Search results for: authenticity of transactions
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 452

Search results for: authenticity of transactions

122 Artificial intelligence and Law

Authors: Mehrnoosh Abouzari, Shahrokh Shahraei

Abstract:

With the development of artificial intelligence in the present age, intelligent machines and systems have proven their actual and potential capabilities and are mindful of increasing their presence in various fields of human life in the fields of industry, financial transactions, marketing, manufacturing, service affairs, politics, economics and various branches of the humanities .Therefore, despite the conservatism and prudence of law enforcement, the traces of artificial intelligence can be seen in various areas of law. Including judicial robotics capability estimation, intelligent judicial decision making system, intelligent defender and attorney strategy adjustment, dissemination and regulation of different and scattered laws in each case to achieve judicial coherence and reduce opinion, reduce prolonged hearing and discontent compared to the current legal system with designing rule-based systems, case-based, knowledge-based systems, etc. are efforts to apply AI in law. In this article, we will identify the ways in which AI is applied in its laws and regulations, identify the dominant concerns in this area and outline the relationship between these two areas in order to answer the question of how artificial intelligence can be used in different areas of law and what the implications of this application will be. The authors believe that the use of artificial intelligence in the three areas of legislative, judiciary and executive power can be very effective in governments' decisions and smart governance, and helping to reach smart communities across human and geographical boundaries that humanity's long-held dream of achieving is a global village free of violence and personalization and human error. Therefore, in this article, we are going to analyze the dimensions of how to use artificial intelligence in the three legislative, judicial and executive branches of government in order to realize its application.

Keywords: artificial intelligence, law, intelligent system, judge

Procedia PDF Downloads 119
121 The Impact of Strategic Information in Developing the Target Cost Approach to achieve Competitive Advantage

Authors: Rizgar Abdullah Sabir Jaf, Bayan Sedeeq Azeez Hussin, Dler Moosa Ahmed Karim

Abstract:

Presently, economic and technological developments are growing faster in an unparalleled way. The result of that is innovative changing a great deal of a great deal of assumption, concepts, transactions, and high of competition between companies all over the world. The title of the thesis is one of the subjects that get large concerns in the financial and business world in the present time. That is because many competitive firms have appeared in the regional and global markets and the rapid changes that covered all fields of life. The subjects of the dissertation have a special importance in making the firm's businesses succeed in general and the industrial firms especially. Thus, the basic purpose of this study is to determine whether target costing is used in the costing application process in their customer expectation, profit margin, cost and price determination, cost reduction and management operations. In today’s intensely competitive and highly volatile business environment, consistent development of low cost and high quality products meeting the functional requirements is a key to a company's survival. Companies continuously strive to reduce the costs while still producing quality products to stay ahead in the competition. Many companies have turned to target costing to achieve this objective. The results indicate that there is a significant positive relationship (at the significance level less than 0.05) between the factors competitive advantage and management accounting techniques in the firm's sample study.

Keywords: strategic information, target cost, competitive advantage, Iraqi soft drink firms

Procedia PDF Downloads 305
120 Shariah Guideline on Value-Based Intermediation Implementation in the Light of Maqasid Shariah Analysis

Authors: Muhammad Izzam Bin Mohd Khazar, Ruqayyah Binti Mohamad Ali, Nurul Atiqah Binti Yusri

Abstract:

Value-based intermediation (VBI) has been introduced by Bank Negara Malaysia (BNM) as the next strategic direction and growth driver for Islamic banking institutions. The aim of VBI is to deliver the intended outcome of Shariah through practices, conducts, and offerings that generate positive and sustainable impact to the economy, community and environment which is aligned to Maqasid Shariah in preserving the common interest of society by preventing harm and maximizing benefit. Hence, upon its implementation, VBI will experiment the current Shariah compliance treatment and revolutionise new policies and systems that can meritoriously entrench and convey the objectives of Shariah. However, discussion revolving VBI in the light of Maqasid analysis is still scarce hence further research needs to be undertaken. The idea of implementation of VBI vision into quantifiable Maqasid Shariah measurement is yet to be explored due to the nature of Maqasid that is variable. The contemporary scholars also have different views on the implementation of VBI. This paper aims to discuss on the importance of Maqasid Shariah in the current Islamic finance transactions by providing Shariah index measurement in the application of VBI. This study also intends to explore basic Shariah guidelines and parameters based on the objectives of Shariah; preservation of the five pillars (religion, life, progeny, intellect and wealth) with further elaboration on preservation of wealth under five headings: rawaj (circulation and marketability); wuduh (transparency); hifz (preservation); thabat (durability and tranquillity); and ‘adl (equity and justice). In alignment with these headings, Islamic finance can be innovated for VBI implementation, particularly in Maybank Islamic being a significant leader in the IFI market.

Keywords: Islamic Financial Institutions, Maqasid Index, Maqasid Shariah, sustainability, value-based intermediation

Procedia PDF Downloads 168
119 Ethnomedicinal Plants Used for Gastrointestinal Ailments by the People of Tribal District Kinnaur (Himachal Pradesh) India

Authors: Geeta, Richa, M. L. Sharma

Abstract:

Himachal Pradesh, a hilly State of India located in the Western Himalayas, with varied altitudinal gradients and climatic conditions, is a repository of plant diversity and the traditional knowledge associated with plants. The State is inhabited by various tribal communities who usually depend upon local plants for curing various ailments. Utilization of plant resources in their day-to-day life has been an age old practice of the people inhabiting this State. The present study pertains to the tribal district Kinnaur of Himachal Pradesh, located between 77°45’ and 79°00’35” east longitudes and between 31°05’50” and 32°05’15” north altitudes. Being a remote area with only very basic medical facilities, local people mostly use traditional herbal medicines for primary healthcare needs. Traditional healers called “Amji” are usually very secretive in revealing their medicinal knowledge to novice and pass on their knowledge to next generation orally. As a result, no written records of healing herbs are available. The aim of present study was to collect and consolidate the ethno-medicinal knowledge of local people of the district about the use of plants for treating gastrointestinal ailments. The ethnobotanical information was collected from the local practitioners, herbal healers and elderly people having rich knowledge about the medicinal herbs through semi-structured questionnaire and key informant discussions. A total 46 plant species belonging to 40 genera and 24 families have been identified which are used as cure for gastrointestinal ailments. Among the parts used for gastointestinal ailments, aerial parts (14%) were followed by the whole plant (13%), root (8%), leaves (6%), flower (5%), fruit and seed (3%) and tuber (1%). These plant species could be prioritized for conservation and subject to further studies related to phytochemical screening for their authenticity. Most of the medicinal plants of the region are collected from the wild and are often harvested for trade. Sustainable harvesting and domestication of the highly traded species from the study area is needed.

Keywords: Amji, gastrointestinal, Kinnaur, medicinal plants, traditional knowledge

Procedia PDF Downloads 393
118 Authentication and Traceability of Meat Products from South Indian Market by Species-Specific Polymerase Chain Reaction

Authors: J. U. Santhosh Kumar, V. Krishna, Sebin Sebastian, G. S. Seethapathy, G. Ravikanth, R. Uma Shaanker

Abstract:

Food is one of the basic needs of human beings. It requires the normal function of the body part and a healthy growth. Recently, food adulteration increases day by day to increase the quantity and make more benefit. Animal source foods can provide a variety of micronutrients that are difficult to obtain in adequate quantities from plant source foods alone. Particularly in the meat industry, products from animals are susceptible targets for fraudulent labeling due to the economic profit that results from selling cheaper meat as meat from more profitable and desirable species. This work presents an overview of the main PCR-based techniques applied to date to verify the authenticity of beef meat and meat products from beef species. We were analyzed 25 market beef samples in South India. We examined PCR methods based on the sequence of the cytochrome b gene for source species identification. We found all sample were sold as beef meat as Bos Taurus. However, interestingly Male meats are more valuable high price compare to female meat, due to this reason most of the markets samples are susceptible. We were used sex determination gene of cattle like TSPY(Y-encoded, testis-specific protein TSPY is a Y-specific gene). TSPY homologs exist in several mammalian species, including humans, horses, and cattle. This gene is Y coded testis protein genes, which only amplify the male. We used multiple PCR products form species-specific “fingerprints” on gel electrophoresis, which may be useful for meat authentication. Amplicons were obtained only by the Cattle -specific PCR. We found 13 market meat samples sold as female beef samples. These results suggest that the species-specific PCR methods established in this study would be useful for simple and easy detection of adulteration of meat products.

Keywords: authentication, meat products, species-specific, TSPY

Procedia PDF Downloads 375
117 Infrastructure Sharing Synergies: Optimal Capacity Oversizing and Pricing

Authors: Robin Molinier

Abstract:

Industrial symbiosis (I.S) deals with both substitution synergies (exchange of waste materials, fatal energy and utilities as resources for production) and infrastructure/service sharing synergies. The latter is based on the intensification of use of an asset and thus requires to balance capital costs increments with snowball effects (network externalities) for its implementation. Initial investors must specify ex-ante arrangements (cost sharing and pricing schedule) to commit toward investments in capacities and transactions. Our model investigate the decision of 2 actors trying to choose cooperatively a level of infrastructure capacity oversizing to set a plug-and-play offer to a potential entrant whose capacity requirement is randomly distributed while satisficing their own requirements. Capacity cost exhibits sub-additive property so that there is room for profitable overcapacity setting in the first period. The entrant’s willingness-to-pay for the access to the infrastructure is dependent upon its standalone cost and the capacity gap that it must complete in case the available capacity is insufficient ex-post (the complement cost). Since initial capacity choices are driven by ex-ante (expected) yield extractible from the entrant we derive the expected complement cost function which helps us defining the investors’ objective function. We first show that this curve is decreasing and convex in the capacity increments and that it is shaped by the distribution function of the potential entrant’s requirements. We then derive the general form of solutions and solve the model for uniform and triangular distributions. Depending on requirements volumes and cost assumptions different equilibria occurs. We finally analyze the effect of a per-unit subsidy a public actor would apply to foster such sharing synergies.

Keywords: capacity, cooperation, industrial symbiosis, pricing

Procedia PDF Downloads 211
116 Stable Isotope Ratios Data for Tracing the Origin of Greek Olive Oils and Table Olives

Authors: Efthimios Kokkotos, Kostakis Marios, Beis Alexandros, Angelos Patakas, Antonios Avgeris, Vassilios Triantafyllidis

Abstract:

H, C, and O stable isotope ratios were measured in different olive oils and table olives originating from different regions of Greece. In particular, the stable isotope ratios of different olive oils produced in the Lakonia region (Peloponesse – South Greece) from different varieties, i.e., cvs ‘Athinolia’ and ‘koroneiki’, were determined. Additionally, stable isotope ratios were also measured in different table olives (cvs ‘koroneiki’ and ‘kalamon’) produced in the same region (Messinia). The aim of this study was to provide sufficient isotope ratio data regarding each variety and region of origin that could be used in discriminative studies of oil olives and table olives produced by different varieties in other regions. In total, 97 samples of olive oil (cv ‘Athinolia’ and ‘koroneiki’) and 67 samples of table olives (cvs ‘kalmon’ and ‘koroneiki’) collected during two consecutive sampling periods (2021-2022 and 2022-2023) were measured. The C, H, and O isotope ratios were measured using Isotope Ratio Mass Spectrometry (IRMS), and the results obtained were analyzed using chemometric techniques. The measurements of the isotope ratio analyses were expressed in permille (‰) using the delta δ notation (δ=Rsample/Rstandard-1, where Rsample and Rstandardis represent the isotope ratio of sample and standard). Results indicate that stable isotope ratios of C, H, and O ranged between -28,5+0,45‰, -142,83+2,82‰, 25,86+0,56‰ and -29,78+0,71‰, -143,62+1,4‰, 26,32+0,55‰ in olive oils produced in Lakonia region from ‘Athinolia’ and ‘koroneiki ‘varieties, respectively. The C, H, and O values from table olives originated from Messinia region were -28,58+0,63‰, -138,09+3,27‰, 25,45+0,62‰ and -29,41+0,59‰,-137,67+1,15‰, 24,37+0,6‰ for ‘Kalamon’ and ‘koroneiki’ olives respectively. Acknowledgments: This research has been co-financed by the European Regional Development Fund of the European Union and Greek national funds through the Operational Program Competitiveness, Entrepreneurship and Innovation, under the call RESEARCH—CREATE—INNOVATE (Project code: T2EDK-02637; MIS 5075094, Title: ‘Innovative Methodological Tools for Traceability, Certification and Authenticity Assessment of Olive Oil and Olives’).

Keywords: olive oil, table olives, Isotope ratio, IRMS, geographical origin

Procedia PDF Downloads 57
115 Block-Chain Land Administration Technology in Nigeria: Opportunities and Challenges

Authors: Babalola Sunday Oyetayo, Igbinomwanhia Uyi Osamwonyi, Idowu T. O., Herbert Tata

Abstract:

This paper explores the potential benefits of adopting blockchain technology in Nigeria's land administration systems while also addressing the challenges and implications of its implementation in the country's unique context. Through a comprehensive literature review and analysis of existing research, the paper delves into the key attributes of blockchain that can revolutionize land administration practices, with a particular focus on simplifying land registration procedures, expediting land title issuance, and enhancing data transparency and security. The decentralized and immutable nature of blockchain offers unique advantages, instilling trust and confidence in land transactions, which are especially crucial in Nigeria's land governance landscape. However, integrating blockchain in Nigeria's land administration ecosystem presents specific challenges, necessitating a critical evaluation of technical, socio-economic, and infrastructural barriers. These challenges encompass data privacy concerns, scalability, interoperability with outdated systems, and gaining acceptance from various stakeholders. By synthesizing these insights, the paper proposes strategies tailored to Nigeria's context to optimize the benefits of blockchain adoption while addressing the identified challenges. The research findings contribute significantly to the ongoing discourse on blockchain technology in Nigeria's land governance, offering evidence-based recommendations to policymakers, land administrators, and stakeholders. Ultimately, the paper aims to promote the effective utilization of blockchain, fostering efficiency, transparency, and trust in Nigeria's land administration systems to drive sustainable development and societal progress.

Keywords: block-chain, technology, stakeholders, land registration

Procedia PDF Downloads 72
114 The Role of BPSK (Consumer Dispute Settlement Body) in the Monitoring of Standard Clause Inclusion within Indonesian Customer Protection Law

Authors: Deviana Yuanitasari

Abstract:

The rapid development of world commerce and trade nowadays has created fast-paced demand in every business activities and transactions. That also includes the need for ready to use and practical form of standard contract. For the company or business owner, the use of standard contract is an alternative way to achieve economic goals faster, effectively and efficiently. In the other hand, for the consumer the practice of using standard contract usually unfavorable, because the contract clauses usually have been defined by the company and cannot be individually negotiated. That means consumer cannot influence the substances of the contract clauses. The purpose of this study is to get deeper understanding and analyze the role of Consumer Dispute Settlement Body in the monitoring of standard clause inclusion by businesses and industries within the context of practicing consumer protection law. Furthermore, this study will focus on the procedure of sanction and the effectiveness of the sanction for the business practitioners which disregard the inclusion of the prohibited standard clause. Therefore, this study will depict the law issues and other phenomenon that related with the role of Consumer Dispute Settlement Body in monitoring the inclusion of standard clause and procedure of sanction for the business practitioners that still use exemption clause within Consumer Protection Law System. This study results that BPSK has been assigned to monitor the inclusion of standard clause and settle consumer dispute. At this stage, BPSK role is passive, which means BPSK only takes an action if there are consumer complaints. The procedure of sanction is not part of BPSK tasks, since should there be a violation of standard clause; BPSK can only ask the business practitioners to remove the prohibited clause and not give a sanction. As a result, the procedure of sanction rule for the Standard Clause violation in this context can be considered as ineffective.

Keywords: standard contract, standard clause, consumer protection law, consumer dispute settlement body

Procedia PDF Downloads 334
113 Customer’s Choice of a Bank: An Empirical Enquiry from the Banked Ghanaian

Authors: Emmanuel Larbi Offei, Felix Agyei-Sasu, Maura Naa Densua Ashong

Abstract:

Ghana has 26 universal banks and several banking and non-banking financial institutions operating in the country. The growing number of banks has heightened competition among banks to attract and retain customers more customers to ensure sustainability. Hence the need to identify and understand factors that influences customers’ choice of banks cannot be overemphasised. This study investigates the determinants of bank selection criteria by banking customers in Ghana. Four banks were purposively sampled for this study namely Barclays, Standard Chartered, Sahel Sahara and Unibank. Convenience sampling was then used to select 114 bank customers in Accra and interviewed. Questionnaires were used to collect data that were analysed in tables and charts with the use of STATA software. The findings of the study revealed that quick/prompt services and complaint handling, safety of funds, networked branches, easy access to functional Automated Teller Machines (ATMs) and low/moderate service charges were the major determinants of customers’ choice of banks. The results further show that 89.5 percent of all deposits are held in either current or savings accounts. About 22.1 percent of the respondents indicated that they have plans of changing their banks in the near future because they are not satisfied with their banks. A gender analysis of the choice criteria showed differences between the choice criteria of the male as compared to the female. The study recommends that banks in Ghana should focus on products and policies that will not compromise on the safety of funds of their customers. Again, banks must address customer complaints and dissatisfactions as promptly as possible by taking pragmatic steps to address administrative bureaucracies and infrastructural challenges that prolong the duration of banking transactions.

Keywords: Ghana, banks, determinants, customers’ choice, competition

Procedia PDF Downloads 440
112 Integrating Heritage Conservation and Sustainable Development: The Role of Buffer Zones in Safeguarding the Tentative World Heritage Sites and Empowering Local Communities in India

Authors: Shweta Vardia

Abstract:

The 2021 decision by the World Heritage Center to align buffer zones with the 2015 Strategy for Sustainable Development marks a significant advancement in the protection of cultural and natural heritage sites. Buffer zones play a critical role in preserving the outstanding universal value, authenticity, and integrity of heritage sites, shielding them from threats such as urbanization, industrialization, and tourism. The 2015 Strategy emphasizes the integration of culture and heritage into sustainable development policies, highlighting the importance of community participation, traditional knowledge, and effective management in the conservation of heritage sites. This paper examines the implications of this strategic alignment for tentative World Heritage Sites in India. It explores how buffer zones can serve as tools for sustainable tourism, economic growth, and environmental protection while also addressing the socio-economic needs of local communities. By adopting a people-centered approach, the study underscores the need for active community involvement in heritage conservation, recognizing local residents as long-term custodians of cultural heritage. The role of buffer zones in promoting sustainable livelihoods, enhancing resilience to environmental changes, and fostering a sense of belonging among communities is also discussed. The challenges associated with buffer zones, including restrictive boundaries, unclear legislative frameworks, and potential disconnection from sociocultural contexts, are critically analyzed. The paper advocates for a holistic and integrated approach to buffer zone management, ensuring that policies are not only theoretically sound but also practically feasible. It concludes by emphasizing the need for collaborative efforts among conservation professionals, local communities, and policymakers to achieve sustainable development goals that respect both the heritage site's integrity and the well-being of surrounding populations.

Keywords: buffer zones, India, local communities, urbanization, world heritage sites

Procedia PDF Downloads 28
111 Rethinking the Use of Online Dispute Resolution in Resolving Cross-Border Small E-Disputes in EU

Authors: Sajedeh Salehi, Marco Giacalone

Abstract:

This paper examines the role of existing online dispute resolution (ODR) mechanisms and their effects on ameliorating access to justice – as a protected right by Art. 47 of the EU Charter of Fundamental Rights – for consumers in EU. The major focus of this study will be on evaluating ODR as the means of dispute resolution for Business-to-Consumer (B2C) cross-border small claims raised in e-commerce transactions. The authors will elaborate the consequences of implementing ODR methods in the context of recent developments in EU regulatory safeguards on promoting consumer protection. In this analysis, both non-judiciary and judiciary ODR redress mechanisms are considered, however, the significant consideration is given to – obligatory and non-obligatory – judiciary ODR methods. For that purpose, this paper will particularly investigate the impact of the EU ODR platform as well as the European Small Claims Procedure (ESCP) Regulation 861/2007 and their role on accelerating the access to justice for consumers in B2C e-disputes. Although, considerable volume of research has been carried out on ODR for consumer claims, rather less (or no-) attention has been paid to provide a combined doctrinal and empirical evaluation of ODR’s potential in resolving cross-border small e-disputes, in EU. Hence, the methodological approach taken in this study is a mixed methodology based on qualitative (interviews) and quantitative (surveys) research methods which will be mainly based on the data acquired through the findings of the Small Claims Analysis Net (SCAN) project. This project contributes towards examining the ESCP Regulation implementation and efficiency in providing consumers with a legal watershed through using the ODR for their transnational small claims. The outcomes of this research may benefit both academia and policymakers at national and international level.

Keywords: access to justice, consumers, e-commerce, small e-Disputes

Procedia PDF Downloads 128
110 Stereological Evaluation of Liver of Rabbit Fetuses After Transplantation of Human Wharton’s Jelly-Derived Mesenchymal Stromal/Stem Cells

Authors: Zahra Khodabandeh, Leila Rezaeian, Mohammad Amin Edalatmanesh, Asghar Mogheiseh, Nader Tanideh, Mehdi Dianatpour, Shahrokh Zare, Hossein Bordbar, Neda Baghban, Amin Tamadon

Abstract:

Background: In-utero xenotransplantation of stem cells in abnormal fetuses effectively treats several genetic illnesses. Objective: The current research aimed to evaluate structural and morphological alterations in the liver of rabbit fetuses following xenotransplantation of human Wharton’s jelly-derived mesenchymal stromal cells (hWJ-MSCs) using a stereological technique. Methods: hWJ-MSCs were isolated from the human umbilical cord, and their authenticity was established by flow cytometry and differentiation. At gestational day 14, the rabbits were anesthetized, and hWJ-MSCs were injected into the uteri of 24 fetuses. Twenty-two fetuses were born successfully. Ten rabbit liver specimens were prepared from injected fetuses, including eight rabbits on day three following birth and two rabbits on the 21st post-natal day. The non-injected fetuses were considered positive controls. The livers of the control and hWJ-MSCs-treated rabbits were fixed, processed, stained, and examined through stereological approaches. Results: In the hWJ-MSCs-treated group, the mean liver weight and volume increased by 42% and 78% compared to the control group. The total volume of the hepatocytes increased by 63% and that of sinusoids by threefold in the treated rabbits. The total volume of the central veins increased by 70%. The total number corresponding to hepatocytes in the experimental group increased by 112% compared to the rabbits in the control. The total volume of the hepatocyte nuclei in the experimental group increased by 117% compared to the rabbits in the control. Conclusion: After xenotransplantation of human MSCs, host tissue microenvironments (here, the rabbit liver) were altered, and these included quantitative factors corresponding to the liver tissue and hepatocyte morphometric indices.

Keywords: xenotransplantation, mesenchymal stromal, stem cell, Wharton ‘s jelly, liver

Procedia PDF Downloads 101
109 Understanding Profit Shifting by Multinationals in the Context of Cross-Border M&A: A Methodological Exploration

Authors: Michal Friedrich

Abstract:

Cross-border investment has never been easier than in today’s global economy. Despite recent initiatives tightening the international tax landscape, profit shifting and tax optimization by multinational entities (MNEs) in the context of cross-border M&A remain persistent and complex phenomena that warrant in-depth exploration. By synthesizing the outcomes of existing research, this study aims to first provide a methodological framework for identifying MNEs’ profit-shifting behavior and quantifying its fiscal impacts via various macroeconomic and microeconomic approaches. The study also proposes additional methods and qualitative/quantitative measures for extracting insight into the profit shifting behavior of MNEs in the context of their M&A activities at industry and entity levels. To develop the proposed methods, this study applies the knowledge of international tax laws and known profit shifting conduits (incl. dividends, interest, and royalties) on several model cases/types of cross-border acquisitions and post-acquisition integration activities by MNEs and highlights important factors that encourage or discourage tax optimization. Follow-up research is envisaged to apply the methods outlined in this study on published data on real-world M&A transactions to gain practical country-by-country, industry and entity-level insights. In conclusion, this study seeks to contribute to the ongoing discourse on profit shifting by providing a methodological toolkit for exploring profit shifting tendencies MNEs in connection with their M&A activities and to serve as a backbone for further research. The study is expected to provide valuable insight to policymakers, tax authorities, and tax professionals alike.

Keywords: BEPS, cross-border M&A, international taxation, profit shifting, tax optimization

Procedia PDF Downloads 69
108 The Fabric of Culture: Deciphering the Discourse of Permitted and Prohibited Raw Materials for Clothing in Hadith Literature

Authors: Hadas Hirsch

Abstract:

Clothing is aimed at concealing and revealing the body, protecting it, and manifesting religious, political, and social declarations. The material and symbolic meanings of clothing and its raw materials are evaluated through the context of their social, cultural, and religious systems. The raw materials for clothing that were frequent and familiar in the 7th century Arab Peninsula were wool, leather, cotton, and some kinds of silk. The spread of the Muslim empire and the intersections with other religions and cultures enable the trickling of new raw materials that were unknown to Muslims or unaccepted. The sources for this research are hadith collections that discuss in details various kinds of textiles and their origin, together with a legal explanation that permits or prohibits its use. The paper will describe and analyze this discussion by contextualizing it in social, religious, and cultural reality that creates a structure of socio-religious dependency. The aim is not to identify, catalogue, and technically analyze fabrics but to reveal their role in Muslims’ life as a means of creating dependency for the community and setting borders inside and outside. The analysis is built upon a scale that starts with the most recommended raw materials, then comes the permitted ones and, in the end, the prohibited raw materials. This mapping will provide an insight into the ways textiles, as a cultural medium, help to shape and redefine identities and, at the same time, enable a sphere for creative expression within socio-cultural and religious limits and context. To sum up, hadith literature has the main role is characterizing Muslim clothing, from garments to textiles and colors, including multiple variations and contradicting aspects. The Muslim style of clothing and, in particular, textiles is a manifestation of the socio-religious structure of dependency that creates differentiated Muslim identity together with subdivision of gendered groups. Some other aspects are the tension between authenticity and imitation and the jurists’ pragmatic and practice attitude that enables an individual sphere of expression within the limits of jurisprudence.

Keywords: Hadith, jurisprudence, medieval Islam, material culture

Procedia PDF Downloads 94
107 Credit Card Fraud Detection with Ensemble Model: A Meta-Heuristic Approach

Authors: Gong Zhilin, Jing Yang, Jian Yin

Abstract:

The purpose of this paper is to develop a novel system for credit card fraud detection based on sequential modeling of data using hybrid deep learning models. The projected model encapsulates five major phases are pre-processing, imbalance-data handling, feature extraction, optimal feature selection, and fraud detection with an ensemble classifier. The collected raw data (input) is pre-processed to enhance the quality of the data through alleviation of the missing data, noisy data as well as null values. The pre-processed data are class imbalanced in nature, and therefore they are handled effectively with the K-means clustering-based SMOTE model. From the balanced class data, the most relevant features like improved Principal Component Analysis (PCA), statistical features (mean, median, standard deviation) and higher-order statistical features (skewness and kurtosis). Among the extracted features, the most optimal features are selected with the Self-improved Arithmetic Optimization Algorithm (SI-AOA). This SI-AOA model is the conceptual improvement of the standard Arithmetic Optimization Algorithm. The deep learning models like Long Short-Term Memory (LSTM), Convolutional Neural Network (CNN), and optimized Quantum Deep Neural Network (QDNN). The LSTM and CNN are trained with the extracted optimal features. The outcomes from LSTM and CNN will enter as input to optimized QDNN that provides the final detection outcome. Since the QDNN is the ultimate detector, its weight function is fine-tuned with the Self-improved Arithmetic Optimization Algorithm (SI-AOA).

Keywords: credit card, data mining, fraud detection, money transactions

Procedia PDF Downloads 131
106 Foreign Artificial Intelligence Investments and National Security Exceptions in International Investment Law

Authors: Ying Zhu

Abstract:

Recent years have witnessed a boom of foreign investments in the field of artificial intelligence (AI). Foreign investments provide critical capital for AI development but also trigger national security concerns of host states. A notable example is an increasing number of cases in which the Committee on Foreign Investment in the United States (CFIUS) has denied Chinese acquisitions of US technology companies on national security grounds. On July 19, 2018, the Congress has reached a deal on the final draft of a new provision to strengthen CFIUS’s authority to review overseas transactions involving sensitive US technology. The question is: how to reconcile the emerging tension between, on the one hand, foreign AI investors’ expectations of a predictable investment environment, and on the other hand, host states’ regulatory power on national security? This paper provides a methodology to reconcile this tension under international investment law. Based on an examination, the national security exception clauses in international investment treaties and the application of national security justification in investor-state arbitration jurisprudence, the paper argues that a traditional interpretation of the national security exception, based on the necessity concept in customary international law, fails to take into account new risks faced by countries, including security concerns over strategic industries such as AI. To overcome this shortage, the paper proposes to incorporate an integrated national security clause in international investment treaties, which includes a two-tier test: a ‘self-judging’ test in the pre-establishment period and a ‘proportionality’ test in the post-establishment period. At the end, the paper drafts a model national security clause for future treaty-drafting practice.

Keywords: foreign investment, artificial intelligence, international investment law, national security exception

Procedia PDF Downloads 152
105 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 141
104 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 130
103 Digital Environment as a Factor of the City's Competitiveness in Attracting Tourists: The Case of Yekaterinburg

Authors: Alexander S. Burnasov, Anatoly V. Stepanov, Maria Y. Ilyushkina

Abstract:

In the conditions of transition to the digital economy, the digital environment of the city becomes one of the key factors of its tourism attractiveness. Modern digital environment makes travelling more accessible, improves the quality of travel services and the attractiveness of many tourist destinations. The digitalization of the industry allows to use resources more efficiently, to simplify business processes, to minimize risks, and to improve travel safety. The city promotion as a tourist destination in the foreign market becomes decisive in the digital environment. Information technologies are extremely important for the functioning of not only any tourist enterprise but also the city as a whole. In addition to solving traditional problems, it is also possible to implement some innovations from the tourism industry, such as the availability of city services in international systems of booking tickets and booking rooms in hotels, the possibility of early booking of theater and museum tickets, the possibility of non-cash payment by cards of international payment systems, Internet access in the urban environment for travelers. The availability of the city's digital services makes it possible to reduce ordering costs, contributes to the optimal selection of tourist products that meet the requirements of the tourist, provides increased transparency of transactions. The users can compare prices, features, services, and reviews of the travel service. The ability to share impressions with friends thousands of miles away directly affects the image of the city. It is possible to promote the image of the city in the digital environment not only through world-scale events (such as World Cup 2018, international summits, etc.) but also through the creation and management of services in the digital environment aimed at supporting tourism services, which will help to improve the positioning of the city in the global tourism market.

Keywords: competitiveness, digital environment, travelling, Yekaterinburg

Procedia PDF Downloads 136
102 The Perspective of Waria Transgenders in Singaraja on Their Reproduction Health

Authors: Made Kurnia Widiastuti Giri, Nyoman Kanca, Arie Swastini, Bambang Purwanto

Abstract:

Aim: Waria transgenders are a phenomenon whose existence is undeniable. The sexual behaviours of waria transgenders belong to the groups of high-risk STDs infections, especially HIV/AIDS. The present study was aimed at finding out the general idea of the existence of waria transgenders in Singaraja, their sexual transactions, their sexual behaviours, and at exploring the factors affecting their sexual behaviours along with their participation in regular reproduction health control. Methods: The subjects of the present research were male-to-female transgenders living in the town of Singaraja. The research applied a qualitative approach. Data collection in this research was conducted through in-depth interview and observation. Results: The results of the study exposed 1) the existence of waria transgender community in Singaraja observed from their active participation in social events such as taking the roles of counsellors in the campaign of prevention and control of HIV/AIDS with the Local Commission of AIDS Control and other foundations; 2) the sexual services provided by waria transgenders which were performed in squeeze method, oral and anal sex which could be categorized as HIV/AIDS high-risk sexual behaviours, while the consistency in doing safe sex among the trangenders in Singaraja showed that most of the waria transgenders (80%) were aware of the urgency of using condoms during sexual intercourse; and 3) the low participation of the waria transgenders in Singaraja in regular reproduction health check up at the local Centre of Public Health Service was caused by their negative perception about being examined by female doctors. Conclucions: Waria in singaraja categorized as HIV/AIDS high-risk sexual behaviours but they do have consistency in doing safe sex by using condoms. They have a negative psychological perception about being examined by female doctors.

Keywords: waria transgenders, sexual behaviours, reproduction health, hiv/aids

Procedia PDF Downloads 335
101 From Being to Becoming: Emancipation and Empowerment in the African Diaspora

Authors: R. Vidhya

Abstract:

Diasporic writings present a comprehensive view of social, cultural and psychological dualities of immigrants. Isolation and the strong feelings of insecurity and inferiority due to constant marginalization coupled with a nostalgia for their motherland, its customs, culture, language, food and people which keep haunting the minds of immigrants are the major themes that are handled by diasporic writers. In the African diaspora, more than the men, it is the women who face the brunt and burden of the triple jeopardy – the racial, class and gender discrimination. Women writers from Africa have successfully sketched the plight of African women in the diaspora. Buchi Emecheta, a Nigerian woman writer deftly portrays the African Diaspora in her novels. She skillfully weaves her stories with her own experiences as an immigrant in the United Kingdom. She portrays the immigrant life and psychology through numerous themes like exile, geographical shift of locations, transactions of culture, political instability and the dilemma of moral and religious ideologies in her diasporic novels Second-class Citizen, Gwendolyn and Kehinde. The contemporary Nigerian woman writer Chimamanda Ngozi Adichie has also dexterously depicted the diasporic dilemma of her protagonist Ifemelu in Americannah, who initially has the experience of a despondent and a downcast in the United States of America. This paper aims to analyse the diasporic sentiments and sensibilities of the Nigerian Igbo women writers Buchi Emecheta and Chimamanda Ngozi Adichie whose women characters finally find emancipation and empowerment in the African Diaspora. This study is based on the Africana Womanist Literary theory propounded by Clenora Hudson-Weems.

Keywords: African Diaspora, Nigerian women writers, Buchi Emecheta, Chimamanda Ngozi Adichie, emancipation, empowerment

Procedia PDF Downloads 287
100 An East-West Trans-Cultural Study: Zen Enlightenment in Asian and John Cage's Visual Arts

Authors: Yu-Shun Elisa Pong

Abstract:

American composer John Cage (1912-1992) is an influential figure in musical, visual and performing arts after World War II and has also been claimed as a forerunner of the western avant-garde in the artistic field. However, the crucial factors contributed to his highly acclaimed achievements include the Zen enlightenment, which he mainly got from Japanese Zen master D. T. Suzuki (1870-1966). As a kind of reflection and afterthought of the Zen inspiration, John Cage created various forms of arts in which visual arts have recently attracted more and more attention and discussion, especially from the perspectives of Zen. John Cage had started to create visual art works since he was 66 years old and the activity had lasted until his death. The quality and quantity of the works are worthy of in-depth study— the 667 pieces of print, 114 pieces of water color, and about 150 pieces of sketch. Cage’s stylistic changes during the 14 years of creation are quite obvious, and the Zen elements in the later works seem to be omnipresent. Based on comparative artistic study, a historical and conceptual view of Zen art that was formed initially in the traditional Chinese and Japanese visual arts will be discussed. Then, Chinese and Japanese representative Zen works will be mentioned, and the technique aspect, as well as stylistic analysis, will be revealed. Finally, a comprehensive comparison of the original Oriental Zen works with John Cage’s works and focus on the influence, and art transformation will be addressed. The master pieces from Zen tradition by Chinese artists like Liang Kai (d. 1210) and Ma Yuan (1160-1225) from Southern Sung Dynasty, the Japanese artists like Sesshū (1420-1506), Miyamoto Musashi (1584-1645) and some others would be discussed. In the current study, these art works from different periods of historical development in Zen will serve as the basis of analogy, interpretation, and criticism to Cage's visual art works. Through the perspectives of the Zen authenticity from Asia, we see how John Cage appropriated the eastern culture to his innovation, which changed the art world forever. And it is believed that through a transition from inter-, cross-, toward trans-cultural inspiration, John Cage set up a unique pathway of art innovations.

Keywords: John Cage, Chinese Zen art, Japanese Zen art, visual art

Procedia PDF Downloads 524
99 Beyond the Tragedy of Absence: Vizenor's Comedy of Native Presence

Authors: Mahdi Sepehrmanesh

Abstract:

This essay explores Gerald Vizenor's innovative concepts of the tragedy of absence and the comedy of presence as frameworks for understanding and challenging dominant narratives about Native American identity and history. Vizenor's work critiques the notion of irrevocable cultural loss and rigid definitions of Indigenous identity based on blood quantum and stereotypical practices. Through subversive humor, trickster figures, and storytelling, Vizenor asserts the active presence and continuance of Native peoples, advocating for a dynamic, self-determined understanding of Native identity. The essay examines Vizenor's use of postmodern techniques, including his engagement with simulation and hyperreality, to disrupt colonial discourses and create new spaces for Indigenous expression. It explores the concept of "crossblood" identities as a means of resisting essentialist notions of Native authenticity and embracing the complexities of contemporary Indigenous experiences. Vizenor's ideas of survivance and transmotion are analyzed as strategies for cultural resilience and adaptation in the face of ongoing colonial pressures. The interplay between absence and presence in Vizenor's work is discussed, particularly through the lens of shadow survivance and the power of storytelling. The essay also delves into Vizenor's critique of terminal creed and his promotion of natural reason as an alternative epistemology to Western rationalism. While acknowledging the significant influence of Vizenor's work on Native American literature and theory, the essay also addresses critiques of his approach, including concerns about the accessibility of his writing and its political effectiveness. Despite these debates, the essay argues that Vizenor's concepts offer a powerful vision of Indigenous futurity that is rooted in tradition yet open to change, inspiring hope and agency in the face of oppression. By examining Vizenor's multifaceted approach to Native American identity and presence, this essay contributes to ongoing discussions about Indigenous representation, cultural continuity, and resistance to colonial narratives in literature and beyond.

Keywords: gerald vizenor, identity native american literature, survivance, trickster discourse, identity

Procedia PDF Downloads 34
98 A Study of Topical and Similarity of Sebum Layer Using Interactive Technology in Image Narratives

Authors: Chao Wang

Abstract:

Under rapid innovation of information technology, the media plays a very important role in the dissemination of information, and it has a totally different analogy generations face. However, the involvement of narrative images provides more possibilities of narrative text. "Images" through the process of aperture, a camera shutter and developable photosensitive processes are manufactured, recorded and stamped on paper, displayed on a computer screen-concretely saved. They exist in different forms of files, data, or evidence as the ultimate looks of events. By the interface of media and network platforms and special visual field of the viewer, class body space exists and extends out as thin as sebum layer, extremely soft and delicate with real full tension. The physical space of sebum layer of confuses the fact that physical objects exist, needs to be established under a perceived consensus. As at the scene, the existing concepts and boundaries of physical perceptions are blurred. Sebum layer physical simulation shapes the “Topical-Similarity" immersing, leading the contemporary social practice communities, groups, network users with a kind of illusion without the presence, i.e. a non-real illusion. From the investigation and discussion of literatures, digital movies editing manufacture and produce the variability characteristics of time (for example, slices, rupture, set, and reset) are analyzed. Interactive eBook has an unique interaction in "Waiting-Greeting" and "Expectation-Response" that makes the operation of image narrative structure more interpretations functionally. The works of digital editing and interactive technology are combined and further analyze concept and results. After digitization of Interventional Imaging and interactive technology, real events exist linked and the media handing cannot be cut relationship through movies, interactive art, practical case discussion and analysis. Audience needs more rational thinking about images carried by the authenticity of the text.

Keywords: sebum layer, topical and similarity, interactive technology, image narrative

Procedia PDF Downloads 389
97 Factors Affecting M-Government Deployment and Adoption

Authors: Saif Obaid Alkaabi, Nabil Ayad

Abstract:

Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.

Keywords: e-government, m-government, system dependability, system security, trust

Procedia PDF Downloads 381
96 Learning and Rethinking Language through Gendered Experiences

Authors: Neha Narayanan

Abstract:

The paper tries to explore the role of language in determining spaces occupied by women in everyday lives. It is inspired from an ongoing action research work which employs ‘immersion’- arriving at a research problematic through community research, as a methodology in a Kondh adivasi village, Kirkalpadu located in Rayagada district of the Indian state of Odisha. In the dominant development discourse, language is associated with either preservation or conservation of endangered language or empowerment through language. Beyond these, is the discourse of language as a structure, with the hegemonic quality to organise lifeworld in a specific manner. This rigid structure leads to an experience of constriction of space for women. In Kirkalpadu, the action research work is with young and unmarried women of the age 15-25. During daytime, these women are either in the agricultural field or in the bari -the backyard of the house whose rooms are linearly arranged one after the other ending with the kitchen followed by an open space called bari (in Odia) which is an intimate and gendered space- where they are not easily visible. They justify the experience of restriction in mobility and fear of moving out of the village alone by the argument that the place and the men are nihi-aaeh (not good). These women, who have dropped out of school early to contribute to the (surplus) labour requirement in the household, want to learn English to be able to read signboards when they are on the road, to be able to fill forms at a bank and use mobile phones to communicate with their romantic partner(s). But the incapacity to have within one’s grasp the province of language and the incapacity to take the mobile phone to the kind of requirements marked by the above mentioned impossible transactions with space restricts them to the bari of the house. The paper concludes by seeking to explore the possibilities of learning and rethinking languages which takes into cognizance the gendered experience of women and the desire of women to cross the borders and occupy spaces restricted to them.

Keywords: action research, gendered experience, language, space

Procedia PDF Downloads 171
95 Performance Measurement by Analytic Hierarchy Process in Performance Based Logistics

Authors: M. Hilmi Ozdemir, Gokhan Ozkan

Abstract:

Performance Based Logistics (PBL) is a strategic approach that enables creating long-term and win-win relations among stakeholders in the acquisition. Contrary to the traditional single transactions, the expected value is created by the performance of the service pertaining to the strategic relationships in this approach. PBL motivates all relevant stakeholders to focus on their core competencies to produce the desired outcome in a collective way. The desired outcome can only be assured with a cost effective way as long as it is periodically measured with the right performance parameters. Thus, defining these parameters is a crucial step for the PBL contracts. In performance parameter determination, Analytic Hierarchy Process (AHP), which is a multi-criteria decision making methodology for complex cases, was used within this study for a complex system. AHP has been extensively applied in various areas including supply chain, inventory management, outsourcing, and logistics. This methodology made it possible to convert end-user’s main operation and maintenance requirements to sub criteria contained by a single performance parameter. Those requirements were categorized and assigned weights by the relevant stakeholders. Single performance parameter capable of measuring the overall performance of a complex system is the major outcome of this study. The parameter deals with the integrated assessment of different functions spanning from training, operation, maintenance, reporting, and documentation that are implemented within a complex system. The aim of this study is to show the methodology and processes implemented to identify a single performance parameter for measuring the whole performance of a complex system within a PBL contract. AHP methodology is recommended as an option for the researches and the practitioners who seek for a lean and integrated approach for performance assessment within PBL contracts. The implementation of AHP methodology in this study may help PBL practitioners from methodological perception and add value to AHP in becoming prevalent.

Keywords: analytic hierarchy process, performance based logistics, performance measurement, performance parameters

Procedia PDF Downloads 281
94 Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types

Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke

Abstract:

The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age.

Keywords: cybercrime legislation, cyber attacks, consumer privacy and protection law, detection, electronic transaction law, prevention, privacy and data protection law, prohibition, prosecution

Procedia PDF Downloads 41
93 Potential Contribution of Local Food Resources towards Sustainable Food Tourism in Nueva Vizcaya

Authors: Marvin Eslava

Abstract:

The over-arching aim of this research is to determine the potential contribution of local food resources to the tourism growth of Nueva Vizcaya. It reviews some of the underpinning concepts and to provide a set of considerations for stakeholders to maximize the opportunity of local food can offer to businesses and the wider community. The basis of the study is to develop a sustainable food tourism model for Nueva Vizcaya. For the purpose of this research, there were 60 total numbers of respondents classified as samples from a six municipality. The respondents of the study were stakeholder consisting of government official, local producers, businessman and Non-government organizations in the selected municipalities of Nueva Vizcaya. Stratified purposive sampling was the appropriate technique that was used to the local government officials and employees, NGOs including the businessmen who are associated with local food resources and local producers. The documentary study, focus group discussion and survey questionnaire was used in order to meet the objectives of the study. Kruskall Wallis test was used to test the variances the ratings of the participants. This was used in the computation of hypothesis. The study concluded that the province of Nueva Vizcaya is blessed for its rich farmlands and fertile mountain soil boasts to produce high quality agricultural products. It is a home of various different indigenous groups creating a wide range of local cuisine. The province has substantial local food development evidence by the various food tourism related resources, increase in facilities and celebrating food tourism related events. The local food resources provide extensive potential economic empowerment and help in building the identity of the province. In addition, the local food resources extensively enhance the agriculture sector and other attractions in the province. Finally, it helps to preserve the authenticity of the food culture and generated pride among all stakeholders extensively. All stakeholders have the same perception on the potential contribution of local food resources to the development of the province of Nueva Vizcaya. The public and private sectors are cognizant on their roles to support the production of local food resources in Nueva Vizcaya. Major challenges and barriers in the development of sustainable food tourism in Nueva Vizcaya include production or supply and marketing.

Keywords: local food resources, contribution, food tourism, benefits

Procedia PDF Downloads 261