Search results for: common law legal system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 22635

Search results for: common law legal system

22275 Protecting Labor Rights in the Platform Economy: Legal Challenges and Innovative Explorations

Authors: Ruwen Pei

Abstract:

In the rapidly evolving landscape of the digital economy, platform employment has emerged as a transformative labor force, fundamentally altering the traditional paradigms of the employer-employee relationship. This paper provides a comprehensive analysis of the unique dynamics and intricate legal challenges associated with platform work, where workers often navigate precarious labor conditions without the robust safety nets typically afforded in traditional industries. It underscores the limitations of current labor regulations, particularly in addressing pressing concerns such as income volatility and disparate benefits. By drawing insights from diverse global case studies, this study emphasizes the compelling need for platform companies to shoulder their social welfare responsibilities, ensuring fair treatment and security for their workers. Moreover, it critically examines the profound influence of socio-cultural factors and educational awareness on the platform economy, shedding light on the complexities of this emerging labor landscape. Advocating for a harmonious equilibrium between flexibility and security, this paper calls for substantial legal reforms and innovative policy initiatives that can adapt to the evolving nature of work in the digital age. Finally, it anticipates forthcoming trends in the digital economy and platform labor relations, underscoring the significance of proactive adaptation to foster equitable and inclusive employment practices.

Keywords: platform employment, labor protections, social welfare, legal reforms, digital economy

Procedia PDF Downloads 44
22274 Recognition and Protection of Indigenous Society in Indonesia

Authors: Triyanto, Rima Vien Permata Hartanto

Abstract:

Indonesia is a legal state. The consequence of this status is the recognition and protection of the existence of indigenous peoples. This paper aims to describe the dynamics of legal recognition and protection for indigenous peoples within the framework of Indonesian law. This paper is library research based on literature. The result states that although the constitution has normatively recognized the existence of indigenous peoples and their traditional rights, in reality, not all rights were recognized and protected. The protection and recognition for indigenous people need to be strengthened.

Keywords: indigenous peoples, customary law, state law, state of law

Procedia PDF Downloads 309
22273 Examining the Relationship Between Traditional Property Rights and Online Intellectual Property Rights in the Digital Age

Authors: Luljeta Plakolli-Kasumi

Abstract:

In the digital age, the relationship between traditional property rights and online intellectual property rights is becoming increasingly complex. On the one hand, the internet and advancements in technology have allowed for the widespread distribution and use of digital content, making it easier for individuals and businesses to access and share information. On the other hand, the rise of digital piracy and illegal file-sharing has led to increased concerns about the protection of intellectual property rights. This paper aims to examine the relationship between traditional property rights and online intellectual property rights in the digital age by analyzing the current legal frameworks, key challenges and controversies that arise, and potential solutions for addressing these issues. The paper will look at how traditional property rights concepts such as ownership and possession are being applied in the online context and how they intersect with new and evolving forms of intellectual property such as digital downloads, streaming services, and online content creation. It will also discuss the tension between the need for strong intellectual property protection to encourage creativity and innovation and the public interest in promoting access to information and knowledge. Ultimately, the paper will explore how the legal system can adapt to better balance the interests of property owners, creators, and users in the digital age.

Keywords: intellectual property, traditional property, digital age, digital content

Procedia PDF Downloads 77
22272 Improve the Provisions in the Life Imprisonment Law in Vietnam

Authors: Nguyen Xuan Thuy

Abstract:

The provisions on life imprisonment in the legal system enable to differentiate criminal liability and individualize the penalties for particularly serious crimes. This punishment acts as an intermediary between the determined imprisonment of a maximum of 20 years and the capital punishment, enabling the penalty system to maintain its internal unity. However, the practice of applying the punishment has been posing many problems that need to be studied in order to come up with solutions to improve the provisions related to the penalty and its effectiveness in the fight against crimes. The article summarizes the law on life imprisonment sentence in the current criminal law to highlight its characteristics and role in Vietnam's Penal Code. It also suggests some solutions to improve the law and its effectiveness in preventing and combating crimes.

Keywords: life imprisonment, Vietnam, law, penalty, provisions

Procedia PDF Downloads 80
22271 Application of the Building Information Modeling Planning Approach to the Factory Planning

Authors: Peggy Näser

Abstract:

Factory planning is a systematic, objective-oriented process for planning a factory, structured into a sequence of phases, each of which is dependent on the preceding phase and makes use of particular methods and tools, and extending from the setting of objectives to the start of production. The digital factory, on the other hand, is the generic term for a comprehensive network of digital models, methods, and tools – including simulation and 3D visualisation – integrated by a continuous data management system. Its aim is the holistic planning, evaluation and ongoing improvement of all the main structures, processes and resources of the real factory in conjunction with the product. Digital factory planning has already become established in factory planning. The application of Building Information Modeling has not yet been established in factory planning but has been used predominantly in the planning of public buildings. Furthermore, this concept is limited to the planning of the buildings and does not include the planning of equipment of the factory (machines, technical equipment) and their interfaces to the building. BIM is a cooperative method of working, in which the information and data relevant to its lifecycle are consistently recorded, managed and exchanged in a transparent communication between the involved parties on the basis of digital models of a building. Both approaches, the planning approach of Building Information Modeling and the methodical approach of the Digital Factory, are based on the use of a comprehensive data model. Therefore it is necessary to examine how the approach of Building Information Modeling can be extended in the context of factory planning in such a way that an integration of the equipment planning, as well as the building planning, can take place in a common digital model. For this, a number of different perspectives have to be investigated: the equipment perspective including the tools used to implement a comprehensive digital planning process, the communication perspective between the planners of different fields, the legal perspective, that the legal certainty in each country and the quality perspective, on which the quality criteria are defined and the planning will be evaluated. The individual perspectives are examined and illustrated in the article. An approach model for the integration of factory planning into the BIM approach, in particular for the integrated planning of equipment and buildings and the continuous digital planning is developed. For this purpose, the individual factory planning phases are detailed in the sense of the integration of the BIM approach. A comprehensive software concept is shown on the tool. In addition, the prerequisites required for this integrated planning are presented. With the help of the newly developed approach, a better coordination between equipment and buildings is to be achieved, the continuity of the digital factory planning is improved, the data quality is improved and expensive implementation errors are avoided in the implementation.

Keywords: building information modeling, digital factory, digital planning, factory planning

Procedia PDF Downloads 247
22270 Knowledge Based Liability for ISPs’ Copyright and Trademark Infringement in the EU E-Commerce Directive: Two Steps Behind the Philosophy of Computing Mind

Authors: Mohammad Sadeghi

Abstract:

The subject matter of this article is the efficiency of current knowledge standard to afford the legal integration regarding criteria and approaches to ISP knowledge standards, to shield ISP and copyright, trademark and other parties’ rights in the online information society. The EU recognizes the knowledge-based liability for intermediaries in the European Directive on Electronic Commerce, but the implication of all parties’ responsibility for combating infringement has been immolated by dominating attention on liability due to the lack of the appropriate legal mechanism to devote each party responsibility. Moreover, there is legal challenge on the applicability of knowledge-based liability on hosting services and information location tools service. The aim of this contribution is to discuss the advantages and disadvantages of ECD knowledge standard through case law with a special emphasis on duty of prevention and constructive knowledge role on internet service providers (ISP s’) to achieve fair balance between all parties rights.

Keywords: internet service providers, liability, copyright infringement, hosting, caching, mere conduit service, notice and takedown, E-commerce Directive

Procedia PDF Downloads 504
22269 The Differences and Similarities between the Ship Waste Tracking Regulations of Turkey and Particular European Union Member Countries

Authors: Kaan Koyuncu, Umut Celen Arican, Sevilay Can

Abstract:

In the maritime industry, there have been regulations to prevent pollution, and the first attempt to offer a legal basis was Marpol Convention which was held in 1973 in order to provide a framework for the disposal of ship wastes. Based on this convention, ports are obliged to build waste receiving facilities. European Union regulations make several member countries to follow these directions, In Turkey, under Blue Card System, the quantity and types of wastes, the delivery time, the capacity of the receiving facilities, and other required information can be monitored online. Therefore, yachts and other boats with the bilge, sewage, and waste which illegally discharge into the sea, can be blocked. This system is an outcome of the law adopted from European Union regulations. In this study, the present systems in Turkey which occurred in 2010 after the integration of the system, which has been put in the force in 2000 in Europe will be analyzed and interpreted to provide a useful comparison, a practical guide, and a roadmap for potential improvements.

Keywords: Europe-Turkey, blue card, marine environment, ship waste tracking system

Procedia PDF Downloads 481
22268 Recent Legal Changes in Turkish Commercial Law to Be a Part of International Markets and Their Results

Authors: Ibrahim Arslan

Abstract:

Since 1984, Turkey has experienced a significant transformation in legal and economic matters. The most consequential examples of this transformation in recent years are the renewal of the Commercial Code and the Check Act. Nowadays, the commercial activity is not limited within the boundaries of the country; on the contrary, as required by the global economy, it has an international dimension. For this reason, unlike some other legal principles, the rules regulating the commercial life should be compatible with the international standards as much as possible. Otherwise the development possibility in the global markets will be limited. The Check Act has been adopted in 2009 and the Commercial Code has been adopted in 2011. The Commercial Code has been entered into force on 1 July 2012. The international dimension of check is in-disputable for it is based on the Geneva Convention. However, the Turkish business life has created a unique application of this legal tool. This application is called “post-date” checks. Indeed the majority of the checks being used in the market are post-dated checks. The holders of these checks have waited the date written on the check for presentation and collection. Thus, the actual situation has occurred. This actual situation has been legitimized via Check Act No. 5941 and post dated checks have gained a legal status. In the preparation of the new the Turkish Commercial Code one of the goals is "to ensure that the Turkish commercial law becomes a part of the international market". To achieve this goal, significant changes have been made especially concerning the independent external audition of the corporations, the board structure and public disclosure regulations. These changes aim to facilitate the internationalization of Turkish corporations as well as intensification of foreign direct investments through foreign capital. Although the target has been determined this way, after the adoption but five days before the entry into force of the Turkish Commercial Code No. 6102, a law made backward going alterations concerning independent external audition and public disclosure regulations. Turkish Commercial Code has been currently in force with its altered status. Both the regulations in the Check Act as well as the changes in the Commercial Code are not compatible with the goals introduced by rationale “to ensure Turkish commercial law to be a part of the international market” as such.

Keywords: Turkish Commercial Code No. 6102, Turkish Check Act, “post-date” checks, legal changes

Procedia PDF Downloads 276
22267 Active Victim Participation in the Criminal Justice System: The Indian Scenario

Authors: Narayani Sepaha

Abstract:

In earlier days, the sufferer was burdened to prove the offence as well as to put the offender to punishment. The adversary system of legal procedure was characterized simply by two parties: the prosecution and the defence. With the onset of this system, firstly the judge started acting as a neutral arbitrator, and secondly, the state inadvertently started assuming the lead role and thereby relegated the victims to the position of oblivion. In this process, with the increasing role of police forces and the government, the victims got systematically excluded from the key stages of the case proceedings and were reduced to the stature of a prosecution witness. This paper tries to emphasise the increasing control over the various stages of the trial, by other stakeholders, leading to the marginalization of victims in the trial process. This monopolization has signalled the onset of an era of gross neglect of victims in the whole criminal justice system. This consciousness led some reformists to raise their concerns over the issue, during the early part of the 20th century. They started supporting the efforts which advocated giving prominence to the participation of victims in the trial process. This paved the way for the evolution of the science of victimology. Markedly the innovativeness to work out facts, seek opinions and statements of the victims and reassure that their voice is also heard has ensured the revival of their rightful roles in the justice delivery system. Many countries, like the US, have set an example by acknowledging the advantages of participation of victims in trials like in the proceedings of the Ariel Castro Kidnappings of Cleveland, Ohio and enacting laws for protecting their rights within the framework of the legal system to ensure speedy and righteous delivery of justice in some of the most complicated cases. An attempt has been made to flag that the accused have several rights in contrast to the near absence of separate laws for victims of crime, in India. It is sad to note that, even in the initial process of registering a crime the victims are subjected to the mercy of the officers in charge and thus begins the silent suffering of these victims, which continues throughout the process of their trial. The paper further contends, that the degree of victim participation in trials and its impact on the outcomes, can be debated and evaluated, but its potential to alter their position and make them regain their lost status cannot be ignored. Victim participation in trial proceedings will help the court in perceiving the facts of the case in a better manner and in arriving at a balanced view of the case. This will not only serve to protect the overall interest of the victims but will act to reinforce the faith in the criminal justice delivery system. It is pertinent to mention that there is an urgent need to review the accused centric prosecution system and introduce appropriate amendments so that the marginalization of victims comes to an end.

Keywords: victim participation, criminal justice, India, trial, marginalised

Procedia PDF Downloads 138
22266 Challenge Response-Based Authentication for a Mobile Voting System

Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono

Abstract:

A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.

Keywords: authentication, data protection, mobile voting, security

Procedia PDF Downloads 399
22265 Interoperability Model Design of Smart Grid Power System

Authors: Seon-Hack Hong, Tae-Il Choi

Abstract:

Interoperability is defined as systems, components, and devices developed by different entities smoothly exchanging information and functioning organically without mutual consultation, being able to communicate with each other and computer systems of the same type or different types, and exchanging information or the ability of two or more systems to exchange information and use the information exchanged without extra effort. Insufficiencies such as duplication of functions when developing systems and applications due to lack of interoperability in the electric power system and low efficiency due to a lack of mutual information transmission system between the inside of the application program and the design is improved, and the seamless linkage of newly developed systems is improved. Since it is necessary to secure interoperability for this purpose, we designed the smart grid-based interoperability standard model in this paper.

Keywords: interoperability, power system, common information model, SCADA, IEEE2030, Zephyr

Procedia PDF Downloads 102
22264 Pattern of Valvular Involvement and Demographic Features of Patients on Benzathine Penicillin at Dhulikhel Hospital

Authors: Sanjaya Humagain, Rajendra Koju

Abstract:

Background: Rheumatic heart disease (RHD) is the most common cardiovascular disease in children and young adults. Though declined and almost non-existent in developed nations, RHD is still one of the leading cause for premature death and disability in developing countries. Prevalence of RHD is high in both rural as well as urban area of Nepal. Present study is designed to look at the pattern of valvular involvement and demographic features in RHD. Methods: 326 patients indicated for inj. Benzathine penicillin were selected and echocardiograph performed to see the pattern of vavular involvement. Data analysis was done using SPSS 17. Result: The most common type of lesion was mixed type with mitral valve involvement. MR was the most common isolated lesion. MS was more commonly seen in females whereas AS was more common in males. Secondary prophylaxis was more common than primary prophylaxis. Conclusion: RHD still being a major problem and a preventable disease so extensive screening program is required to identify them early and prevent the complication.

Keywords: acute rheumatic fever, RHD, MS, MR, AS, AR, Inj benzathine penicillin

Procedia PDF Downloads 302
22263 Factors of Adoption of the International Financial Reporting Standard for Small and Medium Sized Entities

Authors: Uyanga Jadamba

Abstract:

Globalisation of the world economy has necessitated the development and implementation of a comparable and understandable reporting language suitable for use by all reporting entities. The International Accounting Standard Board (IASB) provides an international reporting language that lets all users understand the financial information of their business and potentially allows them to have access to finance at an international level. The study is based on logistic regression analysis to investigate the factors for the adoption of theInternational Financial Reporting Standard for Small and Medium sized Entities (IFRS for SMEs). The study started with a list of 217 countries from World Bank data. Due to the lack of availability of data, the final sample consisted of 136 countries, including 60 countries that have adopted the IFRS for SMEs and 76 countries that have not adopted it yet. As a result, the study included a period from 2010 to 2020 and obtained 1360 observations. The findings confirm that the adoption of the IFRS for SMEs is significantly related to the existence of national reporting standards, law enforcement quality, common law (legal system), and extent of disclosure. It means that the likelihood of adoption of the IFRS for SMEs decreases if the country already has a national reporting standard for SMEs, which suggests that implementation and transitional costs are relatively high in order to change the reporting standards. The result further suggests that the new standard adoption is easier in countries with constructive law enforcement and effective application of laws. The finding also shows that the adoption increases if countries have a common law system which suggests that efficient reportingregulations are more widespread in these countries. Countries with a high extent of disclosing their financial information are more likely to adopt the standard than others. The findings lastly show that the audit qualityand primary education levelhave no significant impact on the adoption.One possible explanation for this could be that accounting professionalsfrom in developing countries lacked complete knowledge of the international reporting standards even though there was a requirement to comply with them. The study contributes to the literature by providing factors that impact the adoption of the IFRS for SMEs. It helps policymakers to better understand and apply the standard to improve the transparency of financial statements. The benefit of adopting the IFRS for SMEs is significant due to the relaxed and tailored reporting requirements for SMEs, reduced burden on professionals to comply with the standard, and provided transparent financial information to gain access to finance.The results of the study are useful toemerging economies where SMEs are dominant in the economy in informing its evaluation of the adoption of the IFRS for SMEs.

Keywords: IFRS for SMEs, international financial reporting standard, adoption, institutional factors

Procedia PDF Downloads 62
22262 The Common Agricultural Policy in a Czech Context

Authors: Markéta Slováková

Abstract:

The largest share of policy and money within the European Union goes to agriculture. The Union’s Common Agricultural Policy has undergone several transformations in the last five decades, with the main change taking place in the 1990's. This change influenced agriculture in the Czech Republic, inasmuch as the fledgling republic was preparing to join the European Union and adopt its policies. In the 1990s, Czech agriculture passed from a centrally planned economy to a market economy and subsequently adopted the terms of the Common Agricultural Policy. The Czech Republic is also characterized by a significant landscape sphere diversification. Agricultural entrepreneurs in the Czech Republic are still not used the possibility of grants from the European Union. They focus rather on national or regional subsidy titles. Only half of all agricultural entrepreneurs in the Czech Republic use European subsidies. This article focuses on the introduction of the Common Agricultural Policy to the Czech Republic and its subsequent influence on Czech agriculture. It is demonstrated on the implementation rate of the CAP in the EU Member States and the closer focus is on the Czech integration.

Keywords: common agricultural policy, agriculture, European Union, transformation

Procedia PDF Downloads 570
22261 Control of Single Axis Magnetic Levitation System Using Fuzzy Logic Control

Authors: A. M. Benomair, M. O. Tokhi

Abstract:

This paper presents the investigation on a system model for the stabilization of a Magnetic Levitation System (Maglev’s). The magnetic levitation system is a challenging nonlinear mechatronic system in which an electromagnetic force is required to suspend an object (metal sphere) in air space. The electromagnetic force is very sensitive to the noise which can create acceleration forces on the metal sphere, causing the sphere to move into the unbalanced region. Maglev’s give the contribution in industry and this system has reduce the power consumption, has increase the power efficiency and reduce the cost maintenance. The common applications for Maglev’s Power Generation (e.g. wind turbine), Maglev’s trains and Medical Device (e.g. Magnetically suspended Artificial Heart Pump). This paper presents the comparison between dynamic response and robust characteristic for both conventional PD and Fuzzy PD controller. The main contribution of this paper is the proof of fuzzy PD type stabilization and robustness. By use of a method to tune the scaling factors of the linear PD type fuzzy controller from an equivalent tuned conventional PD.

Keywords: magnetic levitation system, PD controller, Fuzzy Logic Control, Fuzzy PD

Procedia PDF Downloads 257
22260 Criteria to Access Justice in Remote Criminal Trial Implementation

Authors: Inga Žukovaitė

Abstract:

This work aims to present postdoc research on remote criminal proceedings in court in order to streamline the proceedings and, at the same time, ensure the effective participation of the parties in criminal proceedings and the court's obligation to administer substantive and procedural justice. This study tests the hypothesis that remote criminal proceedings do not in themselves violate the fundamental principles of criminal procedure; however, their implementation must ensure the right of the parties to effective legal remedies and a fair trial and, only then, must address the issues of procedural economy, speed and flexibility/functionality of the application of technologies. In order to ensure that changes in the regulation of criminal proceedings are in line with fair trial standards, this research will provide answers to the questions of what conditions -first of all, legal and only then organisational- are required for remote criminal proceedings to ensure respect for the parties and enable their effective participation in public proceedings, to create conditions for quality legal defence and its accessibility, to give a correct impression to the party that they are heard and that the court is impartial and fair. It also seeks to present the results of empirical research in the courts of Lithuania that was made by using the interview method. The research will serve as a basis for developing a theoretical model for remote criminal proceedings in the EU to ensure a balance between the intention to have innovative, cost-effective, and flexible criminal proceedings and the positive obligation of the State to ensure the rights of participants in proceedings to just and fair criminal proceedings. Moreover, developments in criminal proceedings also keep changing the image of the court itself; therefore, in the paper will create preconditions for future research on the impact of remote criminal proceedings on the trust in courts. The study aims at laying down the fundamentals for theoretical models of a remote hearing in criminal proceedings and at making recommendations for the safeguarding of human rights, in particular the rights of the accused, in such proceedings. The following criteria are relevant for the remote form of criminal proceedings: the purpose of judicial instance, the legal position of participants in proceedings, their vulnerability, and the nature of required legal protection. The content of the study consists of: 1. Identification of the factual and legal prerequisites for a decision to organise the entire criminal proceedings by remote means or to carry out one or several procedural actions by remote means 2. After analysing the legal regulation and practice concerning the application of the elements of remote criminal proceedings, distinguish the main legal safeguards for protection of the rights of the accused to ensure: (a) the right of effective participation in a court hearing; (b) the right of confidential consultation with the defence counsel; (c) the right of participation in the examination of evidence, in particular material evidence, as well as the right to question witnesses; and (d) the right to a public trial.

Keywords: remote criminal proceedings, fair trial, right to defence, technology progress

Procedia PDF Downloads 57
22259 Roadmaps as a Tool of Innovation Management: System View

Authors: Matich Lyubov

Abstract:

Today roadmaps are becoming commonly used tools for detecting and designing a desired future for companies, states and the international community. The growing popularity of this method puts tasks such as identifying basic roadmapping principles, creation of concepts and determination of the characteristics of the use of roadmaps depending on the objectives as well as restrictions and opportunities specific to the study area on the agenda. However, the system approach, e.g. the elements which are recognized to be major for high-quality roadmapping, remains one of the main fields for improving the methodology and practice of their development as limited research was devoted to the detailed analysis of the roadmaps from the view of system approach. Therefore, this article is an attempt to examine roadmaps from the view of the system analysis, to compare areas, where, as a rule, roadmaps and systems analysis are considered the most effective tools. To compare the structure and composition of roadmaps and systems models the identification of common points between construction stages of roadmaps and system modeling and the determination of future directions for research roadmaps from a systems perspective are of special importance.

Keywords: technology roadmap, roadmapping, systems analysis, system modeling, innovation management

Procedia PDF Downloads 292
22258 ATC in Competitive Electricity Market Using TCSC

Authors: S. K. Gupta, Richa Bansal

Abstract:

In a deregulated power system structure, power producers, and customers share a common transmission network for wheeling power from the point of generation to the point of consumption. All parties in this open access environment may try to purchase the energy from the cheaper source for greater profit margins, which may lead to overloading and congestion of certain corridors of the transmission network. This may result in violation of line flow, voltage and stability limits and thereby undermine the system security. Utilities therefore need to determine adequately their Available Transfer Capability (ATC) to ensure that system reliability is maintained while serving a wide range of bilateral and multilateral transactions. This paper presents power transfer distribution factor based on AC load flow for the determination and enhancement of ATC. The study has been carried out for IEEE 24 bus Reliability Test System.

Keywords: available transfer capability, FACTS devices, power transfer distribution factors, electric

Procedia PDF Downloads 485
22257 Legal Means for Access to Information Management

Authors: Sameut Bouhaik Mostafa

Abstract:

Information Act is the Canadian law gives the right of access to information for the institution of government. It declares the availability of government information to the public, but that exceptions should be limited and the necessary right of access to be specific, and also states the need to constantly re-examine the decisions on the disclosure of any government information independently from the government. By 1982, it enacted a dozen countries, including France, Denmark, Finland, Sweden, the Netherlands and the United States (1966) newly legally to access the information. It entered access to Canadian information into force of the Act of 1983, under the government of Pierre Trudeau, allowing Canadians to recover information from government files, and the development of what can be accessed from the information, and the imposition of timetables to respond. It has been applied by the Information Commissioner in Canada.

Keywords: law, information, management, legal

Procedia PDF Downloads 396
22256 Surrogacy: A Comparative, Legal, Children’s Rights Perspective

Authors: Ronli Sifris

Abstract:

The last Australian Parliamentary inquiry into surrogacy took place in 2016. Since then, a number of countries have reviewed their surrogacy laws, including countries such as New Zealand and the United Kingdom, which traditionally have invoked similar legal approaches to Australia on a broad range of issues. The time is ripe to reform Australia’s surrogacy laws with a view to putting in place a system that best protects the rights of all parties to a surrogacy arrangement, and especially the rights of the child. There are two specific, linked issues which tend to be particularly contentious in the surrogacy context. The first relates to legal parentage. There are questions around whether the surrogate or the intended parents should be deemed the legal parents of a child born through surrogacy and what should be the process for any transfer of parentage. The second key issue relates to compensation and whether a surrogate should be compensated for the reproductive labour inherent in conceiving, gestating, and birthing a child. This paper will invoke a comparative analysis with a view to considering how different countries are regulating surrogacy and which approach best protects the rights all parties involved in the surrogacy arrangement, especially the rights of the children born through surrogacy. The specific countries to be considered are Australia, Canada, and California (United States). I have selected these countries for the following reasons: Australia is the jurisdiction where the author is based, it is, therefore, the jurisdiction with which she has the most familiarity. It allows altruistic surrogacy only and post-birth parentage orders in favour of the intended parents of children born through altruistic surrogacy California, as a jurisdiction allowing for compensated surrogacy and pre-birth parentage orders in favour of the intended parents, sits at the other end of the spectrum to Australia thereby providing an interesting point of comparison. Canada sits somewhere in the middle; it ostensibly allows only altruistic surrogacy, but in practice, many aspects of the Canadian process resemble compensated surrogacy. In addition to conducting a comparative analysis with other countries, the paper will also consider international human rights law as its overarching framework for determining the approach that best protects the rights of a child born through surrogacy. Particular attention will be paid to the United Nations Convention on the Rights of the Child as the key children’s rights treaty. The European Court of Human Rights will also be extensively considered as it has decided a number of cases relating to the rights of children born through surrogacy.

Keywords: surrogacy, children’s rights, australia, compensation, parentage

Procedia PDF Downloads 107
22255 Genetic Testing and Research in South Africa: The Sharing of Data Across Borders

Authors: Amy Gooden, Meshandren Naidoo

Abstract:

Genetic research is not confined to a particular jurisdiction. Using direct-to-consumer genetic testing (DTC-GT) as an example, this research assesses the status of data sharing into and out of South Africa (SA). While SA laws cover the sending of genetic data out of SA, prohibiting such transfer unless a legal ground exists, the position where genetic data comes into the country depends on the laws of the country from where it is sent – making the legal position less clear.

Keywords: cross-border, data, genetic testing, law, regulation, research, sharing, South Africa

Procedia PDF Downloads 139
22254 Using Genre Analysis to Teach Contract Negotiation Discourse Practices

Authors: Anthony Townley

Abstract:

Contract negotiation is fundamental to commercial law practice. For this study, genre and discourse analytical methodology was used to examine the legal negotiation of a Merger & Acquisition (M&A) deal undertaken by legal and business professionals in English across different jurisdictions in Europe. While some of the most delicate negotiations involved in this process were carried on face-to-face or over the telephone, these were generally progressed more systematically – and on the record – in the form of emails, email attachments, and as comments and amendments recorded in successive ‘marked-up’ versions of the contracts under negotiation. This large corpus of textual data was originally obtained by the author, in 2012, for the purpose of doctoral research. For this study, the analysis is particularly concerned with the use of emails and covering letters to exchange legal advice about the negotiations. These two genres help to stabilize and progress the negotiation process and account for negotiation activities. Swalesian analysis of functional Moves and Steps was able to identify structural similarities and differences between these text types and to identify certain salient discursive features within them. The analytical findings also indicate how particular linguistic strategies are more appropriately and more effectively associated with one legal genre rather than another. The concept of intertextuality is an important dimension of contract negotiation discourse and this study also examined how the discursive relationships between the different texts influence the way that texts are constructed. In terms of materials development, the research findings can contribute to more authentic English for Legal & Business Purposes pedagogies for students and novice lawyers and business professionals. The findings can first be used to design discursive maps that provide learners with a coherent account of the intertextual nature of the contract negotiation process. These discursive maps can then function as a framework in which to present detailed findings about the textual and structural features of the text types by applying the Swalesian genre analysis. Based on this acquired knowledge of the textual nature of contract negotiation, the authentic discourse materials can then be used to provide learners with practical opportunities to role-play negotiation activities and experience professional ways of thinking and using language in preparation for the written discourse challenges they will face in this important area of legal and business practice.

Keywords: English for legal and business purposes, discourse analysis, genre analysis, intertextuality, pedagogical materials

Procedia PDF Downloads 127
22253 Transgenders Rights in Pakistan: From an Islamic Perspective

Authors: Zaid Haris

Abstract:

Since the beginning of time, transgender people have faced difficult circumstances, particularly in Pakistan. They have experienced discrimination, physical abuse, sexual assault, and murder in their lives. In response to their complaints, the Pakistani Supreme Court established a landmark that enables them to participate in society on an equal base. As a result, transgendered people living all around Pakistan have seen their legal, political, and cultural advocacy blossom since 2009. In order to provide and defend the human rights of Pakistan's transgender persons, this paper aims to identify and analyse the constitutional and legal framework set out there. The Supreme Court's momentous decision sparked legal reform in the nation for these rights, most notably the Transgender Persons (Protection of Rights) Act of 2017, a bill that was filed in Parliament. The implementation of the rights granted to transgender people in Pakistan, whether it relates to education, health, or any other area, requires close inspection. Additionally, for society to be accepting and inclusive, a significant and radical change in behaviour is required. This paper also includes the interviews of a few transgenders from Pakistan.

Keywords: discrimination, islam, pakistan, physical abuse, sexual assault, transgenders

Procedia PDF Downloads 106
22252 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward

Authors: Ahmad Almaududy Amri

Abstract:

Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.

Keywords: piracy, Southeast Asia, maritime security, legal frameworks

Procedia PDF Downloads 482
22251 Risk Factors Associated with Increased Emergency Department Visits and Hospital Admissions Among Child and Adolescent Patients

Authors: Lalanthica Yogendran, Manassa Hany, Saira Pasha, Benjamin Chaucer, Simarpreet Kaur, Christopher Janusz

Abstract:

Children and adolescent patients visit the Psychiatric Emergency Department (ED) for multiple reasons. Visiting the Psychiatric ED itself can be a traumatic experience that can affect an adolescents mental well-being, regardless of a history of mental illness. Despite this, limited research exists in this domain. Prospective studies have correlated adverse psychosocial determinants among adolescents to risk factors for poor well-being and unfavorable behavior outcomes. Studies have also shown that physiological stress is a contributor in the development of health problems and an increase in substance abuse in adolescents. This study aimed to retrospectively determine which psychosocial factors are associated with an increase in psychiatric ED visits. 600 charts of patients who had a psychiatric ED and inpatient admission visit from January 2014 through December 2014 were reviewed. Sociodemographics, diagnoses, ED visits and inpatient admissions were collected. Descriptive statistics, chi-square tests and independent t-test analyses were utilized to examine differences in the sample to determine which factors affected ED visits and admissions. The sample was 50% female, 35.2% self-identified black, and had a mean age of 13 years. The majority, 85%, went to public school and 17% were in special education. Attention Deficit Hyperactivity Disorder was the most common admitting diagnosis, found in 132(23%) responders. Most patients came from single parent household 305 (53%). The mean ages of patients that were sexually active, with legal issues, and reporting marijuana substance abuse were 15, 14.35, and 15 years respectively. Patients from two biological parent households had significantly fewer ED visits (1.2 vs. 1.7, p < 0.01) and admissions (0.09 vs. 0.26, p < 0.01). Among social factors, those who reported sexual, physical or emotional abuse had a significantly greater number of ED visits (2.1 vs. 1.5, p < 0.01) and admissions (0.61 vs. 0.14, p < 0.01) than those who did not. Patients that were sexually active or had legal issues or substance abuse with marijuana had a significantly greater number of admissions (0.43 vs. 0.17, p < 0.01), (0.54 vs. .18, p < 0.01) and (0.46 vs. 0.18, p < 0.01) respectively. This data supports the theory of the stability of a two parent home. Dual parenting plays a role in creating a safe space where a child can develop; this is shown by subsequent decreases in psychiatric ED visits and admissions. This may highlight the psychological protective role of a two parent household. Abuse can exacerbate existing psychiatric illness or initiate the onset of new disease. Substance abuse and legal issues result in early induction to the criminal system. Results show that this causes an increase in frequency of visits and severity of symptoms. Only marijuana, but not other illicit substances, correlated with higher incidence of psychiatric ED visits. This may speak to the psychotropic nature of tetrahydrocannabinols and their role in mental illness. This study demonstrates the array of psychosocial factors that lead to increased ED visits and admissions in children and adolescents.

Keywords: adolescent, child psychiatry, emergency department, substance abuse

Procedia PDF Downloads 316
22250 Pro-BluCRM: A Proactive Customer Relationship Management System Using Bluetooth

Authors: Mohammad Alawairdhi

Abstract:

Customer Relationship Management (CRM) started gaining attention as late as the 1990s, and since then efforts are ongoing to define the domain’s precise specifications. There is yet no single agreed upon definition. However, a predominant majority perceives CRM as a mechanism for enhancing interaction with customers, thereby strengthening the relationship between a business and its clients. From the perspective of Information Technology (IT) companies, CRM systems can be viewed as facilitating software products or services to automate the marketing, selling and servicing functions of an organization. In this paper, we have proposed a Bluetooth enabled CRM system for small- and medium-scale organizations. In the proposed system, Bluetooth technology works as an automatic identification token in addition to its common use as a communication channel. The system comprises a server side accompanied by a user-interface support for both client and server sides. The system has been tested in two environments and users have expressed ease of use, convenience and understandability as major advantages of the proposed solution.

Keywords: customer relationship management, CRM, bluetooth, automatic identification token

Procedia PDF Downloads 330
22249 Reconsidering the Legitimacy of Capital Punishment in the Interpretation of the Human Right to Life in the Two Traditional Approaches

Authors: Yujie Zhang

Abstract:

There are debates around the legitimacy of capital punishment, i.e., whether death could serve as a proper execution in our legal system or not. Different arguments have been raised. However, none of them seem able to provide a determined answer to the issue; this results in a lack of instruction in the legal practice. This article, therefore, devotes itself to the effort to find such an answer. It takes the perspective of rights, through interpreting the concept of right to life, which capital punishment appears to be in confliction with in the two traditional approaches, to reveal a possibly best account of the right and its conclusion on capital punishment. However, this effort is not a normative one which focuses on what ought to be. It means the article does not try to work out which argument we should choose and solve the hot debate on whether capital punishment should be allowed or not. It, again, does not propose which perspective we should take to approach this issue or generally which account of right must be better; rather, it is more a thought experiment. It attempts to raise a new perspective to approach the issue of the legitimacy of capital punishment. Both its perspective and conclusion therefore are tentative: what if we view this issue in a way we have never tried before, for example the different accounts of right to life? In this sense, the perspective could be defied, while the conclusion could be rejected. Other perspectives and conclusions are also possible. Notwithstanding, this tentative perspective and account of the right still could not be denied from serving as a potential approach, since it does have the ability to provide us with a determined attitude toward capital punishment that is hard to achieve through existing arguments.

Keywords: capital punishment, right to life, theories of rights, the choice theory

Procedia PDF Downloads 177
22248 The Targeting Logic of Terrorist Groups in the Sahel

Authors: Mathieu Bere

Abstract:

Al-Qaeda and Islamic State-affiliated groups such as Ja’amat Nusra al Islam Wal Muslimim (JNIM) and the Islamic State-Greater Sahara Faction, which is now part of the Boko Haram splinter group, Islamic State in West Africa, were responsible, between 2018 and 2020, for at least 1.333 violent incidents against both military and civilian targets, including the assassination and kidnapping for ransom of Western citizens in Mali, Burkina Faso and Niger, the Central Sahel. Protecting civilians from the terrorist violence that is now spreading from the Sahel to the coastal countries of West Africa has been very challenging, mainly because of the many unknowns that surround the perpetrators. To contribute to a better protection of civilians in the region, this paper aims to shed light on the motivations and targeting logic of jihadist perpetrators of terrorist violence against civilians in the central Sahel region. To that end, it draws on relevant secondary data retrieved from datasets, the media, and the existing literature, but also on primary data collected through interviews and surveys in Burkina Faso. An analysis of the data with the support of qualitative and statistical analysis software shows that military and rational strategic motives, more than purely ideological or religious motives, have been the main drivers of terrorist violence that strategically targeted government symbols and representatives as well as local leaders in the central Sahel. Behind this targeting logic, the jihadist grand strategy emerges: wiping out the Western-inspired legal, education and governance system in order to replace it with an Islamic, sharia-based political, legal, and educational system.

Keywords: terrorism, jihadism, Sahel, targeting logic

Procedia PDF Downloads 72
22247 HPLC-UV Screening of Legal (Caffeine and Yohimbine) and Illegal (Ephedrine and Sibutramine) Substances from Weight Loss Dietary Supplements for Athletes

Authors: Amelia Tero-Vescan, Camil-Eugen Vari, Laura Ciulea, Cristina Filip, Silvia Imre

Abstract:

A HPLC –UV method for the identification of ephedrine (EPH), sibutramine (SB), yohimbine (Y) and caffeine (CF) was developed. Separation was performed on a Kromasil 100-RP8, 150 mm x 4.6 mm, 5 mm column equipped with a precolumn Kromasil RP 8. Mobile phase was a gradient of 80-35 % sodium dihydrogen phosphate pH=5 with NH4OH and acetonitrile over 15 minutes time of analysis. Based on the responses of 113 athletes about dietary supplements (DS) consumed for "fat burning" and weight loss which have a legal status in Romania, 28 supplements have been selected and investigated for their content in CF, Y, legal substances, and SB, EPH (prohibited substances in DS). The method allows quantitative determination of the four substances in a short analysis time and with minimum cost. The presence of SB and EPH in the analyzed DS was not detected while the content in CF and Y considering the dosage recommended by the manufacturer does not affect the health of the consumers. DS labeling (plant extracts with CF and Y content) allows manufacturers to avoid declaring correct and exact amounts per pharmaceutical form (pure CF or equivalent and Y, respectively).

Keywords: dietary supplements, sibutramine, ephedrine, yohimbine, caffeine, HPLC

Procedia PDF Downloads 426
22246 On the Optimization of a Decentralized Photovoltaic System

Authors: Zaouche Khelil, Talha Abdelaziz, Berkouk El Madjid

Abstract:

In this paper, we present a grid-tied photovoltaic system. The studied topology is structured around a seven-level inverter, supplying a non-linear load. A three-stage step-up DC/DC converter ensures DC-link balancing. The presented system allows the extraction of all the available photovoltaic power. This extracted energy feeds the local load; the surplus energy is injected into the electrical network. During poor weather conditions, where the photovoltaic panels cannot meet the energy needs of the load, the missing power is supplied by the electrical network. At the common connexion point, the network current shows excellent spectral performances.

Keywords: seven-level inverter, multi-level DC/DC converter, photovoltaic, non-linear load

Procedia PDF Downloads 166