Results 21 to 30 of about 2,430,883 (250)
Games for groundwater governance: field experiments in Andhra Pradesh, India
Groundwater is a common-pool resource that is subject to depletion in many places around the world as a result of increased use of irrigation and water-demanding cash crops. Where state capacity to control groundwater use is limited, collective action is
Ruth Meinzen-Dick +6 more
doaj +1 more source
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario
This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities.
Mohammad A. Hawila, Sunil S. Chirayath
doaj +1 more source
Distributed security policy conformance [PDF]
Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a basic level of protection.This paper presents Odessa, a resilient system for monitoring and validating compliance of ...
Montanari, Mirko +4 more
openaire +3 more sources
Raw materials policy as security policy [PDF]
Today the global shortage refers primarily to raw materials. High energy prices, unstable agricultural markets and problematic rare ores are only some of striking indicators of the new race for raw materials. This is just the beginning: with the progress
Schneider Henrique, Bigler Hans-Ulrich
doaj +1 more source
This study reviews the Artificial Intelligence and Machine Learning approaches developed thus far for driver profile and driving pattern recognition, representing a set of macroscopic and microscopic behaviors respectively, to enhance the understanding ...
Dimitrios I. Tselentis +1 more
doaj +1 more source
Household food insecurity and cooking energy access in Nigeria: A panel data approach
Access to sources of cooking energy has potential impacts on food security, however, there is a paucity of information and empirical evidence on their linkages.
Adegbenga Emmanuel Adekoya +9 more
doaj +1 more source
The number of elderly Internet users has increased significantly in the past few years, and the Internet has greatly changed the way that older adults access information and communicate.
Yan Nan, Yating Xie, Yuqun Hu
doaj +1 more source
Combining Approaches for Systemic Behaviour Change in Groundwater Governance
Over-extraction of groundwater is a prominent challenge in India, with profound implication for food security, livelihoods, and economic development. As groundwater is an ‘invisible’ and mobile common pool resource, sustainable governance of groundwater ...
Richu Sanil +3 more
doaj +1 more source
On Quantitative Security Policies [PDF]
We introduce a formal framework to specify and enforce quantitative security policies. The framework consists of: (i) a stochastic process calculus to express the measurable space of computations in terms of Continuous Time Markov Chains; (ii) a stochastic modal logic (a variant of CSL) to represent the bound constraints on execution speed; (iii) two ...
DEGANO, PIERPAOLO +2 more
openaire +2 more sources
The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security
Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement.
Hwang, Junseok, Syamsuddin, Irfan
core +1 more source

