5,714 research outputs found

    Large extinctions in an evolutionary model: The role of innovation and keystone species

    Get PDF
    The causes of major and rapid transitions observed in biological macroevolution as well as in the evolution of social systems are a subject of much debate. Here we identify the proximate causes of crashes and recoveries that arise dynamically in a model system in which populations of (molecular) species co-evolve with their network of chemical interactions. Crashes are events that involve the rapid extinction of many species and recoveries the assimilation of new ones. These are analyzed and classified in terms of the structural properties of the network. We find that in the absence of large external perturbation, `innovation' is a major cause of large extinctions and the prime cause of recoveries. Another major cause of crashes is the extinction of a `keystone species'. Different classes of causes produce crashes of different characteristic sizes.Comment: 8 pages, 3 figures (14 ps files

    Business Continuity for Critical Infrastructure Operators

    Get PDF
    Critical infrastructures often lack resilience and easily lose critical functionalities if hit by adverse events. Continuity management strategies for critical infrastructure operators and the networks that they form, rely also on the functionality of other interrelated networks. Disruptions in operations may affect society and for this reason, securing the operations of critical infrastructure operators is important. The technological impacts of CPS become evident to the resilience of all fields of critical infrastructure, but there is also human elements to take into account. The research question of this study is: How to enhance business continuity of critical infrastructure? This case study research uses qualitative methods collected by conducting interviews of resilience and continuity professionals who work with Finnish critical infrastructure. Resilience and continuity management are key for critical infrastructure operators. Important factors identified were identifying risks, critical activities, key personnel, creating guidelines and procedures, and open communication, which themes were recognised as important to improve resilience and manage continuity.</p

    Arctic maritime safety & security - the human element seen from the Captain´s table

    Get PDF

    Cybersecurity in Skills Development and Leadership

    Get PDF
    Information and Communications Technology (ICT) enables organisations absorb state-ofthe- art knowledge from external sources, and develop skills that promote productivity, competitiveness and organizational learning. This study, completed as part of project ECHO efforts, aims to understand how cybersecurity is seen by PhD students specializing in it. The participants (n = 25) were asked to discuss what is cybersecurity, its elements, and users. The Typeform survey tool was used to collect, store, and analyse this data. The results indicate that successful cybersecurity provides multi-level protection of organisational infrastructures, personal and organisational data, and financial interests of organisations. Failure to protect these may result in negative reputation, financial, ethical, and operational impacts. Human users may be the weakest link in the system, which should be seriously taken into account when deploying cybersecurity measures and administrative user privileges. Users need to be educated in cybersecurity and be aware of threats and new developments and attacker tactics, in particular in the case of social engineering attacks. Basic technical knowledge and capabilities to detect and appropriately report attacks are needed for all levels of ICT users

    Piloting the ECHO e-Skills and Training Toolkit

    Get PDF
    Besides many benefits, ICT technologies are faced with cyber threats. Organ-izations of today, therefore, face many challenges that require technical, sit-uation awareness, and problem-solving related e-skills from a wide level of organizational actors. Business survival depends on how well an organization can implement new IT and take advantage of the opportunities offered by this new IT. Cybersecurity is a pressing issue in modern society. It affects busi-nesses, personal lives, and critical infrastructures. There is a growing need for proficiently cyber-trained personnel to protect society and its organizations and systems. The ECHO E-skills and Training Toolkit was piloted with a team of higher education business ICT teachers. First, the team supervisors chose and valued the most relevant Technical, Situation awareness, and Problem-solving re-lated e-skills. These choices were then given to the pilot test group to discuss and adjust. This pilot study shows that the ECHO E-skills and Training Toolkit can be used to benefit any organization that wishes to assess the e-skills of its personnel and training gaps

    A monkey antigen crossreacting with carcinoembryonic antigen, CEA.

    Get PDF
    Normal monkey tissues were found to contain an antigen which crossreacts immunologically with the carcinoembryonic antigen (CEA) of the human digestive tract. The monkey antigen reacted with complete or partial identity to the normal crossreacting antigen (NCA) in humans when tested in immunodiffusion against anti-CEA or anti-NCA. Extracts of monkey tissues inhibited in radioimmunoassays measuring human NCA. It is possible that monkey foetuses and colonic tumours contain CEA

    Cyber Situational Awareness in Critical Infrastructure Protection

    Get PDF
    The European Union promotes collaboration between authorities and the private sector, and the providers of the most critical services to society face security related obligations. In this paper, critical infrastructure is seen as a system of systems that can be subject to cyber-attacks and&nbsp; other disturbances. Situational awareness (SA) enhances preparations for and decision-making during assessed and unforeseen disruptive incidents, and promoting Cyber effective situational&nbsp; awareness (CSA) requires information sharing between the different interest groups. This research is constructive in nature, where innovative constructions developed as solutions&nbsp; for domain-specific real world problems, while the research question is: “How can cyber&nbsp; situational awareness protect critical infrastructures?” The Observe – Orient – Decide – Act (OODA) loop is examined as a way to promote&nbsp; collaboration towards a shared situational picture, awareness and understanding to meet challenges of forming CSA in relation to risk assessment (RA) and improving resilience. Three levels of organizational decision-making are examined in relation a five-layer cyber structure of an organization to provide a more comprehensive systems view of organizational cyber security. Successful, crisis-management efforts enable organizations to sustain and resume operations, minimize losses, and adapt to manage future incidents, as many critical&nbsp;infrastructures typically lack resilience and may easily lose essential functionality when hit by&nbsp;an adverse event. Situation awareness is the main prerequisite towards cyber security. Without situation awareness, it is impossible to systematically prevent, identify, and protect the system from cyber incidents.</p
    • …
    corecore