Search results for: cyber liability insurance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 784

Search results for: cyber liability insurance

364 A Quantitative Assessment of the Social Marginalization in Romania

Authors: Andra Costache, Rădiţa Alexe

Abstract:

The analysis of the spatial disparities of social marginalization is a requirement in the present-day socio-economic and political context of Romania, an East-European state, member of the European Union since 2007, at present faced with the imperatives of the growth of its territorial cohesion. The main objective of this article is to develop a methodology for the assessment of social marginalization, in order to understand the intensity of the marginalization phenomenon at different spatial scales. The article proposes a social marginalization index (SMI), calculated through the integration of ten indicators relevant for the two components of social marginalization: the material component and the symbolical component. The results highlighted a strong connection between the total degree of social marginalization and the dependence on social benefits, unemployment rate, non-inclusion in the compulsory education, criminality rate, and the type of pension insurance.

Keywords: Romania, social marginalization index, territorial disparities, EU

Procedia PDF Downloads 345
363 Photocatalytic Degradation of Toxic Phenols Using Zinc Oxide Doped Prussian Blue Nanocomposite

Authors: Rachna, Uma Shanker

Abstract:

Aromatic phenols, being priority pollutants, are found in various industrial effluents and seeking the attention of environmentalists worldwide, owing to their life-threatening effects. In the present study, the coupling of zinc oxide with Prussian blue was achieved involving co-precipitation synthesis process using Azadirachta indica plant extract. The fabricated nanocatalyst was employed for the sunlight mediated photodegradation of various phenols (Phenol, 3-Aminophenol, and 2,4-Dinitrophenol). Doping of zinc oxide with Prussian blue caused an increase in the surface area to value 80.109 m²g⁻¹ and also enhanced the semiconducting tendency of the nanocomposite with band gap energy 1.101 eV. The experiment was performed at different parameters of phenols concentration, catalyst amount, pH, time, and exposure of sunlight. The obtained results showed a lower elimination of 2,4-DNP (93%) than 3-AP (97%) and phenol (95%) owing to their molecular weight and basicity differences. In comparison to the starting material (zinc oxide and Prussian blue), nanocomposite was more capable in degrading the phenols and lowered the t1/2 value of phenol (4.405 h), 3-AP (4.04 h) and 2,4-DNP (4.68 h) to a greater extent. Effect of different foreign anions was also studied to check nanocomposite’s liability under natural conditions. The extent of charge recombination being the most limiting factor in the photodegradation of pollutants was determined through the photoluminescence. Sunlight active ZnO@FeHCF nanocomposite was proven to exhibit good catalytic ability up to 10 cycles.

Keywords: nanocomposite, phenols, photodegradation, sunlight, water

Procedia PDF Downloads 126
362 Interest Charges and Sustainability Challenges: The Case of OECD Countries

Authors: Zapji Ymele Aime Philombe

Abstract:

Servicing public debt is a significant budgetary burden in the sense that the payment of interest charges is a liability on the balance sheet of the public budget and affects fiscal policy. Interest charges can sometimes become a burden if they crowd out private activities. In order to analyse and understand the determinants of the debt burden and its impact on the sustainability of public finances, the present work focuses on OECD countries. It is noted from the literature that the factors that determine interest charges are macroeconomic (inflation, GDP growth and interest rates) and public finances (primary balance and public debt). After analysing a panel of 33 OECD countries and using ordinary least squares (OLS), we find that public debt, inflation and long-term interest rates are positively correlated with interest charges. An increase in any of these variables leads to an increase in debt charges. On the other hand, a growth in GDP is negatively associated with interest charges. Indeed, an increase in GDP generates enough revenue to meet the repayment of debt charges. According to the empirical analysis, we can say that, despite the large and growing debt-to-GDP ratio of major OECD countries, interest charges are not a threat to the sustainability of public finances. However, it is important for these countries to reduce the ratio of public debt to GDP because, in the face of the many challenges (health, aging population, etc.) that are looming on the horizon, an increase in interest rates could bring with it considerable burdens that would threaten the budgetary balance of these states.

Keywords: interests charges, public debt, sustainability, interest rates

Procedia PDF Downloads 124
361 Visual Overloaded on User-Generated Content by the Net Generation: Participatory Cultural Viewpoint

Authors: Hasanah Md. Amin

Abstract:

The existence of cyberspace and its growing contents is real and overwhelming. Visual as one of the properties of cyber contents is increasingly becoming more significant and popular among creator and user. The visual and aesthetic of the content is consistent with many similarities. Aesthetic, although universal, has slight differences across the world. Aesthetic power could impress, influence, and cause bias among the users. The content creator who knows how to manipulate this visuals and aesthetic expression can dominate the scenario and the user who is ‘expressive literate’ will gain much from the scenes. User who understands aesthetic will be rewarded with competence, confidence, and certainly, a personality enhanced experience in carrying out a task when participating in this chaotic but promising cyberworld. The aim of this article is to gain knowledge from related literature and research regarding User-Generated Content (UGC), which focuses on aesthetic expression by the Net generation. The objective of this preliminary study is to analyze the aesthetic expression linked to visual from the participatory cultural viewpoint looking for meaning, value, patterns, and characteristics.

Keywords: visual overloaded, user-generated content, net generation, visual arts

Procedia PDF Downloads 439
360 Application of Biometrics in Patient Identification Card: Case Study of Saudi Arabia

Authors: Sarah Aldhalaan, Tanzila Saba

Abstract:

Healthcare sectors are increasing rapidly to fulfill patient’s needs across the world. A patient identification is considered as the main aspect for a patient to be served in healthcare institutes. Nowadays, people are presenting their insurance card along with their identification card in order to get the needed treatment in hospitals however, this process lack security preferences. The aim of this research paper is to reveal a solution to introduce and use biometrics in healthcare hospitals. The findings show that the people know biometrics since they are interacting with them through different channels and that the need for biometrics techniques to identify patients is essential. Also, the survey relevant questions are used to analyze and add insights on what is are the suitable biometrics to be used in such cases. Moreover, results are presented to exhibit the effectiveness of the used methodology and in analyzing usage of biometrics in hospitals in an enhancing way. Finally, an interesting conclusion of overall work is presented at the end of paper.

Keywords: biometrics, healthcare, fingerprint, Saudi Arabia

Procedia PDF Downloads 247
359 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 139
358 The Implementation of Child Adoption as Legal Protection of Children

Authors: Sonny Dewi Judiasih

Abstract:

The principle of a marriage is to achieve a happy and eternity family based on the willing of the God. The family has a fundamental role in the society as a social individual and as a nuclear family consists of father, mother, and children. Thus, each family always would like to have children who will continue the family. However, not all family will be blessed with children and consequently, there is family without children. Therefore, the said the certain family will do any effort to fulfill the wish to have children. One of the ways is to adopt children. The implementation of child adoption is conducted by the family who does not have children but sometimes child adoption is conducted by a family who has already children. The implementation of child adoption is based on the interest of the welfare and the intellectual of the said child. Moreover, it should be based on the social liability of the individual in accordance with the developing of the traditional values as part of the nation culture. The child adoption is conducted for the welfare of the child demonstrates that a change on the basic motive (value) whereby in the past the child adoption is to fulfill the wish of foster parent (to have children in the family). Nowadays the purpose of child adoption is not merely for the interest of foster parent but in particular for the interest, welfare and the future of the child. The development of the society has caused the occurrence of changes of perspective in the society which lead to a need for new law. The court of justice has an impact of such changes. It is evidenced by the court order for child adoption in the legal framework of certainty of law. The changes of motives (value) of the child adoption in the society can be fully understood in the event that the society fully understand that the ultimate purpose of Indonesia nation is to achieve a justice and prosperity society, i.e., social welfare for all Indonesian people.

Keywords: child adoption, family law, legal protection, children

Procedia PDF Downloads 471
357 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 143
356 A Holistic Approach of Cross-Cultural Management with Insight from Neuroscience

Authors: Mai Nguyen-Phuong-Mai

Abstract:

This paper incorporates insight from various models, studies and disciplines to construct a framework called the Inverted Pyramid Model. It is argued that such a framework has several advantages: (1) it reduces the shortcomings of the problem-focused approach that dominates the mainstream theories of cross-cultural management. With contributing insight from neuroscience, it suggests that training in business cross-cultural awareness should start with potential synergy emerged from differences instead of the traditional approach that focuses on the liability of foreigners and negative consequences of cultural distance. (2) The framework supports a dynamic and holistic way of analyzing cultural diversity by analyzing four major cultural units (global, national, organizational and group culture). (3) The framework emphasizes the role of individuals –an aspect of culture that is often ignored or regarded as a non-issue in the traditional approach. It is based on the notion that people don’t do business with a country, but work (in)directly with a unique person. And it is at this individual level that culture is made, personally, dynamically, and contextually. Insight from neuroscience provides significant evidence that a person can develop a multicultural mind, confirm and contradict, follow and reshape a culture, even when (s)he was previously an outsider to this culture. With this insight, the paper proposes a revision of the old adage (Think global – Act local) and change it into Think global – Plan local – Act individual.

Keywords: static–dynamic paradigm, cultural diversity, multicultural mind, neuroscience

Procedia PDF Downloads 129
355 Obligation, the Shifting Nature of Physician-Patient Relationship, and the Basic Healthcare Reform in Mainland China

Authors: Jia Liu

Abstract:

This article explores the shifting nature of physician-patient relationship in mainland China. Specifically, it takes the physician-patient relationship during the barefoot doctor program in 1968-1978, the marketization of healthcare services in 1978-2002, and the healthcare reform in 2003-2020 as three typical historical periods, illustrating how the nature of the physician-patient relationship has changed over time in mainland China. Drawing on recent jurisprudential literature that emphasizes the roles and functions done by and through obligation rather than right, it explores how the obligations of physicians and patients along with the implementation of informed consent, marketization of the healthcare system, and the basic healthcare reform have affected their relationship. One key feature of this article is that it analyzes the ways in which commodification and decommodification of healthcare have defined and in many different ways have determined the expectations and practices of physicians and patients, which illustrates how the trust between physicians and patients threatens to collapse and the bond between the citizen and the state fails to be firmly established in the mainland Chinese healthcare context. It also pays special attention to the role played by law and legal institutions—for instance, the implementation of informed consent and the liability law—in being complicit in facilitating the decoupling of the practices of physicians and patients from their ethical senses of obligation and undermining the bond (the trust relationship) between them.

Keywords: healthcare, marketization, physician-patient relationship, sense of obligation

Procedia PDF Downloads 141
354 High Techno-Parks in the Economy of Azerbaijan and Their Management Problems

Authors: Rasim M. Alguliyev, Alovsat G. Aliyev, Roza O. Shahverdiyeva

Abstract:

The paper investigated the role and position of high techno-parks, which is one of the priorities of Azerbaijan. The main objectives, functions and features of the establishment of high-techno parks, as well as organization of the activity of the structural elements, which are the parking complex and their interactions were analyzed. The development, organization and management of high techno-parks were studied. The key features and functions of innovative structures’ management were explained. The need for a comprehensive management system for the development of high-techno parks was emphasized and the major problems were analyzed. In addition, the methods were proposed for the development of information systems supporting decision making in systematic and sustainable management of the parks.

Keywords: innovative development, innovation processes, innovation economy, innovation infrastructure, high technology park, efficient management, management decisions, information insurance

Procedia PDF Downloads 474
353 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 91
352 Reference Architecture for Intelligent Enterprise Solutions

Authors: Shankar Kambhampaty, Harish Rohan Kambhampaty

Abstract:

Data in IT systems in enterprises has been growing at a phenomenal pace. This has provided opportunities to run analytics to gather intelligence on key business parameters that enable them to provide better products and services to customers. While there are several artificial intelligence (AI/ML) and business intelligence (BI) tools and technologies available in the marketplace to run analytics, there is a need for an integrated view when developing intelligent solutions in enterprises. This paper progressively elaborates a reference model for enterprise solutions, builds an integrated view of data, information, and intelligence components, and presents a reference architecture for intelligent enterprise solutions. Finally, it applies the reference architecture to an insurance organization. The reference architecture is the outcome of experience and insights gathered from developing intelligent solutions for several organizations.

Keywords: architecture, model, intelligence, artificial intelligence, business intelligence, AI, BI, ML, analytics, enterprise

Procedia PDF Downloads 144
351 The Reflection of Greek Reality Concerning Taxation from the Perspective of Both Tax Payers and Taxmen

Authors: Evagelia Makri, Maria Tsourela, Dimitris Paschaloudis, Dafni M. Nerantzaki

Abstract:

One of the biggest financial and social problems, which at the same time constitute one of the greater challenges that Greek society faces today, is the illegal avoidance of tax payments. Tax evasion may negate financial data and community budgets, as well as breed financial chaos. This research seeks to reflect Greek reality concerning tax measures. Also, there will be an effort to record the factors surrounding tax evasion. Greek tax system’s data will be rendered in financial terms. Questionnaires will be handed out to tax payers, and interviews will be conducted to taxmen. The quantitative analysis of the questionnaire answers will define the tax payers’ opinion towards the existence of tax evasion. The qualitative analysis of the interviews will reveal the main reason that boosts tax evasion. At the end, there will be some realistic proposals about how to better collect taxes, through the creation of a strong regulatory mechanism.

Keywords: tax evasion, tax collection measures, insurance recovery measures, Greek tax system

Procedia PDF Downloads 365
350 Body, Sex and Culture: Gender Dissidences through Cinema

Authors: Piedad Lucia Bolivar Goez, Daniel Ignacio Garzon Luna, Maria Camila Balcero Angel, Sara Carolina Martinez Roman, Daniela Natalia Polo Rivas, Sandra Liliana Rocha Guitierrez

Abstract:

This article provides a critical analysis on the conception of disorders of sexual development (DSDs) within the bioethics framework. By means of analytical thought, the objective is to approach topics such as the rediscovery of the body, the reinvention of sexuality and link them to the liability that health personnel have to inform people about the options they have to decide over their health and body. The medicalization of sexed bodies in both psychosocial and anatomo-morpho-physiological dimensions from a legal standpoint were analyzed. Its also explored the gender stereotypes established by society and the role of laws in guaranteeing the right of autonomy that takes on greater relevance in DSD. Through this analysis, it was concluded that despite intersexuality having been analyzed by Colombia’s Constitutional Court, that it is stated as a fair entity, the stigmatization by society has not allowed these individuals to belong to an egalitarian context in which everyone has the same opportunities of access to the goods and services that they need. This leads individuals to hide their identity and expression of genre in order to be accepted in a set of contexts. Thus creating a vulnerability that the health system must be able to identify and in which it is necessary to intervene at a biopsychosocial level, in order to guarantee the protection of the individual within an unquestionable frame of equality and solidarity.

Keywords: disorders of sex development, gender identity, sexuality, transgender persons

Procedia PDF Downloads 194
349 Empirical Evidence on the Need for Harmonization of Audit Criteria for Small Enterprises in India

Authors: Satinder Bhatia

Abstract:

Limited Liability Partnerships (LLPs) was a concept introduced in India in 2009. Ever since then, there has been a fierce growth in the number of organizations registered as LLPs outpacing the number of registrations as private companies. Among other benefits extended to LLPs, the audit being mandated only for LLPs having a turnover of at least Rs 40 lakhs or capital contribution of Rs 25 lakhs, has been a major attraction. This has resulted in only about 10 per cent of LLPs coming under mandatory audit. Even for such companies, the accounting standards to be followed in the preparation of financial statements have not been specified. The Revised Indian Accounting Standards (Revised IndAS) which are aligned with IFRS to a great extent, may apply to LLPs only under limited conditions. Thus, the veracity of even the audited financial statements of LLPs can be questioned. If in future, these LLPs would like to list on a stock exchange to raise capital, there can be serious hurdles if investors do not find the financial statements to be reliable and consistent. LLPs are generally governed by country-specific rules in the area of accounts and audit. Thus, such rules vary across UK, EU and the USA. Some countries have adopted the IFRS for SMEs and since LLPs can be referred to as SMEs; they would come under the ambit of these IFRS provisions. Besides, as the scope of audit widens to cover qualitative information in addition to quantitative data, audit of LLPs has now acquired a new meaning and a new urgency as demands for at least limited purpose audits are arising from different stakeholders including lenders, suppliers, customers and joint venture partners.

Keywords: audit disclosures, audit quality, guidance for SMEs, non-audit services

Procedia PDF Downloads 156
348 Designing a Legal Framework for Social Innovation

Authors: Prapin Nuchpiam

Abstract:

The importance of social innovation has become increasingly significant as the process of developing effective solutions to social problems and being a force of change for people’s better quality of life. In order to promote social innovation, active collaboration between government, business organizations, and the civil society sector is needed. A proper legal framework also plays an important role in building the social innovation ecosystem. Currently, there is no specific law designed for social innovation or a so-called “social innovation law”. One of the legal frameworks for social innovation is the development of hybrid legal forms for social enterprises such as the UK’s Community Interest Company (CIC), the US’s Low-Profit Limited Liability Company (L3C) and the US’s Benefit Corporation (B-Corp), among others. This is because social enterprise is recognized as an organizational form of social innovation with its aim for social benefit goals and the achievement of financial sustainability. Nonetheless, there has been a debate over the differences and similarities between social innovation and social enterprise. Thus, social enterprise law might not fit well with social innovation, resulting in a search for a legal framework specially designed for social innovation. This paper aims to study the interrelationship between social innovation, social enterprise, and the role of law to see whether we need a specific law for social innovation. If so, what should such a legal framework look like? The paper will provide a critical analysis of innovative legal forms for social enterprise as a type of social innovation law. A proper legal framework for social innovation could help promote the sector, which could result in finding new solutions to social problems. It will also bring about a greater common understanding of the exciting development of legal scholarship in this way, which will, in turn, serve as a productive basis or direction for further research on this increasingly important topic.

Keywords: social innovation, social enterprise, legal framework, regulation

Procedia PDF Downloads 99
347 Cartel's Little Helpers: A Comparative Study of the Case Law Regarding the Facilitators of Collusion in Latin America Competition Law and Policy

Authors: Andres Calderon

Abstract:

In order to avoid detection and punishment, cartels have recruited the help of third parties to organize, execute and disguise the anticompetitive practices cartel members have agreed upon. These third parties may take the form of consultancy firms, guilds or professional advisors that do not perform an economic activity in the market where the collusion takes place. This paper takes a look into how national competition authorities and national legislators have dealt with the emergence of the cartels’ facilitators in Latin America. Following the practice of other jurisdictions such as United States (Toys R' Us, Apple), European Union (AC Treuhand), United Kingdom (Replica Kits, Hasbro) and Spain (Urban, Snap-On), some countries (e.g. Argentina, Chile) in Latin America have started to conduct investigations and find antitrust liability in cartels’ facilitators for helping others to violate their national competition laws. Some countries (e.g. Peru and Colombia) have also amended their legislation to amplify the subjective scope of application in order to include cartels’ facilitators. The Latin American case is one of special relevance because public officials are often prone to promote or indulge agreements between competitors in sectors of political interest. A broad definition of cartels’ facilitator, consequently, could lead to the prosecution of punishment of public officials that may hinder the competitive process.

Keywords: anticompetitive practices, cartel, collusion, competition, facilitator, hub and spoke

Procedia PDF Downloads 168
346 Current Status of Industry 4.0 in Material Handling Automation and In-house Logistics

Authors: Orestis Κ. Efthymiou, Stavros T. Ponis

Abstract:

In the last decade, a new industrial revolution seems to be emerging, supported -once again- by the rapid advancements of Information Technology in the areas of Machine-to-Machine (M2M) communication permitting large numbers of intelligent devices, e.g. sensors to communicate with each other and take decisions without any or minimum indirect human intervention. The advent of these technologies have triggered the emergence of a new category of hybrid (cyber-physical) manufacturing systems, combining advanced manufacturing techniques with innovative M2M applications based on the Internet of Things (IoT), under the umbrella term Industry 4.0. Even though the topic of Industry 4.0 has attracted much attention during the last few years, the attempts of providing a systematic literature review of the subject are scarce. In this paper, we present the authors’ initial study of the field with a special focus on the use and applications of Industry 4.0 principles in material handling automations and in-house logistics. Research shows that despite the vivid discussion and attractiveness of the subject, there are still many challenges and issues that have to be addressed before Industry 4.0 becomes standardized and widely applicable.

Keywords: Industry 4.0, internet of things, manufacturing systems, material handling, logistics

Procedia PDF Downloads 127
345 Genetic Algorithms Based ACPS Safety

Authors: Emine Laarouchi, Daniela Cancila, Laurent Soulier, Hakima Chaouchi

Abstract:

Cyber-Physical Systems as drones proved their efficiency for supporting emergency applications. For these particular applications, travel time and autonomous navigation algorithms are of paramount importance, especially when missions are performed in urban environments with high obstacle density. In this context, however, safety properties are not properly addressed. Our ambition is to optimize the system safety level under autonomous navigation systems, by preserving performance of the CPS. At this aim, we introduce genetic algorithms in the autonomous navigation process of the drone to better infer its trajectory considering the possible obstacles. We first model the wished safety requirements through a cost function and then seek to optimize it though genetics algorithms (GA). The main advantage in the use of GA is to consider different parameters together, for example, the level of battery for navigation system selection. Our tests show that the GA introduction in the autonomous navigation systems minimize the risk of safety lossless. Finally, although our simulation has been tested for autonomous drones, our approach and results could be extended for other autonomous navigation systems such as autonomous cars, robots, etc.

Keywords: safety, unmanned aerial vehicles , CPS, ACPS, drones, path planning, genetic algorithms

Procedia PDF Downloads 181
344 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations

Authors: Rady Farag Aziz Ibrahim

Abstract:

The gap between Islamic terrorism and human rights has become an important issue in the fight against Islamic terrorism worldwide. This situation is repeated because terrorism and human rights are interconnected in such a way that when the former begins, the latter becomes subject to violence. This unknown relationship was recognized in the Vienna Declaration and Program of Action adopted at the International Conference on Human Rights held in Vienna on 25 June 1993, confirming that terrorist acts, in all their forms and manifestations, aim to destroy the rights of individuals. humanity to destroy. Therefore, Islamic terrorism is a violation of basic human rights. For this purpose, the first part of the article will focus on the relationship between terrorism and human rights and the synergy between these two concepts. The second part then explores the emerging concept of cyber threats and how they exist. Additionally, technology analysis will be conducted against threats based on human rights. This will be achieved through analysis of the concept of 'securitization' of human rights and by striking a balance between counter-terrorism measures and the protection of human rights at all costs. This article concludes with recommendations on how to balance terrorism and human rights today.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development

Procedia PDF Downloads 44
343 Knowledge Transfer from Experts to Novice: An Empirical Study on Online Communities

Authors: Firmansyah David

Abstract:

This paper aims to investigate factors that drive individuals to transfer their knowledge in the context of online communities. By revisiting tacit-to-explicit knowledge creation, this research attempts to contribute empirically using three online forums (1) Software Engineering; (2) Aerospace Simulator; (3) Health Insurance System. A qualitative approach was deployed to map and recognize the pattern of users ‘Knowledge Transfer (KT), particularly from expert to novice. The findings suggest a common form on how experts give their effort to formulate ‘explicit’ knowledge and how novices ‘understand’ such knowledge. This research underlines that skill; intuition, judgment; value and belief are the prominent factors, both for experts and novice. Further, this research has recognized the groups of expert and novice by their ability to transfer and to ‘adopt’ new knowledge. Future research infers to triangulate the method in which the quantitative study is needed to measure the level of adoption of (new) knowledge by individuals.

Keywords: explicit, expert, knowledge, online community

Procedia PDF Downloads 268
342 Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks

Authors: Jameelah O. Yaqub

Abstract:

The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions.

Keywords: banks, e-products, innovation, Nigeria

Procedia PDF Downloads 337
341 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 325
340 The Role of Virtual Reality in Mediating the Vulnerability of Distant Suffering: Distance, Agency, and the Hierarchies of Human Life

Authors: Z. Xu

Abstract:

Immersive virtual reality (VR) has gained momentum in humanitarian communication due to its utopian promises of co-presence, immediacy, and transcendence. These potential benefits have led the United Nations (UN) to tirelessly produce and distribute VR series to evoke global empathy and encourage policymakers, philanthropic business tycoons and citizens around the world to actually do something (i.e. give a donation). However, it is unclear whether or not VR can cultivate cosmopolitans with a sense of social responsibility towards the geographically, socially/culturally and morally mediated misfortune of faraway others. Drawing upon existing works on the mediation of distant suffering, this article constructs an analytical framework to articulate the issue. Applying this framework on a case study of five of the UN’s VR pieces, the article identifies three paradoxes that exist between cyber-utopian and cyber-dystopian narratives. In the “paradox of distance”, VR relies on the notions of “presence” and “storyliving” to implicitly link audiences spatially and temporally to distant suffering, creating global connectivity and reducing perceived distances between audiences and others; yet it also enables audiences to fully occupy the point of view of distant sufferers (creating too close/absolute proximity), which may cause them to feel naive self-righteousness or narcissism with their pleasures and desire, thereby destroying the “proper distance”. In the “paradox of agency”, VR simulates a superficially “real” encounter for visual intimacy, thereby establishing an “audiences–beneficiary” relationship in humanitarian communication; yet in this case the mediated hyperreality is not an authentic reality, and its simulation does not fill the gap between reality and the virtual world. In the “paradox of the hierarchies of human life”, VR enables an audience to experience virtually fundamental “freedom”, epitomizing an attitude of cultural relativism that informs a great deal of contemporary multiculturalism, providing vast possibilities for a more egalitarian representation of distant sufferers; yet it also takes the spectator’s personally empathic feelings as the focus of intervention, rather than structural inequality and political exclusion (an economic and political power relations of viewing). Thus, the audience can potentially remain trapped within the minefield of hegemonic humanitarianism. This study is significant in two respects. First, it advances the turn of digitalization in studies of media and morality in the polymedia milieu; it is motivated by the necessary call for a move beyond traditional technological environments to arrive at a more novel understanding of the asymmetry of power between the safety of spectators and the vulnerability of mediated sufferers. Second, it not only reminds humanitarian journalists and NGOs that they should not rely entirely on the richer news experience or powerful response-ability enabled by VR to gain a “moral bond” with distant sufferers, but also argues that when fully-fledged VR technology is developed, it can serve as a kind of alchemy and should not be underestimated merely as a “bugaboo” of an alarmist philosophical and fictional dystopia.

Keywords: audience, cosmopolitan, distant suffering, virtual reality, humanitarian communication

Procedia PDF Downloads 145
339 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 149
338 Factors Associated with Self-Rated Health among Persons with Disabilities: A Korean National Survey

Authors: Won-Seok Kim, Hyung-Ik Shin

Abstract:

Self-rated health (SRH) is a subjective assessment of individual health and has been identified as a strong predictor for mortality and morbidity. However few studies have been directed to the factors associated with SRH in persons with disabilities (PWD). We used data of 7th Korean national survey for 5307 PWD in 2008. Multiple logistic regression analysis was performed to find out independent risk factors for poor SRH in PWD. As a result, indicators of physical condition (poor instrumental ADL), socioeconomic disadvantages (poor education, economically inactive, low self-rated social class, medicaid in health insurance, presence of unmet need for hospital use) and social participation and networks (no use of internet service) were selected as independent risk factors for poor SRH in final model. Findings in the present study would be helpful in making a program to promote the health and narrow the gap of health status between the PWD.

Keywords: disabilities, risk factors, self-rated health, socioeconomic disadvantages, social networks

Procedia PDF Downloads 397
337 Tussle of Intellectual Property Rights and Privacy Laws with Reference to Artificial Intelligence

Authors: Lipsa Dash, Gyanendra Sahu

Abstract:

Intelligence is the cornerstone of humans, and now they have created a counterpart of themselves artificially. Our understanding of the word intelligence is a very perspective based and mostly superior understanding of what we read, write, perceive and understand the adversities around better. A wide range of industrial sectors have also started involving the technology to perceive, reason and act. Similarly, intellectual property is the product of human intelligence and creativity. The World Intellectual Property Organisation is currently working on technology trends across the globe, and AI tops the list in the digital frontier that will have a profound impact on the world, transforming the way we live and work. Coming to Intellectual Property, patents and creations of the AI’s itself have constantly been in question. This paper explores whether AI’s can fit in the flexibilities of Trade Related Intellectual Property Studies and gaps in the existing IP laws or rthere is a need of amendment to include them in the ambit. The researcher also explores the right of AI’s who create things out of their intelligence and whether they could qualify to be legal persons making the other laws applicable on them. Differentiation between AI creations and human creations are explored in the paper, and the need of amendments to determine authorship, ownership, inventorship, protection, and identification of beneficiary for remuneration or even for determining liability. The humans and humanoids are all indulged in matters related to Privacy, and that attracts another constitutional legal issue to be addressed. The authors will be focusing on the legal conundrums of AI, transhumanism, and the Internet of things.

Keywords: artificial intelligence, humanoids, healthcare, privacy, legal conundrums, transhumanism

Procedia PDF Downloads 126
336 Islamic Finance in Tunisia: Reality and Development

Authors: Amira Kaddour, Hedia Teraoui, Khmayes Bougatef

Abstract:

The main purpose of this paper is to determine the major causes of the underdevelopment of Islamic finance in Tunisia. Indeed, it’s surprising to note that Zitouna bank established in May 2010 is the first Islamic Tunisian bank although 99% of Tunisians are Muslim and Islam is the religion of the State according to the Constitution. So we rely in our paper on the opinions of number of professors of finance and economics as educated people to prove or reject our hypothesis that the underdevelopment of Islamic finance in Tunisia can be explained by the ignorance of its main principles and advantages. Ours findings reveal that this branch of finance is still largely unknown, not only from public but also from professionals. The results obtained surprisingly show that this insignificance of Islamic banking cannot be explained by the fact that Tunisia has been governed since its independence by a secular left-wing party. Indeed, only 3% of respondents believe that legislation and regulation in Tunisia represent an obstacle to the development of Islamic finance. Moreover, respondents are not very optimistic about the future role of Islamic financing.

Keywords: Islamic banking, Islamic insurance (takaful), Islamic law (shariah), usury (riba)

Procedia PDF Downloads 368
335 Developing Serious Games to Improve Learning Experience of Programming: A Case Study

Authors: Shan Jiang, Xinyu Tang

Abstract:

Game-based learning is an emerging pedagogy to make the learning experience more effective, enjoyable, and fun. However, most games used in classroom settings have been overly simplistic. This paper presents a case study on a Python-based online game designed to improve the effectiveness in both teaching and research in higher education. The proposed game system not only creates a fun and enjoyable experience for students to learn various topics in programming but also improves the effectiveness of teaching in several aspects, including material presentation, helping students to recognize the importance of the subjects, and linking theoretical concepts to practice. The proposed game system also serves as an information cyber-infrastructure that automatically collects and stores data from players. The data could be useful in research areas including human-computer interaction, decision making, opinion mining, and artificial intelligence. They further provide other possibilities beyond these areas due to the customizable nature of the game.

Keywords: game-based learning, programming, research-teaching integration, Hearthstone

Procedia PDF Downloads 166