitators to safe supply absent in the reviewed literature: PWUD reported barriers including lack of access to desired substances, concerns about child apprehension, and a lack of cultural competency within safe supply/OAT programs; prescribers reported barriers including regional differences in service delivery, colleague support, and a lack of, or disagreement between, clinical guidance documents. Conclusion We identified multiple barriers and facilitators to accessing and/or prescribing safe supply or OAT. With few peer-reviewed studies on safe supply models, particularly in the context of emergencies, input from PWUD and other stakeholders offered crucial insights not reflected in the existing literature. To address the overdose epidemic stemming from the criminalization of an unregulated drug supply, prescribers, regulators, and public health authorities should focus on scaling up, and then evaluating, diverse safe supply frameworks that address the facilitators and barriers we have identified

    NetSentry: A deep learning approach to detecting incipient large-scale network attacks

    Get PDF
    Machine Learning (ML) techniques are increasingly adopted to tackle ever-evolving high-profile network attacks, including DDoS, botnet, and ransomware, due to their unique ability to extract complex patterns hidden in data streams. These approaches are however routinely validated with data collected in the same environment, and their performance degrades when deployed in different network topologies and/or applied on previously unseen traffic, as we uncover. This suggests malicious/benign behaviors are largely learned superficially and ML-based Network Intrusion Detection System (NIDS) need revisiting, to be effective in practice. In this paper we dive into the mechanics of large-scale network attacks, with a view to understanding how to use ML for Network Intrusion Detection (NID) in a principled way. We reveal that, although cyberattacks vary significantly in terms of payloads, vectors and targets, their early stages, which are critical to successful attack outcomes, share many similarities and exhibit important temporal correlations. Therefore, we treat NID as a time-sensitive task and propose NetSentry, perhaps the first of its kind NIDS that builds on Bidirectional Asymmetric LSTM (Bi-ALSTM), an original ensemble of sequential neural models, to detect network threats before they spread. We cross-evaluate NetSentry using two practical datasets, training on one and testing on the other, and demonstrate F1 score gains above 33% over the state-of-the-art, as well as up to 3 times higher rates of detecting attacks such as XSS and web bruteforce. Further, we put forward a novel data augmentation technique that boosts the generalization abilities of a broad range of supervised deep learning algorithms, leading to average F1 score gains above 35%

    Lifting the Burden of Addiction: Philanthropic Opportunities to Address Substance Use Disorders in the United States

    Get PDF
    Substance use disorders (SUDs), also known as substance abuse or addiction, affect an estimated 20 million or more adolescents and adults in the U.S. This guidance provides philanthropic funders with the tools & information to reduce immediate harm from substance use disorders and reduce the burden of the disorder over the long term. This includes reducing the damage the disorder causes to people with SUDs and their loved ones, reducing the overall incidence of SUDs, and reducing SUD-related costs to society. We present four strategies for philanthropic funders who want to help:- Save lives and reduce SUD-related illness and homelessness- Improve access to evidence-based treatment- Improve SUD care by changing systems and policies- Fund innovation to improve prevention and treatmen

    Exploring Cultural Expression's Effectiveness in Nigerian Tourist Destinations for Enhanced User Experience

    Get PDF
    Nigeria's cultural assets have made it a prominent tourism landmark in Africa. Cultural tourism has become a thriving sector, with creative industries leveraging cultural expressions to promote tourist destinations. However, many destinations face challenges in effectively packaging culture into tangible products and integrating it into architecture to enhance tourist satisfaction. This research explores the effectiveness of cultural expression in enriching user experiences and identifies various approaches to expressing and commodifying culture to attract tourists. The study employs both qualitative and quantitative research methodologies, using case studies and questionnaires to gather and analyze information. The findings demonstrate that cultural expression significantly contributes to user satisfaction and the preservation of cultural assets in tourist centers. Prioritizing the cultural needs of tourists is crucial for tourist destinations to attract visitors and provide exceptional experiences, fostering consistent growth and development. Recommendations for the tourism industry include understanding and meeting the cultural preferences of tourists, creating an environment that appeals to visitors and ensures their continued engagement, ultimately contributing to the sustainable progress and prosperity of tourist destinations. Keywords: Cultural Assets, Cultural Expression, Exploration, Nigerian Tourists’ Destinations, User experience DOI: 10.7176/JCSD/71-04 Publication date:July 31st 202
    • …
    corecore