scholarly journals Explanatory note on the selection of forage material suitable for the risk assessment of GM feed of plant origin

2018 ◽  
Vol 15 (1) ◽  
Author(s):  
◽  
Michele Ardizzone ◽  
Claudia Paoletti ◽  
Elisabeth Waigmann
Molecules ◽  
2020 ◽  
Vol 25 (21) ◽  
pp. 5014
Author(s):  
Giovanni Benelli

The Editorial outlines recent research advances in green insecticide research. Particular attention is devoted to studies shedding light on the modes of action and non-target toxicity of natural substances of plant origin. Research focusing on the development of new formulations (including those relating to nano-objects) to magnify the effectiveness and stability of green insecticides in the field represents key advances. Herein, a carefully reviewed selection of cutting edge articles about green pesticide development recently published in Molecules is presented. The impact of sub-lethal doses of green insecticides on insect behavioral traits is still overlooked, representing a timely challenge for further research.


Marine Policy ◽  
2018 ◽  
Vol 88 ◽  
pp. 11-22 ◽  
Author(s):  
Stephen J. Newman ◽  
Joshua I. Brown ◽  
David V. Fairclough ◽  
Brent S. Wise ◽  
Lynda M. Bellchambers ◽  
...  

Chemosphere ◽  
1989 ◽  
Vol 19 (1-6) ◽  
pp. 615-622 ◽  
Author(s):  
Henk Heida ◽  
Martin Van Den Berg ◽  
Kees Olie

2018 ◽  
Vol 26 (4) ◽  
pp. 472-490 ◽  
Author(s):  
Nikolaos Argyropoulos ◽  
Konstantinos Angelopoulos ◽  
Haralambos Mouratidis ◽  
Andrew Fish

Purpose The selection of security configurations for complex information systems is a cumbersome process. Decision-making regarding the choice of security countermeasures has to take into consideration a multitude of, often conflicting, functional and non-functional system goals. Therefore, a structured method to support crucial security decisions during a system’s design that can take account of risk whilst providing feedback on the optimal decisions within specific scenarios would be valuable. Design/methodology/approach Secure Tropos is a well-established security requirements engineering methodology, but it has no concepts of Risk, whilst Constrained Goal Models are an existing method to support relevant automated reasoning tasks. Hence we bridge these methods, by extending Secure Tropos to incorporate the concept of Risk, so that the elicitation and analysis of security requirements can be complimented by a systematic risk assessment process during a system’s design time and supporting the reasoning regarding the selection of optimal security configurations with respect to multiple system objectives and constraints, via constrained goal models. Findings As a means of conceptual evaluation, to give an idea of the applicability of the approach and to check if alterations may be desirable, a case study of its application to an e-government information system is presented. The proposed approach is able to generate security mechanism configurations for multiple optimisation scenarios that are provided, whilst there are limitations in terms of a natural trade-off of information levels of risk assessment that are required to be elicited. Originality/value The proposed approach adds additional value via its flexibility in permitting the consideration of different optimisation scenarios by prioritising different system goals and the automated reasoning support.


2020 ◽  
Vol 12 (4) ◽  
pp. 917-927 ◽  
Author(s):  
F. H. Reboredo ◽  
A. Barbosa ◽  
M. M. Silva ◽  
M. L. Carvalho ◽  
J. P. Santos ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document