The Value of Information in Fishery Management

Fisheries ◽  
2008 ◽  
Vol 33 (7) ◽  
pp. 340-348 ◽  
Author(s):  
Gretchen J. A. Hansen ◽  
Michael L. Jones
1981 ◽  
Vol 38 (6) ◽  
pp. 678-689 ◽  
Author(s):  
Carl J. Walters

Available data are often inadequate to discriminate among alternative models that make different predictions about the consequences of allowing escapements outside the range of recent historical experience. Dynamic programming is used to show that the optimum policy in such situations can involve active probing or experimentation with escapements. The optimum adaptive policy is usually difficult to compute, but generally may be closely approximated by a "Bayes equivalent" policy that is simpler to estimate but does not account explicitly for the value of information associated with allowing more extreme escapements. While there are various practical difficulties in estimating and implementing an optimum policy, it is concluded that regular probing experiments should be included in every fishery management plan.Key words: stock-recruitment, optimization, adaptive management, stochastic models


Author(s):  
Sergey Valerevich Belov ◽  
Irina Mikhalovna Kosmacheva ◽  
Irina Vyacheslavovna Sibikina

To solve the problem of information security management the method was proposed that allows determining the degree of importance of confidential documents of the organization. The urgency of the proposed algorithm was substantiated taking into account the requirements of the legislation of the Russian Federation in the sphere of information security. The stages prior to the formation of the list of confidential documents of the organization were described. A review of the main documents of the legal and regulatory framework was carried out including documents relating to the state regulation of relations in the sphere of information security. The classes of protected information for the accessing categories were considered. The criteria changes of the value of information in the process of time were represented. The algorithm of formation of the list of confidential documents of the organization based on the properties of information was offered. The algorithm is based on an expert method of pair comparison of alternatives. The result of the use of this method is a number of confidential documents, ranked in descending order of importance. For each document the weighting factor of importance can be calculated. The verification stage of the degree of expert consistency was included in the methodology to eliminate the use of erroneous expert data. The application of the methodology is illustrated by a calculated example.


2008 ◽  
Author(s):  
Arturo Bris ◽  
Salvatore Cantale ◽  
Emir Hrnjic ◽  
George P. Nishiotis

Sign in / Sign up

Export Citation Format

Share Document