- Risk Perception and Management
- Risk Management in Financial Firms
- Soil Carbon and Nitrogen Dynamics
- Physiological and biochemical adaptations
- Heavy metals in environment
- Complex Systems and Decision Making
- Aquaculture Nutrition and Growth
- Soil Geostatistics and Mapping
- Environmental Toxicology and Ecotoxicology
- Environmental Justice and Health Disparities
- Crustacean biology and ecology
- Information and Cyber Security
- Soil and Water Nutrient Dynamics
- Pesticide and Herbicide Environmental Studies
- Cognitive Science and Mapping
- Microplastics and Plastic Pollution
- Corporate Management and Leadership
- Toxic Organic Pollutants Impact
- Leadership, Behavior, and Decision-Making Studies
- Parasite Biology and Host Interactions
- Conflict Management and Negotiation
- Misinformation and Its Impacts
- Privacy, Security, and Data Protection
- Global and Cross-Cultural Management
- Urban Heat Island Mitigation
Griffith University
2012-2017
Imperial College London
2010-2012
Natural History Museum
2010
British Geological Survey
2010
Environment Agency
2010
ABSTRACT Emergence of policies dealing with concern over soil degradation and anthropogenic impacts to is likely increase the requirement for assessment quality identification soils at risk from degradation. An example proposed EU Soil Framework Directive, which features areas requiring protection There have been some serious objections such requirements on grounds resource capital demands. To help address these concerns, this work proposes a strategic set indicators based measured...
In many countries there are policies in place that impact on soils, but very few legislative or policy tools specifically for the protection of soil. Recent EU proposals soil have been met with opposition grounds excessive cost and resource demands. With need evidence based policy, recognition involving public environmental monitoring is an effective way increasing understanding commitment, has growing interest surveys. addition, it accepted success depends greatly how effectively...
The 40 years that have passed since the beginning of 'environmental revolution' has seen a large increase in development policies for protection environmental media and recognition by public importance quality. There been shift from policy reaction to high profile events, then control releases single media, present position moving toward integrated management all at present. This moved away classical chemical risk assessment holism, including ecological value these media. work details how...
Increased temperature as a potentially threatening process, and the need to investigate thermal tolerance of ‘highland-rainforest’ Euastacus were first identified 20 years ago; however, repertoire has still not been explored. is largest Australia’s 10 freshwater crayfish genera with 52 species, includes many largest, slowest-growing longest-lived species (some >35 years) in World. Several have distributions consistent being ‘climate refugees’, namely, closely associated cool, damp...
1 Environmental Futures Centre and Griffith School of Environment, Gold Coast campus, University, Queensland 4222, Australia 2 Australia; Marine Ecology Research Centre, Southern Cross Lismore, NSW 2480, 3 and, Outback Ecology, 1/73 Troy Terrace, Jolimont, Western Australia, 6014,
Projected elevations in environmental temperature are expected to have a detrimental effect on organisms with distributions that already restricted high-altitude refugia, especially where dispersal is compromised due population isolation by unsuitable intervening habitats. The present study was carried out such an organism, namely Euastacus sulcatus, determine: (1) the at which thermal stress occurs under laboratory conditions; and (2) whether occurring naturally contemporary...
Cyber risk professionals face a formidable challenge in keeping pace with the asymmetric nature of today's advanced threats cyber security. Spending on security has skyrocketed yet threat continues to grow exponentially. This phenomenon is called Paradox and describes what become an entrenched battle for defending against increasingly sophisticated adversary that, date, adapted faster than defensive measures prevent loss data or access sensitive information. Conventional defenses have proven...
The purpose of this study is to develop the first cognitive risk framework for cybersecurity address two narrative arcs in cyber warfare: rise “hacker” as an industry and “cybersecurity paradox”, namely why billions spent on fail semantic cyberattacks. Semantic cyberattacks, also known social engineering, manipulates human users’ perceptions interpretation computer-generated data obtain non-public confidential data. battleground has shifted from attack hard assets a much softer target: mind....
Enterprise risk management frameworks (such as, COSO ERM, ISO 31000, and NIST’s Cybersecurity guidance) have one thing in common – each of the traditional are based on guidance for establishing rudimentary foundations development programs. Along way, term “guidance” has been confused or substituted with “standard(s)” practice many cases (especially early adopters) is assumed to be summation a mature program. The challenge face that “E” enterprise no longer applicable as world transitions...
This article is about the psychology of risk. The risk borrows from Paul Slovic’s Perceptions Risk and explores why so hard to discuss.11. https://hbr.org/2014/12/a-better-way-to-think-about-risk. In general, discussions have proven be ineffective at influencing better behaviors. A part reason appears centered on how we discuss risks. Dan Kahneman Amos Tversky’s Prospect Theory articulated difficulties even seasoned analysts articulating order improve practice, need understand Slovic...