Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

Mid-Holocene Enso: Issues In Quantitative Model-Proxy Data Comparisons, J Brown, A W. Tudhope, M Collins, H V. Mcgregor Jul 2008

Mid-Holocene Enso: Issues In Quantitative Model-Proxy Data Comparisons, J Brown, A W. Tudhope, M Collins, H V. Mcgregor

Faculty of Science - Papers (Archive)

Evaluation of climate model simulations using observed data contributes to the assessment of confidence in model predictions of future climate change. The mid-Holocene represents an opportunity to evaluate model simulations of El Niño–Southern Oscillation (ENSO) in comparison with coral proxy evidence of reduced ENSO amplitude. Quantitative comparisons between coral records and model output have been limited by (1) the use of different measures of ENSO amplitude, (2) possible sampling of natural variability in short records, and (3) uncertainty about the stationarity of the relationship between central Pacific sea surface temperature (SST) variability and ENSO signals at the coral site. We …


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …