2,775 research outputs found
Climate change and fuel poverty
The research examined the possible effects of rapid climate change on fuel poverty (needing to spend more than 10% of income to maintain a satisfactory level of warmth and other energy services in the home). One particular concern was the prospect that there might be a shutting off of the Gulf Stream, which warms Britain and the rest of north-western Europe. Computer simulations of the climate indicate that shutting down the Gulf Stream would cool England by about 3°C. Climate is not the only variable that will affect future levels of fuel poverty. The other main ones are what will happen to the energy efficiency of the building stock, to incomes and to energy prices. The aim of the project was to examine what might happen to each of these four dimensions and construct three scenarios in each dimension (most likely, high and low) to capture the range of variation in possible outcomes. A total of 81 (3x3x3x3) scenarios were modelled and analysed. Since any changes in the climate system take decadesto play out, but it is extremely difficult to predict social, economic and technological changes even 25 years in the future, it was decided to set an objective for this research of looking forward to 2030.
An empirical analysis of Canadian international air policy: Effects of dual carrier designation and partial liberalization.
Green taxes and charges: reducing their impact on low-income households
Environmental or 'green' taxes and charges send signals to consumers by making consumption of environmental resources more expensive. However, there are concerns that their effect could be 'regressive', by hitting lower income households disproportionately. This research, by Paul Ekins and Simon Dresner of the Policy Studies Institute, investigated the possible impact on low-income households in four areas of environmental and social importance: domestic use of energy, water and transport, and domestic generation of waste. It also considered whether any negative impacts could be reduced if the tax or charge were designed appropriately, or if a compensation scheme were introduced
IASME: Information Security Management Evolution for SMEs
Most of the research in information risk and risk management has focused on the
needs of larger organisations. In the area of standards accreditation, the ISO/IEC
27001 Information Risk Management standard has continued to grow in acceptance
and popularity with such organisations, although not to a significant extent with
SMEs. An interesting product recently developed for ENISA (European Nations
Information Security Association) based on the Carnegie-Mellon maturity model and
aimed at SMEs has not so far filled the gap.
In this paper, a researcher and two practitioners from the UK discuss an innovative
development in the UK for addressing the information assurance needs of smaller
organisations. They also share their perceptions about the security of national
information infrastructures, and concerns that SMEs do not get the priority that their
position in the supply chain would suggest they should have.
The authors also explore the development and roll out of IASME (Information
Assurance for SMEs), which they have developed in the context of a tight market,
where spare cash is in short supply, and many SMEs are still in survival mode. The
question for the business is therefore not seen as “can we afford to spend on
information security” but “can we afford not to spend…” As well as the effect on
being able to do business at all of having an SMEs systems compromised, there are
also matters of reputation, and the growing threat of fines as a result of not complying
with laws and regulations.
The paper concludes with achievements of real businesses using the IASME process
to cost-effectively achieve information assurance levels appropriate for themselves
A new basis for aviation taxation: a briefing on the introduction of an aviation tax based on a per-plane duty
Cheaper, greener and more efficient : rationalising UK carbon prices
Current UK energy use policies, which primarily aim to reduce carbon emissions, provide abatement incentives that vary by user and fuel, creating inefficiency. Distributional concerns are often given as a justification for the lower carbon price faced by households, but there is little rationale for carbon prices associated with the use of gas to be lower than those for electricity. We consider reforms that raise carbon prices faced by households and reduce the variation in carbon prices across gas and electricity use, improving the efficiency of emissions reduction. We show that the revenue raised from these reforms can be recycled in a way that ameliorates some of the distributional concerns. Whilst such recycling is not able to protect all poorer households, existing policy also makes distributional trade-offs, but does so in an opaque and inefficient way
Balancing Risk Appetite and Risk Attitude in Requirements: a Framework for User Liberation
The tendency to throw controls at perceived and real system vulnerabilities, coupled with the likelihood of these controls being technical in nature, has the propensity to favour security over usability. However there is little evidence of increased assurance and it could encourage work stoppages or deviations that keep honest users from engaging with the system. The conflicting balance of trust and controls, and the challenge of turning that balance into clear requirements, creates an environment that alienates users and feeds the paranoia of actors who assume more ownership of the system than necessary. Security therefore becomes an inhibitor rather than an enabler for the community. This paper looks at measuring the balance of an organisation’s or a community’s risk appetite with the risk attitudes of its members in the early stages of IS development. It suggests how the dials of assurance can be influenced by the levers of good systems practice to create a cultural shift to trusting the users
On the Complexity of an Unregulated Traffic Crossing
The steady development of motor vehicle technology will enable cars of the
near future to assume an ever increasing role in the decision making and
control of the vehicle itself. In the foreseeable future, cars will have the
ability to communicate with one another in order to better coordinate their
motion. This motivates a number of interesting algorithmic problems. One of the
most challenging aspects of traffic coordination involves traffic
intersections. In this paper we consider two formulations of a simple and
fundamental geometric optimization problem involving coordinating the motion of
vehicles through an intersection.
We are given a set of vehicles in the plane, each modeled as a unit
length line segment that moves monotonically, either horizontally or
vertically, subject to a maximum speed limit. Each vehicle is described by a
start and goal position and a start time and deadline. The question is whether,
subject to the speed limit, there exists a collision-free motion plan so that
each vehicle travels from its start position to its goal position prior to its
deadline.
We present three results. We begin by showing that this problem is
NP-complete with a reduction from 3-SAT. Second, we consider a constrained
version in which cars traveling horizontally can alter their speeds while cars
traveling vertically cannot. We present a simple algorithm that solves this
problem in time. Finally, we provide a solution to the discrete
version of the problem and prove its asymptotic optimality in terms of the
maximum delay of a vehicle
Requirements and Risk: Singing From the Same Hymn-sheet.
Failing to elicit requirements is as much of a risk in the traditional, negative sense as successfully defining requirements is a positive step towards successful systems development. The discipline of risk management has long since had to deal with the spectre of emergent risk and its inherent lack of predictability. Just as risk management considers how any number of vulnerabilities in a system may be exploited by accident or by malicious intent that preys upon exposure to otherwise independent factors, so successful requirements elicitation is beholden to the ability to recognise the need for, and define, derived requirements. In this paper we suggest that risk assessment and requirements elicitation are two manifestations of the same activity: creating trustworthy software. We propose the research and development of a methodology where the two disciplines converge
- …
