Solid Verification Program Enables Cost-Effective Acquisition of Complex Yet Reliable Space Systems (Importance of Implementing a Distributed-Verification Program With Modular-Management Process)

Author(s):  
Satoshi Nagano
2008 ◽  
Vol 11 (1) ◽  
pp. 27-38 ◽  
Author(s):  
Satoshi Nagano

2021 ◽  
Author(s):  
◽  
Emilio Rodriguez-Izquierdo

<p>Participatory approaches to the conservation management of protected areas are being implemented worldwide due to cost-effective and moral reasons. However, given the wide spectrum of participation, levels of participation across the conservation management process might vary from one stage to another. This study presents a unique analysis of how participation varies through the conservation management process, and provides the first step towards creating multi-variate models containing key determinants of perceived participation. This thesis is based on research in the Cordillera Azul National Park, a relatively new protected area in the Peruvian Amazon, where I interviewed some of the main stakeholders and conducted a questionnaire in three communities of the Park's buffer zone. My main findings are: levels of participation did indeed vary across different stages of the Park's management. Also, the perceived benefits and costs of the National Park together with the attitudes towards conservation were influencing the perceived responsibility for the Park's management. Thus, I suggest that if managers want to increase community participation in the protected area's management, they might need to focus on identifying those community members with particular attitudes and concentrate on the benefits and costs of conservation.</p>


2021 ◽  
Author(s):  
◽  
Emilio Rodriguez-Izquierdo

<p>Participatory approaches to the conservation management of protected areas are being implemented worldwide due to cost-effective and moral reasons. However, given the wide spectrum of participation, levels of participation across the conservation management process might vary from one stage to another. This study presents a unique analysis of how participation varies through the conservation management process, and provides the first step towards creating multi-variate models containing key determinants of perceived participation. This thesis is based on research in the Cordillera Azul National Park, a relatively new protected area in the Peruvian Amazon, where I interviewed some of the main stakeholders and conducted a questionnaire in three communities of the Park's buffer zone. My main findings are: levels of participation did indeed vary across different stages of the Park's management. Also, the perceived benefits and costs of the National Park together with the attitudes towards conservation were influencing the perceived responsibility for the Park's management. Thus, I suggest that if managers want to increase community participation in the protected area's management, they might need to focus on identifying those community members with particular attitudes and concentrate on the benefits and costs of conservation.</p>


2021 ◽  
Vol XXVIII (4) ◽  
pp. 74-92
Author(s):  
Arina Alexei ◽  

Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect targets for cyber attackers. University networks are open in design, decentralized and multi-user, making them vulnerable to cyber-attacks. The purpose of this research paper was to identify which is the recommended cyber security strategy and how comprehensive are these studies, within HEIs. The method proposed by Kitchenham was used, focused on the information community. Thus, the following results can be communicated: researchers recommend their own security strategies, because the standards analysed in the papers are not oriented on HEIs, and require important adjustments to be implemented. Most scientific papers do not describe risk management process. The implementation phases are also insufficiently analysed. The functions that the strategy addressed by HEIs should fulfill include identification, protection and detection. The validation methods used in the preimplementation and post-implementation phases are case studies and surveys. Most researchers recommend as final cyber security strategy IT Governance and security policies. The field of research has proved to be very interesting, the researches could contribute to the creation of a comprehensive cybersecurity strategy, focused on the specifics of HEIs, efficient, easy to implement and cost-effective.


Sign in / Sign up

Export Citation Format

Share Document