Toward inherently secure and resilient societies.

نویسندگان

  • Brad Allenby
  • Jonathan Fink
چکیده

Recent years have seen a number of challenges to social stability and order, ranging from terrorist attacks and natural disasters to epidemics such as AIDS and SARS. Such challenges have generated specific policy responses, such as enhanced security at transportation hubs and planned deployment of a global tsunami detection network. However, the range of challenges and the practical impossibility of adequately addressing each in turn argue for adoption of a more comprehensive systems perspective. This should be based on the principle of enhancing social and economic resiliency as well as meeting security and emergency response needs and, to the extent possible, developing and implementing dual-use technologies that offer societal benefits even if anticipated disasters never occur.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building a SECURE

A re you gambling with your supply network? As we look back on supply chain management pre-Sept. 11, 2001, it's fair to say that many companies were indeed unwittingly gambling. Sadly, it took the terrorist attacks and subsequent reactions to expose a cold reality: The supply network is inherently vulnerable to disruption, and the failure of any one element in it could cause the whole network t...

متن کامل

The predictive role of attachment styles in marital disillusionment and attitudes toward infidelity among teachers

Attachment styles are considered as an important predictor of marital issues. The purpose of this study was to investigate the role of attachment styles in marital disillusionment and attitude toward infidelity. The research method was correlation. 188 teachers were selected based on measurement scale and research hypothesis by multistage cluster sampling among married teachers. Measures of adu...

متن کامل

Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE

The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the adversary obtains side-channel information from the real world implementation of these algorithms. Most of the prior works on leakage-resilient cryptography consider leakage models where the adversary has access to the leakage oracle before the challenge-ciphertext is generated (befor...

متن کامل

A joint pricing-network design model for a resilient closed-loop supply chain under quantity discount

In this paper, a novel resilient multi-echelon closed-loop location-allocation-inventory problem (RMCLIP) is addressed that optimizes strategic and tactical decisions simultaneously. In order to represent the purchasing cost of raw material from the supplier, a pricing model under quantity discounts is employed in the closed-loop supply chain (CLSC). Considering the capability of returning the ...

متن کامل

Building resilient pathways to transformation when “no one is in charge”: insights from Australia's Murray-Darling Basin

Climate change and its interactions with complex socioeconomic dynamics dictate the need for decision makers to move from incremental adaptation toward transformation as societies try to cope with unprecedented and uncertain change. Developing pathways toward transformation is especially difficult in regions with multiple contested resource uses and rights, with diverse decision makers and rule...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Science

دوره 309 5737  شماره 

صفحات  -

تاریخ انتشار 2005