2,775 research outputs found

    Climate change and fuel poverty

    Get PDF
    The research examined the possible effects of rapid climate change on fuel poverty (needing to spend more than 10% of income to maintain a satisfactory level of warmth and other energy services in the home). One particular concern was the prospect that there might be a shutting off of the Gulf Stream, which warms Britain and the rest of north-western Europe. Computer simulations of the climate indicate that shutting down the Gulf Stream would cool England by about 3°C. Climate is not the only variable that will affect future levels of fuel poverty. The other main ones are what will happen to the energy efficiency of the building stock, to incomes and to energy prices. The aim of the project was to examine what might happen to each of these four dimensions and construct three scenarios in each dimension (most likely, high and low) to capture the range of variation in possible outcomes. A total of 81 (3x3x3x3) scenarios were modelled and analysed. Since any changes in the climate system take decadesto play out, but it is extremely difficult to predict social, economic and technological changes even 25 years in the future, it was decided to set an objective for this research of looking forward to 2030.

    Climate change and fuel poverty

    Get PDF

    Green taxes and charges: reducing their impact on low-income households

    Get PDF
    Environmental or 'green' taxes and charges send signals to consumers by making consumption of environmental resources more expensive. However, there are concerns that their effect could be 'regressive', by hitting lower income households disproportionately. This research, by Paul Ekins and Simon Dresner of the Policy Studies Institute, investigated the possible impact on low-income households in four areas of environmental and social importance: domestic use of energy, water and transport, and domestic generation of waste. It also considered whether any negative impacts could be reduced if the tax or charge were designed appropriately, or if a compensation scheme were introduced

    IASME: Information Security Management Evolution for SMEs

    Get PDF
    Most of the research in information risk and risk management has focused on the needs of larger organisations. In the area of standards accreditation, the ISO/IEC 27001 Information Risk Management standard has continued to grow in acceptance and popularity with such organisations, although not to a significant extent with SMEs. An interesting product recently developed for ENISA (European Nations Information Security Association) based on the Carnegie-Mellon maturity model and aimed at SMEs has not so far filled the gap. In this paper, a researcher and two practitioners from the UK discuss an innovative development in the UK for addressing the information assurance needs of smaller organisations. They also share their perceptions about the security of national information infrastructures, and concerns that SMEs do not get the priority that their position in the supply chain would suggest they should have. The authors also explore the development and roll out of IASME (Information Assurance for SMEs), which they have developed in the context of a tight market, where spare cash is in short supply, and many SMEs are still in survival mode. The question for the business is therefore not seen as “can we afford to spend on information security” but “can we afford not to spend…” As well as the effect on being able to do business at all of having an SMEs systems compromised, there are also matters of reputation, and the growing threat of fines as a result of not complying with laws and regulations. The paper concludes with achievements of real businesses using the IASME process to cost-effectively achieve information assurance levels appropriate for themselves

    Cheaper, greener and more efficient : rationalising UK carbon prices

    Get PDF
    Current UK energy use policies, which primarily aim to reduce carbon emissions, provide abatement incentives that vary by user and fuel, creating inefficiency. Distributional concerns are often given as a justification for the lower carbon price faced by households, but there is little rationale for carbon prices associated with the use of gas to be lower than those for electricity. We consider reforms that raise carbon prices faced by households and reduce the variation in carbon prices across gas and electricity use, improving the efficiency of emissions reduction. We show that the revenue raised from these reforms can be recycled in a way that ameliorates some of the distributional concerns. Whilst such recycling is not able to protect all poorer households, existing policy also makes distributional trade-offs, but does so in an opaque and inefficient way

    Balancing Risk Appetite and Risk Attitude in Requirements: a Framework for User Liberation

    Get PDF
    The tendency to throw controls at perceived and real system vulnerabilities, coupled with the likelihood of these controls being technical in nature, has the propensity to favour security over usability. However there is little evidence of increased assurance and it could encourage work stoppages or deviations that keep honest users from engaging with the system. The conflicting balance of trust and controls, and the challenge of turning that balance into clear requirements, creates an environment that alienates users and feeds the paranoia of actors who assume more ownership of the system than necessary. Security therefore becomes an inhibitor rather than an enabler for the community. This paper looks at measuring the balance of an organisation’s or a community’s risk appetite with the risk attitudes of its members in the early stages of IS development. It suggests how the dials of assurance can be influenced by the levers of good systems practice to create a cultural shift to trusting the users

    On the Complexity of an Unregulated Traffic Crossing

    Full text link
    The steady development of motor vehicle technology will enable cars of the near future to assume an ever increasing role in the decision making and control of the vehicle itself. In the foreseeable future, cars will have the ability to communicate with one another in order to better coordinate their motion. This motivates a number of interesting algorithmic problems. One of the most challenging aspects of traffic coordination involves traffic intersections. In this paper we consider two formulations of a simple and fundamental geometric optimization problem involving coordinating the motion of vehicles through an intersection. We are given a set of nn vehicles in the plane, each modeled as a unit length line segment that moves monotonically, either horizontally or vertically, subject to a maximum speed limit. Each vehicle is described by a start and goal position and a start time and deadline. The question is whether, subject to the speed limit, there exists a collision-free motion plan so that each vehicle travels from its start position to its goal position prior to its deadline. We present three results. We begin by showing that this problem is NP-complete with a reduction from 3-SAT. Second, we consider a constrained version in which cars traveling horizontally can alter their speeds while cars traveling vertically cannot. We present a simple algorithm that solves this problem in O(nlogn)O(n \log n) time. Finally, we provide a solution to the discrete version of the problem and prove its asymptotic optimality in terms of the maximum delay of a vehicle

    Requirements and Risk: Singing From the Same Hymn-sheet.

    Get PDF
    Failing to elicit requirements is as much of a risk in the traditional, negative sense as successfully defining requirements is a positive step towards successful systems development. The discipline of risk management has long since had to deal with the spectre of emergent risk and its inherent lack of predictability. Just as risk management considers how any number of vulnerabilities in a system may be exploited by accident or by malicious intent that preys upon exposure to otherwise independent factors, so successful requirements elicitation is beholden to the ability to recognise the need for, and define, derived requirements. In this paper we suggest that risk assessment and requirements elicitation are two manifestations of the same activity: creating trustworthy software. We propose the research and development of a methodology where the two disciplines converge
    corecore