World Academy of Science, Engineering and Technology
[Law and Political Sciences]
Online ISSN : 1307-6892
1332 Ethical, Legal and Societal Aspects of Unmanned Aircraft in Defence
Authors: Henning Lahmann, Benjamyn I. Scott, Bart Custers
Abstract:
Suboptimal adoption of AI in defence organisations carries risks for the protection of the freedom, safety, and security of society. Despite the vast opportunities that defence AI-technology presents, there are also a variety of ethical, legal, and societal concerns. To ensure the successful use of AI technology by the military, ethical, legal, and societal aspects (ELSA) need to be considered, and their concerns continuously addressed at all levels. This includes ELSA considerations during the design, manufacturing and maintenance of AI-based systems, as well as its utilisation via appropriate military doctrine and training. This raises the question how defence organisations can remain strategically competitive and at the edge of military innovation, while respecting the values of its citizens. This paper will explain the set-up and share preliminary results of a 4-year research project commissioned by the National Research Council in the Netherlands on the ethical, legal, and societal aspects of AI in defence. The project plans to develop a future-proof, independent, and consultative ecosystem for the responsible use of AI in the defence domain. In order to achieve this, the lab shall devise a context-dependent methodology that focuses on the ‘analysis’, ‘design’ and ‘evaluation’ of ELSA of AI-based applications within the military context, which include inter alia unmanned aircraft. This is bolstered as the Lab also recognises and complements the existing methods in regards to human-machine teaming, explainable algorithms, and value-sensitive design. Such methods will be modified for the military context and applied to pertinent case-studies. These case-studies include, among others, the application of autonomous robots (incl. semi- autonomous) and AI-based methods against cognitive warfare. As the perception of the application of AI in the military context, by both society and defence personnel, is important, the Lab will study how these perceptions evolve and vary in different contexts. Furthermore, the Lab will monitor – as they may influence people’s perception – developments in the global technological, military and societal spheres. Although the emphasis of the research project is on different forms of AI in defence, it focuses on several case studies. One of these case studies is on unmanned aircraft, which will also be the focus of the paper. Hence, ethical, legal, and societal aspects of unmanned aircraft in the defence domain will be discussed in detail, including but not limited to privacy issues. Typical other issues concern security (for people, objects, data or other aircraft), privacy (sensitive data, hindrance, annoyance, data collection, function creep), chilling effects, PlayStation mentality, and PTSD.Keywords: autonomous weapon systems, unmanned aircraft, human-machine teaming, meaningful human control, value-sensitive design
Procedia PDF Downloads 931331 Examining First-time Remote Workers’ Perceptions on Work From Home Amidst the COVID-19 Pandemic: The Future Potential of Hybrid Work Mode
Authors: Lina Vyas, Stuti Rawat
Abstract:
The COVID-19 outbreak has forced many employees to extensively adopt remote work or, widely known as work from home (WFH) arrangements. During the last two years, both employers and employees have had the opportunity to be increasingly aware of the benefits and drawbacks of WFH. Likewise, it gained the attention of academics from various schools of thought who have been interested in the future of work practices and work-life balance. Additionally, employees might also have various demands regarding their work practices after the pandemic. This study explores the potential of hybrid ways of working in the post-pandemic period by comparing first-timers who (sometimes or always) worked from home during the pandemic with those who did not, in terms of the aspects of work-life balance, work-life interference, job performance and willingness to work from home after the pandemic. The quantitative research approach was adopted. Data were collected via an online questionnaire from employees working from home in Hong Kong during the pandemic. There were one thousand three hundred and twenty-eight responses, but only 1,235 respondents experienced working from home during the pandemic. The findings reveal that 72.2% never had or hardly experienced work from home prior to the pandemic. There were statistically significant differences between first-timers and non-first-timers in work-life balance and work-life interference. The study also found that first-timers who were always working from home during the pandemic would prefer having longer WFH after the pandemic than those who were sometimes working from home. These results would serve as a basis for policy development, enabling policymakers to design appropriate HR policies and amend them to meet the current context of actual employee needs.Keywords: hybrid working mode, remote working, work from home, work-life balance, workplace
Procedia PDF Downloads 1071330 Application of Infrared Thermal Imaging, Eye Tracking and Behavioral Analysis for Deception Detection
Authors: Petra Hypšová, Martin Seitl
Abstract:
One of the challenges of forensic psychology is to detect deception during a face-to-face interview. In addition to the classical approaches of monitoring the utterance and its components, detection is also sought by observing behavioral and physiological changes that occur as a result of the increased emotional and cognitive load caused by the production of distorted information. Typical are changes in facial temperature, eye movements and their fixation, pupil dilation, emotional micro-expression, heart rate and its variability. Expanding technological capabilities have opened the space to detect these psychophysiological changes and behavioral manifestations through non-contact technologies that do not interfere with face-to-face interaction. Non-contact deception detection methodology is still in development, and there is a lack of studies that combine multiple non-contact technologies to investigate their accuracy, as well as studies that show how different types of lies produced by different interviewers affect physiological and behavioral changes. The main objective of this study is to apply a specific non-contact technology for deception detection. The next objective is to investigate scenarios in which non-contact deception detection is possible. A series of psychophysiological experiments using infrared thermal imaging, eye tracking and behavioral analysis with FaceReader 9.0 software was used to achieve our goals. In the laboratory experiment, 16 adults (12 women, 4 men) between 18 and 35 years of age (SD = 4.42) were instructed to produce alternating prepared and spontaneous truths and lies. The baseline of each proband was also measured, and its results were compared to the experimental conditions. Because the personality of the examiner (particularly gender and facial appearance) to whom the subject is lying can influence physiological and behavioral changes, the experiment included four different interviewers. The interviewer was represented by a photograph of a face that met the required parameters in terms of gender and facial appearance (i.e., interviewer likability/antipathy) to follow standardized procedures. The subject provided all information to the simulated interviewer. During follow-up analyzes, facial temperature (main ROIs: forehead, cheeks, the tip of the nose, chin, and corners of the eyes), heart rate, emotional expression, intensity and fixation of eye movements and pupil dilation were observed. The results showed that the variables studied varied with respect to the production of prepared truths and lies versus the production of spontaneous truths and lies, as well as the variability of the simulated interviewer. The results also supported the assumption of variability in physiological and behavioural values during the subject's resting state, the so-called baseline, and the production of prepared and spontaneous truths and lies. A series of psychophysiological experiments provided evidence of variability in the areas of interest in the production of truths and lies to different interviewers. The combination of technologies used also led to a comprehensive assessment of the physiological and behavioral changes associated with false and true statements. The study presented here opens the space for further research in the field of lie detection with non-contact technologies.Keywords: emotional expression decoding, eye-tracking, functional infrared thermal imaging, non-contact deception detection, psychophysiological experiment
Procedia PDF Downloads 991329 Improve the Provisions in the Life Imprisonment Law in Vietnam
Authors: Nguyen Xuan Thuy
Abstract:
The provisions on life imprisonment in the legal system enable to differentiate criminal liability and individualize the penalties for particularly serious crimes. This punishment acts as an intermediary between the determined imprisonment of a maximum of 20 years and the capital punishment, enabling the penalty system to maintain its internal unity. However, the practice of applying the punishment has been posing many problems that need to be studied in order to come up with solutions to improve the provisions related to the penalty and its effectiveness in the fight against crimes. The article summarizes the law on life imprisonment sentence in the current criminal law to highlight its characteristics and role in Vietnam's Penal Code. It also suggests some solutions to improve the law and its effectiveness in preventing and combating crimes.Keywords: life imprisonment, Vietnam, law, penalty, provisions
Procedia PDF Downloads 981328 The Role of Digital Technology in Crime Prevention: A Case Study of Cellular Forensics Unit, Capital City Police Peshawar
Authors: Muhammad Ashfaq
Abstract:
Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies, and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries, and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police. A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals. Latest digital analysis software should be provided to equip the Cellular Forensic Unit.Keywords: criminology-pakistan, crime prevention-KP, digital forensics, digital technology-pakistan
Procedia PDF Downloads 981327 Saudi Arabia and the Yemen War: A Fruitless Struggle
Authors: Majid Dashtgerd, Eisa Moradi Afrapoli
Abstract:
The “Yemen War” is one of the longest wars of the recent century, which was launched on 26 March 2015 after the Saudi Arabia-led alliance's military intervention in Yemen. The war began with the aim of fighting Yemen's Houthis and preventing Iranian influence in the region, and Saudi leaders expected a quick victory; However, the “Yemen War” lasted about seven years and is still going on (May 2022), and Saudi Arabia has not been able to achieve its strategic objectives. This study seeks to examine some of the most important reasons for Saudi Arabia's protracted war and failure in Yemen.Keywords: Saudi Arabia, yemen war, houthis, Iran
Procedia PDF Downloads 1271326 Contemporary Global Urban Scenarios: An Essay on Urban Insurgencies
Authors: Clovis Ultramari, Lidia Floriani, Debora Cicioli
Abstract:
This paper is a preliminary discussion on the constituency of contemporary global urban scenarios. It is based on secondary sources, mostly from the topics mostly currently discussed by global studies institutes, academic material on the possible components of this phenomenon, and a list of possible scenarios preliminarily proposed by these authors. It also discusses one of these possible scenarios (urban insurgencies) through the lens of a global perspective. Main objective of the research presented in this paper is to produce insights for international aid and development agencies as well as to respond to an increasing interest in the urban studies field in discussing global topics. This paper also results from discussions held in seminars offered by the authors in the graduate program of Urban Management along 2021 and 2022. It is part of a research project that puts together an international team of researches, mostly from the Global South. Results so far obtained refer to conceptual aspects for the determination of global urban scenarios and the presentation of urban insurgencies as worldwide trending urban phenomenon. Presentation in the seminar is part of an ongoing discussion.Keywords: urban global scenarios, contemporary cities, global south, urban insurgencies
Procedia PDF Downloads 1061325 Text Data Preprocessing Library: Bilingual Approach
Authors: Kabil Boukhari
Abstract:
In the context of information retrieval, the selection of the most relevant words is a very important step. In fact, the text cleaning allows keeping only the most representative words for a better use. In this paper, we propose a library for the purpose text preprocessing within an implemented application to facilitate this task. This study has two purposes. The first, is to present the related work of the various steps involved in text preprocessing, presenting the segmentation, stemming and lemmatization algorithms that could be efficient in the rest of study. The second, is to implement a developed tool for text preprocessing in French and English. This library accepts unstructured text as input and provides the preprocessed text as output, based on a set of rules and on a base of stop words for both languages. The proposed library has been made on different corpora and gave an interesting result.Keywords: text preprocessing, segmentation, knowledge extraction, normalization, text generation, information retrieval
Procedia PDF Downloads 941324 Red Dawn in the Desert: A World-Systems Analysis of the Maritime Silk Road Initiative
Authors: Toufic Sarieddine
Abstract:
The current debate on the hegemonic impact of China’s Belt and Road Initiative (BRI) is of two opposing strands: Resilient and absolute US hegemony on the one hand and various models of multipolar hegemony such as bifurcation on the other. Bifurcation theories illustrate an unprecedented division of hegemonic functions between China and the US, whereby Beijing becomes the world’s economic hegemon, leaving Washington the world’s military hegemon and security guarantor. While consensus points to China being the main driver of unipolarity’s rupturing, the debate among bifurcationists is on the location of the first rupture. In this regard, the Middle East and North Africa (MENA) region has seen increasing Chinese foreign direct investment in recent years while that to other regions has declined, ranking it second in 2018 as part of the financing for the Maritime Silk Road Initiative (MSRI). China has also become the top trade partner of 11 states in the MENA region, as well as its top source of machine imports, surpassing the US and achieving an overall trade surplus almost double that of Washington’s. These are among other features outlined in world-systems analysis (WSA) literature which correspond with the emergence of a new hegemon. WSA is further utilized to gauge other facets of China’s increasing involvement in MENA and assess whether bifurcation is unfolding therein. These features of hegemony include the adoption of China’s modi operandi, economic dominance in production, trade, and finance, military capacity, cultural hegemony in ideology, education, and language, and the promotion of a general interest around which to rally potential peripheries (MENA states in this case). China’s modi operandi has seen some adoption with regards to support against the United Nations Convention on the Law of the Sea, oil bonds denominated in the yuan, and financial institutions such as the Shanghai Gold Exchange enjoying increasing Arab patronage. However, recent elections in Qatar, as well as liberal reforms in Saudi Arabia, demonstrate Washington’s stronger normative influence. Meanwhile, Washington’s economic dominance is challenged by China’s sizable machine exports, increasing overall imports, and widening trade surplus, but retains some clout via dominant arms and transport exports, as well as free-trade deals across the region. Militarily, Washington bests Beijing’s arms exports, has a dominant and well-established presence in the region, and successfully blocked Beijing’s attempt to penetrate through the UAE. Culturally, Beijing enjoys higher favorability in Arab public opinion, and its broadcast networks have found some resonance with Arab audiences. In education, the West remains MENA students’ preferred destination. Further, while Mandarin has become increasingly available in schools across MENA, its usage and availability still lag far behind English. Finally, Beijing’s general interest in infrastructure provision and prioritizing economic development over social justice and democracy provides an avenue for increased incorporation between Beijing and the MENA region. The overall analysis shows solid progress towards bifurcation in MENA.Keywords: belt and road initiative, hegemony, Middle East and North Africa, world-systems analysis
Procedia PDF Downloads 1081323 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe
Authors: Shivalaxmi Arumugham
Abstract:
Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA
Procedia PDF Downloads 971322 Impacts of Artificial Intelligence on the Doctor-Patient Relationship: Ethical Principles, Informed Consent and Medical Obligation
Authors: Rafaella Nogaroli
Abstract:
It is presented hypothetical cases in the context of AI algorithms to support clinical decisions, in order to discuss the importance of doctors to respect AI ethical principles. Regarding the principle of transparency and explanation, there is an impact on the new model of patient consent and on the understanding of qualified information. Besides, the human control of technology (AI as a tool) should guide the physician's activity; otherwise, he breaks the patient's legitimate expectation in a specific result, with the consequent transformation of the medical obligation nature.Keywords: medical law, artificial intelligence, ethical principles, patient´s informed consent, medical obligations
Procedia PDF Downloads 1021321 Time for the United Kingdom to Implement Statutory Clawback Provision on Directors’ Remunerations: Lessons and Experiences from the United States and the Netherlands
Authors: John Kong Shan Ho
Abstract:
Senior executives’ remunerations of public companies have aroused much debate and attention in the media. In the aftermath of the Global Financial Crisis (GFC), excessive executive pay arrangements were blamed for contributing to excessive risk-taking, which caused the financial meltdown. Since then, regulators and lawmakers around the world have introduced regulations to strengthen the corporate governance of listed companies. A key aspect of such reform is by strengthening regulatory intervention over executives’ remunerations and increasing the transparency of such information. This article is written against such background and examines the recent proposal by the UK BEIS to ask the FRC to amend the UK Corporate Governance Code (UKCGC) to strengthen clawback provisions for directors’ remuneration in listed companies as part of its audit reform. The article examines the background and debates regarding the possible implementation of such a measure in the UK. Contrary to the BEIS’ proposal, it argues that implementing it through the UKCGC is unlikely to enhance overall corporate governance and audit quality. It argues that the UK should follow the footsteps of its US and Dutch counterparts by enacting legislation to claw back directors’ remunerations. It will also provide some recommendations as to the key factors that need to be considered in drafting such a statutory provision.Keywords: company law, corporate governance, agency problem, directors' remunerations, clawbacks
Procedia PDF Downloads 1341320 The Ludic Exception and the Permanent Emergency: Understanding the Emergency Regimes with the Concept of Play
Authors: Mete Ulaş Aksoy
Abstract:
In contemporary politics, the state of emergency has become a permanent and salient feature of politics. This study aims to clarify the anthropological and ontological dimensions of the permanent state of emergency. It pays special attention to the structural relation between the exception and play. Focusing on the play in the context of emergency and exception enables the recognition of the difference and sometimes the discrepancy between the exception and emergency, which has passed into oblivion because of the frequency and normalization of emergency situations. This study coins the term “ludic exception” in order to highlight the difference between the exceptions in which exuberance and paroxysm rule over the socio-political life and the permanent emergency that protects the authority with a sort of extra-legality. The main thesis of the study is that the ludic elements such as risk, conspicuous consumption, sacrificial gestures, agonism, etc. circumscribe the exceptional moments temporarily, preventing them from being routine and normal. The study also emphasizes the decline of ludic elements in modernity as the main factor in the transformation of the exceptions into permanent emergency situations. In the introduction, the relationship between play and exception is taken into consideration. In the second part, the study elucidates the concept of ludic exceptions and dwells on the anthropological examples of the ludic exceptions. In the last part, the decline of ludic elements in modernity is addressed as the main factor for the permanent emergency.Keywords: emergency, exception, ludic exception, play, sovereignty
Procedia PDF Downloads 901319 Access to Natural Resources in the Cameroonian Part of the Logone Basin: A Driver and Mitigation Tool to Ethnical Conflicts
Authors: Bonguen Onouck Rolande Carole, Ndongo Barthelemy
Abstract:
The climate change effects on the Lake Chad, coupled with population growth, have pushed large masses of people of various origins towards the lower part of the lower Logonewatershed in search of the benefits of environmental services, causing pressure on the environment and its resources. Economic services are therefore threatened, and the decrease in resources contributes to the deterioration of the social wellbeing resulting to conflicts among/between local communities, immigrants, displaced people, and foreigners. This paper is an information contribution on ethnical conflicts drivers in the area and the provided local management mechanisms such can help mitigate present or future conflicts in similar areas. It also prints out the necessity to alleviate water access deficit and encourage good practices for the population wellbeing. In order to meet the objective, in 2018, through the interface of the World Bank-Cameroon project-PULCI, data were collected on the field directly by discussing with the population and visiting infrastructures, indirectly by a questionnaire survey. Two administrative divisions were chosen (Logoneet Chari, Mayo-Danay) in which targeted localities were Zina, Mazera, Lahai, Andirni near the Waza Park and Yagoua, Tekele, Pouss, respectively. Due to some sociocultural and religious reasons, some information were acquired through the traditional chiefs. A desk study analysis based on resources access and availability conflicts history, and management mechanism was done. As results, roots drivers of ethnical conflicts are struggles over natural resources access, and the possibility of conflicts increases as the scarcity and vulnerabilities persist, creating more sociocultural gaps and tensions. The mitigation mechanisms though fruitful, are limited. There is poor documentation on the topic, the resources management policies of this basin are unsuitable and ineffective for some. Therefore, the restoration of environmental and ecosystems, the mitigation of climate change effects, and food insecurity are the challenges that must be met to alleviate conflicts in these localities.Keywords: ethnic, communities, conflicts, mitigation mechanisms, natural resources, logone basin
Procedia PDF Downloads 1111318 Land Rights, Policy and Cultural Identity in Uganda: Case of the Basongora Community
Authors: Edith Kamakune
Abstract:
As much as Indigenous rights are presumed to be part of the broad human rights regime, members of the indigenous communities have continually suffered violations, exclusions, and threat. There are a number of steps taken from the international community in trying to bridge the gap, and this has been through the inclusion of provisions as well as the passing of conventions and declarations with specific reference to the rights of indigenous peoples. Some examples of indigenous people include theSiberian Yupik of St Lawrence Island; the Ute of Utah; the Cree of Alberta, and the Xosa andKhoiKhoi of Southern Africa. Uganda’s wide cultural heritage has played a key role in the failure to pay special attention to the needs of the rights of indigenous peoples. The 1995 Constitution and the Land Act of 1998 provide for abstract land rights without necessarily paying attention to indigenous communities’ special needs. Basongora are a pastoralist community in Western Uganda whose ancestral land is the present Queen Elizabeth National Park of Western Uganda, Virunga National Park of Eastern Democratic Republic of Congo, and the small percentage of the low lands under the Rwenzori Mountains. Their values and livelihood are embedded in their strong attachment to the land, and this has been at stake for the last about 90 Years. This research was aimed atinvestigating the relationship between land rights and the right to cultural identity among indigenous communities, looking at the policy available on land and culture, and whether the policies are sensitive of the specific issues of vulnerable ethnic groups; and largely the effect of land on the right to cultural identity. The research was guided by three objectives: to examine and contextualize the concept of land rights among the Basongora community; to assess the policy frame work available for the protection of the Basongora community; to investigate the forms of vulnerability of the Basongora community. Quantitative and qualitative methods were used. a case of Kaseseand Kampala Districts were purposefully selected .138 people were recruited through random and nonrandom techniques to participate in the study, and these were 70 questionnaire respondents; 20 face to face interviews respondents; 5 key informants, and 43 participants in focus group discussions; The study established that Land is communally held and used and thatit continues to be a central source of livelihood for the Basongora; land rights are important in multiplication of herds; preservation, development, and promotion of culture and language. Research found gaps in the policy framework since the policies are concerned with tenure issues and the general provisions areambiguous. Oftenly, the Basongora are not called upon to participate in decision making processes, even on issues that affect them. The research findings call forauthorities to allow Basongora to access Queen Elizabeth National Park land for pasture during particular seasons of the year, especially during the dry seasons; land use policy; need for a clear alignment of the description of indigenous communitiesunder the constitution (Uganda, 1995) to the international definition.Keywords: cultural identity, land rights, protection, uganda
Procedia PDF Downloads 1561317 Conscription or Constriction: Perception of Students on the Reinforcement of Compulsory Military Service
Authors: Krista Mae F. Ramos, Lance Micaiah C. Dauz, Gylza Nicole D. Bautista, Rua R. Galang, Jeric Xyrus G. Karganilla
Abstract:
With the recent proclamation of the possible reinforcement of Compulsory Military Service in the Philippines, debates and societal talks rose and circulated as opinions and perceptions regarding the topic continue to clash. This study aims to determine the perception of the youth on its reimplementation and identify various advantages and disadvantages based on their perspective. The responses were gathered through a virtual call interview, underwent the process of thematization, and were categorized into different themes. Results reflect that the students perceive compulsory military service as a necessity for national defense but requires a long time that can hinder their education and needs a strong foundation to be implemented and sustained. The participants acknowledged that the practice would instill discipline, patriotism, and nationalism, develop an individual’s physical abilities, provide skills and knowledge and improve a person’s self-defense. However, there are also concerns regarding the prominent military shaping and abuse, their loss of freedom of choice, and the chances of health deterioration.Keywords: compulsory, military, service, reinforcement, perception
Procedia PDF Downloads 1701316 Risks beyond Cyber in IoT Infrastructure and Services
Authors: Mattias Bergstrom
Abstract:
Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.Keywords: IoT, security, infrastructure, SCADA, blockchain, AI
Procedia PDF Downloads 1071315 Reasonableness to Strengthen Citizen Participation in Mexican Anti-Corruption Policies
Authors: Amós García Montaño
Abstract:
In a democracy, a public policy must be developed within the regulatory framework and considering citizen participation in its planning, design, execution, and evaluation stages, necessary factors to have both legal support and sufficient legitimacy for its operation. However, the complexity and magnitude of certain public problems results in difficulties for the generation of consensus among society members, leading to unstable and unsuccessful scenarios for the exercise of the right to citizen participation and the generation of effective and efficient public policies. This is the case of public policies against corruption, an issue that in Mexico is difficult to define and generates conflicting opinions. To provide a possible solution to this delicate reality, this paper analyzes the principle of reasonableness as a tool for identifying the basic elements that guarantee a fundamental level of the exercise of the right to citizen participation in the fight against corruption, adopting elements of human rights indicator methodologies. In this sense, the relevance of having a legal framework that establishes obligations to incorporate proactive and transversal citizen participation in the matter is observed. It is also noted the need to monitor the operation of various citizen participation mechanisms in the decision-making processes of the institutions involved in the fight and prevention of corruption, which lead to an increase in the improvement of the perception of the citizen role as a relevant actor in this field. It is concluded that the principle of reasonableness is presented as a very useful tool for the identification of basic elements that facilitate the fulfillment of human rights commitments in the field of public policies.Keywords: anticorruption, public participation, public policies, reasonableness
Procedia PDF Downloads 831314 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021
Authors: Nkosingiphile Mbusozayo Zungu
Abstract:
The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.Keywords: phishing, cybersecurity, informetrics, information security
Procedia PDF Downloads 1131313 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda
Authors: Seember Susan Aondoakura
Abstract:
This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.Keywords: conflict, protection, security, SGBV
Procedia PDF Downloads 961312 A Constitutional Theory of the American Presidency
Authors: Elvin Lim
Abstract:
This article integrates the debate about presidential powers with the debate about federalism, arguing that there are two ways of exercising presidential powers, one working in tandem with expanding federal powers, and the other working against it. Alexander Hamilton and Thomas Jefferson—the former a Federalist and the latter echoing the views of many Anti-Federalists—disagreed not only on the constitutional basis of prerogative, but also on the ends for which it should be deployed. This tension has always existed in American politics, and is reproduced today. Modern Democrats and Republicans both want a strong executive, but the Democrats who want a strong executive to pass legislation to expand the reach of the federal government; naturally, they must rely on an equally empowered Congress to do so. Republicans generally do not want an intrusive federal government, which is why their defense of a strong presidency does not come alongside a call for a strong Congress. This distinction cannot be explained without recourse to foundational yet opposing views about the appropriate role of federal power. When we bring federalism back in, we see that there are indeed two presidencies; one neo-Federalist, in favor of moderate presidential prerogative alongside a robust Congress directed collectively to a national state-building agenda and expanding the federal prerogative; another, neo-Anti-Federalist, in favor of expansive presidential prerogative and an ideologically sympathetic Congress equally suspicious of federal power to retard or roll back national state-building in favour of states rights.Keywords: US presidency, federalism, prerogative, anti-federalism
Procedia PDF Downloads 1171311 Russia’s Role in Resolving the Nagorno-Karabakh Conflict 1990-2020
Authors: Friba Haidari
Abstract:
The aim of the study is to identify Russia's role in managing the Nagorno-Karabakh conflict betweenArmenia and Azerbaijan during the years 1990 to 2020. The Nagorno-Karabakh crisis can not be considered a mere territorial conflict but also a crossroads of interests of foreign actors. Geopolitical rivalries and the access to energy by regional and trans-regional actors have complicated the crisis and created a security challenge in the region, which is likely to escalate into a full-blown war between the parties involved. The geopolitical situation of Nagorno-Karabakh and its current situation have affected all peripheral states in some way. Russia, as one of the main actors in this scene, has been actively involved since the beginning of the crisis. The Russians have always sought to strengthen their influence and presence in the Nagorno-Karabakh crisis. Russia's efforts to weaken the role of the Minsk Group, The presence of Western actors, and the deployment of Russian forces in the disputed area can be assessed in this context. However, this study seeks to answer the question of what role did Russia play in managing the Nagorno-Karabakh conflict between Armenia and Azerbaijan between 1990 and 2020? The study hypothesizes that Russia has prevented the escalation of the Nagorno-Karabakh conflict through mediation and some coercion. This study is divided into four parts, including conflict management as a theoretical framework; Examining the competition and the role of actors in the Caucasus region, especially the role of the Minsk Group, and what approach or tools and methods Russia has used in its foreign policy in managing the conflict, and finally what are the relations between the countries involved and what will be Russia's role in the future? Was discussed. This study examines the analysis and transfer of ideas and information using authoritative international sources with an explanatory method and shares its results with everyone.Keywords: Russia, conflict, nagorno-karabakh, management
Procedia PDF Downloads 911310 The Decision-Making Process of the Central Banks of Brazil and India in Regional Integration: A Comparative Analysis of MERCOSUR and SAARC (2003-2014)
Authors: Andre Sanches Siqueira Campos
Abstract:
Central banks can play a significant role in promoting regional economic and monetary integration by strengthening the payment and settlement systems. However, close coordination and cooperation require facilitating the implementation of reforms at domestic and cross-border levels in order to benchmark with international standards and commitments to the liberal order. This situation reflects the normative power of the regulatory globalization dimension of strong states, which may drive or constrain regional integration. In the MERCOSUR and SAARC regions, central banks have set financial initiatives that could facilitate South America and South Asia regions to move towards convergence integration and facilitate trade and investments connectivities. This is qualitative method research based on a combination of the Process-Tracing method with Qualitative Comparative Analysis (QCA). This research approaches multiple forms of data based on central banks, regional organisations, national governments, and financial institutions supported by existing literature. The aim of this research is to analyze the decision-making process of the Central Bank of Brazil (BCB) and the Reserve Bank of India (RBI) towards regional financial cooperation by identifying connectivity instruments that foster, gridlock, or redefine cooperation. The BCB and The RBI manage the monetary policy of the largest economies of those regions, which makes regional cooperation a relevant framework to understand how they provide an effective institutional arrangement for regional organisations to achieve some of their key policies and economic objectives. The preliminary conclusion is that both BCB and RBI demonstrate a reluctance to deepen regional cooperation because of the existing economic, political, and institutional asymmetries. Deepening regional cooperation is constrained by the interests of central banks in protecting their economies from risks of instability due to different degrees of development between countries in their regions and international financial crises that have impacted the international system in the 21st century. Reluctant regional integration also provides autonomy for national development and political ground for the contestation of Global Financial Governance by Brazil and India.Keywords: Brazil, central banks, decision-making process, global financial governance, India, MERCOSUR, connectivity, payment system, regional cooperation, SAARC
Procedia PDF Downloads 1141309 The Impact of Digital Inclusive Finance on the High-Quality Development of China's Export Trade
Authors: Yao Wu
Abstract:
In the context of financial globalization, China has put forward the policy goal of high-quality development, and the digital economy, with its advantage of information resources, is driving China's export trade to achieve high-quality development. Due to the long-standing financing constraints of small and medium-sized export enterprises, how to expand the export scale of small and medium-sized enterprises has become a major threshold for the development of China's export trade. This paper firstly adopts the hierarchical analysis method to establish the evaluation system of high-quality development of China's export trade; secondly, the panel data of 30 provinces in China from 2011 to 2018 are selected for empirical analysis to establish the impact model of digital inclusive finance on the high-quality development of China's export trade; based on the analysis of heterogeneous enterprise trade model, a mediating effect model is established to verify the mediating role of credit constraint in the development of high-quality export trade in China. Based on the above analysis, this paper concludes that inclusive digital finance, with its unique digital and inclusive nature, alleviates the credit constraint problem among SMEs, enhances the binary marginal effect of SMEs' exports, optimizes their export scale and structure, and promotes the high-quality development of regional and even national export trade. Finally, based on the findings of this paper, we propose insights and suggestions for inclusive digital finance to promote the high-quality development of export trade.Keywords: digital inclusive finance, high-quality development of export trade, fixed effects, binary marginal effects
Procedia PDF Downloads 931308 Beijing Xicheng District Housing Price Econometric Analysis: “Multi-School Zoning”Policy
Authors: Haoxue Cui, Sirui Zhang, Shanshan Gao, Weiyi Zhang, Lantian Wang, Xuanwen Zheng
Abstract:
The 2020 "multi-school zoning" policy makes students ineligible for direct attendance in their district. To study whether the housing price trend of the school district is affected by the policy, This paper studies housing prices based on the school district division in Xicheng District, Beijing. In this paper, we collected housing prices and the basic situation of communities from "Anjuke", which were divided into two periods of 15 months before and after the 731 policy in the Xicheng District, Beijing. Then we used DID model and time fixed effect to investigate the DIFFERENTIAL statistics, that is, the overall net impact of the policy. The results show that the coefficient is negative at a certain statistical level. It indicates that the housing prices of school districts in the Xicheng district decreased after the "multi-school zoning" policy, which shows that the policy has effectively reduced the housing price of school districts in the Xicheng District and laid a foundation for the "double reduction" policy in 2022.Keywords: “multi-school zoning”policy, DID, time fixed effect, housing prices
Procedia PDF Downloads 1601307 Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan
Authors: Ishtiaq Ahmad Gondal, Mubasher Hussain
Abstract:
Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard.Keywords: social justice, counterterrorism, educational policy, religion, peace, terrorism
Procedia PDF Downloads 1101306 Overview of the Public Service Executive Training System in Hungary
Authors: Csilla Paksi-Petró
Abstract:
The Hungarian national public administration training system providing continuous, lifelong further training to some ten thousand executives in public administration was launched in 2014, adding skills and competency development to the previous training solutions, which had a mainly legal and professional approach. The executive training system is being continuously developed since tackling the existing qualitative, and quantitative challenges calls for the introduction of novel, innovative solutions. With a gap-filling character, this study presents, in brief, the last eight years of system of executive training in public administration, supported by the outcomes of the author's empirical research, makes suggestions for the possible directions of its further development. Through this article, the reader may obtain an overview of the current Hungarian civil service further training system, its institution system, the method of its application, its target groups, its results, and its development prospects. By reading the article, the reader will get acquainted with the good practices of the Hungarian civil service further training system.Keywords: coaching, e-learning, executive development, further-training
Procedia PDF Downloads 1211305 Exploring Environmental, Social, and Governance (ESG) Standards for Space Exploration
Authors: Rachael Sullivan, Joshua Berman
Abstract:
The number of satellites orbiting earth are in the thousands now. Commercial launches are increasing, and civilians are venturing into the outer reaches of the atmosphere. As the space industry continues to grow and evolve, so too will the demand on resources, the disparities amongst socio-economic groups, and space company governance standards. Outside of just ensuring that space operations are compliant with government regulations, export controls, and international sanctions, companies should also keep in mind the impact their operations will have on society and the environment. Those looking to expand their operations into outer space should remain mindful of both the opportunities and challenges that they could encounter along the way. From commercial launches promoting civilian space travel—like the recent launches from Blue Origin, Virgin Galactic, and Space X—to regulatory and policy shifts, the commercial landscape beyond the Earth's atmosphere is evolving. But practices will also have to become sustainable. Through a review and analysis of space industry trends, international government regulations, and empirical data, this research explores how Environmental, Social, and Governance (ESG) reporting and investing will manifest within a fast-changing space industry.Institutions, regulators, investors, and employees are increasingly relying on ESG. Those working in the space industry will be no exception. Companies (or investors) that are already engaging or plan to engage in space operations should consider 1) environmental standards and objectives when tackling space debris and space mining, 2) social standards and objectives when considering how such practices may impact access and opportunities for different socioeconomic groups to the benefits of space exploration, and 3) how decision-making and governing boards will function ethically, equitably, and sustainably as we chart new paths and encounter novel challenges in outer space.Keywords: climate, environment, ESG, law, outer space, regulation
Procedia PDF Downloads 1521304 Intellectual Property and SMEs in the Baltic Sea Region: A Comparative Study on the Use of the Utility Model Protection
Authors: Christina Wainikka, Besrat Tesfaye
Abstract:
Several of the countries in the Baltic Sea region are ranked high in international innovations rankings, such as the Global Innovation Index and European Innovation Scoreboard. There are however some concerns in the performance of different countries. For example, there is a widely spread notion about “The Swedish Paradox”. Sweden is ranked high due to investments in R&D and patent activity, but the outcome is not as high as could be expected. SMEs in Sweden are also below EU average when it comes to registering intellectual property rights such as patents and trademarks. This study is concentrating on the protection of utility model. This intellectual property right does not exist in Sweden, but in for example Finland and Germany. The utility model protection is sometimes referred to as a “patent light” since it is easier to obtain than the patent protection but at the same time does cover technical solutions. In examining statistics on patent activities and activities in registering utility models it is clear that utility model protection is scarcely used in the countries that have the protection. In Germany 10 577 applications were made in 2021. In Finland there were 259 applications made in 2021. This can be compared with patent applications that were 58 568 in Germany in 2021 and 1 662 in Finland in 2021. In Sweden there has never been a protection for utility models. The only protection for technical solutions is patents and business secrets. The threshold for obtaining a patent is high, due to the legal requirements and the costs. The patent protection is there for often not chosen by SMEs in Sweden. This study examines whether the protection of utility models in other countries in the Baltic region provide SMEs in these countries with better options to protect their innovations. The legal methodology is comparative law. In order to study the effects of the legal differences statistics are examined and interviews done with SMEs from different industries.Keywords: baltic sea region, comparative law, SME, utility model
Procedia PDF Downloads 1141303 Trademarks and Non-Fungible Tokens: New Frontiers for Trademark Law
Authors: Dima Basma
Abstract:
The unprecedented expansion in the use of Non-Fungible Tokens (NFTS) has prompted luxury brand owners to file their trademark applications for the use of their marks in the metaverse world. While NFTs provide a favorable tool for product traceability and anti-counterfeiting endeavors, the legal ramifications of such abrupt shift are complex, diverse, and yet to be understood. Practically, a sizable number of NFT creators are minting digital tokens associated with existing trademarks, selling them at strikingly high rates, thus disadvantaging trademark owners who joined and are yet to join the meta-verse world. As a result, multiple luxury brands are filing confusion and dilution lawsuits against alleged artists offering for sale NFTs depicting reputable marks labeling their use as “parody” and “social commentary.” Given the already muddled state of trademark law in relation to both traditional and modern infringement criteria, this paper aims to explore the feasibility of the current system in dealing with the emerging NFT trends. The paper firstly delves into the intersection between trademarks and NFTs. Furthermore, in light of the striking increase in NFT use, the paper sheds critical light on the shortcoming of the current system. Finally, the paper provides recommendations for overcoming current and prospective challenges in this area.Keywords: trademarks, NFTs, dilution, social commentary
Procedia PDF Downloads 117