Search results for: legal technology
8580 Need for Policy and Legal Framework for Caste Based Atrocities as Violation of International Human Rights in View of Indian Diaspora
Authors: Vijayalaxmi Khopade
Abstract:
The Prima facie caste system is intrinsic to Indian society. It is an ancient system of intense social stratification based upon birth and enjoying religious sanction. The uppermost strata and privileges are ascribed and enjoyed by brahmins (priestly class), while the lowest strata are occupied by Dalits who are not ascribed with any privileges. The caste system is inherently hierarchical, patriarchal, and systematic and thrives solely on exploitation justified through means of the Brahminical system of hegemony based singularly on birth. The caste system has extended its tentacles to other religions like Christianity, Buddhism, Jainism, and Islam in South Asia. Term Dalit is colloquially used to categorize persons belonging to lower strata in the caste hierarchy. However, this category is heterogenous and highly stratified, following practices like untouchability and exclusion amongst themselves. The modern Indian legal system acknowledges the existence of Caste and its perils. Therefore, by virtue of the Indian Constitution, provisions for affirmative action for the protection and development of Dalits are made. Courts in India have liberally interpreted laws to benefit Dalits. However, the modern system of governance is not immune from Caste based biases. These biases are reflected in the implementation of governance, including the dispensation of justice. The economic reforms of the 1990s gave a huge boost to the Indian diaspora. Persons of Indian origin are now seen making great strides in almost every sector and enjoying positions of power globally. As one peels off the layer of ethnic Indian origin, a deep seated layer of Caste and Caste based patriarchy is clearly visible. Indian diaspora enjoying positions of power essentially belongs to upper castes and carry Caste based biases with them. These castes have long enjoyed the benefits of education; therefore, they were the first ones to benefit from LPG (Liberalization, Privatization, Globalization) model adopted in the 1990s. Dalits, however, had little formal education until recently. The western legal system, to the best of our knowledge, does not recognize Caste and, therefore, cannot afford protection for Dalits, wherein discrimination and exploitation take place solely on the basis of Caste. Therefore, Dalits are left with no legal remedy outside domestic jurisdiction. Countries like the UK have made an attempt to include Caste in their Equality Bill 2010. This has met with tough resistance from Upper caste Hindus who shy away from recognizing their caste privileges and, therefore, the existence of Caste. In this paper, an attempt for comparative analysis is made between various legal protections accorded to Dalits in India vis-à-vis international human rights as protected by the United Nations under its declaration of Universal Human rights. An attempt has been made to mark a distinction between race and Caste and to establish a position of women in Caste based hierarchy. The paper also makes an argument for the inclusion of atrocities committed against Dalits as a violation of international human rights, their protection by the United Nations, and the trial of their violations by International Courts. The paper puts into perspective the need for an external agency like the United Nations and International courts to interfere in rights guaranteed by the Indian Constitution, even with the existence of a modern legal system in a sovereign democratic country.Keywords: atrocity, caste, diaspora, legal framework
Procedia PDF Downloads 2158579 Environmental and Space Travel
Authors: Alimohammad
Abstract:
Man's entry into space is one of the most important results of developments and advances made in information technology. But this human step, like many of his other actions, is not free of danger, as space pollution today has become a major problem for the global community. Paying attention to the issue of preserving the space environment is in the interest of all governments and mankind, and ignoring it can increase the possibility of conflict between countries. What many space powers still do not pay attention to is the freedom to explore and exploit space should be limited by banning pollution of the space environment. Therefore, freedom and prohibition are complementary and should not be considered conflicting concepts. The legal system created by the current space treaties for the effective preservation of the space environment has failed. Customary international law also does not have an effective provision and guarantee of sufficient executions in order to prevent damage to the environment. Considering the responsibility of each generation in the healthy transfer of the environment to the next generation and considering the sustainable development concept, the space environment must also be passed on to future generations in a healthy and undamaged manner. As a result, many environmental policies related to Earth should also be applied to the space environment..Keywords: law, space, environment, responsibility
Procedia PDF Downloads 848578 The Applicability of General Catholic Canon Law during the Ongoing Migration Crisis in Hungary
Authors: Lorand Ujhazi
Abstract:
The vast majority of existing canonical studies about migration are focused on examining the general pastoral and legal regulations of the Catholic Church. The weakness of this approach is that it ignores a number of important factors; like the financial, legal and personal circumstances of a particular church or the canonical position of certain organizations which actually look after the immigrants. This paper is a case study, which analyses the current and historical migration related policies and activities of the Catholic Church in Hungary. To achieve this goal the study uses canon law, historical publications, various instructions and communications issued by church superiors, Hungarian and foreign media reports and the relevant Hungarian legislation. The paper first examines how the Hungarian Catholic Church assisted migrants like Armenians fleeing from the Ottoman Empire, Poles escaping during the Second World War, East German and Romanian citizens in the 1980s and refugees from the former Yugoslavia in the 1990s. These events underline the importance of past historical experience in the development of contemporary pastoral and humanitarian policy of the Catholic Church in Hungary. Then the paper turns to the events of the ongoing crisis by describing the unique challenges faced by churches in transit countries like Hungary. Then the research contrasts these findings with the typical responsibilities of churches in countries which are popular destinations for immigrants. The next part of the case study focuses on the changes to the pre-crisis legal and canonical framework which influenced the actions of hierarchical and charity organizations in Hungary. Afterwards, the paper illustrates the dangers of operating in an unclear legal environment, where some charitable activities of the church like a fundraising campaign may be interpreted as a national security risk by state authorities. Then the paper presents the reactions of Hungarian academics to the current migration crisis and finally it offers some proposals how to improve parts of Canon Law which govern immigration. The conclusion of the paper is that during the formulation of the central refugee policy of the Catholic Church decision makers must take into consideration the peculiar circumstances of its particular churches. This approach may prevent disharmony between the existing central regulations, the policy of the Vatican and the operations of the local church organizations.Keywords: canon law, Catholic Church, civil law, Hungary, immigration, national security
Procedia PDF Downloads 3088577 Commercialization of Innovative Technologies: Strategic Licensing in Patent Infringement Cases
Authors: Amaliny Yoganathan-Hasselbeck
Abstract:
Based on the assumption, that strategic licensing is more valuable and sustainable for the economy than a legal dispute and action for an injunction, the strategy of licensing in patent infringement cases was studied. A theoretical framework was developed based on the transaction costs approach, describing the major variables within the process of licensing to an alleged patent infringer. An exploratory case study analysis was conducted on the basis of expert interviews with patent licensing agencies, patent attorneys, licensing departments of companies and research institutions. Key findings define the major criteria in each step of the licensing process and include the factors determining the intensity of patent tracking e.g. patent policies, the decision criteria when dealing with patent infringement cases, e.g. market position and reputation, and the transaction itself starting with the initiation of the contact with the alleged patent infringer, negotiating the licensing contract and monitoring the license agreement.Keywords: innovation, licensing, patent, patent infringement, strategy, technology
Procedia PDF Downloads 4768576 Knowledge Development: How New Information System Technologies Affect Knowledge Development
Authors: Yener Ekiz
Abstract:
Knowledge development is a proactive process that covers collection, analysis, storage and distribution of information that helps to contribute the understanding of the environment. To transfer knowledge correctly and fastly, you have to use new emerging information system technologies. Actionable knowledge is only of value if it is understandable and usable by target users. The purpose of the paper is to enlighten how technology eases and affects the process of knowledge development. While preparing the paper, literature review, survey and interview methodology will be used. The hypothesis is that the technology and knowledge development are inseparable and the technology will formalize the DIKW hierarchy again. As a result, today there is huge data. This data must be classified sharply and quickly.Keywords: DIKW hierarchy, knowledge development, technology
Procedia PDF Downloads 4418575 The Determinant Factors of Technology Adoption for Improving Firm’s Performance; Toward a Conceptual Model
Authors: Zainal Arifin, Avanti Fontana
Abstract:
Considering that TOE framework is the most useful instrument for studying technology adoption in firm context, this paper will analyze the influence of technological, organizational and environmental (TOE) factors to the Dynamic capabilities (DCs) associated with technology adoption strategy for improving the firm’s performance. Focusing on the determinant factors of technology adoption at the firm level, the study will contribute to the broader study of resource base view (RBV) and dynamic capability (DC). There is no study connecting directly the TOE factors to the DCs, this paper proposes technology adoption as a functional competence/capability which mediates a relationship between technology adoptions with firm’s performance. The study wants to show a conceptual model of the indirect effects of DCs at the firm level, which can be key predictors of firm performance in dynamic business environment. The results of this research is mostly relevant to top corporate executives (BOD) or top management team (TMT) who seek to provide some supporting ‘hardware’ content and condition such as technological factors, organizational factors, environmental factors, and to improve firm's ‘software ‘ ability such as adaptive capability, absorptive capability and innovative capability, in order to achieve a successful technology adoption in organization. There are also mediating factors which are elaborated at this paper; timing and external network. A further research for showing its empirical results is highly recommended.Keywords: technology adoption, TOE framework, dynamic capability, resources based view
Procedia PDF Downloads 3328574 Analyzing the Commercialization of New Technology
Authors: Wen-Hsiang Lai, Mei-Wen Chen
Abstract:
In the face of developing new technologies, identifying potential new technological product and the suitable market is important. Since laser technology is widely applied in many industries, this study explores the technology commercialization of laser technology. According to the literature review and industry analysis, this study discusses the factors influencing the consumer’s purchase intention and tries to find a new market direction to develop the laser technology. This study adopts a new product adoption model as the research framework and uses three variables of ‘Consumer characteristics’, ‘Perception of product attributes’ and ‘External environment’ to discuss the purchase intention of consumers, who are physicians and owners of the medical cosmetics. This study finds that in the major variable of ‘Consumer characteristics’, the sub-variables of ‘Personality’, ‘Knowledge of product’, ‘Perceived risk’ and ‘Motivation’ are significantly related to consumer’s purchase intention. In the major variable of ‘Perception of product attributes’, the sub-variables of ‘Brand’ and ‘Measure of manufacture country’ are the key factors that affect the willingness of consumer’s purchase intention. Finally, in the major variable of ‘External environment’ variable, the sub-variables of ‘Time’ and ‘Price’ have significant impact on consumer’s purchase intention.Keywords: technology commercialization, new product adoption, consumer’s purchase intention, laser technology
Procedia PDF Downloads 1958573 Policy Implications of Cashless Banking on Nigeria’s Economy
Authors: Oluwabiyi Adeola Ayodele
Abstract:
This study analysed the Policy and general issues that have arisen over time in Nigeria’ Cashless banking environment as a result of the lack of a Legal framework on Electronic banking in Nigeria. It undertook an in-depth study of the cashless banking system. It discussed the evolution, growth and development of cashless banking in Nigeria; It revealed the expected benefits of the cashless banking system; It appraised regulatory issues and other prevalent problems on cashless banking in Nigeria; and made appropriate recommendations where necessary. The study relied on primary and secondary sources of information. The primary sources included the Constitution of the Federal Republic of Nigeria, Statutes, Conventions and Judicial decisions, while the secondary sources included Books, Journals Articles, Newspapers and Internet Materials. The study revealed that cashless banking has been adopted in Nigeria but still at the developing stage. It revealed that there is no law for the regulation of cashless banking in Nigeria, what Nigeria relies on for regulation is the Central Bank of Nigeria’s Cashless Policy, 2014. The Banks and Other Financial Institutions Act Chapter B3, LFN, 2004 of Nigeria lack provision to accommodate issues on Internet banking. However, under the general principles of legality in criminal law, and by the provisions of the Nigerian Constitution, a person can only be punished for conducts that have been defined to be criminal by written laws with the penalties specifically stated in the law. Although Nigeria has potent laws for the regulation of paper banking, these laws cannot be substituted for paperless transactions. This is because the issues involved in both transactions vary. The study also revealed that the absence of law in the cashless banking environment in Nigeria will subject consumers to endless risks. This study revealed that the creation of banking markets via the Internet relies on both available technologies and appropriate laws and regulations. It revealed however that Law of some of the countries considered on cashless banking has taken care of most of the legal issues and other problems prevalent in the cashless banking environment. The study also revealed some other problems prevalent in the Nigerian cashless banking environment. The study concluded that for Nigeria to find solutions to the legal issues raised in its cashless banking environment and other problems of cashless banking, it should have a viable legal Frame work for internet banking. The study concluded that the Central Bank of Nigeria’s Policy on Cashless banking is not potent enough to tackle the challenges posed to cashless banking in Nigeria because policies only have a persuasive effect and not a binding effect. There is, therefore, a need for appropriate Laws for the regulation of cashless Banking in Nigeria. The study also concluded that there is a need to create more awareness of the system among Nigerians and solve infrastructural problems like prevalent power outage which often have been creating internet network problem.Keywords: cashless-banking, Nigeria, policies, laws
Procedia PDF Downloads 4898572 Ethical Implications of Gaps in the Implementation Process of the Circular Economy: Special Focus on Underdeveloped Countries
Authors: Sujith Gunawardhana
Abstract:
The circular economy is a system in which resources and energy are derived from renewable sources, utilized efficiently, recycled, and reused to reduce waste, reduce nonrenewable resource consumption, and mitigate negative environmental impacts. However, it poses moral questions about sustainability, the environment, and societal issues. Many societies face challenges when implementing the circular economy, as the concept is still young. The equitable distribution of the advantages and costs of circularity should be ensured during implementation, as some communities, particularly disadvantaged or marginalized ones, may suffer unfairly disproportionately from the harmful effects of production and recycling facilities. Prioritizing the health and safety of workers, communities, and the environment is essential, and strict rules must be implemented to guard against harm. However, most underdeveloped countries need a legal safeguard for this situation. The ultimate objective of the circular economy is to improve social, environmental, and economic performance, but its implementation also requires consideration of the ethics of care and non-epistemic values. Those are often hindered in underdeveloped countries, as the availability of infrastructure and technology, affordability, and legislative framework are poor. To achieve long-term success in the circular economy, evaluating implementation steps and considering health, safety, environmental, and social risks is crucial. To implement the circular economy, respect ethics of care and non-epistemic values. Adopt Kantian Ethics and control technology design to ensure equal benefits for all involved. Ethical gaps may lead underdeveloped countries to generate social pressure against the circular economy.Keywords: circular economy, ethics, values, sustainability
Procedia PDF Downloads 1098571 Intellectual Property Implications in the Context of Space Exploration with a Special Focus on ESA Rules and Regulations
Authors: Linda Ana Maria Ungureanu
Abstract:
This article details the manner in which European law establishes the protection and ownership rights over works created in off-world environments or in relation to space exploration. In this sense, the analysis is focused on identifying the legal treatment applicable to creative works based on the provisions regulated under the International Space Treaties, on one side, and the International IP Treaties and subsequent EU legislation, on the other side, with a special interest on ESA Rules and Regulations. Furthermore, the article analyses the manner in which ESA regulates the ownership regime applicable for creative works, taking into account the relationship existing between the inventor/creator and ESA and the environment in which the creative work was developed. Moreover, the article sets a series of de lege ferenda proposals for the regulation of intellectual property matters in the context of space exploration, the main purpose being to identify legal measures and steps that need to be taken in order to ensure that creative activities are fostered and understood as a significant catalyst for encouraging space exploration.Keywords: intellectual property law, ESA guidelines, international IP treaties, EU legislation
Procedia PDF Downloads 1778570 Competitive Advantages of a Firm without Fundamental Technology: A Case Study of Sony, Casio and Nintendo
Authors: Kiyohiro Yamazaki
Abstract:
A purpose of this study is to examine how a firm without fundamental technology is able to gain the competitive advantage. This paper examines three case studies, Sony in the flat display TV industry, Casio in the digital camera industry and Nintendo in the home game machine industry. This paper maintain the firms without fundamental technology construct two advantages, economic advantage and organizational advantage. An economic advantage involves the firm can select either high-tech or cheap devices out of several device makers, and change the alternatives cheaply and quickly. In addition, organizational advantage means that a firm without fundamental technology is not restricted by organizational inertia and cognitive restraints, and exercises the characteristic of strength.Keywords: firm without fundamental technology, economic advantage, organizational advantage, Sony, Casio, Nintendo
Procedia PDF Downloads 2888569 Engaging the World Bank: Good Governance and Human Rights-Based Approaches
Authors: Lottie Lane
Abstract:
It is habitually assumed and stated that the World Bank should engage and comply with international human rights standards. However, the basis for holding the Bank to such standards is unclear. Most advocates of the idea invoke aspects of international law to argue that the Bank has existing obligations to act in compliance with human rights standards. The Bank itself, however, does not appear to accept such arguments, despite having endorsed the importance of human rights for a considerable length of time. A substantial challenge is that under the current international human rights law framework, the World Bank is considered a non-state actor, and as such, has no direct human rights obligations. In the absence of clear legal duties for the Bank, it is necessary to look at the tools available beyond the international human rights framework to encourage the Bank to comply with human rights standards. This article critically examines several bases for arguing that the Bank should comply and engage with human rights through its policies and practices. Drawing on the Bank’s own ‘good governance’ approach as well as the United Nations’ ‘human rights-based-approach’ to development, a new basis is suggested. First, the relationship between the World Bank and human rights is examined. Three perspectives are considered: (1) the legal position – what the status of the World Bank is under international human rights law, and whether it can be said to have existing legal human rights obligations; (2) the Bank’s own official position – how the Bank envisages its relationship with and role in the protection of human rights; and (3) the relationship between the Bank’s policies and practices and human rights (including how its attitudes are reflected in its policies and how the Bank’s operations impact human rights enjoyment in practice). Here, the article focuses on two examples – the (revised) 2016 Environmental and Social Safeguard Policies and the 2012 case-study regarding Gambella, Ethiopia. Both examples are widely considered missed opportunities for the Bank to actively engage with human rights. The analysis shows that however much pressure is placed on the Bank to improve its human rights footprint, it is extremely reluctant to do so explicitly, and the legal bases available are insufficient for requiring concrete, ex ante action by the Bank. Instead, the Bank’s own ‘good governance’ approach to development – which it has been advocating since the 1990s – can be relied upon. ‘Good governance’ has been used and applied by many actors in many contexts, receiving numerous different definitions. This article argues that human rights protection can now be considered a crucial component of good governance, at least in the context of development. In doing so, the article explains the relationship and interdependence between the two concepts, and provides three rationales for the Bank to take a ‘human rights-based approach’ to good governance. Ultimately, this article seeks to look beyond international human rights law and take a governance approach to provide a convincing basis upon which to argue that the World Bank should comply with human rights standards.Keywords: World Bank, international human rights law, good governance, human rights-based approach
Procedia PDF Downloads 3598568 From Restraint to Obligation: The Protection of the Environment in Times of Armed Conflict
Authors: Aaron Walayat
Abstract:
Protection of the environment in international law has been one of the most developed in the context of international humanitarian law. This paper examines the history of the protection of the environment in times of armed conflict, beginning with the traditional notion of restraint observed in antiquity towards the obligation to protect the environment, examining the treaties and agreements, both binding and non-binding which have contributed to environmental protection in war. The paper begins with a discussion of the ancient concept of restraint. This section examines the social norms in favor of protection of the environment as observed in the Bible, Greco-Roman mythology, and even more contemporary literature. The study of the traditional rejection of total war establishes the social foundation on which the current legal regime has stemmed. The paper then studies the principle of restraint as codified in international humanitarian law. It mainly examines Additional Protocol I of the Geneva Convention of 1949 and existing international law concerning civilian objects and the principles of international humanitarian law in the classification between civilian objects and military objectives. The paper then explores the environment’s classification as both a military objective and as a civilian object as well as explores arguments in favor of the classification of the whole environment as a civilian object. The paper will then discuss the current legal regime surrounding the protection of the environment, discussing some declarations and conventions including the 1868 Declaration of St. Petersburg, the 1907 Hague Convention No. IV, the Geneva Conventions, and the 1976 Environmental Modification Convention. The paper concludes with the outline noting the movement from codification of the principles of restraint into the various treaties, agreements, and declarations of the current regime of international humanitarian law. This paper provides an analysis of the history and significance of the relationship between international humanitarian law as a major contributor to the growing field of international environmental law.Keywords: armed conflict, environment, legal regime, restraint
Procedia PDF Downloads 2048567 Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia
Authors: Daniel Alati
Abstract:
Recent high-profile terrorist events in Canada, the United Kingdom and Europe – the London Bridge attacks, the terrorist attacks in Nice, France and Barcelona, Spain, the 2014 Ottawa Parliament attacks and the 2017 attacks in Edmonton – have all raised levels of public and academic concern with so-called “lone-wolf” and “radicalized” terrorism. Similarly, several countries outside of the “Western” world have been dealing with radicalization to violent extremism for several years. Many South East Asian countries, including Indonesia, Malaysia, Singapore and the Philippines have all had experience with what might be described as ISIS or extremist-inspired acts of terrorism. Indeed, it appears the greatest strength of groups such as ISIS has been their ability to spread a global message of violent extremism that has led to radicalization in markedly different jurisdictions throughout the world. These markedly different jurisdictions have responded with counter-radicalization strategies that warrant further comparative analysis. This paper utilizes an inter-disciplinary legal methodology. In doing so, it compares legal, political, cultural and historical aspects of the counter-radicalization strategies employed by Canada, the United Kingdom and several South East Asian countries (Indonesia, Malaysia, Singapore and the Philippines). Whilst acknowledging significant legal and political differences between these jurisdictions, the paper engages in these analyses with an eye towards understanding which best practices might be shared between the jurisdictions. In doing so, it presents valuable findings of a comparative nature that are useful to both academic and practitioner audiences in several jurisdictions.Keywords: Canada, United Kingdom and South East Asia, comparative law and politics, radicalization to violent extremism, terrorism
Procedia PDF Downloads 3418566 Using Blockchain Technology to Extend the Vendor Managed Inventory for Sustainability
Authors: Elham Ahmadi, Roshaali Khaturia, Pardis Sahraei, Mohammad Niyayesh, Omid Fatahi Valilai
Abstract:
Nowadays, Information Technology (IT) is changing the way traditional enterprise management concepts work. One of the most dominant IT achievements is the Blockchain Technology. This technology enables the distributed collaboration of stakeholders for their interactions while fulfilling the security and consensus rules among them. This paper has focused on the application of Blockchain technology to enhance one of traditional inventory management models. The Vendor Managed Inventory (VMI) has been considered one of the most efficient mechanisms for vendor inventory planning by the suppliers. While VMI has brought competitive advantages for many industries, however its centralized mechanism limits the collaboration of a pool of suppliers and vendors simultaneously. This paper has studied the recent research for VMI application in industries and also has investigated the applications of Blockchain technology for decentralized collaboration of stakeholders. Focusing on sustainability issue for total supply chain consisting suppliers and vendors, it has proposed a Blockchain based VMI conceptual model. The different capabilities of this model for enabling the collaboration of stakeholders while maintaining the competitive advantages and sustainability issues have been discussed.Keywords: vendor managed inventory, VMI, blockchain technology, supply chain planning, sustainability
Procedia PDF Downloads 2238565 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics
Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan
Abstract:
The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning
Procedia PDF Downloads 1508564 The New Family Law in Kuwait: A Step Towards International Standards
Authors: Dina Hadad
Abstract:
Women empowerment in the Arab world remains a central issue in the context of development and human rights. Akin to many societies around the globe, gender equality is yet to be achieved. This research will provide an introduction into the current legal stand of some Arab countries in terms of gender equality and women rights in the context of family law. It will look specifically into the recent family law in Kuwait and why many women consider it a positive step towards affirming their rights and their needs. Depending on comparative material from the area, the research argues that whilst some countries made efforts to promote women’s empowerment as a concept and practice throughout its policies, others have indeed some unique journeys that reflect organic and from within evolutions. Nonetheless, these efforts are yet to reflect a comprehensive structure that addresses women legal and political empowerment let alone social status. A contradiction in the realities of different Arab states is nothing new since the lack of comprehensive rights-based policy making in Arab countries has contributed to the disconnect between economic growth and development challenges.Keywords: women empowerment, cultural challenges, gender equality, Islamic law, international standards, family law
Procedia PDF Downloads 1958563 The Determinants of Behavioral Intention to Use toward T-Cash Services Provider in Jakarta and Surburban Area
Authors: Stephen Coandadiputra, Chrestella Carissa
Abstract:
Technology is created to simplify human’s life. One of current technology which being called as the second wave internet generation is the internet of things. Internet of things lets thousands of devices connected each other. In today's marketing world, IOT has brought customer into the next level which helping the customer to shorten every transaction they are conducting from traditional approach to sophisticated approach. However, the implementation of technology has always obstacles. The objective of this paper is to explore the determinants of customer to accepts such technology like the internet of things within their transaction. According to TAM (Technology Acceptance Model), researcher constructs the acceptance of internet of things based on perceived usefulness, perceived ease of use and trust and social factor and the two customer characteristics: perceived enjoyment and perceived behavioral control. This research uses exploratory research design which being facilitated by spreading questionnaire to 145 T-cash users in Jakarta and in its suburban region. At least, 190 samples were observed and questioned accordingly. All the collected data will be analyzed using Lisrel.Keywords: behavioral intention to use, internet of things, near field communication, technology acceptance model
Procedia PDF Downloads 3358562 The Impact of Constitutional and Legal Provisions on the Indian Women’s Status in 21st Century
Authors: Mamta Chandrashekhar
Abstract:
Women’s participation in mainstream political and social activity has important implications for the broader arena of governance in any country. This research work will highlights some of the key issues that concerned with the impact of constitutional & Legal provision on the Indian women Status in present century. The principle of gender equality is enshrined in the Indian Constitution in its Preamble, Fundamental Rights, Fundamental Duties and Directive Principles. The Constitution not only grants equality to women, but also empowers the State to adopt measures of positive discrimination in favour of women. In recent years, the empowerment of women has been recognized as the central issue in determining the status of women. The main objective of this research is to analyzed the status of Indian women and the existing wide gap between the goals enunciated in the Constitution, legislation, policies, plans, programmes, and related mechanisms on the one hand and the situational reality of the status of women in India, This work encourage and inspire to women empowerment, will be beneficial to build a well-organized ideal society through Gender Equality and Development & Peace in the 21st century.Keywords: awareness, constitution, development, empowerment
Procedia PDF Downloads 5158561 Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types
Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke
Abstract:
The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age.Keywords: cybercrime legislation, cyber attacks, consumer privacy and protection law, detection, electronic transaction law, prevention, privacy and data protection law, prohibition, prosecution
Procedia PDF Downloads 418560 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases
Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee
Abstract:
Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements
Procedia PDF Downloads 2298559 Coordinated Community Response to Intimate Partner Violence on College Campuses
Authors: Robert D. Hanser, Gina M. Hanser
Abstract:
This paper provides an overview of Coordinated Community Response Teams (CCRT) to Intimate Partner Violence (IPV). The CCRT, as a partnership and collaborative effort between multiple agencies is highlighted. This paper is a legal analysis that showcases new legislation and legal requirements in the United States for investigating, processing, and reporting to acts of victimization have transformed the role of the university’s CCRT on campus, making its mission all the more important, both internal and external to the campus. As a specific example, discussion of the CCRT in Northeast Louisiana at the University of Louisiana at Monroe is provided as an example of involvement in this initiative, where federal grant funding has allowed a micro version of the region’s CCRT to be implemented on that campus. Simultaneously, university personnel also work with external agencies throughout the community in intimate partner violence response. Amidst this, the result is a genuine partnership between practitioners and researchers who work together to provide public awareness, prevention, first-responder, and intervention services in a comprehensive manner throughout Northeast Louisiana.Keywords: interperaonal violence, sexual assault, dating violence, campus violence
Procedia PDF Downloads 3098558 A Temporal Analysis on the Legal Status of the Turkish Straits in the Scope of National and International Legislation
Authors: Gizem Kodak, Birsen Koldemir
Abstract:
The Turkish Straits are at the crossroads of Europe and Asia continents and are unique waterways connecting the Black Sea countries to the rest of the world. Because of the geostrategic value of the location, passage of trade and war ships through the Turkish Straits has become a vital attraction and importance for the great powers and the riparian states throughout the history. This study contains a temporal analysis of the legal measures implemented in the Turkish Straits System. In this context, the historical alternation of the Turkish Straits has been examined, taking into account the relevant national and international regulations. In other words, relevant national and international regulations have been examined in this study according to historical time schedules. Parallel to the main concept mentioned above, the first chapter focuses on international regulations. These arrangements are organized according to date order and in three subheadings: Sèvres Treaty (1920), Lausanne Treaty (1923) and Montreux Convention (1936). Another topic, the national regulations, has been examined under five subheadings. These; (1982), Port Regulations of Canakkale (1982), Marine Traffic Regulations of the Turkish Straits and Marmara Region (1994) and Maritime Traffic Regulations for the Turkish Straits (1998). In doing so, the aim was to identify the differences in legal arrangements throughout the time regarding the navigation through the Turkish Straits. The current situation of the Turkish Straits has been presented in detail in the last part of the work, taking Montreux Convention into consideration. In this context, the articles of the Convention which regulate the passage of trade vessels have been examined from two perspectives; Peace time and war time. As for the measures that can be implemented in time of war, three options put forward depending on Turkey's stance: ‘Turkey not being belligerent’, ‘Turkey being belligerent’ and ‘situation in which Turkey considers herself threatened with imminent danger of war’.Keywords: temporal analysis, maritime law, Turkish straits, maritime accidents
Procedia PDF Downloads 1528557 Antecedents of Spinouts: Technology Relatedness, Intellectual Property Rights, and Venture Capital
Authors: Sepideh Yeganegi, Andre Laplume, Parshotam Dass, Cam-Loi Huynh
Abstract:
This paper empirically examines organizational and institutional antecedents of entrepreneurial entry. We employ multi-level logistic regression modelling methods on a sub-sample of the Global Entrepreneurship Monitor’s 2011 survey covering 30 countries. The results reveal that employees who have experience with activities unrelated to the core technology of their organizations are more likely to spin out entrepreneurial ventures, whereas those with experiences related to the core technology are less likely to do so. In support of the recent theory, we find that the strength of intellectual property rights and the availability of venture capital have negative and positive effects, respectively, on the likelihood that employees turn into entrepreneurs. These institutional factors also moderate the effect of relatedness to core technology such that entrepreneurial entries by employees with experiences related to core technology are curbed more severely by stronger intellectual property rights protection regimes and lack of venture capital.Keywords: spinouts, intellectual property rights, venture capital, entrepreneurship, organizational experiences, core technology
Procedia PDF Downloads 3568556 An Era of Arts: Examining Intersection of Technology and Museums
Authors: Vivian Li
Abstract:
With the rapid development of technology, virtual reality (VR) and augmented reality (AR) are becoming increasingly prominent in our lives. Museums have led the way in digitization, offering their collections to the wider public through the open internet, which is dramatically changing our experience of art. Technology is also being implemented into our physical art-viewing experience, enabling museums to capture historical sites while creating a more immersive experience for patrons. This study takes a qualitative approach, examining secondary sources and synthesizing information from interviews with field professionals to answer the question: to what extent is the contemporary perception of art transformed by the digitization of art museums? The findings establish that museums are becoming increasingly open with their collections, utilizing digitization to spread their intellectual content to people worldwide and to diversify their audiences. The use of VR and AR is also enabling museums to preserve and showcase historical artifacts and sites in a more interactive and user-focused way. Technology is also crafting new forms of art and art museums. Ultimately, the intersection of technology and museums is not changing the definition of art but rather offering new modes for the public to experience and learn about arts and history.Keywords: art, augmented reality, digitization, museums, technology, virtual reality
Procedia PDF Downloads 1278555 Applied Linguistics: Language, Corpora, and Technology
Authors: M. Imran
Abstract:
This research explores the intersections of applied linguistics, corpus linguistics, translation, and technology, aiming to present innovative cross-disciplinary tools and frameworks. It highlights significant contributions to language, corpora, and technology within applied linguistics, which deepen our understanding of these domains and provide practical resources for scholars, educators, and translators. By showcasing these advancements, the study seeks to enhance collaboration and application in language-related fields. The significance of applied linguistics is emphasized by some of the research that has been emphasized, which presents pedagogical perspectives that could enhance instruction and the learning results of student’s at all academic levels as well as translation trainees. Researchers provided useful data from language studies with classroom applications from an instructional standpoint.Keywords: linguistics, language, corpora, technology
Procedia PDF Downloads 128554 Analyzing Information Management in Science and Technology Institute Libraries in India
Authors: P. M. Naushad Ali
Abstract:
India’s strength in basic research is recognized internationally. Science and Technology research in India has been performed by six distinct bodies or organizations such as Cooperative Research Associations, Autonomous Research Council, Institute under Ministries, Industrial R&D Establishment, Universities, Private Institutions. All most all these institutions are having a well-established library/information center to cater the information needs of their users like scientists and technologists. Information Management (IM) comprises disciplines concerned with the study and the effective and efficient management of information and resources, products and services as well as the understanding of the involved technologies and the people engaged in this activity. It is also observed that the libraries and information centers in India are also using modern technologies for the management of various activities and services to serve their users in a better way. Science and Technology libraries in the country are usually better equipped because the investment in Science and Technology in the country are much larger than those in other fields. Thus, most of the Science and Technology libraries are equipped with modern IT-based tools for handling and management of library services. In spite of these facts Science and Technology libraries are having all the characteristics of a model organization where computer application is found most successful, however, the adoption of this IT based management tool is not uniform in these libraries. The present study will help to know about the level use of IT-based management tools for the information management of Science and Technology libraries in India. The questionnaire, interview, observation and document review techniques have been used in data collection. Finally, the author discusses findings of the study and put forward some suggestions to improve the quality of Science and Technology institute library services in India.Keywords: information management, science and technology libraries, India, IT-based tools
Procedia PDF Downloads 3938553 The Human Process of Trust in Automated Decisions and Algorithmic Explainability as a Fundamental Right in the Exercise of Brazilian Citizenship
Authors: Paloma Mendes Saldanha
Abstract:
Access to information is a prerequisite for democracy while also guiding the material construction of fundamental rights. The exercise of citizenship requires knowing, understanding, questioning, advocating for, and securing rights and responsibilities. In other words, it goes beyond mere active electoral participation and materializes through awareness and the struggle for rights and responsibilities in the various spaces occupied by the population in their daily lives. In times of hyper-cultural connectivity, active citizenship is shaped through ethical trust processes, most often established between humans and algorithms. Automated decisions, so prevalent in various everyday situations, such as purchase preference predictions, virtual voice assistants, reduction of accidents in autonomous vehicles, content removal, resume selection, etc., have already found their place as a normalized discourse that sometimes does not reveal or make clear what violations of fundamental rights may occur when algorithmic explainability is lacking. In other words, technological and market development promotes a normalization for the use of automated decisions while silencing possible restrictions and/or breaches of rights through a culturally modeled, unethical, and unexplained trust process, which hinders the possibility of the right to a healthy, transparent, and complete exercise of citizenship. In this context, the article aims to identify the violations caused by the absence of algorithmic explainability in the exercise of citizenship through the construction of an unethical and silent trust process between humans and algorithms in automated decisions. As a result, it is expected to find violations of constitutionally protected rights such as privacy, data protection, and transparency, as well as the stipulation of algorithmic explainability as a fundamental right in the exercise of Brazilian citizenship in the era of virtualization, facing a threefold foundation called trust: culture, rules, and systems. To do so, the author will use a bibliographic review in the legal and information technology fields, as well as the analysis of legal and official documents, including national documents such as the Brazilian Federal Constitution, as well as international guidelines and resolutions that address the topic in a specific and necessary manner for appropriate regulation based on a sustainable trust process for a hyperconnected world.Keywords: artificial intelligence, ethics, citizenship, trust
Procedia PDF Downloads 648552 Constitution and Self-Consciousness in Hegel's Philosophy
Authors: Akbar Jamali
Abstract:
According to Hegel’s philosophy, constitution of any given nation is the best expression of its national Self-Consciousness. Since constitution is the place in which freedom and Universal Rights is expressed, and since the essence of Self-consciousness is freedom, the development of self-consciousness and consequently freedom, is the direct cause of the development of constitution. Self-consciousness develops in the human history according to its own internal and external dialectic; therefore, it is essentially a dynamic phenomenon. However, constitution is supposed to be a stable foundation for the legal system of state and society. Therefore, the dilemma is: how the dynamic and contradictory nature of Self-Consciousness is the foundation of constitution that supposed to be the stable base of legal system of state and society. According to Hegel’s philosophy, the contradiction between the dynamic self- consciousness and the static constitution and state has an essential role in the formation of social movements within any given state. Self-consciousness is the phenomenology of Spirit in the human history. Subjective Spirit expresses itself in the different shapes of Self-consciousness in human spirit. These different shapes of self-consciousness must be identical with its contradiction; Objective Spirit. State is the highest form of the objective Spirit. Therefore, state and its foundation namely ‘constitution’ must be identical with Self-consciousness. "Spirit cannot remain forever alienated from its expression." Hegel states. Self-consciousness is the Subjective Spirit, it freely develops according to its internal and external contradictions, but since it must be always identical with its expression namely constitution, its development results to alienation. They way by which self-consciousness became again identical with the constitution determines the nature of legal and political development of any given society and state. In the democratic states, self-consciousness shows itself partially in the public opinion. In the process of election, this public opinion changes the ruling parties that construct the government. In democracies, self-consciousness or subjective spirit is in a dialectical relationship with state or the Objective Spirit. Therefore, it cannot remain alienated with its expression that is political system and its constitution. But, in the autocracies Self-consciousness cannot easily express itself in the government and its constitution. More Self-consciousness develops more it becomes alienated with its expression that is the state and its constitution. Rebel and revolution are the symptom of alienation of Spirit (self-consciousness) with its expression (state and its constitution).Keywords: alienation, constitution, self-consciousness, spirit
Procedia PDF Downloads 3628551 A Study of Students’ Perceptions of Technology in Petaling District
Authors: Ahmad Masduki Bin Selamat
Abstract:
Malaysia is becoming a developed country by the year 2020, the problem is that little is known about the perceptions and curricular values of Malaysian high school students who have taken Living Skills as a subject in the regular public school. How these students perceive technology in their daily lives, in the country’s development and in global context, is not known. The study involved form 4 students from four public schools in Petaling District. The study found that the Petaling District students’ knowledge of technology were good, where 76.6 % of them scored 50% marks and above during the achievement test. In addition, it was also found that only excellent and squatter students perceived technology education as important as a school subject, compared to those students from the urban area. It was found that students preferred business and entrepreneurship topics rather than the other Living Skills curriculum. The study suggests that students should be exposed to technology education from the early years of schooling (preschool to secondary). In addition, the acquisition of skills, the evaluation, revision and modification of the instruction as well as the curriculum should be enforced.Keywords: technology education, living skills, curricular values, public schools
Procedia PDF Downloads 450