Abstracts | Law and Political Sciences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1817

World Academy of Science, Engineering and Technology

[Law and Political Sciences]

Online ISSN : 1307-6892

1337 Development Planning in the System of the Islamic Republic of Iran in the Light of Development Laws: From Rationally Planning to Wisely Decision Making

Authors: Mohammad Sadeghi, Mahdieh Saniee

Abstract:

Nowadays, development laws have become a major branch of engineering science, laws help humankind achieve his/her basic needs, and it is attracted to the attention of the nations. Therefore, lawyers have been invited to contemplate legislator's approaches respecting legislating countries' economic, social and cultural development plans and to observe the reliance of approaches on two elements of distributive justice and transitional justice in light of legal rationality. Legal rationality in development planning has encountered us with this question that whether a rational approach and existing models in the Iran development planning system approximate us to the goal of development laws respecting the rationalist approach and also regarding wisely decision-making model. The present study will investigate processes, approaches, and damages of development planning in the legislation of country development plans to answer this question.

Keywords: rationality, decision-making process, policymaking, development

Procedia PDF Downloads 90
1336 Digitization and Economic Growth in Africa: The Role of Financial Sector Development

Authors: Abdul Ganiyu Iddrisu, Bei Chen

Abstract:

Digitization is the process of transforming analog material into digital form, especially for storage and use in a computer. Significant development of information and communication technology (ICT) over the past years has encouraged many researchers to investigate its contribution to promoting economic growth and reducing poverty. Yet the compelling empirical evidence on the effects of digitization on economic growth remains weak, particularly in Africa. This is because extant studies that explicitly evaluate digitization and economic growth nexus are mostly reports and desk reviews. This points out an empirical knowledge gap in the literature. Hypothetically, digitization influences financial sector development which in turn influences economic growth. Digitization has changed the financial sector and its operating environment. Obstacles to access to financing, for instance, physical distance, minimum balance requirements, and low-income flows, among others can be circumvented. Savings have increased, micro-savers have opened bank accounts, and banks are now able to price short-term loans. This has the potential to develop the financial sector. However, empirical evidence on the digitization-financial development nexus is dearth. On the other hand, a number of studies maintained that financial sector development greatly influences growth of economies. We, therefore, argue that financial sector development is one of the transmission mechanisms through which digitization affects economic growth. Employing macro-country-level data from African countries and using fixed effects, random effects and Hausman-Taylor estimation approaches, this paper contributes to the literature by analysing economic growth in Africa, focusing on the role of digitization and financial sector development. First, we assess how digitization influences financial sector development in Africa. From an economic policy perspective, it is important to identify digitization determinants of financial sector development so that action can be taken to reduce the economic shocks associated with financial sector distortions. This nexus is rarely examined empirically in the literature. Secondly, we examine the effect of domestic credit to the private sector and stock market capitalization as a percentage of GDP as used to proxy for financial sector development on economic growth. Digitization is represented by the volume of digital/ICT equipment imported and GDP growth is used to proxy economic growth. Finally, we examine the effect of digitization on economic growth in the light of financial sector development. The following key results were found; first, digitalization propels financial sector development in Africa. Second, financial sector development enhances economic growth. Finally, contrary to our expectation, the results also indicate that digitalization conditioned on financial sector development tends to reduce economic growth in Africa. However, results of the net effects suggest that digitalization, overall, improve economic growth in Africa. We, therefore, conclude that, digitalization in Africa does not only develop the financial sector but unconditionally contributes the growth of the continent’s economies.

Keywords: digitalization, financial sector development, Africa, economic growth

Procedia PDF Downloads 113
1335 Punishing Unfit Defendants for International Crimes Committed Decades Ago

Authors: Md. Mustakimur Rahman

Abstract:

On the one hand, while dealing with temporally distant international crimes (TDICs), prosecutors are likely to encounter many defendants suffering from severe physical or mental disorders. The concept of a defendant's "fitness," on the other hand, is based on the notion that an alleged perpetrator must be protected from a conviction resulting from a lack of participation or competence in making proper judgments. As a result, if a defendant is temporarily or permanently mentally ill, going through a formal criminal trial may be highly unlikely. TheExtraordinary Chambers in the Courts of Cambodia(ECCC), for example, arrested and tried IengThirth for crimes against humanity, grave breaches of the 1949 Geneva Conventions, and genocide. Still, the Trial Chamber found her incompetent to stand trial and released her in 2011. Although the prosecution had a lot of evidence against her, she was free from prosecution. It suggests that alleged war criminals may be granted immunity due to their unfitness, implying that unfitness is a hurdle to combating impunity. Given the absence of a formal criminal trial, international criminal law (ICL) should take steps to address this issue. ICL, according to Mark A. Drumbl, has yet to develop its penology; hence it borrows penological rationales from domestic criminal law. For example, international crimes tribunals such as the Nuremberg Tribunal and the Tokyo Tribunal, ad hoc tribunals have used retribution, utilitarianism, and rehabilitation as punishment justifications. On the other hand, like in the case of IengThirth, a criminal trial may not always be feasible. As a result, instead of allowing impunity, this paper proposes informal trials. This paper, for example, suggests two approaches to dealing with unfit defendants: 1) trial without punishment and 2) punishment without trial. Trial without punishment is a unique method of expressing condemnation without incarceration. "Expressivism has a broader basis than communication of punishment and sentencing," says Antony Duff. According to Drumbl, we can untangle our understanding of punishment from "the iconic preference for jailhouses" to include a larger spectrum of non-incarcerative measures like "recrimination, shame, consequence, and sanction." Non-incarcerative measures allow offenders to be punished without going through a formal criminal trial. This strategy denotes accountability for unlawful behavior. This research concludes that in many circumstances, prosecuting elderly war crimes suspects is difficult or unfeasible, but their age or illness should not be grounds for impunity. They should be accountable for their heinous activities through criminal trials or other mechanisms.

Keywords: international criminal law, international criminal punishment, international crimes tribunal, temporally distant international crimes

Procedia PDF Downloads 60
1334 The Flypaper Effect and the Municipal Participation Fund in the Brazilian Public Sector

Authors: Lucas Oliveira Gomes Ferreira, André Luiz Marques Serrano

Abstract:

The fiscal decentralization driven by the 1988 Constitution was responsible for granting greater autonomy to Brazilian subnational entities, as states and municipalities were entrusted with greater responsibilities to provide local public goods and services. However, the revenues necessary to implement the new attributions are largely received through intergovernmental transfers and not by local tax collection. The literature points out that public spending increases more by receiving unconditional and nonmatching (lump sum) intergovernmental grants than by an increase in taxpayers' income. This effect, called the flypaper effect, happens because the funds received could be used to reduce local taxes, meaning an increase in the citizen's private income. However, they are applied in the public sector in the form of expenses. The present work investigates the existence of the flypaper effect in Brazilian municipalities during the first two decades of the 21st century. The research uses the Municipal Participation Fund (FPM) as a grant proxy from 2000 to 2019 through econometrics of cross-section and panel data for all 5,568 municipalities. The results indicate the flypaper effect in Brazilian municipalities, as well as the proportional relationship between the receipt of constitutional transfers and the increase in public expenditure.

Keywords: flypaper effect, intergovernmental transfers, municipal participation fund, fiscal federalism

Procedia PDF Downloads 122
1333 Data Science/Artificial Intelligence: A Possible Panacea for Refugee Crisis

Authors: Avi Shrivastava

Abstract:

In 2021, two heart-wrenching scenes, shown live on television screens across countries, painted a grim picture of refugees. One of them was of people clinging onto an airplane's wings in their desperate attempt to flee war-torn Afghanistan. They ultimately fell to their death. The other scene was the U.S. government authorities separating children from their parents or guardians to deter migrants/refugees from coming to the U.S. These events show the desperation refugees feel when they are trying to leave their homes in disaster zones. However, data paints a grave picture of the current refugee situation. It also indicates that a bleak future lies ahead for the refugees across the globe. Data and information are the two threads that intertwine to weave the shimmery fabric of modern society. Data and information are often used interchangeably, but they differ considerably. For example, information analysis reveals rationale, and logic, while data analysis, on the other hand, reveals a pattern. Moreover, patterns revealed by data can enable us to create the necessary tools to combat huge problems on our hands. Data analysis paints a clear picture so that the decision-making process becomes simple. Geopolitical and economic data can be used to predict future refugee hotspots. Accurately predicting the next refugee hotspots will allow governments and relief agencies to prepare better for future refugee crises. The refugee crisis does not have binary answers. Given the emotionally wrenching nature of the ground realities, experts often shy away from realistically stating things as they are. This hesitancy can cost lives. When decisions are based solely on data, emotions can be removed from the decision-making process. Data also presents irrefutable evidence and tells whether there is a solution or not. Moreover, it also responds to a nonbinary crisis with a binary answer. Because of all that, it becomes easier to tackle a problem. Data science and A.I. can predict future refugee crises. With the recent explosion of data due to the rise of social media platforms, data and insight into data has solved many social and political problems. Data science can also help solve many issues refugees face while staying in refugee camps or adopted countries. This paper looks into various ways data science can help solve refugee problems. A.I.-based chatbots can help refugees seek legal help to find asylum in the country they want to settle in. These chatbots can help them find a marketplace where they can find help from the people willing to help. Data science and technology can also help solve refugees' many problems, including food, shelter, employment, security, and assimilation. The refugee problem seems to be one of the most challenging for social and political reasons. Data science and machine learning can help prevent the refugee crisis and solve or alleviate some of the problems that refugees face in their journey to a better life. With the explosion of data in the last decade, data science has made it possible to solve many geopolitical and social issues.

Keywords: refugee crisis, artificial intelligence, data science, refugee camps, Afghanistan, Ukraine

Procedia PDF Downloads 53
1332 Ethical, Legal and Societal Aspects of Unmanned Aircraft in Defence

Authors: Henning Lahmann, Benjamyn I. Scott, Bart Custers

Abstract:

Suboptimal adoption of AI in defence organisations carries risks for the protection of the freedom, safety, and security of society. Despite the vast opportunities that defence AI-technology presents, there are also a variety of ethical, legal, and societal concerns. To ensure the successful use of AI technology by the military, ethical, legal, and societal aspects (ELSA) need to be considered, and their concerns continuously addressed at all levels. This includes ELSA considerations during the design, manufacturing and maintenance of AI-based systems, as well as its utilisation via appropriate military doctrine and training. This raises the question how defence organisations can remain strategically competitive and at the edge of military innovation, while respecting the values of its citizens. This paper will explain the set-up and share preliminary results of a 4-year research project commissioned by the National Research Council in the Netherlands on the ethical, legal, and societal aspects of AI in defence. The project plans to develop a future-proof, independent, and consultative ecosystem for the responsible use of AI in the defence domain. In order to achieve this, the lab shall devise a context-dependent methodology that focuses on the ‘analysis’, ‘design’ and ‘evaluation’ of ELSA of AI-based applications within the military context, which include inter alia unmanned aircraft. This is bolstered as the Lab also recognises and complements the existing methods in regards to human-machine teaming, explainable algorithms, and value-sensitive design. Such methods will be modified for the military context and applied to pertinent case-studies. These case-studies include, among others, the application of autonomous robots (incl. semi- autonomous) and AI-based methods against cognitive warfare. As the perception of the application of AI in the military context, by both society and defence personnel, is important, the Lab will study how these perceptions evolve and vary in different contexts. Furthermore, the Lab will monitor – as they may influence people’s perception – developments in the global technological, military and societal spheres. Although the emphasis of the research project is on different forms of AI in defence, it focuses on several case studies. One of these case studies is on unmanned aircraft, which will also be the focus of the paper. Hence, ethical, legal, and societal aspects of unmanned aircraft in the defence domain will be discussed in detail, including but not limited to privacy issues. Typical other issues concern security (for people, objects, data or other aircraft), privacy (sensitive data, hindrance, annoyance, data collection, function creep), chilling effects, PlayStation mentality, and PTSD.

Keywords: autonomous weapon systems, unmanned aircraft, human-machine teaming, meaningful human control, value-sensitive design

Procedia PDF Downloads 76
1331 Examining First-time Remote Workers’ Perceptions on Work From Home Amidst the COVID-19 Pandemic: The Future Potential of Hybrid Work Mode

Authors: Lina Vyas, Stuti Rawat

Abstract:

The COVID-19 outbreak has forced many employees to extensively adopt remote work or, widely known as work from home (WFH) arrangements. During the last two years, both employers and employees have had the opportunity to be increasingly aware of the benefits and drawbacks of WFH. Likewise, it gained the attention of academics from various schools of thought who have been interested in the future of work practices and work-life balance. Additionally, employees might also have various demands regarding their work practices after the pandemic. This study explores the potential of hybrid ways of working in the post-pandemic period by comparing first-timers who (sometimes or always) worked from home during the pandemic with those who did not, in terms of the aspects of work-life balance, work-life interference, job performance and willingness to work from home after the pandemic. The quantitative research approach was adopted. Data were collected via an online questionnaire from employees working from home in Hong Kong during the pandemic. There were one thousand three hundred and twenty-eight responses, but only 1,235 respondents experienced working from home during the pandemic. The findings reveal that 72.2% never had or hardly experienced work from home prior to the pandemic. There were statistically significant differences between first-timers and non-first-timers in work-life balance and work-life interference. The study also found that first-timers who were always working from home during the pandemic would prefer having longer WFH after the pandemic than those who were sometimes working from home. These results would serve as a basis for policy development, enabling policymakers to design appropriate HR policies and amend them to meet the current context of actual employee needs.

Keywords: hybrid working mode, remote working, work from home, work-life balance, workplace

Procedia PDF Downloads 83
1330 Application of Infrared Thermal Imaging, Eye Tracking and Behavioral Analysis for Deception Detection

Authors: Petra Hypšová, Martin Seitl

Abstract:

One of the challenges of forensic psychology is to detect deception during a face-to-face interview. In addition to the classical approaches of monitoring the utterance and its components, detection is also sought by observing behavioral and physiological changes that occur as a result of the increased emotional and cognitive load caused by the production of distorted information. Typical are changes in facial temperature, eye movements and their fixation, pupil dilation, emotional micro-expression, heart rate and its variability. Expanding technological capabilities have opened the space to detect these psychophysiological changes and behavioral manifestations through non-contact technologies that do not interfere with face-to-face interaction. Non-contact deception detection methodology is still in development, and there is a lack of studies that combine multiple non-contact technologies to investigate their accuracy, as well as studies that show how different types of lies produced by different interviewers affect physiological and behavioral changes. The main objective of this study is to apply a specific non-contact technology for deception detection. The next objective is to investigate scenarios in which non-contact deception detection is possible. A series of psychophysiological experiments using infrared thermal imaging, eye tracking and behavioral analysis with FaceReader 9.0 software was used to achieve our goals. In the laboratory experiment, 16 adults (12 women, 4 men) between 18 and 35 years of age (SD = 4.42) were instructed to produce alternating prepared and spontaneous truths and lies. The baseline of each proband was also measured, and its results were compared to the experimental conditions. Because the personality of the examiner (particularly gender and facial appearance) to whom the subject is lying can influence physiological and behavioral changes, the experiment included four different interviewers. The interviewer was represented by a photograph of a face that met the required parameters in terms of gender and facial appearance (i.e., interviewer likability/antipathy) to follow standardized procedures. The subject provided all information to the simulated interviewer. During follow-up analyzes, facial temperature (main ROIs: forehead, cheeks, the tip of the nose, chin, and corners of the eyes), heart rate, emotional expression, intensity and fixation of eye movements and pupil dilation were observed. The results showed that the variables studied varied with respect to the production of prepared truths and lies versus the production of spontaneous truths and lies, as well as the variability of the simulated interviewer. The results also supported the assumption of variability in physiological and behavioural values during the subject's resting state, the so-called baseline, and the production of prepared and spontaneous truths and lies. A series of psychophysiological experiments provided evidence of variability in the areas of interest in the production of truths and lies to different interviewers. The combination of technologies used also led to a comprehensive assessment of the physiological and behavioral changes associated with false and true statements. The study presented here opens the space for further research in the field of lie detection with non-contact technologies.

Keywords: emotional expression decoding, eye-tracking, functional infrared thermal imaging, non-contact deception detection, psychophysiological experiment

Procedia PDF Downloads 83
1329 Improve the Provisions in the Life Imprisonment Law in Vietnam

Authors: Nguyen Xuan Thuy

Abstract:

The provisions on life imprisonment in the legal system enable to differentiate criminal liability and individualize the penalties for particularly serious crimes. This punishment acts as an intermediary between the determined imprisonment of a maximum of 20 years and the capital punishment, enabling the penalty system to maintain its internal unity. However, the practice of applying the punishment has been posing many problems that need to be studied in order to come up with solutions to improve the provisions related to the penalty and its effectiveness in the fight against crimes. The article summarizes the law on life imprisonment sentence in the current criminal law to highlight its characteristics and role in Vietnam's Penal Code. It also suggests some solutions to improve the law and its effectiveness in preventing and combating crimes.

Keywords: life imprisonment, Vietnam, law, penalty, provisions

Procedia PDF Downloads 73
1328 The Role of Digital Technology in Crime Prevention: A Case Study of Cellular Forensics Unit, Capital City Police Peshawar

Authors: Muhammad Ashfaq

Abstract:

Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies, and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries, and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police. A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals. Latest digital analysis software should be provided to equip the Cellular Forensic Unit.

Keywords: criminology-pakistan, crime prevention-KP, digital forensics, digital technology-pakistan

Procedia PDF Downloads 70
1327 Saudi Arabia and the Yemen War: A Fruitless Struggle

Authors: Majid Dashtgerd, Eisa Moradi Afrapoli

Abstract:

The “Yemen War” is one of the longest wars of the recent century, which was launched on 26 March 2015 after the Saudi Arabia-led alliance's military intervention in Yemen. The war began with the aim of fighting Yemen's Houthis and preventing Iranian influence in the region, and Saudi leaders expected a quick victory; However, the “Yemen War” lasted about seven years and is still going on (May 2022), and Saudi Arabia has not been able to achieve its strategic objectives. This study seeks to examine some of the most important reasons for Saudi Arabia's protracted war and failure in Yemen.

Keywords: Saudi Arabia, yemen war, houthis, Iran

Procedia PDF Downloads 105
1326 Contemporary Global Urban Scenarios: An Essay on Urban Insurgencies

Authors: Clovis Ultramari, Lidia Floriani, Debora Cicioli

Abstract:

This paper is a preliminary discussion on the constituency of contemporary global urban scenarios. It is based on secondary sources, mostly from the topics mostly currently discussed by global studies institutes, academic material on the possible components of this phenomenon, and a list of possible scenarios preliminarily proposed by these authors. It also discusses one of these possible scenarios (urban insurgencies) through the lens of a global perspective. Main objective of the research presented in this paper is to produce insights for international aid and development agencies as well as to respond to an increasing interest in the urban studies field in discussing global topics. This paper also results from discussions held in seminars offered by the authors in the graduate program of Urban Management along 2021 and 2022. It is part of a research project that puts together an international team of researches, mostly from the Global South. Results so far obtained refer to conceptual aspects for the determination of global urban scenarios and the presentation of urban insurgencies as worldwide trending urban phenomenon. Presentation in the seminar is part of an ongoing discussion.

Keywords: urban global scenarios, contemporary cities, global south, urban insurgencies

Procedia PDF Downloads 87
1325 Text Data Preprocessing Library: Bilingual Approach

Authors: Kabil Boukhari

Abstract:

In the context of information retrieval, the selection of the most relevant words is a very important step. In fact, the text cleaning allows keeping only the most representative words for a better use. In this paper, we propose a library for the purpose text preprocessing within an implemented application to facilitate this task. This study has two purposes. The first, is to present the related work of the various steps involved in text preprocessing, presenting the segmentation, stemming and lemmatization algorithms that could be efficient in the rest of study. The second, is to implement a developed tool for text preprocessing in French and English. This library accepts unstructured text as input and provides the preprocessed text as output, based on a set of rules and on a base of stop words for both languages. The proposed library has been made on different corpora and gave an interesting result.

Keywords: text preprocessing, segmentation, knowledge extraction, normalization, text generation, information retrieval

Procedia PDF Downloads 66
1324 Red Dawn in the Desert: A World-Systems Analysis of the Maritime Silk Road Initiative

Authors: Toufic Sarieddine

Abstract:

The current debate on the hegemonic impact of China’s Belt and Road Initiative (BRI) is of two opposing strands: Resilient and absolute US hegemony on the one hand and various models of multipolar hegemony such as bifurcation on the other. Bifurcation theories illustrate an unprecedented division of hegemonic functions between China and the US, whereby Beijing becomes the world’s economic hegemon, leaving Washington the world’s military hegemon and security guarantor. While consensus points to China being the main driver of unipolarity’s rupturing, the debate among bifurcationists is on the location of the first rupture. In this regard, the Middle East and North Africa (MENA) region has seen increasing Chinese foreign direct investment in recent years while that to other regions has declined, ranking it second in 2018 as part of the financing for the Maritime Silk Road Initiative (MSRI). China has also become the top trade partner of 11 states in the MENA region, as well as its top source of machine imports, surpassing the US and achieving an overall trade surplus almost double that of Washington’s. These are among other features outlined in world-systems analysis (WSA) literature which correspond with the emergence of a new hegemon. WSA is further utilized to gauge other facets of China’s increasing involvement in MENA and assess whether bifurcation is unfolding therein. These features of hegemony include the adoption of China’s modi operandi, economic dominance in production, trade, and finance, military capacity, cultural hegemony in ideology, education, and language, and the promotion of a general interest around which to rally potential peripheries (MENA states in this case). China’s modi operandi has seen some adoption with regards to support against the United Nations Convention on the Law of the Sea, oil bonds denominated in the yuan, and financial institutions such as the Shanghai Gold Exchange enjoying increasing Arab patronage. However, recent elections in Qatar, as well as liberal reforms in Saudi Arabia, demonstrate Washington’s stronger normative influence. Meanwhile, Washington’s economic dominance is challenged by China’s sizable machine exports, increasing overall imports, and widening trade surplus, but retains some clout via dominant arms and transport exports, as well as free-trade deals across the region. Militarily, Washington bests Beijing’s arms exports, has a dominant and well-established presence in the region, and successfully blocked Beijing’s attempt to penetrate through the UAE. Culturally, Beijing enjoys higher favorability in Arab public opinion, and its broadcast networks have found some resonance with Arab audiences. In education, the West remains MENA students’ preferred destination. Further, while Mandarin has become increasingly available in schools across MENA, its usage and availability still lag far behind English. Finally, Beijing’s general interest in infrastructure provision and prioritizing economic development over social justice and democracy provides an avenue for increased incorporation between Beijing and the MENA region. The overall analysis shows solid progress towards bifurcation in MENA.

Keywords: belt and road initiative, hegemony, Middle East and North Africa, world-systems analysis

Procedia PDF Downloads 83
1323 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe

Authors: Shivalaxmi Arumugham

Abstract:

Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.

Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA

Procedia PDF Downloads 78
1322 Impacts of Artificial Intelligence on the Doctor-Patient Relationship: Ethical Principles, Informed Consent and Medical Obligation

Authors: Rafaella Nogaroli

Abstract:

It is presented hypothetical cases in the context of AI algorithms to support clinical decisions, in order to discuss the importance of doctors to respect AI ethical principles. Regarding the principle of transparency and explanation, there is an impact on the new model of patient consent and on the understanding of qualified information. Besides, the human control of technology (AI as a tool) should guide the physician's activity; otherwise, he breaks the patient's legitimate expectation in a specific result, with the consequent transformation of the medical obligation nature.

Keywords: medical law, artificial intelligence, ethical principles, patient´s informed consent, medical obligations

Procedia PDF Downloads 77
1321 Time for the United Kingdom to Implement Statutory Clawback Provision on Directors’ Remunerations: Lessons and Experiences from the United States and the Netherlands

Authors: John Kong Shan Ho

Abstract:

Senior executives’ remunerations of public companies have aroused much debate and attention in the media. In the aftermath of the Global Financial Crisis (GFC), excessive executive pay arrangements were blamed for contributing to excessive risk-taking, which caused the financial meltdown. Since then, regulators and lawmakers around the world have introduced regulations to strengthen the corporate governance of listed companies. A key aspect of such reform is by strengthening regulatory intervention over executives’ remunerations and increasing the transparency of such information. This article is written against such background and examines the recent proposal by the UK BEIS to ask the FRC to amend the UK Corporate Governance Code (UKCGC) to strengthen clawback provisions for directors’ remuneration in listed companies as part of its audit reform. The article examines the background and debates regarding the possible implementation of such a measure in the UK. Contrary to the BEIS’ proposal, it argues that implementing it through the UKCGC is unlikely to enhance overall corporate governance and audit quality. It argues that the UK should follow the footsteps of its US and Dutch counterparts by enacting legislation to claw back directors’ remunerations. It will also provide some recommendations as to the key factors that need to be considered in drafting such a statutory provision.

Keywords: company law, corporate governance, agency problem, directors' remunerations, clawbacks

Procedia PDF Downloads 104
1320 The Ludic Exception and the Permanent Emergency: Understanding the Emergency Regimes with the Concept of Play

Authors: Mete Ulaş Aksoy

Abstract:

In contemporary politics, the state of emergency has become a permanent and salient feature of politics. This study aims to clarify the anthropological and ontological dimensions of the permanent state of emergency. It pays special attention to the structural relation between the exception and play. Focusing on the play in the context of emergency and exception enables the recognition of the difference and sometimes the discrepancy between the exception and emergency, which has passed into oblivion because of the frequency and normalization of emergency situations. This study coins the term “ludic exception” in order to highlight the difference between the exceptions in which exuberance and paroxysm rule over the socio-political life and the permanent emergency that protects the authority with a sort of extra-legality. The main thesis of the study is that the ludic elements such as risk, conspicuous consumption, sacrificial gestures, agonism, etc. circumscribe the exceptional moments temporarily, preventing them from being routine and normal. The study also emphasizes the decline of ludic elements in modernity as the main factor in the transformation of the exceptions into permanent emergency situations. In the introduction, the relationship between play and exception is taken into consideration. In the second part, the study elucidates the concept of ludic exceptions and dwells on the anthropological examples of the ludic exceptions. In the last part, the decline of ludic elements in modernity is addressed as the main factor for the permanent emergency.

Keywords: emergency, exception, ludic exception, play, sovereignty

Procedia PDF Downloads 69
1319 Access to Natural Resources in the Cameroonian Part of the Logone Basin: A Driver and Mitigation Tool to Ethnical Conflicts

Authors: Bonguen Onouck Rolande Carole, Ndongo Barthelemy

Abstract:

The climate change effects on the Lake Chad, coupled with population growth, have pushed large masses of people of various origins towards the lower part of the lower Logonewatershed in search of the benefits of environmental services, causing pressure on the environment and its resources. Economic services are therefore threatened, and the decrease in resources contributes to the deterioration of the social wellbeing resulting to conflicts among/between local communities, immigrants, displaced people, and foreigners. This paper is an information contribution on ethnical conflicts drivers in the area and the provided local management mechanisms such can help mitigate present or future conflicts in similar areas. It also prints out the necessity to alleviate water access deficit and encourage good practices for the population wellbeing. In order to meet the objective, in 2018, through the interface of the World Bank-Cameroon project-PULCI, data were collected on the field directly by discussing with the population and visiting infrastructures, indirectly by a questionnaire survey. Two administrative divisions were chosen (Logoneet Chari, Mayo-Danay) in which targeted localities were Zina, Mazera, Lahai, Andirni near the Waza Park and Yagoua, Tekele, Pouss, respectively. Due to some sociocultural and religious reasons, some information were acquired through the traditional chiefs. A desk study analysis based on resources access and availability conflicts history, and management mechanism was done. As results, roots drivers of ethnical conflicts are struggles over natural resources access, and the possibility of conflicts increases as the scarcity and vulnerabilities persist, creating more sociocultural gaps and tensions. The mitigation mechanisms though fruitful, are limited. There is poor documentation on the topic, the resources management policies of this basin are unsuitable and ineffective for some. Therefore, the restoration of environmental and ecosystems, the mitigation of climate change effects, and food insecurity are the challenges that must be met to alleviate conflicts in these localities.

Keywords: ethnic, communities, conflicts, mitigation mechanisms, natural resources, logone basin

Procedia PDF Downloads 79
1318 Land Rights, Policy and Cultural Identity in Uganda: Case of the Basongora Community

Authors: Edith Kamakune

Abstract:

As much as Indigenous rights are presumed to be part of the broad human rights regime, members of the indigenous communities have continually suffered violations, exclusions, and threat. There are a number of steps taken from the international community in trying to bridge the gap, and this has been through the inclusion of provisions as well as the passing of conventions and declarations with specific reference to the rights of indigenous peoples. Some examples of indigenous people include theSiberian Yupik of St Lawrence Island; the Ute of Utah; the Cree of Alberta, and the Xosa andKhoiKhoi of Southern Africa. Uganda’s wide cultural heritage has played a key role in the failure to pay special attention to the needs of the rights of indigenous peoples. The 1995 Constitution and the Land Act of 1998 provide for abstract land rights without necessarily paying attention to indigenous communities’ special needs. Basongora are a pastoralist community in Western Uganda whose ancestral land is the present Queen Elizabeth National Park of Western Uganda, Virunga National Park of Eastern Democratic Republic of Congo, and the small percentage of the low lands under the Rwenzori Mountains. Their values and livelihood are embedded in their strong attachment to the land, and this has been at stake for the last about 90 Years. This research was aimed atinvestigating the relationship between land rights and the right to cultural identity among indigenous communities, looking at the policy available on land and culture, and whether the policies are sensitive of the specific issues of vulnerable ethnic groups; and largely the effect of land on the right to cultural identity. The research was guided by three objectives: to examine and contextualize the concept of land rights among the Basongora community; to assess the policy frame work available for the protection of the Basongora community; to investigate the forms of vulnerability of the Basongora community. Quantitative and qualitative methods were used. a case of Kaseseand Kampala Districts were purposefully selected .138 people were recruited through random and nonrandom techniques to participate in the study, and these were 70 questionnaire respondents; 20 face to face interviews respondents; 5 key informants, and 43 participants in focus group discussions; The study established that Land is communally held and used and thatit continues to be a central source of livelihood for the Basongora; land rights are important in multiplication of herds; preservation, development, and promotion of culture and language. Research found gaps in the policy framework since the policies are concerned with tenure issues and the general provisions areambiguous. Oftenly, the Basongora are not called upon to participate in decision making processes, even on issues that affect them. The research findings call forauthorities to allow Basongora to access Queen Elizabeth National Park land for pasture during particular seasons of the year, especially during the dry seasons; land use policy; need for a clear alignment of the description of indigenous communitiesunder the constitution (Uganda, 1995) to the international definition.

Keywords: cultural identity, land rights, protection, uganda

Procedia PDF Downloads 130
1317 Conscription or Constriction: Perception of Students on the Reinforcement of Compulsory Military Service

Authors: Krista Mae F. Ramos, Lance Micaiah C. Dauz, Gylza Nicole D. Bautista, Rua R. Galang, Jeric Xyrus G. Karganilla

Abstract:

With the recent proclamation of the possible reinforcement of Compulsory Military Service in the Philippines, debates and societal talks rose and circulated as opinions and perceptions regarding the topic continue to clash. This study aims to determine the perception of the youth on its reimplementation and identify various advantages and disadvantages based on their perspective. The responses were gathered through a virtual call interview, underwent the process of thematization, and were categorized into different themes. Results reflect that the students perceive compulsory military service as a necessity for national defense but requires a long time that can hinder their education and needs a strong foundation to be implemented and sustained. The participants acknowledged that the practice would instill discipline, patriotism, and nationalism, develop an individual’s physical abilities, provide skills and knowledge and improve a person’s self-defense. However, there are also concerns regarding the prominent military shaping and abuse, their loss of freedom of choice, and the chances of health deterioration.

Keywords: compulsory, military, service, reinforcement, perception

Procedia PDF Downloads 136
1316 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 79
1315 Reasonableness to Strengthen Citizen Participation in Mexican Anti-Corruption Policies

Authors: Amós García Montaño

Abstract:

In a democracy, a public policy must be developed within the regulatory framework and considering citizen participation in its planning, design, execution, and evaluation stages, necessary factors to have both legal support and sufficient legitimacy for its operation. However, the complexity and magnitude of certain public problems results in difficulties for the generation of consensus among society members, leading to unstable and unsuccessful scenarios for the exercise of the right to citizen participation and the generation of effective and efficient public policies. This is the case of public policies against corruption, an issue that in Mexico is difficult to define and generates conflicting opinions. To provide a possible solution to this delicate reality, this paper analyzes the principle of reasonableness as a tool for identifying the basic elements that guarantee a fundamental level of the exercise of the right to citizen participation in the fight against corruption, adopting elements of human rights indicator methodologies. In this sense, the relevance of having a legal framework that establishes obligations to incorporate proactive and transversal citizen participation in the matter is observed. It is also noted the need to monitor the operation of various citizen participation mechanisms in the decision-making processes of the institutions involved in the fight and prevention of corruption, which lead to an increase in the improvement of the perception of the citizen role as a relevant actor in this field. It is concluded that the principle of reasonableness is presented as a very useful tool for the identification of basic elements that facilitate the fulfillment of human rights commitments in the field of public policies.

Keywords: anticorruption, public participation, public policies, reasonableness

Procedia PDF Downloads 66
1314 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021

Authors: Nkosingiphile Mbusozayo Zungu

Abstract:

The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.

Keywords: phishing, cybersecurity, informetrics, information security

Procedia PDF Downloads 88
1313 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda

Authors: Seember Susan Aondoakura

Abstract:

This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.

Keywords: conflict, protection, security, SGBV

Procedia PDF Downloads 76
1312 A Constitutional Theory of the American Presidency

Authors: Elvin Lim

Abstract:

This article integrates the debate about presidential powers with the debate about federalism, arguing that there are two ways of exercising presidential powers, one working in tandem with expanding federal powers, and the other working against it. Alexander Hamilton and Thomas Jefferson—the former a Federalist and the latter echoing the views of many Anti-Federalists—disagreed not only on the constitutional basis of prerogative, but also on the ends for which it should be deployed. This tension has always existed in American politics, and is reproduced today. Modern Democrats and Republicans both want a strong executive, but the Democrats who want a strong executive to pass legislation to expand the reach of the federal government; naturally, they must rely on an equally empowered Congress to do so. Republicans generally do not want an intrusive federal government, which is why their defense of a strong presidency does not come alongside a call for a strong Congress. This distinction cannot be explained without recourse to foundational yet opposing views about the appropriate role of federal power. When we bring federalism back in, we see that there are indeed two presidencies; one neo-Federalist, in favor of moderate presidential prerogative alongside a robust Congress directed collectively to a national state-building agenda and expanding the federal prerogative; another, neo-Anti-Federalist, in favor of expansive presidential prerogative and an ideologically sympathetic Congress equally suspicious of federal power to retard or roll back national state-building in favour of states rights.

Keywords: US presidency, federalism, prerogative, anti-federalism

Procedia PDF Downloads 94
1311 Russia’s Role in Resolving the Nagorno-Karabakh Conflict 1990-2020

Authors: Friba Haidari

Abstract:

The aim of the study is to identify Russia's role in managing the Nagorno-Karabakh conflict betweenArmenia and Azerbaijan during the years 1990 to 2020. The Nagorno-Karabakh crisis can not be considered a mere territorial conflict but also a crossroads of interests of foreign actors. Geopolitical rivalries and the access to energy by regional and trans-regional actors have complicated the crisis and created a security challenge in the region, which is likely to escalate into a full-blown war between the parties involved. The geopolitical situation of Nagorno-Karabakh and its current situation have affected all peripheral states in some way. Russia, as one of the main actors in this scene, has been actively involved since the beginning of the crisis. The Russians have always sought to strengthen their influence and presence in the Nagorno-Karabakh crisis. Russia's efforts to weaken the role of the Minsk Group, The presence of Western actors, and the deployment of Russian forces in the disputed area can be assessed in this context. However, this study seeks to answer the question of what role did Russia play in managing the Nagorno-Karabakh conflict between Armenia and Azerbaijan between 1990 and 2020? The study hypothesizes that Russia has prevented the escalation of the Nagorno-Karabakh conflict through mediation and some coercion. This study is divided into four parts, including conflict management as a theoretical framework; Examining the competition and the role of actors in the Caucasus region, especially the role of the Minsk Group, and what approach or tools and methods Russia has used in its foreign policy in managing the conflict, and finally what are the relations between the countries involved and what will be Russia's role in the future? Was discussed. This study examines the analysis and transfer of ideas and information using authoritative international sources with an explanatory method and shares its results with everyone.

Keywords: Russia, conflict, nagorno-karabakh, management

Procedia PDF Downloads 69
1310 The Decision-Making Process of the Central Banks of Brazil and India in Regional Integration: A Comparative Analysis of MERCOSUR and SAARC (2003-2014)

Authors: Andre Sanches Siqueira Campos

Abstract:

Central banks can play a significant role in promoting regional economic and monetary integration by strengthening the payment and settlement systems. However, close coordination and cooperation require facilitating the implementation of reforms at domestic and cross-border levels in order to benchmark with international standards and commitments to the liberal order. This situation reflects the normative power of the regulatory globalization dimension of strong states, which may drive or constrain regional integration. In the MERCOSUR and SAARC regions, central banks have set financial initiatives that could facilitate South America and South Asia regions to move towards convergence integration and facilitate trade and investments connectivities. This is qualitative method research based on a combination of the Process-Tracing method with Qualitative Comparative Analysis (QCA). This research approaches multiple forms of data based on central banks, regional organisations, national governments, and financial institutions supported by existing literature. The aim of this research is to analyze the decision-making process of the Central Bank of Brazil (BCB) and the Reserve Bank of India (RBI) towards regional financial cooperation by identifying connectivity instruments that foster, gridlock, or redefine cooperation. The BCB and The RBI manage the monetary policy of the largest economies of those regions, which makes regional cooperation a relevant framework to understand how they provide an effective institutional arrangement for regional organisations to achieve some of their key policies and economic objectives. The preliminary conclusion is that both BCB and RBI demonstrate a reluctance to deepen regional cooperation because of the existing economic, political, and institutional asymmetries. Deepening regional cooperation is constrained by the interests of central banks in protecting their economies from risks of instability due to different degrees of development between countries in their regions and international financial crises that have impacted the international system in the 21st century. Reluctant regional integration also provides autonomy for national development and political ground for the contestation of Global Financial Governance by Brazil and India.

Keywords: Brazil, central banks, decision-making process, global financial governance, India, MERCOSUR, connectivity, payment system, regional cooperation, SAARC

Procedia PDF Downloads 87
1309 The Impact of Digital Inclusive Finance on the High-Quality Development of China's Export Trade

Authors: Yao Wu

Abstract:

In the context of financial globalization, China has put forward the policy goal of high-quality development, and the digital economy, with its advantage of information resources, is driving China's export trade to achieve high-quality development. Due to the long-standing financing constraints of small and medium-sized export enterprises, how to expand the export scale of small and medium-sized enterprises has become a major threshold for the development of China's export trade. This paper firstly adopts the hierarchical analysis method to establish the evaluation system of high-quality development of China's export trade; secondly, the panel data of 30 provinces in China from 2011 to 2018 are selected for empirical analysis to establish the impact model of digital inclusive finance on the high-quality development of China's export trade; based on the analysis of heterogeneous enterprise trade model, a mediating effect model is established to verify the mediating role of credit constraint in the development of high-quality export trade in China. Based on the above analysis, this paper concludes that inclusive digital finance, with its unique digital and inclusive nature, alleviates the credit constraint problem among SMEs, enhances the binary marginal effect of SMEs' exports, optimizes their export scale and structure, and promotes the high-quality development of regional and even national export trade. Finally, based on the findings of this paper, we propose insights and suggestions for inclusive digital finance to promote the high-quality development of export trade.

Keywords: digital inclusive finance, high-quality development of export trade, fixed effects, binary marginal effects

Procedia PDF Downloads 68
1308 Beijing Xicheng District Housing Price Econometric Analysis: “Multi-School Zoning”Policy

Authors: Haoxue Cui, Sirui Zhang, Shanshan Gao, Weiyi Zhang, Lantian Wang, Xuanwen Zheng

Abstract:

The 2020 "multi-school zoning" policy makes students ineligible for direct attendance in their district. To study whether the housing price trend of the school district is affected by the policy, This paper studies housing prices based on the school district division in Xicheng District, Beijing. In this paper, we collected housing prices and the basic situation of communities from "Anjuke", which were divided into two periods of 15 months before and after the 731 policy in the Xicheng District, Beijing. Then we used DID model and time fixed effect to investigate the DIFFERENTIAL statistics, that is, the overall net impact of the policy. The results show that the coefficient is negative at a certain statistical level. It indicates that the housing prices of school districts in the Xicheng district decreased after the "multi-school zoning" policy, which shows that the policy has effectively reduced the housing price of school districts in the Xicheng District and laid a foundation for the "double reduction" policy in 2022.

Keywords: “multi-school zoning”policy, DID, time fixed effect, housing prices

Procedia PDF Downloads 127