期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Oil Spill Management in Nigeria: SWOT Analysis of the Joint Investigation Visit (JIV) Process
1
作者 Akpofure Rim-Rukeh 《Journal of Environmental Protection》 2015年第3期259-271,共13页
The Joint Investigation Visit (JIV) process of the National Oil Spill Detection and Response Agency (NOSDRA) have been analysed using the Strength, Weakness, Opportunity and Threat (SWOT) methodology. The oil spill Jo... The Joint Investigation Visit (JIV) process of the National Oil Spill Detection and Response Agency (NOSDRA) have been analysed using the Strength, Weakness, Opportunity and Threat (SWOT) methodology. The oil spill Joint Investigation Visit (JIV) is empowered by the Oil Spill Recovery, Clean-up, Remediation and Damage Assessment Reulations, 2011 Section 5. The strength of the JIV process lies within its participatory nature and the well defined legal structure of the process. The oil spill Joint Investigation Visit process in Nigeria has several weaknesses—lack of independence and oversight, lack of technical competence on the part of regulatory bodies, lack of technical competence on the part of community representative, lack of transparency on the part of oil companies, lack of general procedure for determining the actual cause of spill, lack of general procedure for determining the actual volume of oil spilled, determination on the size of the impacted area and exclusion of women from the JIV Process. The JIV process for oil spill presents a number of opportunities such as;increasing community awareness, growing consciousness through Non Governmental Organisations (NGOs) and capacity building of stakeholders. Possible threats to the JIV process include;poor governance and corruption, manipulation of the Process by the spiller through the start date of an oilspill and obvious lack of transparency. Improved effectiveness of the JIV process will depend on strengthening of government agency coordination, integrated decision-making adequate training to various stakeholders and supporting infrastructure for purposeful monitoring and enforcement. 展开更多
关键词 Joint INVESTIGATION VISIT national oil spill detection and response agency NIGERIA SWOT Analysis oil spill Community Trepresentatives
下载PDF
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
2
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of Service Attacks) and DoS (Denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (Security Information and Event Management) CISA (Cybersecurity and Infrastructure Security agency) NIST (national Institute of Standards and Technology) XDR (Extended detection and response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet Control Message Protocol) Cyberwarfare
下载PDF
论马六甲海峡溢油应急反应合作机制的构建 被引量:2
3
作者 梅宏 高晓露 吉克 《中国海商法研究》 CSSCI 2014年第2期39-45,共7页
面对马六甲海峡日益增大的海上溢油风险,应通过建立定期会议制度、领导机构运行管理制度、资金保障制度、技术互助制度以及争端解决和责任追究制度,构建马六甲海峡溢油应急反应合作机制。这不仅可以弥补马六甲海峡合作机制在溢油事故应... 面对马六甲海峡日益增大的海上溢油风险,应通过建立定期会议制度、领导机构运行管理制度、资金保障制度、技术互助制度以及争端解决和责任追究制度,构建马六甲海峡溢油应急反应合作机制。这不仅可以弥补马六甲海峡合作机制在溢油事故应急处理方面的缺失,且将从合作方式、合作范围、合作义务的性质以及国际海事组织在合作中的作用等方面为完善《联合国海洋法公约》第43条提供示例。 展开更多
关键词 马六甲海峡合作机制 溢油应急反应合作机制 《联合国海洋法公约》
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部