17,168 research outputs found

    Incidental catches of pelagic megafauna by the EU pelagic fleet in the Mauritanian exclusive economic zone during the year 2001 : results extracted from the scientific observer program

    Get PDF
    The joint project between the Netherlands Institute for Fisheries Research (RIVO) and the Mauritanian Institute for Oceanography and Fisheries Research (IMROP) has been initiated in 1998 in order to strengthen Mauritaniaā€™s capacity for research on stocks of small pelagic fish. Part of this project is the 'Scientific Observer Program' that monitors the catches (conserved and discarded) of the EU fishery for small pelagics in Mauritania. The EU pelagic fleet in Mauritania focuses their fisheries mainly on the group of sardinella, additional target species are horse mackerel, chub mackerel and pilchard. Still, the unwanted bycatches of non-commercial large animals such as sharks and dolphins is inevitable so far. This report describes the total bycatches of the pelagic megafauna by the EU pelagic fleet in the Mauritanian Exclusive Economic Zone during the year 2001. The current sampling of large bycatches appears to be full of shortcomings and the collected data are inadequate to apply for the evaluation of the impact of the EU pelagic fishery in Mauritania. Therefore it is concluded that the program needs to undergo a thorough renewal. Essential recommendations are given

    The Influence of Culture on ABMP Negotiation Parameters

    Get PDF
    Negotiations are known to proceed differently across cultures. A realistic agent model of international negotiations has to take cultural differences into account. This paper presents an agent-based model that tackles this challenge. The context is a trade game where commodities with a hidden quality attribute are exchanged. The negotiation model uses the ABMP negotiation architecture. It applies a utility function that includes market value, quality preference, and risk attitude. The indices of the five dimensions of Hofstedeā€™s model of national cultures are used, in combination with agentā€™s group membership and societal status, to differentiate negotiation behavior by adaptation of weight factors in the utility function and ABMP parameters. The paper presents test runs with synthetic cultures and a set of actual national cultures. The present version of the model helps to understand behaviors in international trade networks. It proves that Hofstedeā€™s dimensions can be used to generate culturally differentiated agent

    The organization of transactions research with the Trust and Tracing Game

    Get PDF
    This paper presents empirical results of research on the influence of social aspects on the organization of transactions in the domain of chains and networks. The research method used was a gaming simulation called the Trust and Tracing game in which participants trade commodity goods with a hidden quality attribute. Previous sessions of this gaming simulation identified a list of variables for further investigation (Meijer et al., 2006). The use of gaming simulation as data gathering tool for quantitative research in supply chains and networks is a proof-of-principle. This paper shows results from 27 newly conducted sessions and previously unused data from 3 older sessions. Tests confirmed the use of network and market modes of organization. Pre-existing social relations influenced the course of the action in the sessions. Being socially embedded was not beneficial for the score on the performance indicators money and points. The hypothesized reduction in measurable transaction costs when there was high trust between the participants could not be found. Further analysis revealed that participants are able to suspect cheats in a session based on other factors than tracing. Testing hypotheses with data gathered in a gaming simulation proved feasible. Experiences with the methodology used are discusse

    Transparency in the Pork Supply Chain: Comparing China and The Netherlands

    Get PDF
    We present a research plan to assess the value of transparency by comparing pork supply chains in The Netherlands and China.We assume that chain performance depends on chain configuration, which depends on societal context and its associated quality control institutions. We define chain configuration in terms of structure and transparency. In order to be able to assess the influence of societal context and its quality control institutions on chain configuration and performance, we compare two countries that have very different societies. Ultimately, our goal is to be able to indicate whether a certain chain configuration suits all, or whether chain configuration should be tailored to societal context.Pork supply chain, societal context, transparency, information exchange, chain configuration, Agribusiness, Industrial Organization,

    Computational Modeling of Culture's Consequences

    Get PDF
    This paper presents an approach to formalize the influence of culture on the decision functions of agents in social simulations. The key components are (a) a definition of the domain of study in the form of a decision model, (b) knowledge acquisition based on a dimensional theory of culture, resulting in expert validated computational models of the influence of single dimensions, and (c) a technique for integrating the knowledge about individual dimensions. The approach is developed in a line of research that studies the influence of culture on trade processes. Trade is an excellent subject for this study of cultureā€™s consequences because it is ubiquitous, relevant both socially and economically, and often increasingly cross-cultural in a globalized world

    Attacks by ā€œAnonymousā€ WikiLeaks Proponents not Anonymous

    Get PDF
    On November 28, 2010, the world started watching the whistle blower website WikiLeaks to begin publishing part of the 250,000 US Embassy Diplomatic cables. These confidential cables provide an insight on U.S. international affairs from 274 different embassies, covering topics such as analysis of host countries and leaders and even requests for spying out United Nations leaders.\ud The release of these cables has caused reactions not only in the real world, but also on the Internet. In fact, a cyberwar started just before the initial release. Wikileaks has reported that their servers were experiencing distributed denial-of-service attacks (DDoS). A DDoS attack consists of many computers trying to overload a server by firing a high number of requests, leading ultimately to service disruption. In this case, the goal was to avoid the release of the embassy cables.\ud After the initial cable release, several companies started severed ties with WikiLeaks. One of the first was Amazon.com, that removed the WikiLeaks web- site from their servers. Next, EveryDNS, a company in which the domain wikileaks.org was registered, dropped the domain entries from its servers. On December 4th, PayPal cancelled the account that WikiLeaks was using to receive on-line donations. On the 6th, Swiss bank PostFinance froze the WikiLeaks assets and Mastercard stopped receiving payments to the WikiLeaks account. Visa followed Mastercard on December 7th.\ud These reactions caused a group of Internet activists (or ā€œhacktivistsā€) named Anonymous to start a retaliation against PostFinance, PayPay, MasterCard, Visa, Moneybrookers.com and Amazon.com, named ā€œOperation Paybackā€. The retaliation was performed as DDoS attacks to the websites of those companies, disrupting their activities (except for the case of Amazon.com) for different periods of time.\ud The Anonymous group consists of volunteers that use a stress testing tool to perform the attacks. This tool, named LOIC (Low Orbit Ion Cannon), can be found both as a desktop application and as a Web page.\ud Even though the group behind the attacks claims to be anonymous, the tools they provide do not offer any security services, such as anonymization. As a consequence, a hacktivist that volunteers to take part in such attacks, can be traced back easily. This is the case for both current versions of the LOIC tool. Therefore, the goal of this report is to present an analysis of privacy issues in the context of these attacks, and raise awareness on the risks of taking part in them
    • ā€¦
    corecore