scholarly journals Towards the Development of an Early Warning/Response Network

Refuge ◽  
1996 ◽  
pp. 21-27 ◽  
Author(s):  
Howard Adelman ◽  
Susanne Schmeidl

This article outlines a proposal put forth by the Prevention/Early Warning Unit at the Centrefor Refugee Studies, York University. The article describes the problems with early warning and how an early warning network (EWNET) can address these existing difficulties. This EWNET is described as an academic- NGO-policy consortium that over a period of a few years will become self-sufficient through the involvement of business. Utilizing the Internet, EWNET will collect information from all over the world, analyze and disseminate such information. The link to policy makers and the importance of properly communicating alerts are discussed. While a central management team oversees EWNET, there are several units working on administration, sales and research. Furthermore, the research unit is broken down into indicator, communication, response and area study research; the latter being linked to twenty crises area nodes. This structure assures that EWNET will comprise a broad resource network as well as the links necessary for sending uniform early warning signals.

2021 ◽  
Author(s):  
◽  
Dale Stephens

<p>The Internet has rapidly become the world’s most prevalent form of communication. It can be accessed twenty-four hours a day from virtually any location in the world from a myriad of technologically savvy devices. Internet users can keep up to date with world events, watch movies, listen to music, interact with government agencies, analyse business trends, undertake research and maintain contact with people anywhere. The Internet also provides the ability for users to shop ‘online’ with virtually any product or service supplier anywhere in the world. This has created concerns regarding the use of personal information obtained through the medium of the Internet. An individual’s right to privacy is a right enshrined in legislation and through tort law. With the uptake of technology and the burgeoning use of the Internet the subject of online privacy has become a complex issue for law and policy makers both in New Zealand and internationally. The aim of this paper is to look at the online shopper or consumer and how their information could be protected. This paper looks at the key areas of privacy legislation, the storage of data and the rise of new technologies including ‘cloud’ computing and suggests that the complexity of online privacy is such that a different approach to access and use of personal information of online shoppers may be required. The rate of technology change, the enormity of the data capture situation and the international accessibility of the Internet are all factors that create an almost impossible situation for ensuring consumer privacy so this paper proposes that the onus moves away from the law and policy makers and put into the hands of the users of the Internet.</p>


Author(s):  
Ravi Nath ◽  
Vasudeva N.R. Murthy

There is overwhelming evidence that the use of the Internetenabled applications and solutions provide unprecedented economic growth opportunities. However, the Internet diffusion rates remain low in many countries. According to the International Telecommunications Union (ITU), in 2004, less than 3% of the Africans used the Internet, whereas the average Internet subscription rate for G8 countries (Canada, France, Germany, Italy, Japan, Russia, the UK, and the US) is about 50%. Also, in nearly 30 countries the Internet penetration rates still remain below 1% (ITU, 2006). So, what are the key factors that explain this wide variation in Internet subscription rates in countries around the world? An understanding of these factors will be highly useful for policy makers, economic developmental agencies and political leaders in establishing and implementing suitable national developmental strategies and policies.


2014 ◽  
pp. 198-216
Author(s):  
Edwin Agwu

The internet has impacted the lives of individuals, organisations, and governments all over the world. However, it is now viewed and adopted with caution due mainly to the criminal tendencies of some misguided elements within the society. The internet technology has evolved to become a weapon of “mass robbery” in the hands of criminals. Fraudulent mails emanating from Africa, in general and Nigeria in particular have received world wide attentions. These and more have dented the image of the country home and abroad. This study presents the various ways in which the internet is used for criminal purposes within the Nigerian polity. It further examined the various crime related laws, their adequacies, and implications. Findings revealed the interplay of different methods through which vulnerable individuals and organisations are defrauded. The strategies proposed for addressing these crimes with a view to giving the country a clean bill of health in the international community are as well applicable to other developing countries. The findings also lay solid foundations for further research within different strands of crimes. It also concludes with recommendations for policy makers, businesses, and internet services providers with emphasis on the need for greater awareness creation.


Author(s):  
Forough Shojanoori ◽  
Samaneh Sadat Sadidpour

Families have moved, or have been moved, from the streets into their homes or more specifically, into their bedrooms. Digital technology – computer games, mobiles & the internet and email are referred to as new technology when they are discussed in relation to Health & structure of families and Many parents, clinicians, researchers, and policy makers are concerned that electronic tools, especially those featuring violent content, may be harmful to individuals especially youths. This article is a documentary study, combination of multiple focus is chosen. In this article, Internet, Mobile and computer games. This article looks into the role of the technology on families. Specifically, it examines how the mediated space that this technology creates matters. Technological change often creates ungrounded fears but also overinflated hopes. In order to minimize risks and to seize chances, systematic, empirical, and ideally experimental research is crucial in all over the world. Major changes in family structure and environments might potentially severely disrupt family functioning, thus diminishing a family’s ability to cope with stress, so by the advent of a technology.


2012 ◽  
Vol 457-458 ◽  
pp. 1356-1360
Author(s):  
Hui Sun ◽  
Lin Jing Xiao ◽  
Shu Qing Wang

The new-type networking and intelligent safety bed aiming at quakeproof and anti-violence is studied and designed. This Safety Bed includes the high precision seismograph, the pneumatic system, the Double-wing-typed Closed Mechanism, controlling system and so on. It can protect user from the danger from the earthquake and violence. The networking control system designed can interface with the Internet which combines the manufacturer-user service system with the Safety Bed in the world to offer the service online. The correlation technique can be applied in the seismic monitoring at home and hotel, in the home intelligent early-warning, in the intelligent anti-violence, and so on.


Author(s):  
Guglielmo Campus ◽  
Marcela Diaz-Betancourt ◽  
Maria Grazia Cagetti ◽  
Joana C. Carvalho ◽  
Thiago S. Carvalho ◽  
...  

The Centres for Disease Control and Prevention and the World Health Organization have developed preparedness and prevention checklists for healthcare professionals regarding the containment of COVID-19. The aim of the present protocol is to evaluate the impact of the COVID-19 outbreak among dentists in different countries where various prevalence of the epidemic has been reported. Several research groups around the world were contacted by the central management team. The online anonymous survey will be conducted on a convenience sample of dentists working both in national health systems and in private or public clinics. In each country/area, a high (~5–20%) proportion of dentists working there will be invited to participate. The questionnaire, developed and standardized previously in Italy, has four domains: (1) personal data; (2) symptoms/signs relative to COVID-19; (3) working conditions and PPE (personal protective equipment) adopted after the infection’s outbreak; (4) knowledge and self-perceived risk of infection. The methodology of this international survey will include translation, pilot testing, and semantic adjustment of the questionnaire. The data will be entered on an Excel spreadsheet and quality checked. Completely anonymous data analyses will be performed by the central management team. This survey will give an insight into the dental profession during COVID-19 pandemic globally.


2013 ◽  
Vol 3 (2) ◽  
pp. 56-74 ◽  
Author(s):  
Edwin Agwu

The internet has impacted the lives of individuals, organisations, and governments all over the world. However, it is now viewed and adopted with caution due mainly to the criminal tendencies of some misguided elements within the society. The internet technology has evolved to become a weapon of “mass robbery” in the hands of criminals. Fraudulent mails emanating from Africa, in general and Nigeria in particular have received world wide attentions. These and more have dented the image of the country home and abroad. This study presents the various ways in which the internet is used for criminal purposes within the Nigerian polity. It further examined the various crime related laws, their adequacies, and implications. Findings revealed the interplay of different methods through which vulnerable individuals and organisations are defrauded. The strategies proposed for addressing these crimes with a view to giving the country a clean bill of health in the international community are as well applicable to other developing countries. The findings also lay solid foundations for further research within different strands of crimes. It also concludes with recommendations for policy makers, businesses, and internet services providers with emphasis on the need for greater awareness creation.


Data & Policy ◽  
2021 ◽  
Vol 3 ◽  
Author(s):  
Stefaan G. Verhulst

Abstract Data and data science offer tremendous potential to address some of our most intractable public problems (including the Covid-19 pandemic). At the same time, recent years have shown some of the risks of existing and emerging technologies. An updated framework is required to balance potential and risk, and to ensure that data is used responsibly. Data responsibility is not itself a new concept. However, amid a rapidly changing technology landscape, it has become increasingly clear that the concept may need updating, in order to keep up with new trends such as big data, open data, the Internet of things, and artificial intelligence, and machine learning. This paper seeks to outline 10 approaches and innovations for data responsibility in the 21st century. The 10 emerging concepts we have identified include: End-to-end data responsibility Decision provenance Professionalizing data stewardship From data science to question science Contextual consent Responsibility by design Data asymmetries and data collaboratives Personally identifiable inference Group privacy Data assemblies Each of these is described at greater length in the paper, and illustrated with examples from around the world. Put together, they add up to a framework or outline for policy makers, scholars, and activists who seek to harness the potential of data to solve complex social problems and advance the public good. Needless to say, the 10 approaches outlined here represent just a start. We envision this paper more as an exercise in agenda-setting than a comprehensive survey.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2011 ◽  
Vol 23 (4) ◽  
pp. 186-191 ◽  
Author(s):  
Malini Ratnasingam ◽  
Lee Ellis

Background. Nearly all of the research on sex differences in mass media utilization has been based on samples from the United States and a few other Western countries. Aim. The present study examines sex differences in mass media utilization in four Asian countries (Japan, Malaysia, South Korea, and Singapore). Methods. College students self-reported the frequency with which they accessed the following five mass media outlets: television dramas, televised news and documentaries, music, newspapers and magazines, and the Internet. Results. Two significant sex differences were found when participants from the four countries were considered as a whole: Women watched television dramas more than did men; and in Japan, female students listened to music more than did their male counterparts. Limitations. A wider array of mass media outlets could have been explored. Conclusions. Findings were largely consistent with results from studies conducted elsewhere in the world, particularly regarding sex differences in television drama viewing. A neurohormonal evolutionary explanation is offered for the basic findings.


Sign in / Sign up

Export Citation Format

Share Document