Definition of key terms

advertisement
BIGMUN 2014
TOPIC HANDBOOK
7th committee of the General Assembly
INTERNATIONAL SCIENTIFIC COOPERATION
BIGMUN 2014
Committee of the General Assembly
International Scientific Cooperation
7th
Stem cell research
Introduction:
Before scientists learned how to remove stem cells from human embryos, scientists have been
performing bone marrow stem cells transplants for many decades. But in 1998, when
scientists found out how to remove stem cells from human embryos debate started.
With this find, a lot of excitement was raised. Due to the high potential these stem cells have
concerning the curing of medical conditions such as cancer. Argument however centered on
destroying human embryos.
Definition of key terms:
Stem cells: Stem cells are a class of undifferentiated cells of multicellular organisms. A stem
cell dividing has the potential to remain a stem cell or differentiate into another type of cell
with a specialized function, such as a red blood cell or a brain cell.
Also, in many tissues the stem cells serve as a sort of internal repair system. The cells divide
essentially without a limit in order to replenish other cells.
Stem cells can be categorized into two main categories:
-
Embryonic stem cells: As the name suggests, these stem cells are derived from embryos.
Mainly four- to five-day old human embryos. These embryos are not extracted from actual
women body’s but are usually extras that have been created in IVF (in vitro fertilization)
clinics, were eggs are fertilized in a test tube, of which only one is implemented in the body
of the woman.
-
Adult stem cells Non-embryonic stem cells or adult stem cells can be found after
embryonic development and are to be found inside different types of tissue. These
stem cells have been found in tissues such as the bone marrow, blood vessels, brain,
skin, the liver etc. The cells remain non-dividing until the differentiation is activated
because of disease or tissue injury. Adult stem cells have less potential than embryonic
stem cells. The adult stem cells can differentiate into a range of cell types of the
originating organ. So an adult stem cell in the blood can differentiate into a red blood
cell but can’t differentiate into a skin cell.
2
BIGMUN 2014
Committee of the General Assembly
International Scientific Cooperation
7th
-
The potency of stem cells: Stem cells are categorized by their potential to differentiate
into other types of cells. The full classification includes:
o Totipotent - the ability to differentiate into all possible cell types. Examples are
the zygote formed at egg fertilization and the first few cells that result from the
division of the zygote.
o Pluripotent - the ability to differentiate into almost all cell types. Examples
include embryonic stem cells and cells that are derived from the mesoderm,
endoderm, and ectoderm germ layers that are formed in the beginning stages of
embryonic stem cell differentiation.
o Multipotent - the ability to differentiate into a closely related family of cells.
Examples include hematopoietic (adult) stem cells that can become red and
white blood cells or platelets.
o Oligopotent - the ability to differentiate into a few cells. Examples include
(adult) lymphoid or myeloid stem cells.
o Unipotent - the ability to only produce cells of their own type, but have the
property of self-renewal required to be labeled a stem cell. Examples include
(adult) muscle stem cells.
Embryonic stem cells are considered pluripotent instead of totipotent because they do not
have the ability to become part of the extra-embryonic membranes or the placenta.1
General overview
Stem cells show potential for many different areas of health and medical research, studying
these will help us understand how they transform in specialized cells that make the human
body. Cancer and birth defects are examples of serious medical conditions, which are caused
by problems in the process of the differentiation of stem cells. The understanding of the cell
development will help correct errors that cause these medical conditions.
Governments around the world have already passed the legislation to regulate the research
on stem cells. In the United States for example, the laws prohibit the creation of embryos for
research purposes. Instead the researchers receive embryos that are left over from IVF clinics.
They will only receive these embryos with the consent of donors.
1
http://www.medicalnewstoday.com/info/stem_cell/
3
BIGMUN 2014
Committee of the General Assembly
International Scientific Cooperation
7th
However, a disagreement has arisen regarding the funding of stem cell research. Billions of
dollars are allocated by the federal government each year in order to fund biomedical
research. This money is also used for stem cells research, but is it right to fund embryonic
stem cell research with the money derived from taxpayers who might think that this research
is unethical.
Relevant UN treaties and events:

http://www.un.org/News/Press/docs/2005/ga10333.doc.htm
Central questions for debate:
Constructive debate is needed to solve the issue. You can form answers with good arguments
to the following ethical questions to make a good policy on the issue. You can also use this to
gain ideas for a resolution.
-
Does life begin at the fertilization of the egg or at birth?
-
Is a human embryo tantamount to a human child?
-
Does a human embryo have the same rights as a human child?
-
If the destruction of a human embryo can provide a cure for innumerable patients,
might it then be justified?
-
Seeing that embryonic stem cells have the ability to grow in a dish and can, so in theory
it could still grow into a human being, is the embryo really destroyed?
Online security
Introduction:
The Internet has grown so fast that it is hard to keep track of it. It is changing faster and faster.
Something containing so much important information needs to be secured. Since the
beginning of the Internet is has had security problems. Even today, after several years and
countless attempts of keeping the web secure, it still has security issues.
Definition of key terms
Internet: The Internet is a global network connecting millions of computers. More than 100
countries are linked into exchanges of data, news and opinions. According to Internet World
Stats, as of December 31, 2011 there was an estimated 2,267,233,742 Internet users
4
BIGMUN 2014
Committee of the General Assembly
International Scientific Cooperation
7th
worldwide. This represents 32.7% of the world's population. Keep in mind that these
statistics are taken two years ago, meaning it has grown tremendously since then.
Unlike online services, which are centrally controlled, the Internet is decentralized by design.
Each Internet computer, called a host, is independent. Its operators can choose which Internet
services to use and which local services to make available to the global Internet community.
Remarkably, this anarchy by design works exceedingly well. 2
General overview:
The World Wide Web is the single largest, most ubiquitous source of information in the world,
and it sprang up spontaneously. People use interactive Web pages to obtain stock quotes,
receive tax information from the Internal Revenue Service, check the local weather, conduct
election polls, register for a conference, search for old friends, and the list goes on.
The Web took on a life of its own from the very beginning. The introduction of a common
protocol and a friendly graphical user interface was all that was needed to ignite the Internet
explosion. The Web’s virtues are extolled without end, but its rapid growth and universal
adoption have not been without cost. In particular, security was added as an
afterthought.
New capabilities were added to satisfy the growing demand for features
without carefully considering the impact on security.
It did not take long for the Web to move from the scientific community to the commercial
world. For then the dangers of accidental and malicious abuse grew. At this point, the security
threats became much more serious. The incentive for malicious attackers to exploit
vulnerabilities in the underlying technologies is at an all-time high. Basically, when it comes
down to the significant importance of Web security it affects us all.
There are simple and advanced methods for ensuring browser security and protecting user
privacy. The more simple techniques are user certification schemes, which rely on digital IDs.
Netscape Communicator and Internet Explorer allow users to obtain and use personal
certificates. Currently, a certification company called Verisign offers digital Ids that consist of
a certificate of a user’s identity. The Digital IDs are divided into different types of classes of
digital Ids, each represents a different level of assurance in the identity, and each comes at an
increasingly higher cost. The assurance is determined by the effort that goes into identifying
2
http://www.webopedia.com/TERM/I/Internet.html
5
BIGMUN 2014
Committee of the General Assembly
International Scientific Cooperation
7th
the person requesting the certificate.3
So computer security is a serious issue and has grave implications such as unauthorized
access to the system, destruction of information and damages in monetary terms. Security
vulnerability is subject to how weak the network is and how sensitive it is to security needs. A
corporate intranet is vulnerable to the external environment, as it has to be connected to
partner or customers to complete transactions. Security vulnerabilities arise when the weak
link result in problems and extensive damages to the users.
Security vulnerability is basically a flaw in the computer system that can result in security
breaches. Vulnerabilities can arise from encryption, policy oversight, logic error and internal
spying etc. Others include deficient passwords, sabotage, theft, network protocol design and
eavesdropping. Unauthorized access may result from application or operating system code
theft. This is usually the case when there is an architectural problem or deficient security
design. Specified action must be formulated for each vulnerability and security features to
ensure that attackers do not alter it.4
Relevant UN treaties and events:

http://undss.un.org.in/defaultmap.asp
Financially supporting sustainable technological
development projects
Introduction:
In 1993 the United Nations created Millennium Development Goals (MDG). The MDG was a
list created to encourage sustainable economic and social development in all countries by the
year 20155. These goals were especially aimed towards LEDC’s (Lest economically developed
counties). Through the use of the MDG’s the economic and social difference between MEDC’s
(Most economically developed) and LEDC’S would be lessened and the global disparities
would diminish. Below is the complete list of the eight goals.
1.) Eradicate extreme poverty and hunger
http://onlineessays.com/essays/tech/tech29.php
http://www.ukessays.com/essays/computer-science/internet-security.php
5 http://www.un.org/millenniumgoals/bkgd.shtml
3
4
6
BIGMUN 2014
Committee of the General Assembly
International Scientific Cooperation
7th
2.) Achieve universal primary education
3.) Promote gender equality and empower women
4.) Reduce child mortality
5.) Improve maternal health
6.) Combat HIV/AIDS, malaria and other diseases
7.) Ensure environmental sustainability
8.) Global partnership for development
Despite the global progress towards MDG 1, many countries and regions are falling behind
and social and economic inequalities are growing almost everywhere6. With the recognition of
this a key success factor to acquiring sustainable development is through the use of
innovation7.
Use of Technology:
Due to the improvement in technology sustainable development projects such as low carbon
housing and transportation are being made possible for many countries. Through this process
the ability for countries to support sustainable development and reach goals within the MDG
are being made possible. In recognition of this, many developing countries are drafting and
investing in programs for improvement in technology and innovation by establishing
Ministries of Science and Technologies, to invest more resources within targeted scientific
development programs8. In relation to these efforts, many additional nations are in need of
assistance to grow their ability to support and finance their national innovation within the
science of technology.
Future projection:
The United Nations currently is in the progress of establishing an intergovernmental process
to develop a set of "action-oriented, concise and easy to communicate" sustainable
development goals (SDGs) to help drive the implementation of sustainable development.9 In
http://www.un.org/en/ecosoc/newfunct/pdf13/sti_ifad.pdf
http://web.mit.edu/invent/n-pressreleases/downloads/sustainable.pdf
8 http://www.un.org/esa/devaccount/projects/2008/0809AC.html
9 http://sustainabledevelopment.un.org/index.php?menu=1565
6
7
7
BIGMUN 2014
Committee of the General Assembly
International Scientific Cooperation
7th
order to accomplish this projects are needed to not only financial support a country but
provide sustainable technological support in order for a country to meet development goals.
Helpful links:

http://www.un.org/en/ecosoc/newfunct/pdf13/sti_ifad.pdf

http://sustainabledevelopment.un.org/index.php?menu=1565
8
Download