Search results for: dedicated protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2873

Search results for: dedicated protection

2603 Externalised Migration Controls and the Deportation of Minors and Potential Refugees from Mexico

Authors: Vickie Knox

Abstract:

Since the ‘urgent humanitarian crisis’ of the arrival of tens of thousands of Central American minors at the Mexico-US border in early 2014, the USA has increasingly externalised migration controls to Mexico. Although the resulting policy ‘Plan Frontera Sur’ claimed to protect migrants’ human rights, it has manifested as harshly delivered in-country controls and an alarming increase in deportations, particularly of minors. This is of particular concern given the ongoing situation of forced migration caused by criminal violence in Central America because these deportations do not all comply with Mexico’s international obligations and with its own legal framework for international protection that allows inter alia verbal asylum claims and grants minors additional protection against deportation. Notably, the volume of deportations, the speed with which they are carried out and the lack of adequate screening indicate non-compliance with the principle of non-refoulement and the right to claim asylum or other forms of protection. Based on qualitative data gathered in fieldwork in 2015 and quantitative data covering the period 2014-2016, this research details three types of adverse outcome resulting from these externalised controls: human rights violations perpetrated in order to deliver the policy–namely, deportations that may not comply with the principle of non-refoulement or the protection of minors; human rights violations perpetrated in the execution of policy–such as violations by state actors during apprehension and detention; and adverse consequences of the policy – such as increased risk during transit. This research has particular resonance as the Trump era brings tighter enforcement in the region, and has broader relevance for the study of externalisation tools on a global level.

Keywords: deportation, externalisation, forced migration, non-refoulement

Procedia PDF Downloads 151
2602 Simple and Effective Method of Lubrication and Wear Protection

Authors: Buddha Ratna Shrestha, Jimmy Faivre, Xavier Banquy

Abstract:

By precisely controlling the molecular interactions between anti-wear macromolecules and bottle-brush lubricating molecules in the solution state, we obtained a fluid with excellent lubricating and wear protection capabilities. The reason for this synergistic behavior relies on the subtle interaction forces between the fluid components which allow the confined macromolecules to sustain high loads under shear without rupture. Our results provide rational guides to design such fluids for virtually any type of surfaces. The lowest friction coefficient and the maximum pressure that it can sustain is 5*10-3 and 2.5 MPa which is close to the physiological pressure. Lubricating and protecting surfaces against wear using liquid lubricants is a great technological challenge. Until now, wear protection was usually imparted by surface coatings involving complex chemical modifications of the surface while lubrication was provided by a lubricating fluid. Hence, we here research for a simple, effective and applicable solution to the above problem using surface force apparatus (SFA). SFA is a powerful technique with sub-angstrom resolution in distance and 10 nN/m resolution in interaction force while performing friction experiment. Thus, SFA is used to have the direct insight into interaction force, material and friction at interface. Also, we always know the exact contact area. From our experiments, we found that by precisely controlling the molecular interactions between anti-wear macromolecules and lubricating molecules, we obtained a fluid with excellent lubricating and wear protection capabilities. The reason for this synergistic behavior relies on the subtle interaction forces between the fluid components which allow the confined macromolecules to sustain high loads under shear without rupture. The lowest friction coefficient and the maximum pressure that it can sustain in our system is 5*10-3 and 2.5 GPA which is well above the physiological pressure. Our results provide rational guides to design such fluids for virtually any type of surfaces. Most importantly this process is simple, effective and applicable method of lubrication and protection as until now wear protection was usually imparted by surface coatings involving complex chemical modifications of the surface. Currently, the frictional data that are obtained while sliding the flat mica surfaces are compared and confirmed that a particular mixture of solution was found to surpass all other combination. So, further we would like to confirm that the lubricating and antiwear protection remains the same by performing the friction experiments in synthetic cartilages.

Keywords: bottle brush polymer, hyaluronic acid, lubrication, tribology

Procedia PDF Downloads 263
2601 Views on Abortion and Case Law on International and European Levels: Past and Present Jurisprudence

Authors: Aurélie Cassiers

Abstract:

In this presentation, an overview is given of the freedom of states to legislate concerning abortion. Today, access to safe and legal abortion is still a hot topic in many countries in the world. Abortion policies try to strike a balance between women’s rights to self-determination and private life on the one hand, and the protection of the life of unborn children on the other. Each country has different religious, cultural and political views on abortion, and therefore specific legislations. However, citizens may submit a complaint at international courts when they find their national legislation too restrictive. The study is discussed of the development of the ECtHR, UNCHR, and IACHR case law, regarding the question of the ‘right to abort’ and indirectly of the protection of the unborn children. Each relevant case is analyzed to answer the following questions: Is the unborn child protected, and if so, how? Why does the woman want to abort and how is her interest or right protected? How is a fair balance reached between the different interests? Is the state completely free to write policies that restrict abortion? What are the factors to determine the margin of appreciation of the state? In conclusion, does this specific court recognize a right to abort, and if so, under which conditions? To conclude, this presentation shows that each court has its own perspective on and perception of abortion, and its own criteria to determine whether the state is complying with international norms regarding individual liberty and protection of the children.

Keywords: abortion, international courts, unborn children, women rights

Procedia PDF Downloads 129
2600 Decision Support System for the Management of the Shandong Peninsula, China

Authors: Natacha Fery, Guilherme L. Dalledonne, Xiangyang Zheng, Cheng Tang, Roberto Mayerle

Abstract:

A Decision Support System (DSS) for supporting decision makers in the management of the Shandong Peninsula has been developed. Emphasis has been given to coastal protection, coastal cage aquaculture and harbors. The investigations were done in the framework of a joint research project funded by the German Ministry of Education and Research (BMBF) and the Chinese Academy of Sciences (CAS). In this paper, a description of the DSS, the development of its components, and results of its application are presented. The system integrates in-situ measurements, process-based models, and a database management system. Numerical models for the simulation of flow, waves, sediment transport and morphodynamics covering the entire Bohai Sea are set up based on the Delft3D modelling suite (Deltares). Calibration and validation of the models were realized based on the measurements of moored Acoustic Doppler Current Profilers (ADCP) and High Frequency (HF) radars. In order to enable cost-effective and scalable applications, a database management system was developed. It enhances information processing, data evaluation, and supports the generation of data products. Results of the application of the DSS to the management of coastal protection, coastal cage aquaculture and harbors are presented here. Model simulations covering the most severe storms observed during the last decades were carried out leading to an improved understanding of hydrodynamics and morphodynamics. Results helped in the identification of coastal stretches subjected to higher levels of energy and improved support for coastal protection measures.

Keywords: coastal protection, decision support system, in-situ measurements, numerical modelling

Procedia PDF Downloads 195
2599 Personal Data Protection: A Legal Framework for Health Law in Turkey

Authors: Veli Durmus, Mert Uydaci

Abstract:

Every patient who needs to get a medical treatment should share health-related personal data with healthcare providers. Therefore, personal health data plays an important role to make health decisions and identify health threats during every encounter between a patient and caregivers. In other words, health data can be defined as privacy and sensitive information which is protected by various health laws and regulations. In many cases, the data are an outcome of the confidential relationship between patients and their healthcare providers. Globally, almost all nations have own laws, regulations or rules in order to protect personal data. There is a variety of instruments that allow authorities to use the health data or to set the barriers data sharing across international borders. For instance, Directive 95/46/EC of the European Union (EU) (also known as EU Data Protection Directive) establishes harmonized rules in European borders. In addition, the General Data Protection Regulation (GDPR) will set further common principles in 2018. Because of close policy relationship with EU, this study provides not only information on regulations, directives but also how they play a role during the legislative process in Turkey. Even if the decision is controversial, the Board has recently stated that private or public healthcare institutions are responsible for the patient call system, for doctors to call people waiting outside a consultation room, to prevent unlawful processing of personal data and unlawful access to personal data during the treatment. In Turkey, vast majority private and public health organizations provide a service that ensures personal data (i.e. patient’s name and ID number) to call the patient. According to the Board’s decision, hospital or other healthcare institutions are obliged to take all necessary administrative precautions and provide technical support to protect patient privacy. However, this application does not effectively and efficiently performing in most health services. For this reason, it is important to draw a legal framework of personal health data by stating what is the main purpose of this regulation and how to deal with complicated issues on personal health data in Turkey. The research is descriptive on data protection law for health care setting in Turkey. Primary as well as secondary data has been used for the study. The primary data includes the information collected under current national and international regulations or law. Secondary data include publications, books, journals, empirical legal studies. Consequently, privacy and data protection regimes in health law show there are some obligations, principles and procedures which shall be binding upon natural or legal persons who process health-related personal data. A comparative approach presents there are significant differences in some EU member states due to different legal competencies, policies, and cultural factors. This selected study provides theoretical and practitioner implications by highlighting the need to illustrate the relationship between privacy and confidentiality in Personal Data Protection in Health Law. Furthermore, this paper would help to define the legal framework for the health law case studies on data protection and privacy.

Keywords: data protection, personal data, privacy, healthcare, health law

Procedia PDF Downloads 224
2598 Managing the Magnetic Protection of Workers in Magnetic Resonance Imaging

Authors: Safoin Aktaou, Aya Al Masri, Kamel Guerchouche, Malorie Martin, Fouad Maaloul

Abstract:

Introduction: In the ‘Magnetic Resonance Imaging (MRI)’ department, all workers involved in preparing the patient, setting it up, tunnel cleaning, etc. are likely to be exposed to ‘ElectroMagnetic fields (EMF)’ emitted by the MRI device. Exposure to EMF can cause adverse radio-biological effects to workers. The purpose of this study is to propose an organizational process to manage and control EMF risks. Materials and methods: The study was conducted at seven MRI departments using machines with 1.5 and 3 Tesla magnetic fields. We assessed the exposure of each one by measuring the two electromagnetic fields (static and dynamic) at different distances from the MRI machine both inside and around the examination room. Measurement values were compared with British and American references (those of the UK's ‘Medicines and Healthcare Regulatory Agency (MHRA)’ and the ‘American Radiology Society (ACR)’). Results: Following the results of EMF measurements and their comparison with the recommendations of learned societies, a zoning system that adapts to needs of different MRI services across the country has been proposed. In effect, three risk areas have been identified within the MRI services. This has led to the development of a good practice guide related to the magnetic protection of MRI workers. Conclusion: The guide established by our study is a standard that allows MRI workers to protect themselves against the risk of electromagnetic fields.

Keywords: comparison with international references, measurement of electromagnetic fields, magnetic protection of workers, magnetic resonance imaging

Procedia PDF Downloads 164
2597 Exploration of the Protection Theory of Chinese Scenic Heritage Based on Local Chronicles

Authors: Mao Huasong, Tang Siqi, Cheng Yu

Abstract:

The cognition and practice of Chinese landscapes have distinct uniqueness. The intergenerational inheritance of urban and rural landscapes is a common objective fact which has created a unique type of heritage in China - scenic heritage. The current generalization of the concept of scenic heritage has affected the lack of innovation in corresponding protection practices. Therefore, clarifying the concepts and connotations of scenery and scenic heritage, clarifying the protection objects of scenic heritage and the methods and approaches in intergenerational inheritance can provide theoretical support for the practice of Chinese scenic heritage and contribute Chinese wisdom to the transformation of world heritage sites. Taking ancient Shaoxing, which has a long time span and rich descriptions of scenic types and quantities, as the research object and using local chronicles as the basic research material, based on text analysis, word frequency analysis, case statistics, and historical, geographical spatial annotation methods, this study traces back to ancient scenic practices and conducts in-depth descriptions in both text and space. it have constructed a scenic heritage identification method based on the basic connotation characteristics and morphological representation characteristics of natural and cultural correlations, combined with the intergenerational and representative characteristics of scenic heritage; Summarized the bidirectional integration of "scenic spots" and "form scenic spots", "outstanding people" and "local spirits" in the formation process of scenic heritage; In inheritance, guided by Confucian values of education; In communication, the cultural interpretation constructed by scenery and the way of landscape life are used to strengthen the intergenerational inheritance of natural, artificial material elements, and intangible spirits. As a unique type of heritage in China, scenic heritage should improve its standards, values, and connotations in current protection practices and actively absorb historical experience.

Keywords: scenic heritage, heritage protection, cultural landscape, shaoxing, chinese landscape

Procedia PDF Downloads 67
2596 Experimental and Semi-Analytical Investigation of Wave Interaction with Double Vertical Slotted Walls

Authors: H. Ahmed, A. Schlenkhoff, R. Rousta, R. Abdelaziz

Abstract:

Vertical slotted walls can be used as permeable breakwaters to provide economical and environmental protection from undesirable waves and currents inside the port. The permeable breakwaters are partially protection and have been suggested to overcome the environmental disadvantages of fully protection breakwaters. For regular waves a semi-analytical model is based on an eigenfunction expansion method and utilizes a boundary condition at the surface of each wall are developed to detect the energy dissipation through the slots. Extensive laboratory tests are carried out to validate the semi-analytic models. The structure of the physical model contains two walls and it consists of impermeable upper and lower part, where the draft is based a decimal multiple of the total depth. The middle part is permeable with a porosity of 50%. The second barrier is located at a distant of 0.5, 1, 1.5 and 2 times of the water depth from the first one. A comparison of the theoretical results with previous studies and experimental measurements of the present study show a good agreement and that, the semi-analytical model is able to adequately reproduce most the important features of the experiment.

Keywords: permeable breakwater, double vertical slotted walls, semi-analytical model, transmission coefficient, reflection coefficient, energy dissipation coefficient

Procedia PDF Downloads 385
2595 Awarding Copyright Protection to Artificial Intelligence Technology for its Original Works: The New Way Forward

Authors: Vibhuti Amarnath Madhu Agrawal

Abstract:

Artificial Intelligence (AI) and Intellectual Property are two emerging concepts that are growing at a fast pace and have the potential of having a huge impact on the economy in the coming times. In simple words, AI is nothing but work done by a machine without any human intervention. It is a coded software embedded in a machine, which over a period of time, develops its own intelligence and begins to take its own decisions and judgments by studying various patterns of how people think, react to situations and perform tasks, among others. Intellectual Property, especially Copyright Law, on the other hand, protects the rights of individuals and Companies in content creation that primarily deals with application of intellect, originality and expression of the same in some tangible form. According to some of the reports shared by the media lately, ChatGPT, an AI powered Chatbot, has been involved in the creation of a wide variety of original content, including but not limited to essays, emails, plays and poetry. Besides, there have been instances wherein AI technology has given creative inputs for background, lights and costumes, among others, for films. Copyright Law offers protection to all of these different kinds of content and much more. Considering the two key parameters of Copyright – application of intellect and originality, the question, therefore, arises that will awarding Copyright protection to a person who has not directly invested his / her intellect in the creation of that content go against the basic spirit of Copyright laws? This study aims to analyze the current scenario and provide answers to the following questions: a. If the content generated by AI technology satisfies the basic criteria of originality and expression in a tangible form, why should such content be denied protection in the name of its creator, i.e., the specific AI tool / technology? B. Considering the increasing role and development of AI technology in our lives, should it be given the status of a ‘Legal Person’ in law? C. If yes, what should be the modalities of awarding protection to works of such Legal Person and management of the same? Considering the current trends and the pace at which AI is advancing, it is not very far when AI will start functioning autonomously in the creation of new works. Current data and opinions on this issue globally reflect that they are divided and lack uniformity. In order to fill in the existing gaps, data obtained from Copyright offices from the top economies of the world have been analyzed. The role and functioning of various Copyright Societies in these countries has been studied in detail. This paper provides a roadmap that can be adopted to satisfy various objectives, constraints and dynamic conditions related AI technology and its protection under Copyright Law.

Keywords: artificial intelligence technology, copyright law, copyright societies, intellectual property

Procedia PDF Downloads 71
2594 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 259
2593 Solving the Refugee Problem in the Modern State System: The Philosophical Dilemma of Sovereignty and Human Right

Authors: Xiaoman Dong

Abstract:

The refugee problem has a long history, but the scale and severity of modern refugee crises demand us to consider if the progress of political history exacerbates the refugee problem. This paper argues that although sovereignty owes its legitimacy to the protection of human rights, the modern state system complicates the refugee problem by first introducing then blurring the line between human rights and civil rights, and making national identity indispensable to basic livelihood and dignity. This paper first explains the source of the modern state system’s legitimacy by putting it in the context of social contract theories and the politics of nation-building. It then discusses how states create the concept of statelessness, which leads to more violations on human rights. Using historical records of the League of Nations High Commission for Refugees and the United Nations High Commissioner for Refugees, this paper reveals that neither the refugee problem of the Cold-War period nor the current refugee crisis is collateral damage of war, but rather the consequence of intentional exclusionary policies produced out of political interests. Finally, it contends that if the modern state system is to sustain, it cannot prioritize the protection of civil rights of a particular group over the protection of basic human rights of all.

Keywords: burden sharing, human rights, legitimacy of state, positive externality, sovereignty

Procedia PDF Downloads 190
2592 Urban Development from the Perspective of Lou Gang Polder System: Taihu Lake, Huzhou as an Example

Authors: Wei Bin Shen

Abstract:

Lou Gang world irrigation project heritage in Taihu Lake is a systematic irrigation project integrating water conservancy, ecology and culture. Through the methods of historical documents and field investigation, this paper deeply analyzes the formation history, connotation and value of Lou Gang polder system: Lou Gang heritage, describes in detail the relationship between Lou Gang polder system in Taihu Lake and the development and evolution of Huzhou City, and initially explores the protection and Utilization Strategies of Lou Gang water conservancy cultural heritage resources in Taihu Lake from the current situation.

Keywords: Lou Gang, protection strategy, urban evolution, waterconservancyculturalheritage

Procedia PDF Downloads 169
2591 Implementation of Learning Disability Annual Review Clinics to Ensure Good Patient Care, Safety, and Equality in Covid-19: A Two Pass Audit in General Practice

Authors: Liam Martin, Martha Watson

Abstract:

Patients with learning disabilities (LD) are at increased risk of physical and mental illness due to health inequality. To address this, NICE recommends that people from the age of 14 with a learning disability should have an annual LD health check. This consultation should include a holistic review of the patient’s physical, mental and social health needs with a view of creating an action plan to support the patient’s care. The expected standard set by the Quality and Outcomes Framework (QOF) is that each general practice should review at least 75% of their LD patients annually. During COVID-19, there have been barriers to primary care, including health anxiety, the shift to online general practice and the increase in GP workloads. A surgery in North London wanted to assess whether they were falling short of the expected standard for LD patient annual reviews in order to optimize care post Covid-19. A baseline audit was completed to assess how many LD patients were receiving their annual reviews over the period of 29th September 2020 to 29th September 2021. This information was accessed using EMIS Web Health Care System (EMIS). Patients included were aged 14 and over as per QOF standards. Doctors were not notified of this audit taking place. Following the results of this audit, the creation of learning disability clinics was recommended. These clinics were recommended to be on the ground floor and should be a dedicated time for LD reviews. A re-audit was performed via the same process 6 months later in March 2022. At the time of the baseline audit, there were 71 patients aged 14 and over that were on the LD register. 54% of these LD patients were found to have documentation of an annual LD review within the last 12 months. None of the LD patients between the ages of 14-18 years old had received their annual review. The results were discussed with the practice, and dedicated clinics were set up to review their LD patients. A second pass of the audit was completed 6 months later. This showed an improvement, with 84% of the LD patients registered at the surgery now having a documented annual review within the last 12 months. 78% of the patients between the ages of 14-18 years old had now been reviewed. The baseline audit revealed that the practice was not meeting the expected standard for LD patient’s annual health checks as outlined by QOF, with the most neglected patients being between the ages of 14-18. Identification and awareness of this vulnerable cohort is important to ensure measures can be put into place to support their physical, mental and social wellbeing. Other practices could consider an audit of their annual LD health checks to make sure they are practicing within QOF standards, and if there is a shortfall, they could consider implementing similar actions as used here; dedicated clinics for LD patient reviews.

Keywords: COVID-19, learning disability, learning disability health review, quality and outcomes framework

Procedia PDF Downloads 85
2590 The Impact of Human Rights on Society and Legislations

Authors: Eid Nasr Saad Nasr

Abstract:

Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 59
2589 A Study on ESD Protection Circuit Applying Silicon Controlled Rectifier-Based Stack Technology with High Holding Voltage

Authors: Hee-Guk Chae, Bo-Bae Song, Kyoung-Il Do, Jeong-Yun Seo, Yong-Seo Koo

Abstract:

In this study, an improved Electrostatic Discharge (ESD) protection circuit with low trigger voltage and high holding voltage is proposed. ESD has become a serious problem in the semiconductor process because the semiconductor density has become very high these days. Therefore, much research has been done to prevent ESD. The proposed circuit is a stacked structure of the new unit structure combined by the Zener Triggering (SCR ZTSCR) and the High Holding Voltage SCR (HHVSCR). The simulation results show that the proposed circuit has low trigger voltage and high holding voltage. And the stack technology is applied to adjust the various operating voltage. As the results, the holding voltage is 7.7 V for 2-stack and 10.7 V for 3-stack.

Keywords: ESD, SCR, latch-up, power clamp, holding voltage

Procedia PDF Downloads 548
2588 Use of Protection Motivation Theory to Assess Preventive Behaviors of COVID-19

Authors: Maryam Khazaee-Pool, Tahereh Pashaei, Koen Ponnet

Abstract:

Background: The global prevalence and morbidity of Coronavirus disease 2019 (COVID-19) are high. Preventive behaviors are proven to reduce the damage caused by the disease. There is a paucity of information on determinants of preventive behaviors in response to COVID-19 in Mazandaran province, north of Iran. So, we aimed to evaluate the protection motivation theory (PMT) in promoting preventive behaviors of COVID-19 in Mazandaran province. Materials and Methods: In this descriptive cross-sectional study, 1220 individuals participated. They were selected via social networks using convenience sampling in 2020. Data were collected online using a demographic questionnaire and a valid and reliable scale based on PMT. Data analysis was done using the Pearson correlation coefficient and linear regression in SPSS V24. Result: The mean age of the participants was 39.34±8.74 years. The regression model showed perceived threat (ß =0.033, P =0.007), perceived costs (ß=0.039, P=0.045), perceived self-efficacy (ß =0.116, P>0.001), and perceived fear (ß=0.131, P>0.001) as the significant predictors of COVID-19 preventive behaviors. This model accounted for 78% of the variance in these behaviors. Conclusion: According to constructs of the PMT associated with protection against COVID-19, educational programs and health promotion based on the theory and benefiting from social networks could be helpful in increasing the motivation of people towards protective behaviors against COVID-19.

Keywords: questionnaire development, validation, intention, prevention, covid-19

Procedia PDF Downloads 42
2587 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 143
2586 Storage Tank Overfill Protection in Compliance with Functional Safety Standard: IEC 61511

Authors: Hassan Alsada

Abstract:

Tank overfill accidents are major concerns for industries handling large volumes of hydrocarbons. Buncefield, Jaipur, Puerto Rico, and West Virginia are just a few accidents with catastrophic consequences. Thus, it is very important for any industry to take the right safety measures for overfill prevention. Moreover, one of the main causative factors in the overfill accidents was inadequate risk analysis and, subsequently, inadequate design. This study aims to provide a full assessment in accordance with the Functional safety standard: “IEC 615 11 – Safety instrumented systems for the process industry” to the tank overfill scenario according to the standard’s Safety Life Cycle (SLC), which includes: the analysis phase, the implementation phase, and the operation phase. The paper discusses in depth the tank overfills Independent Protection Layers (IPLs) with systematic analysis to avoid the safety risks of under-design and the financial risk of facility overdesign. The result shows a clear and systematic assessment in compliance with the standards that can help to assist existing tank overfilling setup or a guide to support designing new storage facilities overfill protection.

Keywords: IEC 61511, PHA, LOPA, process safety, safety, health, environment, safety instrumented systems, safety instrumented function, functional safety, safety life cycle

Procedia PDF Downloads 90
2585 Existing International Cooperation Mechanisms and Proposals to Enhance Their Effectiveness for Marine-Based Geoengineering Governance

Authors: Aylin Mohammadalipour Tofighi

Abstract:

Marine-based geoengineering methods, proposed to mitigate climate change, operate primarily through two mechanisms: reducing atmospheric carbon dioxide levels and diminishing solar absorption by the oceans. While these approaches promise beneficial outcomes, they are fraught with environmental, legal, ethical, and political challenges, necessitating robust international governance. This paper underscores the critical role of international cooperation within the governance framework, offering a focused analysis of existing international environmental mechanisms applicable to marine-based geoengineering governance. It evaluates the efficacy and limitations of current international legal structures, including treaties and organizations, in managing marine-based geoengineering, noting significant gaps such as the absence of specific regulations, dedicated international entities, and explicit governance mechanisms such as monitoring. To rectify these problems, the paper advocates for concrete steps to bolster international cooperation. These include the formulation of dedicated marine-based geoengineering guidelines within international agreements, the establishment of specialized supervisory entities, and the promotion of transparent, global consensus-building. These recommendations aim to foster governance that is environmentally sustainable, ethically sound, and politically feasible, thereby enhancing knowledge exchange, spurring innovation, and advancing the development of marine-based geoengineering approaches. This study emphasizes the importance of collaborative approaches in managing the complexities of marine-based geoengineering, contributing significantly to the discourse on international environmental governance in the face of rapid climate and technological changes.

Keywords: climate change, environmental law, international cooperation, international governance, international law, marine-based geoengineering, marine law, regulatory frameworks

Procedia PDF Downloads 72
2584 Analyzing the Effectiveness of a Bank of Parallel Resistors, as a Burden Compensation Technique for Current Transformer's Burden, Using LabVIEW™ Data Acquisition Tool

Authors: Dilson Subedi

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However, due to upgradation of electromechanical relays to numerical relays and electromechanical energy meters to digital meters, the connected burden, which defines some of the CT characteristics, has drastically reduced. This has led to the system experiencing high currents damaging the connected relays and meters. Since the protection and metering equipment's are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore, during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and on the reliability of the protection and metering system. This paper shows the effectiveness of a bank of parallel connected resistors, as a burden compensation technique, in compensating the burden of under-burdened CT’s. The response of the CT in the case of failure of one or more resistors at different levels of overcurrent will be captured using the LabVIEWTM data acquisition hardware (DAQ). The analysis is done on the real-time data gathered using LabVIEWTM. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, burden compensation, current transformer

Procedia PDF Downloads 245
2583 The Effect of Artificial Intelligence on Human Rights Regulations

Authors: Karam Aziz Hamdy Fahmy

Abstract:

Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 64
2582 Protection of Stakeholders under the Transitional Commercial Code of Eritrea: Comparative Analysis with the 2018 Company Law of Peoples Republic of China

Authors: Hayle Makda Gebru

Abstract:

Companies are inevitable for society. They are the building blocks of every development in a country aimed at producing continuous goods and services for the people and, in turn, obliged to pay taxes, which enhances the economy of the nation. For the proper functioning of companies, their relationship with their stakeholders must be secure. The major stakeholders are suppliers, consumers, employees, creditors, etc. The law plays an important role in enhancing the relationship between these different stakeholders. If the law fails to keep track of the relationship, both the company and stakeholders remain unprotected. As a result, the potential benefits are prejudiced. This paper makes a comparative analysis of the types and formation of companies under the Transitional Commercial Code of Eritrea and the Company Law of the Peoples Republic of China. In particular, the paper addresses the legal lacuna under the TCrCE on handling the failure of shareholders to pay the promised capital. So, the methodology of the study is entirely analyzing the two countries' laws using practical cases. After analyzing the practical problems on the ground using real cases, this paper calls on Eritrea to update its outdated Commercial Code to give proper protection to the stakeholders.

Keywords: companies, company law of the People's Republic of China, transitional commercial code of Eritrea, protection of stakeholders, failure to pay the promised capital

Procedia PDF Downloads 69
2581 The Quantitative Analysis of the Traditional Rural Settlement Plane Boundary

Authors: Yifan Dong, Xincheng Pu

Abstract:

Rural settlements originate from the accumulation of residential building elements, and their agglomeration forms the settlement pattern and defines the relationship between the settlement and the inside and outside. The settlement boundary is an important part of the settlement pattern. Compared with the simplification of the urban settlement boundary, the settlement of the country is more complex, fuzzy and uncertain, and then presents a rich and diverse boundary morphological phenomenon. In this paper, China traditional rural settlements plane boundary as the research object, using fractal theory and fractal dimension method, quantitative analysis of planar shape boundary settlement, and expounds the research for the architectural design, ancient architecture protection and renewal and development and the significance of the protection of settlements.

Keywords: rural settlement, border, fractal, quantification

Procedia PDF Downloads 248
2580 The Right to Data Portability and Its Influence on the Development of Digital Services

Authors: Roman Bieda

Abstract:

The General Data Protection Regulation (GDPR) will come into force on 25 May 2018 which will create a new legal framework for the protection of personal data in the European Union. Article 20 of GDPR introduces a right to data portability. This right allows for data subjects to receive the personal data which they have provided to a data controller, in a structured, commonly used and machine-readable format, and to transmit this data to another data controller. The right to data portability, by facilitating transferring personal data between IT environments (e.g.: applications), will also facilitate changing the provider of services (e.g. changing a bank or a cloud computing service provider). Therefore, it will contribute to the development of competition and the digital market. The aim of this paper is to discuss the right to data portability and its influence on the development of new digital services.

Keywords: data portability, digital market, GDPR, personal data

Procedia PDF Downloads 473
2579 Dogmatic Analysis of Legal Risks of Using Artificial Intelligence: The European Union and Polish Perspective

Authors: Marianna Iaroslavska

Abstract:

ChatGPT is becoming commonplace. However, only a few people think about the legal risks of using Large Language Model in their daily work. The main dilemmas concern the following areas: who owns the copyright to what somebody creates through ChatGPT; what can OpenAI do with the prompt you enter; can you accidentally infringe on another creator's rights through ChatGPT; what about the protection of the data somebody enters into the chat. This paper will present these and other legal risks of using large language models at work using dogmatic methods and case studies. The paper will present a legal analysis of AI risks against the background of European Union law and Polish law. This analysis will answer questions about how to protect data, how to make sure you do not violate copyright, and what is at stake with the AI Act, which recently came into force in the EU. If your work is related to the EU area, and you use AI in your work, this paper will be a real goldmine for you. The copyright law in force in Poland does not protect your rights to a work that is created with the help of AI. So if you start selling such a work, you may face two main problems. First, someone may steal your work, and you will not be entitled to any protection because work created with AI does not have any legal protection. Second, the AI may have created the work by infringing on another person's copyright, so they will be able to claim damages from you. In addition, the EU's current AI Act imposes a number of additional obligations related to the use of large language models. The AI Act divides artificial intelligence into four risk levels and imposes different requirements depending on the level of risk. The EU regulation is aimed primarily at those developing and marketing artificial intelligence systems in the EU market. In addition to the above obstacles, personal data protection comes into play, which is very strictly regulated in the EU. If you violate personal data by entering information into ChatGPT, you will be liable for violations. When using AI within the EU or in cooperation with entities located in the EU, you have to take into account a lot of risks. This paper will highlight such risks and explain how they can be avoided.

Keywords: EU, AI act, copyright, polish law, LLM

Procedia PDF Downloads 20
2578 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 123
2577 Radiation Protection and Licensing for an Experimental Fusion Facility: The Italian and European Approaches

Authors: S. Sandri, G. M. Contessa, C. Poggi

Abstract:

An experimental nuclear fusion device could be seen as a step toward the development of the future nuclear fusion power plant. If compared with other possible solutions to the energy problem, nuclear fusion has advantages that ensure sustainability and security. In particular considering the radioactivity and the radioactive waste produced, in a nuclear fusion plant the component materials could be selected in order to limit the decay period, making it possible the recycling in a new reactor after about 100 years from the beginning of the decommissioning. To achieve this and other pertinent goals many experimental machines have been developed and operated worldwide in the last decades, underlining that radiation protection and workers exposure are critical aspects of these facilities due to the high flux, high energy neutrons produced in the fusion reactions. Direct radiation, material activation, tritium diffusion and other related issues pose a real challenge to the demonstration that these devices are safer than the nuclear fission facilities. In Italy, a limited number of fusion facilities have been constructed and operated since 30 years ago, mainly at the ENEA Frascati Center, and the radiation protection approach, addressed by the national licensing requirements, shows that it is not always easy to respect the constraints for the workers' exposure to ionizing radiation. In the current analysis, the main radiation protection issues encountered in the Italian Fusion facilities are considered and discussed, and the technical and legal requirements are described. The licensing process for these kinds of devices is outlined and compared with that of other European countries. The following aspects are considered throughout the current study: i) description of the installation, plant and systems, ii) suitability of the area, buildings, and structures, iii) radioprotection structures and organization, iv) exposure of personnel, v) accident analysis and relevant radiological consequences, vi) radioactive wastes assessment and management. In conclusion, the analysis points out the needing of a special attention to the radiological exposure of the workers in order to demonstrate at least the same level of safety as that reached at the nuclear fission facilities.

Keywords: fusion facilities, high energy neutrons, licensing process, radiation protection

Procedia PDF Downloads 352
2576 Recent Developments and Expectations in the Legal Expenses Insurance in Turkey

Authors: İbrahim Arslan, Mücahit Ünal

Abstract:

An important issue to ensure justice is to simplify the right to seek justice. But there is a cost of seeking justice in civil law. It costs at least, attorneys' fees and judicial expenses during the beginning and in case of losing a trial. Indeed, most of the people refrain from seeking justice because of these expenses. Therefore, it is not inappropriate to say that the removal of obstacles staying on the way of seeking justice will increase the belief in justice. Legal expenses insurance is a private law contract of insurance in which the insurer is obliged to pay premiums of the insured, to provide the necessary services for the protection of legal interests of the insured person within the agreed scope. This type of insurance is being practiced in the Western world for a long time. The special rights, duties and obligations of the parties to a legal expenses insurance contract shall be governed by the Turkish Commercial Code (TCC) and the contractual agreements which are regularly closed in the form of general terms and conditions. If the number of the legal expenses insurance contracts concluded increase this will definitely improve the percentage of seeking justice before the courts. The general terms and conditions applicable in Turkey generally include litigation costs, referee fees, guarantee fund , enforcement costs , appeal costs borne decision corrections costs. In addition, besides the insured, other family members or the people specified in the policy are protected in the scope of personal/family legal expenses insurance. The commercial law disputes fall outside the scope of coverage in this insurance branch. The insured person chooses his own lawyer and the insurer is not allowed to give advice during the selection of a lawyer. In April 2015, the Prime Minister announced of a new era in the field of legal expenses insurance in Turkey and this announcement excited the insurance industry and legal community.

Keywords: insurance, in the Turkish law on legal protection insurance, legal protection insurance, legal protection

Procedia PDF Downloads 357
2575 Jurisdictional Issues in E-Commerce Law after the 'Recast Brussels Regulation'

Authors: Seyedeh Sajedeh Salehi

Abstract:

The Regulation No. 1215/2012/EC also known as the Brussels I Regulation (Recast) deals with jurisdictional disputes in civil and commercial matters. The main aim of the Recast (as in-line with its predecessor Regulation) is to bring a reform in procuring more simplified and faster circulation of civil and commercial judgments within the EU. Hence it is significant to take a closer look at the function of this regulatory tool. Therefore, the main objective of this paper is to analyze a clear understanding of the post-Recast situation on e-commerce relevant jurisdictional matters. The e-consumer protection and the choice-of-court agreements along with the position of the Court of Justice of the European Union in its decisions within the Recast Regulation will be also taken into consideration throughout this paper.

Keywords: choice-of-court agreements, consumer protection, e-commerce, jurisdiction, Recast Brussels I Regulation

Procedia PDF Downloads 310
2574 Cultural Heritage Management and Tourism in Kosovo

Authors: Valon Shkodra

Abstract:

In our paper, we will give an overview of the cultural heritage and tourism in Kosovo. Kosovo has a history, culture, tradition and architecture that are different from those of other countries in the region, and each country has its own characteristics and peculiarities. In this paper, we will mainly present the situation of cultural heritage and its interpretation. The research is based on fieldwork and the aim of the research is to live the situation of cultural heritage and tourism. The reason why we chose this topic is that cultural heritage and tourism are now the most important industry developing many countries in the world. Besides the benefits that tourism brings, it also has an impact on the preservation, protection and promotion of culture in general. Kosovo, with its cultural diversity and very good geographical location, is also very well suited to develop these two areas as a bridge to each other. The cultural heritage holds traces from the earliest eras and shows a diversity of different civilizations that have just begun to be explored and presented.

Keywords: cultural heritage, economy, tourism, development, institutions, protection

Procedia PDF Downloads 224