Search results for: privacy enforcement
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 805

Search results for: privacy enforcement

265 A Comparative Analysis of the Enforceability of Social and Economic Rights: Nigeria and South Africa as Case Studies

Authors: Foluke Abimbola

Abstract:

There are two separate groups of a recognised body of human rights. These are known as Civil and Political Rights, and Economic and Social Rights. There is however an impression that civil and political rights are enforceable in courts while socio-economic rights are not. Nigeria is an example of one of such countries whose constitution has social, economic and cultural rights’ provisions as well as civil and political rights. However, the socio-economic rights provided in the Nigerian constitution are not justiciable or are unenforceable in a court of law. On the other hand, a comparative examination of the socio-economic right provisions in the South African constitution and judgments of the constitutional court of South Africa reveals that socio-economic rights may be enforceable. This position may ensure the protection of the socio-economic rights of the poor and vulnerable groups. These rights include the rights to food, adequate shelter, health, and education. Moreover, the African Charter on Human and Peoples’ Rights (African Charter) which incorporates similar socio-economic right provisions, has been recognized as a domestic law in Nigeria and its provisions are enforceable by the domestic courts by virtue of the African Charter on Human and People’s Rights (Ratification and Enforcement) Act Cap A9 Laws of the Federation of Nigeria 2004. It is not only a regional treaty signed and adopted by Nigeria but has been passed into law by the National Assembly and can be enforced like any other local law. This paper will propose that in view of the provisions of the African Charter and mechanisms for implementation as well as other international conventions and national constitutional provisions on human rights, domestic courts may be able to assess state responsibilities in the light of socio-economic rights. Cases decided by South African courts and other jurisdictions will be discussed in order to lend weight to the notion that socio-economic rights can be enforced in jurisdictions such as Nigeria even though the constitution provides otherwise.

Keywords: african charter, constitutional court of south africa, nigerian constitution, socio-economic rights, south african constitution

Procedia PDF Downloads 128
264 Criminalizing the Transmission of HIV-Lessons for South Africa

Authors: Desiree David

Abstract:

South Africa has one of the highest rates of HIV infection in the world, with a sizable percentage of the population living with HIV. A substantial number of new infections occur as a result of sexual activity. South African courts have awarded civil claims for damages as a result of the transmission of HIV as a result of non-disclosure by the HIV-positive sexual partner, and more recently, the criminal courts have also convicted and sentenced individuals accused of infecting others as a result of sexual activity. This paper will analyse some case law from South African court cases that have dealt with criminal convictions for the transmission of HIV, and the potential for more widespread prosecutions of these cases. It will also address the desirability of this trend in light of the social public health system, as well as human rights concerns surrounding this highly contentious issue. This will be done by considering some applicable provisions of the Bill of Rights such as the right to privacy and equality, as espoused in the Constitution of the Republic of South Africa. The paper further addresses the experience of other jurisdictions such as Canada, Singapore, Lesotho and Uganda, by analyzing case law, and consider the pitfalls of criminalizing a wide spectrum of sexual conduct that could result in the transmission of HIV. The paper concludes with a proposal that the issue of criminalizing the transmission of HIV cannot be addressed by the criminal justice system alone, as to do so could result in harsh consequences for those living with HIV. As such individuals may be burdened with additional responsibilities that could potentially impact on the rights of the individual. This may ultimately result in injustice for those living with HIV.

Keywords: criminalization, HIV, human rights, South Africa

Procedia PDF Downloads 318
263 Strategies and Approaches for Curriculum Development and Training of Faculty in Cybersecurity Education

Authors: Lucy Tsado

Abstract:

As cybercrime and cyberattacks continue to increase, the need to respond will follow suit. When cybercrimes occur, the duty to respond sometimes falls on law enforcement. However, criminal justice students are not taught concepts in cybersecurity and digital forensics. There is, therefore, an urgent need for many more institutions to begin teaching cybersecurity and related courses to social science students especially criminal justice students. However, many faculty in universities, colleges, and high schools are not equipped to teach these courses or do not have the knowledge and resources to teach important concepts in cybersecurity or digital forensics to criminal justice students. This research intends to develop curricula and training programs to equip faculty with the skills to meet this need. There is a current call to involve non-technical fields to fill the cybersecurity skills gap, according to experts. There is a general belief among non-technical fields that cybersecurity education is only attainable within computer science and technologically oriented fields. As seen from current calls, this is not entirely the case. Transitioning into the field is possible through curriculum development, training, certifications, internships and apprenticeships, and competitions. There is a need to identify how a cybersecurity eco-system can be created at a university to encourage/start programs that will lead to an interest in cybersecurity education as well as attract potential students. A short-term strategy can address this problem through curricula development, while a long-term strategy will address developing training faculty to teach cybersecurity and digital forensics. Therefore this research project addresses this overall problem in two parts, through curricula development for the criminal justice discipline; and training of faculty in criminal justice to teaching the important concepts of cybersecurity and digital forensics.

Keywords: cybersecurity education, criminal justice, curricula development, nontechnical cybersecurity, cybersecurity, digital forensics

Procedia PDF Downloads 78
262 Application of Non-Smoking Areas in Hospitals

Authors: Nur Inayah Ismaniar, Sukri Palutturi, Ansariadi, Atjo Wahyu

Abstract:

Background: In various countries in the world, the problem of smoking is now considered something serious because of the effects of smoking which can not only lead to addiction but also have the potential to harm health. Public health authorities have concluded that one solution that can be done to protect the public from active smokers is to issue a policy that requires public facilities to be completely smoke-free. The hospital is one of the public facilities that has been designated as a smoke-free area. However, the implementation and maintenance of a successful program based on a smoke-free hospital are still considered an ongoing challenge worldwide due to the very low level of adherence. The low level of compliance with this smoke-free policy is also seen in other public facilities. The purpose of the literature review is to review the level of compliance with the application of the Non-Smoking Area policy, how this policy has succeeded in reducing smoking activity in hospitals, and what factors lead to such compliance in each country in the world. Methods: A literature review of articles was carried out on all types of research methods, both qualitative and quantitative. The sample is all subjects who are in the research location, which includes patients, staff and hospital visitors. Results: Various variations in the level of compliance were found in various kinds of literature. The literature with the highest level of compliance is 88.4%. Furthermore, several determinants that are known to affect the compliance of the Non-Smoking Area policies in hospitals include communication, information, knowledge, perceptions, interventions, attitudes and support. Obstacles to its enforcement are the absence of sanctions against violators of the Non-Smoking Area policy, the ineffectiveness of the function of policymakers in hospitals, and negative perceptions of smoking related to mental health. Conclusion: Violations of the Non-Smoking Area policy are often committed by the hospital staff themselves, which makes it difficult for this policy to be fully enforced at various points in the hospital.

Keywords: health policy, non-smoking area, hospital, implementation

Procedia PDF Downloads 68
261 Inter-Country Parental Child Removal and Subsequent Custody Disputes in India: Need for Legislative Reforms

Authors: Pritam Kumar Ghosh

Abstract:

The phenomenon of inter-country parental child removal and the protection of children against removal from lawful custody by their own parents has been a major issue over the last five decades. This occurs when parents take away their children during pending divorce and custody proceedings or in violation of pre-existing foreign or Indian custody orders through which they may have obtained visitation rights only after divorce but not permanent custody. Even though considerable efforts have been made by the Indian judiciary to resolve the issue, a lot is still left to be desired. A study of the spate of judicial decisions on the issue since 1970 reveals that judges have attempted to resolve the issue mainly through the application of the existing personal law regime and the principle of the best interest of the child. This has made the position of law extremely confusing. The existing precedential jurisprudence contains a wide variety of custody orders in the name of enforcement of the paramount consideration of the best interest and welfare of children. The problem is aggravated by the fact that India has decided not to accede to the Hague Abduction Convention of 1980, which is the main international instrument combating the issue. In this context, the paper discusses the reasons behind the rising instances of inter-country parental child removals. It then goes on to analyze the existing jurisprudence of international child custody disputes in India, which have come before courts post-removal of children from lawful custody. The paper concludes by suggesting essential reforms in the existing Indian legal framework governing the issue. In the process, the paper proposes new legislation for India governing inter-country parental child removals and subsequent custody disputes. The possible structure and content of this new law shall also be outlined as a part of the paper.

Keywords: custody, dispute, child removal, Hague convention

Procedia PDF Downloads 51
260 Mental Health and Technology: Evidence Review

Authors: Kylie Henderson

Abstract:

Adapting mental health interventions is important when providing support to those experiencing difficulties. This analysis aimed to explore and evaluate the effectiveness of various forms of mental health interventions. Literature that has analysed face-to-face (F2F), phone (Telehealth), mobile (mHealth) and online (e-interventions) interferences found all interventions were effective in reducing and treating symptoms of mental health disorders. F2F and Telehealth interventions facilitated greater engagement and client satisfaction. Due to accessibility and privacy, mHealth and e-interventions were the preferred methods of engagement with health services for youth and young adults. Regardless, these interventions still identified several barriers of high dropout, low adherence, and lack of awareness. Additionally, a large proportion of interventions lacked evidence-based foundations. Exploration of interventions that utilise a variety of interfaces, as well as incorporated evidence-based literature and clinician experience, show that they benefit those experiencing mental health difficulties. Applications like YourHealth+ provide a combination of interventions (F2F, mHealth, and e-interventions) to improve the wellbeing of job seekers and employment consults. Individuals that have used the application in conjunction with therapy have reported feeling more empowered and demonstrated improved wellbeing. Practitioners have also described improved confidence in their ability to provide support to clients. Therefore, it can be proposed that utilising a variety of interventions as well as incorporating literature and experience is beneficial to those experiencing mental health difficulties and to health practitioners.

Keywords: face-to-face, e-interventions, mHealth, YourHealth+

Procedia PDF Downloads 116
259 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 317
258 Public Attitudes toward Domestic Violence against Women in China and Spain: A Cross-Cultural Study

Authors: Menglu Yang, Ani Beybutyan, Rocio Pina, Miguel Angel Soria

Abstract:

Domestic violence against women is one of the most serious social problems in the world. Attitudes toward domestic violence against women play an important role in the perpetration of violence against women, the way that victims respond to the violence, and how the community responds to violence against women. China and Spain are countries which have been influenced by the culture which males hold power and dominance over the female for a long time. However, as more connected with other European countries, the legal enforcement related to domestic violence against women developed earlier in Spain, and consequently, social awareness of violence against women evolved differently in two countries. The present study aimed to explore and compare the attitudes toward domestic violence against women across China and Spain, and their influence factors, such as gender equality attitudes and coercive control. Totally 506 participants, 255 from China and 251 from Spain completed questionnaires, including attitudes toward domestic violence against women, definition of violence behavior, justification for violence, gender equity attitudes, and coercive control. Results demonstrated that Chinese participants were less aware of domestic violence against women issue but more agreed that such issue was a crime than Spanish participants. In addition to cultural difference, gender equality attitudes, coercive control, gender, and age also affected attitudes toward domestic violence against women. Our findings imply attitudes toward domestic violence against women differ from countries along with the difference in gender equity attitudes and coercive control; such a difference may arise from cultural, traditional belief and current justice system influence. Despite the developed justice system, male dominance culture may lead to maintain the belief that domestic violence is domestic and private issue which police and justice force may not get involved.

Keywords: cross-cultural differences, domestic violence, public attitudes, violence against women

Procedia PDF Downloads 250
257 Context-Aware Alert Method in Hajj Pilgrim Location-Based Tracking System

Authors: Syarif Hidayat

Abstract:

As millions of people with different backgrounds perform hajj every year in Saudi Arabia, it brings out several problems. Missing people is among many crucial problems need to be encountered. Some people might have had insufficient knowledge of using tracking system equipment. Other might become a victim of an accident, lose consciousness, or even died, prohibiting them to perform certain activity. For those reasons, people could not send proper SOS message. The major contribution of this paper is the application of the diverse alert method in pilgrims tracking system. It offers a simple yet robust solution to send SOS message by pilgrims during Hajj. Knowledge of context aware computing is assumed herein. This study presents four methods that could be utilized by pilgrims to send SOS. The first method is simple mobile application contains only a button. The second method is based on behavior analysis based off GPS location movement anomaly. The third method is by introducing pressing pattern to smartwatch physical button as a panic button. The fourth method is by identifying certain accelerometer pattern recognition as a sign of emergency situations. Presented method in this paper would be an important part of pilgrims tracking system. The discussion provided here includes easy to use design whilst maintaining tracking accuracy, privacy, and security of its users.

Keywords: context aware computing, emergency alert system, GPS, hajj pilgrim tracking, location-based services

Procedia PDF Downloads 196
256 Digital Innovation and Business Transformation

Authors: Bisola Stella Sonde

Abstract:

Digital innovation has emerged as a pivotal driver of business transformation in the contemporary landscape. This case study research explores the dynamic interplay between digital innovation and the profound metamorphosis of businesses across industries. It delves into the multifaceted dimensions of digital innovation, elucidating its impact on organizational structures, customer experiences, and operational paradigms. The study investigates real-world instances of businesses harnessing digital technologies to enhance their competitiveness, agility, and sustainability. It scrutinizes the strategic adoption of digital platforms, data analytics, artificial intelligence, and emerging technologies as catalysts for transformative change. The cases encompass a diverse spectrum of industries, spanning from traditional enterprises to disruptive startups, offering insights into the universal relevance of digital innovation. Moreover, the research scrutinizes the challenges and opportunities posed by the digital era, shedding light on the intricacies of managing cultural shifts, data privacy, and cybersecurity concerns in the pursuit of innovation. It unveils the strategies that organizations employ to adapt, thrive, and lead in the era of digital disruption. In summary, this case study research underscores the imperative of embracing digital innovation as a cornerstone of business transformation. It offers a comprehensive exploration of the contemporary digital landscape, offering valuable lessons for organizations striving to navigate the ever-evolving terrain of the digital age.

Keywords: business transformation, digital innovation, emerging technologies, organizational structures

Procedia PDF Downloads 36
255 E-Book Market In Vietnam: Great Potential, Many Barriers

Authors: Zakir Hossain

Abstract:

Nowadays reading e-books on laptops, smartphones, and tablets have become a new leisure activity for Vietnamese youth. Since 2011 the copyrighted e-book market began to develop in Vietnam with the participation of five local enterprises. Over the last five years, thousands of e-books were published including the first online early education book series for children from 0 to 6 years old. Research shows that 61% Vietnamese find reading e-books is comfortable, and 45% feel convenient buying books online. More than half of the Vietnamese consider reading online far better than buying printed books, and surprisingly people over age 30 desire reading online while those under 18 prefer reading printed books. Hence with a market of more than 40 million regular internet users including 22 million smartphone users, Vietnam has ample opportunities to develop the e-book market and contribute a great deal to the diversity of the local reading culture which is essential for Building a Lifelong Learning Society, a state ambition of Vietnam by 2020. However, the e-book market in Vietnam is still in its infancy and is growing far too slowly than e-book producers had expected. All five e-book enterprises are facing numerous challenges. While the big profit that e-book technology can bring has been clearly recognised in other countries, e-books in Vietnam only make up less than 1% share of the book market. The objective of the study is to identify the difficulties and barriers to the development of the e-book market in Vietnam through an extensive literature review available in English. The study revealed that illegal e-books due to copyright infringement and an inconvenient payment system to purchase e-books are the major obstacles. The great potential of e-books in Vietnam is a reality but requires government enforcement of copyright protection laws, a new area of focus for the e-book market. Furthermore, Vietnamese readers should change their habits from using free and illegal e-books to develop the e-publishing industry in Vietnam.

Keywords: copyright, e-book, e-book reading, e-publishing, Vietnam

Procedia PDF Downloads 203
254 Psychological Perspectives on Modern Restaurant Interior Design Based on Traditional Elements (Case Study: Interior Design of the Mesineh Restaurant, Tehran, Iran)

Authors: Raheleh Saifiabolhassan

Abstract:

After the post-industrial era, when a wide variety of foods and drinks are readily available everywhere, the motive has shifted from meeting basic nutritional needs to enjoy the eating experience. Today, behavioral environmental studies are an essential branch of science when it comes to understanding, analyzing, and evaluating how humans react to the environment. Similarly, these studies explore customer-influencing factors and the effectiveness of restaurant designs. To facilitate a pleasant dining experience, the authors focused on acoustics, flexibility, and lighting. In this study, 2700 square feet of surface area was used to plan a restaurant (called Mesineh) based on behavioral science, considering many factors related to the interaction between the building and the users, such as flexibility and privacy, acoustics, and light. Environment psychology considerations in architectural design have been lacking for several decades. To fill this gap, the author evaluated environmental psychology standards and applied them to Mesineh's design. A sense of nostalgia will be felt by customers of the Mesineh restaurant thanks to its interior design, which combines historical elements with contemporary elements. Additionally, vernacular Persian architectural elements were incorporated into a modern context to fulfill the behavioral science component of interior design.

Keywords: Mesineh restaurant, interior design, behavioral sciences, environment psychology, traditional persian architecture

Procedia PDF Downloads 189
253 Uniqueness of Fingerprint Biometrics to Human Dynasty: A Review

Authors: Siddharatha Sharma

Abstract:

With the advent of technology and machines, the role of biometrics in society is taking an important place for secured living. Security issues are the major concern in today’s world and continue to grow in intensity and complexity. Biometrics based recognition, which involves precise measurement of the characteristics of living beings, is not a new method. Fingerprints are being used for several years by law enforcement and forensic agencies to identify the culprits and apprehend them. Biometrics is based on four basic principles i.e. (i) uniqueness, (ii) accuracy, (iii) permanency and (iv) peculiarity. In today’s world fingerprints are the most popular and unique biometrics method claiming a social benefit in the government sponsored programs. A remarkable example of the same is UIDAI (Unique Identification Authority of India) in India. In case of fingerprint biometrics the matching accuracy is very high. It has been observed empirically that even the identical twins also do not have similar prints. With the passage of time there has been an immense progress in the techniques of sensing computational speed, operating environment and the storage capabilities and it has become more user convenient. Only a small fraction of the population may be unsuitable for automatic identification because of genetic factors, aging, environmental or occupational reasons for example workers who have cuts and bruises on their hands which keep fingerprints changing. Fingerprints are limited to human beings only because of the presence of volar skin with corrugated ridges which are unique to this species. Fingerprint biometrics has proved to be a high level authentication system for identification of the human beings. Though it has limitations, for example it may be inefficient and ineffective if ridges of finger(s) or palm are moist authentication becomes difficult. This paper would focus on uniqueness of fingerprints to the human beings in comparison to other living beings and review the advancement in emerging technologies and their limitations.

Keywords: fingerprinting, biometrics, human beings, authentication

Procedia PDF Downloads 299
252 Artificial Intelligence in Vietnamese Higher Education: Benefits, Challenges and Ethics

Authors: Duong Van Thanh

Abstract:

Artificial Intelligence (AI) has been recently a new trend in Higher Education systems globally as well as in the Vietnamese Higher Education. This study explores the benefits and challenges in applications of AI in 02 selected universities, ie. Vietnam National Universities in Hanoi Capital and the University of Economics in Ho Chi Minh City. Particularly, this paper focuses on how the ethics of Artificial Intelligence have been addressed among faculty members at these two universities. The AI ethical issues include the access and inclusion, privacy and security, transparency and accountability. AI-powered educational technology has the potential to improve access and inclusion for students with disabilities or other learning needs. However, there is a risk that AI-based systems may not be accessible to all students and may even exacerbate existing inequalities. AI applications can be opaque and difficult to understand, making it challenging to hold them accountable for their decisions and actions. It is important to consider the benefits that adopting AI-systems bring to the institutions, teaching, and learning. And it is equally important to recognize the drawbacks of using AI in education and to take the necessary steps to mitigate any negative impact. The results of this study present a critical concern in higher education in Vietnam, where AI systems may be used to make important decisions about students’ learning and academic progress. The authors of this study attempt to make some recommendation that the AI-system in higher education system is frequently checked by a human in charge to verify that everything is working as it should or if the system needs some retraining or adjustments.

Keywords: artificial intelligence, ethics, challenges, vietnam

Procedia PDF Downloads 92
251 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 71
250 Recent Developments and Expectations in the Legal Expenses Insurance in Turkey

Authors: İbrahim Arslan, Mücahit Ünal

Abstract:

An important issue to ensure justice is to simplify the right to seek justice. But there is a cost of seeking justice in civil law. It costs at least, attorneys' fees and judicial expenses during the beginning and in case of losing a trial. Indeed, most of the people refrain from seeking justice because of these expenses. Therefore, it is not inappropriate to say that the removal of obstacles staying on the way of seeking justice will increase the belief in justice. Legal expenses insurance is a private law contract of insurance in which the insurer is obliged to pay premiums of the insured, to provide the necessary services for the protection of legal interests of the insured person within the agreed scope. This type of insurance is being practiced in the Western world for a long time. The special rights, duties and obligations of the parties to a legal expenses insurance contract shall be governed by the Turkish Commercial Code (TCC) and the contractual agreements which are regularly closed in the form of general terms and conditions. If the number of the legal expenses insurance contracts concluded increase this will definitely improve the percentage of seeking justice before the courts. The general terms and conditions applicable in Turkey generally include litigation costs, referee fees, guarantee fund , enforcement costs , appeal costs borne decision corrections costs. In addition, besides the insured, other family members or the people specified in the policy are protected in the scope of personal/family legal expenses insurance. The commercial law disputes fall outside the scope of coverage in this insurance branch. The insured person chooses his own lawyer and the insurer is not allowed to give advice during the selection of a lawyer. In April 2015, the Prime Minister announced of a new era in the field of legal expenses insurance in Turkey and this announcement excited the insurance industry and legal community.

Keywords: insurance, in the Turkish law on legal protection insurance, legal protection insurance, legal protection

Procedia PDF Downloads 336
249 Economic Effects of Maritime Environmental Legislation in the North and Baltic Sea Area: An Exploratory Sequential Mixed Methods Approach

Authors: Thea Freese

Abstract:

Environmental legislation to protect North and Baltic Sea areas from harmful vessel-source emissions has received increased political attention in recent years. Legislative measures are expected to show positive effects on the health of the marine environment and society. At the same time, compliance might increase the costs to industry and have effects on freight rates and volumes shipped with potential negative repercussions on the environment. Building on an exploratory sequential mixed methods approach, this research project will study the economic effects of maritime environmental legislation in two phases. In Phase I, exploratory in-depth interviews were conducted with 12 experts from various stakeholder groups aiming at identifying variables influencing the relationship between environmental legislation, freight rates and volumes shipped. Influencing factors like compliance, enforcement and modal shift were identified and studied. Phase II will comprise of a quantitative study conducted with the aim of verifying the theory build in Phase I and quantifying economic effects of rules on shipping pollution. Research in this field might inform policy-makers about determinants of behaviour of ship operators in the face of the law and might further the development of a comprehensive legal system for marine environmental protection. At the present stage of research, first tentative results from the qualitative phase may be examined and open research questions to be addressed in the quantitative phase as well as possible research designs for phase II may be discussed. Input from other researchers will be highly valuable at this point.

Keywords: clean shipping operations, compliance, maritime environmental legislation, maritime law and economics, mixed methods research, North and Baltic Sea area

Procedia PDF Downloads 351
248 Pregnancy Rhinitis Prevalence among Saudi Women

Authors: Mohammed G. Alotaibi, Sameer Albahkaly, Salwa M. Bahkali, Abdullah M. Alghamdi, Raseel S. Alswidan, Maha Bin Shafi, Sarah Almaiman

Abstract:

Introduction: Rhinitis is common in Saudi Arabia. Therefore, our study was designed to evaluate the prevalence, triggering factors, severity and progression of rhinitis during pregnancy. Methods: Prospective cross-sectional study was conducted in eight governmental and private medical centers in Riyadh, Saudi Arabia, during June and July 2014. Validated Arabic language self-administered questionnaire was used. Sample size of 260 Saudi pregnant women was calculated by Raosoft sample size calculator. Random sampling was achieved by choosing one and skipping every five patients in the clinic list. Data were coded and entered manually into spreadsheets then transferred to SPSS statistical package version 16.0 for Windows. Consent, Privacy and confidentiality of information were assured. Results: Pregnancy rhinitis was reported 31.2% (CI 25.6 - 37.2%). Symptoms arising in first trimester appeared in 79.2% of PR cases and mostly worsen. The most prevalent symptoms were nasal pruritis (67.5%), followed by sneezing (57.1%), congestion (50.6%), and post nasal drip (46.7%). The major triggering factor was dust (71.4%), followed by Tobacco/Shisha smoke (57.6%) and perfume(47%). Preexisting allergic diseases were markedly associated with developing pregnancy rhinitis. Conclusion: Rhinitis during pregnancy manifested in one third of Saudi pregnant ladies. Nasal pruritus was the most common symptom and dust was the widespread triggering factor.

Keywords: allergy, pregnancy, Rhinitis, sneezing

Procedia PDF Downloads 233
247 Phytoplankton Assemblage and Physicochemical Parameters of a Perturbed Tropical Manmade Lake, Southwestern Nigeria

Authors: Adedolapo Ayoade, John the Beloved Dada

Abstract:

This study identified the phytoplankton assemblage of the Dandaru Lake (that received effluents from a zoological garden and hospital) as bioindicators of water quality. Physicochemical parameters including Dissolved Oxygen (DO), biochemical oxygen demand, nitrate, phosphate and heavy metals were also determined. Samples of water and plankton were collected once monthly from April to September, 2015 at five stations (I – V). The mean physicochemical parameters were within the limits of National Environmental Standards and Regulations Enforcement Agency (NESREA) and USEPA except Lead, 0.02 ± 0.08 mg/ L; Manganese, 0.46 ± 1.00 mg/ L and Zinc, 0.05 ± 0.17 mg/ L. Means of DO, alkalinity, and phosphate were significantly different between the stations at p < 0.05. While highest mean DO (6.88 ± 1.34 mg/L) was recorded in station I with less anthropogenic activities, highest phosphate concentration (0.28 ± 0.28 mg/L) occurred in station II, the entry point of wastewater from hospital and zoological garden. The 147 phytoplankton species found in the lake belonged to six classes: Chlorophyceae (50), Euglenophyceae (40), Bacillariophyceae (37), Cyanophyceae (17), Xanthophyceae and Chrysophyceae (3). The order of abundance for phytoplankton was Euglenophyceae (49.77%) > Bacillariophyceae (18.00%) > Cyanophyceae (17.39%) > Chlorophyceae (13.7%) > Xanthophyceae (1.06%) > Chrysophyceae (0.02%). The stations impacted with effluents were dominated by members of Euglenophyceae (Station III, 77.09%; IV, 50.55%) and Cyanophyceae (Station II, 27.7%; V, 32.57%). While station I was dominated by diatoms (57.98%). The species richness recorded was 0.32 – 4.49. Evenness index was highest in station I and least in station III. Generally, pollution tolerant species (Microcystis, Oscillatoria, Scenedesmus, Anabaena, and Euglena) showed greater density in areas impacted by human activities. The phytoplankton assemblage and comparatively low biotic diversity in Dandaru Lake could be attributed to perturbations in the water column that exerted selective effects on the biological assemblage.

Keywords: manmade lake, Nigeria, phytoplankton, water quality

Procedia PDF Downloads 233
246 Development the Potential of Parking Tax and Parking Retribution Revenues: Case Study in Bekasi City

Authors: Ivan Yudianto

Abstract:

The research objectives are to analyze the factors that impede the Parking Tax and Parking Retribution collection in Bekasi City Government, analyzing the factors that can increase local own revenue from the tax sector of parking tax and parking retribution, analyze monitoring the parking retribution collection by the Bekasi City Government, analyze strategies Bekasi City Government through the preparation of a roadmap and action plan to increase parking tax and parking retribution revenues. The approach used in this research is a qualitative approach. Qualitative research is used because the problem is not yet clear and the object to be studied will be holistic, complex, and dynamic, and the relationship will be interactive symptoms. Methods of data collection and technical analysis of the data was in-depth interviews, participant observation, documentary materials, literature, and triangulation, as well as new methods such as the methods of visual materials and internet browsing. The results showed that there are several factors that become an obstacle such as the parking taxpayer does not disclose the actual parking revenue, the parking taxpayer are late or do not pay Parking Tax, many parking locations controlled by illegal organizations, shortage of human resources in charge levy and supervise the parking tax and parking retribution collection in the Bekasi City Government, surveillance parking tax and parking retribution are not scheduled on a regular basis. Several strategic priorities in order to develop the potential of the Parking Tax and Parking Retribution in the Bekasi City Government, namely through increased controling and monitoring of the Parking Taxpayer, forming a team of auditors to audit the Parking Taxpayer, seek law enforcement persuasive and educative to reduce Parking Taxpayer wayward, providing strict sanctions against the Parking Taxpayer disobedient, revised regulations mayors about locations of parking in Bekasi City, rationalize revenues target of Parking Retribution, conducting takeover attempts parking location on the roadside of the individual or specific group, and drafting regional regulations on parking subscribe.

Keywords: local own revenue, parking retribution, parking tax, parking taxpayer

Procedia PDF Downloads 303
245 CRYPTO COPYCAT: A Fashion Centric Blockchain Framework for Eliminating Fashion Infringement

Authors: Magdi Elmessiry, Adel Elmessiry

Abstract:

The fashion industry represents a significant portion of the global gross domestic product, however, it is plagued by cheap imitators that infringe on the trademarks which destroys the fashion industry's hard work and investment. While eventually the copycats would be found and stopped, the damage has already been done, sales are missed and direct and indirect jobs are lost. The infringer thrives on two main facts: the time it takes to discover them and the lack of tracking technologies that can help the consumer distinguish them. Blockchain technology is a new emerging technology that provides a distributed encrypted immutable and fault resistant ledger. Blockchain presents a ripe technology to resolve the infringement epidemic facing the fashion industry. The significance of the study is that a new approach leveraging the state of the art blockchain technology coupled with artificial intelligence is used to create a framework addressing the fashion infringement problem. It transforms the current focus on legal enforcement, which is difficult at best, to consumer awareness that is far more effective. The framework, Crypto CopyCat, creates an immutable digital asset representing the actual product to empower the customer with a near real time query system. This combination emphasizes the consumer's awareness and appreciation of the product's authenticity, while provides real time feedback to the producer regarding the fake replicas. The main findings of this study are that implementing this approach can delay the fake product penetration of the original product market, thus allowing the original product the time to take advantage of the market. The shift in the fake adoption results in reduced returns, which impedes the copycat market and moves the emphasis to the original product innovation.

Keywords: fashion, infringement, blockchain, artificial intelligence, textiles supply chain

Procedia PDF Downloads 238
244 Punishment on top of Punishment - Impact of Inmate Misconduct

Authors: Nazirah Hassan, Andrew Kendrick

Abstract:

Punishment inside the penal institution has always been practiced in order to maintain discipline and keep order. Nonetheless, criminologists have long debated that the enforcement of discipline by punishing inmates is often ineffective and has a detrimental impact on inmates’ conduct. This paper uses data from a sample of 289 incarcerated young offenders to investigate the prevalence of institutional misconduct. It explores punitive cultural practices inside institutions and how this culture affects the inmates’ conduct during confinement. The project focused on male and female young offenders aged 12 to 21 years old, in eight juvenile justice institutions. The research collected quantitative and qualitative data using a mixed-method approach. All participants completed the Direct and Indirect Prisoner behavior Checklist-Scaled Version Revised (DIPC-SCALED-R). In addition, exploratory interviews were carried out with sixteen inmates and eight institutional staff. Results of the questionnaire survey show that almost half of the inmates reported a higher level of involvement in perpetration. It demonstrates a remarkable convergence of direct, rather than indirect, perpetration. Also, inmates reported a higher level of tobacco used and behavior associated with negative attitudes towards staff and institutional rules. In addition to this, the qualitative data suggests that the punitive culture encourages the onset of misconduct by increasing the stressful and oppressive conditions within the institution. In general, physical exercise and locking up inmates are two forms of punishment that were ubiquitous throughout the institutions. Interestingly, physical exercise is not only enforced by institutional staff but also inmates. These findings are discussed in terms of existing literature and their practical implications are considered.

Keywords: institutional punishment, incarcerated young offenders, punitive culture, institutional misconduct

Procedia PDF Downloads 223
243 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 522
242 Corporate Governance in Higher Education: A South African Perspective

Authors: Corlia van der Walt, Michele K. Havenga

Abstract:

The study considers corporate governance regulation and practice in South African higher education institutions and makes recommendations for the improvement of current governance practices in this sector. The development of corporate governance principles and practices in South Africa, culminating in the King IV Report on Corporate Governance which was launched in November 2016, is discussed. King IV enjoys international recognition as a progressive corporate governance instrument. It was necessitated by the fundamental changes in business and society nationally and globally, as well as by the significant changes to South African company law introduced by new legislation. Corporate governance and the corporate form are narrowly associated, but there is general recognition that the principles of ethical and effective leadership are not restricted to corporations. Thus King IV was drafted with the express aim that it should apply to all organisations, regardless of their form of incorporation, and the report includes specific sector supplements in support of this aspiration. The South African higher education sector has of late been under intense scrutiny, and a few universities have been placed under administration because of poor governance practices. Universities have also been severely impacted by the consequences of what is generally known as ‘#FeesmustFall’, a student led protest movement initially aimed against the increase of fees at public universities, but which rapidly expanded to also include other concerns. It was clearly necessary to revisit corporate governance policy and practice in the sector. The review of the current higher education governance regime in light of the King IV recommendations, lessons from company law regarding the entrenchment and enforcement of corporate governance principles, and a comparison of higher education governance practices in selected other jurisdictions led to recommendations for the improvement of governance practices in South African higher education. It is further suggested that a sector supplement for higher education institutions may provide additional clarity. Some of the recommendations may be of comparative value for international higher education governance.

Keywords: committees, corporate governance, ethical leadership, higher education institutions, integrated reporting, King IV, sector supplements, sustainability

Procedia PDF Downloads 376
241 Diplomatic Assurances in International Law

Authors: William Thomas Worster

Abstract:

Diplomatic assurances issued by states declaring that they will not mistreat individuals returned to them occupy a strange middle ground between being legal and non-legal obligations. States assert that they are non-binding, yet at other times that they are binding. However, this assertion may not be the end of the discussion. The International Court of Justice and other tribunals have concluded that similar instruments were binding, states have disagreed that certain similar instruments were binding, and the Vienna Convention on the Law of Treaties and its travaux prépératoires do not appear to contemplate non-binding instruments. This paper is a case study of diplomatic assurances but, by necessity, touches on the delicate question of whether certain texts are treaties, promises, or non-binding political statements. International law, and law in general, requires a binary approach to obligation. All communications must be binding or not, even if the fit is not precise. Through this study, we will find that some of the obligations in certain assurances can be understood as legal and some not. We will attempt to state the current methodology for determining which obligations are legal under the law of treaties and law on binding unilateral promises. The paper begins with some background of the legal environment of diplomatic assurances and their use in cases of expulsion. The paper then turns to discuss the legal nature of diplomatic assurances, proceeding to address various possibilities for legal value as treaties and as binding unilateral statements. This paper will not examine the legal value of diplomatic assurances solely under customary international law other than the way in which customary international law might further refine the treaty definition. In order to identify whether any assurances are contained in legal acts, this study identifies a pool of relevant assurances and qualitatively analyzes whether any of those are contained in treaties or binding unilateral statements. To the author’s best knowledge, this study is the first large-scale, qualitative qualitative analysis of assurances as a group of instruments that accounts for their heterogenous nature. It is also the first study to identify the indicators of whether an instrument is a treaty or promise.

Keywords: diplomatic assurances, deportation, extradition, expulsion, non-refoulement, torture, persecution, death penalty, human rights, memorandum of understanding, promises, secret, monitoring, compliance, enforcement

Procedia PDF Downloads 64
240 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 278
239 An Efficient Traceability Mechanism in the Audited Cloud Data Storage

Authors: Ramya P, Lino Abraham Varghese, S. Bose

Abstract:

By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.

Keywords: data integrity, dynamic group, group signature, public auditing

Procedia PDF Downloads 370
238 Land Use Changes and Its Implications on Livelihood Activities in Msaranga Peri-Urban Settlement in Moshi Municipality, Tanzania

Authors: Magigi Wakuru, Gaudensi Kapinga

Abstract:

This study examines land use changes and its implications on livelihood activities of peri-urban settlements in Msaranga, Moshi Municipality. Specifically; it analyses the historical development of the settlement, socioeconomic characteristics and land use changes over time. Likely, find out existing livelihood activities and how have been changing over time in the context of urbanization, and lastly highlights land use change implications on livelihood activities to residents. Interviews, observations, documentary reviews and mapping were data collection tools employed. The study shows that housing, urban agriculture, roads infrastructure, recreational, open spaces and institutions are some land use types existing in the settlement. On-farm and off-farm livelihood activities have been identified livelihood activities in the settlement. These include crop cultivation, livestock keeping, trading and formal employment and have been changing over time. However, urbanisation observed to be a catalyst of change and affect livelihood activities over time. Resorting to off-farm livelihoods activities including engaging in retail business and seeking employment in formal and informal sector are some copying strategies documented. The study wind up by pointing roles of different actors and issues of particular attention to different stakeholders towards reducing impact of land use changes on livelihood strategies in the settlement. Likely, unresolved issues for future research and policy development agenda are highlighted in this study. The study concludes that the impact of land use changes on livelihood activities need collaborative effort of different stakeholders, policy enforcement as well as public private partnership in issues based implementation in cities like Moshi where land use is rapidly changing over time within urban planning cycles due to increasing population demand in cities of Sub-Saharan Africa.

Keywords: land use, land use changes, livelihood activities, peri-urban settlement, Moshi, Tanzania

Procedia PDF Downloads 304
237 An Analysis of Socio-Demographics, Living Conditions, and Physical and Emotional Child Abuse Patterns in the Context of the 2010 Haiti Earthquake

Authors: Sony Subedi, Colleen Davison, Susan Bartels

Abstract:

Objective: The aim of this study is to i) investigate the socio-demographics and living conditions of households in Haiti pre- and post 2010 earthquake, ii) determine the household prevalence of emotional and physical abuse in children (aged 2-14) after the earthquake, and iii) explore the association between earthquake-related loss and experience of emotional and physical child abuse in the household while considering potential confounding variables and the interactive effects of a number of social, economic, and demographic factors. Methods: A nationally representative sample of Haitian households from the 2005/6 and 2012 phases of the Demographic and Health Surveys (DHS) was used. Descriptive analysis was summarized using frequencies and measures of central tendency. Chi-squared and independent t-tests were used to compare data that was available pre-earthquake and post-earthquake. The association between experiences of earthquake-related loss and emotional and physical child abuse was assessed using log-binomial regression models. Results: Comparing pre-post-earthquake, noteworthy improvements were observed in the educational attainment of the household head (9.1% decrease in “no education” category) and in possession of the following household items: electricity, television, mobile-phone, and radio post-earthquake. Approximately 77.0% of children aged 2-14 experienced at least one form of physical abuse and 78.5% of children experienced at least one form of emotional abuse one month prior to the 2012 survey period. Analysis regarding the third objective (association between experiences of earthquake-related loss and emotional and physical child abuse) is in progress. Conclusions: The extremely high prevalence of emotional and physical child abuse in Haiti indicates an immediate need for improvements in the enforcement of existing policies and interventions aimed at decreasing child abuse in the household.

Keywords: Haiti earthquake, physical abuse, emotional abuse, natural disasters, children

Procedia PDF Downloads 159
236 The Role of Institutions in Community Wildlife Conservation in Zimbabwe

Authors: Herbert Ntuli, Edwin Muchapondwa

Abstract:

This study used a sample of 336 households and community level data from 30 communities around the Gonarezhou National Park in Zimbabwe to analyse the association between ability to self-organize or cooperation and institutions on one hand and the relationship between success of biodiversity outcomes and cooperation on the other hand. Using both the ordinary least squares and instrumental variables estimation with heteroskedasticity-based instruments, our results confirmed that sound institutions are indeed an important ingredient for cooperation in the respective communities and cooperation positively and significantly affects biodiversity outcomes. Group size, community level trust, the number of stakeholders and punishment were found to be important variables explaining cooperation. From a policy perspective, our results show that external enforcement of rules and regulations does not necessarily translate into sound ecological outcomes but better outcomes are attainable when punishment is rather endogenized by local communities. This seems to suggest that communities should rather be supported in such a way that robust institutions that are tailor made to suit the needs of local condition will emerge that will in turn facilitate good environmental husbandry. Cooperation, training, benefits, distance from the nearest urban canter, distance from the fence, social capital average age of household head, fence and information sharing were found to be very important variables explaining the success of biodiversity outcomes ceteris paribus. Government programmes should target capacity building in terms of institutional capacity and skills development in order to have a positive impact on biodiversity. Hence, the role of stakeholders (e.g., NGOs) in capacity building and government effort should complement each other to ensure that the necessary resources are mobilized and all communities receive the necessary training and resources.

Keywords: institutions, self-organize, common pool resources, wildlife, conservation, Zimbabwe

Procedia PDF Downloads 257