Search results for: legal strategies
6237 The Search for an Alternative to Tabarru` in Takaful Models
Authors: Abu Umar Faruq Ahmad, Muhammad Ayub
Abstract:
Tabarru` (unilateral gratuitous contribution) is thought to be the basic concept that distinguishes Takaful from conventional non-Sharīʿah compliant insurance. The Sharīʿah compliance of its current practice has been questioned in the premise that, a) it is a form of commutative contract; b) it is akin to the commercial corporate structure of insurance companies due to following the same marketing strategies, allocation to reserves, sharing of underwriting surplus by the companies one way or the other, providing loans to the Takaful funds, and resultantly absorbing the underwriting losses. The Sharīʿah scholars are of the view that the relationship between participants in Takaful should be in the form of commitment to donate, under which a contributor makes commitments himself to donate a sum of money for mutual help and cooperation on the condition that the balance, if any, should be returned to him. With the aim of finding solutions to the above mentioned concerns and other Sharīʿah related issues the study seeks to investigate whether the Takaful companies are functioning in accordance with the Islamic principles of brotherhood, solidarity, and cooperative risk sharing. Given that it discusses the cooperative model of Takaful to address the current and future Sharīʿah related and legal concerns. The study proposed an alternative model and considers it to best serve the objectives of Takaful which operates on the basis of ta`awun or mutual co-operation.Keywords: hibah, musharakah ta`awuniyyah, Tabarru`, Takaful
Procedia PDF Downloads 4456236 3D Printing: Rebounding from Global Supply Chain Disruption Due to Natural Disaster
Authors: Gurjinder Singh, Jasmeen Kaur, Mukul Dhiman
Abstract:
This paper mainly describes the significance of 3D printing in the supply chain management in a scenario when there is disruption in global supply chain. Furthermore, the development and implementation of supply chain strategies in context of 3D printing technology is framed to make supply chain of an organization resilient to disruption caused by natural disasters.Keywords: 3D printing, global supply chain, supply chain management, supply chain strategies
Procedia PDF Downloads 4766235 Intellectual Property Implications in the Context of Space Exploration with a Special Focus on ESA Rules and Regulations
Authors: Linda Ana Maria Ungureanu
Abstract:
This article details the manner in which European law establishes the protection and ownership rights over works created in off-world environments or in relation to space exploration. In this sense, the analysis is focused on identifying the legal treatment applicable to creative works based on the provisions regulated under the International Space Treaties, on one side, and the International IP Treaties and subsequent EU legislation, on the other side, with a special interest on ESA Rules and Regulations. Furthermore, the article analyses the manner in which ESA regulates the ownership regime applicable for creative works, taking into account the relationship existing between the inventor/creator and ESA and the environment in which the creative work was developed. Moreover, the article sets a series of de lege ferenda proposals for the regulation of intellectual property matters in the context of space exploration, the main purpose being to identify legal measures and steps that need to be taken in order to ensure that creative activities are fostered and understood as a significant catalyst for encouraging space exploration.Keywords: intellectual property law, ESA guidelines, international IP treaties, EU legislation
Procedia PDF Downloads 1776234 Climate Change Effects and Cocoa Farmers Coping Strategies in Ilaro Local Government Area of Ogun State, Nigeria
Authors: Irene Oluwatosin Uwabor
Abstract:
Climate change is a global phenomenon which affects the environment and undermines agricultural activities, in particular, cocoa production in Nigeria. This study, therefore, assessed the farmers ‘coping strategies to climate change effects in Ilaro Local Government Area of Ogun State, Nigeria. A simple random sampling technique was used to select twenty-five cocoa farmers from each of the selected six wards to make up 150 cocoa farmers as sample size for this study. Descriptive statistics and chi-square analysis were used for the data analysis. The results showed that the average age of the respondents was 43.8 years and male dominated (80.00%) cocoa production. Most of the respondents had some level of formal education (93.4%). The mean of household and year of experience in cocoa farming were eight people and 11.6 years respectively. Family and Hired labour (41.3%) was the common source of labour to the respondents and majority (86.0%) of the respondents were aware of climate change. The study concluded that respondents experienced low yield and high rate of deformed beans in the pods due to climate change. The adjustment strategies used were planting of diseases and pest resistant cocoa varieties, using of heavy mulching, diversification into other non- agricultural income generating activities and tree crops cultivation to provide shade. Also, significant relationships existed between personal characteristics (χ²= 62.24, df = 6, p = 0.00), adjustment strategies (χ²= 103.1, df = 4, p = 0.00) and effect of climate change. It is hereby recommend that extension service providers should intensify more effort and advocating for improved agronomic practices to increase cocoa productivity in the study area.Keywords: cocoa farmers, coping strategies, climate change, ilaro
Procedia PDF Downloads 2116233 Analysis of Sustainability of Groundwater Resources in Rote Island, Indonesia under HADCM3 Global Model Climate Scenarios: Groundwater Flow Simulation and Proposed Adaptive Strategies
Authors: Dua K. S. Y. Klaas, Monzur A. Imteaz, Ika Sudiayem, Elkan M. E. Klaas, Eldav C. M. Klaas
Abstract:
Developing tailored management strategies to ensure the sustainability of groundwater resource under climate and demographic changes is critical for tropical karst island, where relatively small watershed and highly porous soil nature make this natural resource highly susceptible and thus very sensitive to those changes. In this study, long-term impacts of climate variability on groundwater recharge and discharge at the Oemau spring, Rote Island, Indonesia were investigated. Following calibration and validation of groundwater model using MODFLOW code, groundwater flow was simulated for period of 2020-2090 under HadCM3 global model climate (GCM) scenarios, using input data of weather variables downscaled by Statistical Downscaling Model (SDSM). The reported analysis suggests that the sustainability of groundwater resources will be adversely affected by climate change during dry years. The area is projected to variably experience 2.53-22.80% decrease of spring discharge. A subsequent comprehensive set of management strategies as palliative and adaptive efforts was proposed to be implemented by relevant stakeholders to assist the community dealing with water deficit during the dry years. Three main adaptive strategies, namely socio-cultural, technical, and ecological measures, were proposed by incorporating physical and socio-economic characteristics of the area. This study presents a blueprint for assessing groundwater sustainability under climate change scenarios and developing tailored management strategies to cope with adverse impacts of climate change, which may become fundamental necessities across other tropical karst islands in the future.Keywords: climate change, groundwater, management strategies, tropical karst island, Rote Island, Indonesia
Procedia PDF Downloads 1556232 Engaging the World Bank: Good Governance and Human Rights-Based Approaches
Authors: Lottie Lane
Abstract:
It is habitually assumed and stated that the World Bank should engage and comply with international human rights standards. However, the basis for holding the Bank to such standards is unclear. Most advocates of the idea invoke aspects of international law to argue that the Bank has existing obligations to act in compliance with human rights standards. The Bank itself, however, does not appear to accept such arguments, despite having endorsed the importance of human rights for a considerable length of time. A substantial challenge is that under the current international human rights law framework, the World Bank is considered a non-state actor, and as such, has no direct human rights obligations. In the absence of clear legal duties for the Bank, it is necessary to look at the tools available beyond the international human rights framework to encourage the Bank to comply with human rights standards. This article critically examines several bases for arguing that the Bank should comply and engage with human rights through its policies and practices. Drawing on the Bank’s own ‘good governance’ approach as well as the United Nations’ ‘human rights-based-approach’ to development, a new basis is suggested. First, the relationship between the World Bank and human rights is examined. Three perspectives are considered: (1) the legal position – what the status of the World Bank is under international human rights law, and whether it can be said to have existing legal human rights obligations; (2) the Bank’s own official position – how the Bank envisages its relationship with and role in the protection of human rights; and (3) the relationship between the Bank’s policies and practices and human rights (including how its attitudes are reflected in its policies and how the Bank’s operations impact human rights enjoyment in practice). Here, the article focuses on two examples – the (revised) 2016 Environmental and Social Safeguard Policies and the 2012 case-study regarding Gambella, Ethiopia. Both examples are widely considered missed opportunities for the Bank to actively engage with human rights. The analysis shows that however much pressure is placed on the Bank to improve its human rights footprint, it is extremely reluctant to do so explicitly, and the legal bases available are insufficient for requiring concrete, ex ante action by the Bank. Instead, the Bank’s own ‘good governance’ approach to development – which it has been advocating since the 1990s – can be relied upon. ‘Good governance’ has been used and applied by many actors in many contexts, receiving numerous different definitions. This article argues that human rights protection can now be considered a crucial component of good governance, at least in the context of development. In doing so, the article explains the relationship and interdependence between the two concepts, and provides three rationales for the Bank to take a ‘human rights-based approach’ to good governance. Ultimately, this article seeks to look beyond international human rights law and take a governance approach to provide a convincing basis upon which to argue that the World Bank should comply with human rights standards.Keywords: World Bank, international human rights law, good governance, human rights-based approach
Procedia PDF Downloads 3596231 Power Allocation in User-Centric Cell-Free Massive Multiple-Input Multiple-Output Systems with Limited Fronthaul Capacity
Authors: Siminfar Samakoush Galougah
Abstract:
In this paper, we study two power allocation problems for an uplink user-centric (UC) cell-free massive multiple-input multiple-output (CF-mMIMO) system. Besides, we assume each access point (AP) is connected to a central processing unit (CPU) via a fronthaul link with limited capacity. To efficiently use the fronthaul capacity, two strategies for transmitting signals from APs to the CPU are employed, namely, compress-forward estimate (CFE), estimate-compress-forward (ECF). The capacity of the aforementioned strategies in user-centric CF-mMIMO is drived. Then, we solved the two power allocation problems with minimum Spectral Efficiency (SE) and sum-SE maximization objectives for ECF and CFE strategies.Keywords: cell-free massive MIMO, limited capacity fronthaul, spectral efficiency
Procedia PDF Downloads 706230 From Restraint to Obligation: The Protection of the Environment in Times of Armed Conflict
Authors: Aaron Walayat
Abstract:
Protection of the environment in international law has been one of the most developed in the context of international humanitarian law. This paper examines the history of the protection of the environment in times of armed conflict, beginning with the traditional notion of restraint observed in antiquity towards the obligation to protect the environment, examining the treaties and agreements, both binding and non-binding which have contributed to environmental protection in war. The paper begins with a discussion of the ancient concept of restraint. This section examines the social norms in favor of protection of the environment as observed in the Bible, Greco-Roman mythology, and even more contemporary literature. The study of the traditional rejection of total war establishes the social foundation on which the current legal regime has stemmed. The paper then studies the principle of restraint as codified in international humanitarian law. It mainly examines Additional Protocol I of the Geneva Convention of 1949 and existing international law concerning civilian objects and the principles of international humanitarian law in the classification between civilian objects and military objectives. The paper then explores the environment’s classification as both a military objective and as a civilian object as well as explores arguments in favor of the classification of the whole environment as a civilian object. The paper will then discuss the current legal regime surrounding the protection of the environment, discussing some declarations and conventions including the 1868 Declaration of St. Petersburg, the 1907 Hague Convention No. IV, the Geneva Conventions, and the 1976 Environmental Modification Convention. The paper concludes with the outline noting the movement from codification of the principles of restraint into the various treaties, agreements, and declarations of the current regime of international humanitarian law. This paper provides an analysis of the history and significance of the relationship between international humanitarian law as a major contributor to the growing field of international environmental law.Keywords: armed conflict, environment, legal regime, restraint
Procedia PDF Downloads 2046229 An Investigation into the Strategies Adopted by Women Entrepreneurs to Ensure Small Business Success in Nkonkobe Municipality, Eastern Cape Province, South Africa
Authors: Agholor Deborah Ewere, Emmanuel Ade, Seriki Idowu
Abstract:
The role women entrepreneur plays to combat unemployment should not be underestimated, especially in countries with growing unemployment rates such as South Africa. Women entrepreneurs contribute significantly to economic development in South Africa, but their contribution has not been adequately studied and developed. Hence, the study identified business strategies adopted by women entrepreneurs to sustain growth and development of entrepreneurship. Survey research design approach was adopted and convenience sampling method was used for sample selection. The structured questionnaire was used to elicit information from the respondents. The findings revealed some of the operational challenges women entrepreneur faced to include lack of finance, marketing skills and planning and also showed that the strategies adopted by women entrepreneurs have a positive effect on the success of small businesses. It was recommended among others that the women entrepreneurs should take some time to study the nature of challenges other women have faced in business and possibly provide solutions to such issues before starting their own business. It was however concluded that unless the operational challenges named above are resolved, the role of women entrepreneurs in the developing nations will continue to experience deprived economic growth, development and display substandard competitiveness.Keywords: business, entrepreneurs, small, strategies, success, women
Procedia PDF Downloads 4616228 Behavioral Problems Among Down Syndrome Children in the Special Education Complex Peshawar
Authors: Huma Atta, Ishrat Rehman, Muhammad Umair
Abstract:
Objective: To find out the effectiveness of Dr. Stein behavioural modification strategies among Down syndrome children’s behavioural problems. Material & Methods: We took a group of individuals (aged 8-16) having Down syndrome from national special education complex, Peshawar. They were assessed through the behavioural problem index to give us an idea on their behaviour problems, those with a behavioural problem were kept in therapy for further sessions to help them improve. Results: A treatment plan was made according to the extracted behavioural problems of Down syndrome children. Dr. Stein recommended behavioural modification treatment strategies were used for behavioural modification of Down syndrome children (Routine, reward, choice, redirection and consistency). Pre-intervention (M=69.11, SD=6.27) and post-intervention (M=61.33, SD=6.51) conditions; t (8) =2.70, p=0.027. Conclusion: After the successful completion of 9 sessions with Down syndrome children, their behavioural problems were reassessed. Results indicated that Dr. Stein behavioural modification strategy is an effective treatment plan for the modification of behavioural problems among Down syndrome children.Keywords: behavior, down syndrome, treatment, strategies
Procedia PDF Downloads 116227 The Ethics of Jaw Wiring for Weight Loss by Dentists in South Africa: A Principlist Analysis
Authors: Jillian Gardner, Hilde D. Miniggio
Abstract:
The increasing prevalence of obesity has driven the pursuit of alternative weight loss strategies, such as jaw wiring (or ‘slimming wires’), a technique known in the medical community as maxillomandibular fixation, which has evolved beyond its original intention of treating temporomandibular joint disorders. Individuals have increasingly sought and utilized the procedure for weight loss purposes. Although legal in South Africa, this trend presents dentists with ethical dilemmas, as they face requests for interventions that prioritize aesthetic preferences over medical necessity. Drawing on scholarly literature and the four principles framework of Beauchamp and Childress, this ethical analysis offers guidance for dentists facing the ethical dilemma of patient requests for jaw wiring as a weight management intervention. The ethical analysis concludes that dentists who refuse autonomous requests to perform jaw wiring for purely weight loss purposes are ethically justified within the principlist framework in overriding these requests when the principles of non-maleficence and beneficence are at stake. The well-being and health of the patient, as well as societal and professional obligations, justify the refusal to perform jaw wiring purely for weight loss.Keywords: ethics, jaw wiring, maxillomandibular fixation, principlism, weight loss
Procedia PDF Downloads 576226 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics
Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan
Abstract:
The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning
Procedia PDF Downloads 1506225 The New Family Law in Kuwait: A Step Towards International Standards
Authors: Dina Hadad
Abstract:
Women empowerment in the Arab world remains a central issue in the context of development and human rights. Akin to many societies around the globe, gender equality is yet to be achieved. This research will provide an introduction into the current legal stand of some Arab countries in terms of gender equality and women rights in the context of family law. It will look specifically into the recent family law in Kuwait and why many women consider it a positive step towards affirming their rights and their needs. Depending on comparative material from the area, the research argues that whilst some countries made efforts to promote women’s empowerment as a concept and practice throughout its policies, others have indeed some unique journeys that reflect organic and from within evolutions. Nonetheless, these efforts are yet to reflect a comprehensive structure that addresses women legal and political empowerment let alone social status. A contradiction in the realities of different Arab states is nothing new since the lack of comprehensive rights-based policy making in Arab countries has contributed to the disconnect between economic growth and development challenges.Keywords: women empowerment, cultural challenges, gender equality, Islamic law, international standards, family law
Procedia PDF Downloads 1956224 Household Food Insecurity and Associated Coping Strategies in Urban, Peri-Urban and Rural Settings: A Case of Morogoro and Iringa Towns, Tanzania
Authors: U. Tumaini, J. Msuya
Abstract:
Food insecurity is a worrying challenge worldwide with sub-Saharan Africa including Tanzania being the most affected. Although factors that influence household food access security status and ways of coping with such factors have been examined, little has been reported on how these coping strategies vary along the urban-rural continuum especially in medium-sized towns. The purpose of this study was to identify food insecurity coping strategies employed by households and assess whether they are similar along the urban-rural continuum. The study was cross-sectional in design whereby a random sample of 279 households was interviewed using structured questionnaire. Data were analysed using Statistical Package for Social Sciences (SPSS) Version 20 software. It was revealed that the proportion of households relying on less preferred and quality foods, eating fewer meals per day, undertaking work for food or money, performing farm and off-farm activities, and selling fall back assets was higher in rural settings compared to urban and peri-urban areas. Similarly, more households in urban and peri-urban areas cope with food access insecurity by having strict food budgets compared to those in rural households (p ≤ 0.001). The study concludes that food insecurity coping strategies vary significantly from one spatial entity to another. It is thereby recommended that poor, particularly rural households should be supported to diversify their income-generating activities not only for food security purposes during times of food shortage but also as businesses aimed at increasing their household incomes.Keywords: food coping strategies, household food insecurity, medium-sized towns, urban-rural continuum
Procedia PDF Downloads 3286223 Resilience and Renewal: Sustainable Tourism Development in Post-Earthquake Marrakech-El Haouz
Authors: Oumayma Hilal
Abstract:
The devastating earthquake in Marrakech-El Haouz in September 2023 underscores the critical need for sustainable tourism practices. This study proposes innovative approaches to territory tourism, prioritizing resilient and sustainable development to aid recovery and empower local communities. Using a mixed-methods approach, the research evaluates post-earthquake tourism impacts, gathers local perspectives, and benchmarks global models for disaster recovery through tourism. The paper aims to offer practical, community-centric tourism initiatives, integrated with strategic communication strategies, to enhance socio-economic welfare and ensure long-term resilience. The findings are expected to contribute significantly to sustainable tourism literature in post-disaster contexts and provide actionable strategies for the revitalization of the Marrakech-El Haouz region.Keywords: sustainable tourism, community development, Marrakech El Haouz, communication strategies, territory tourism, sustainable tourism, community development
Procedia PDF Downloads 556222 The Impact of Constitutional and Legal Provisions on the Indian Women’s Status in 21st Century
Authors: Mamta Chandrashekhar
Abstract:
Women’s participation in mainstream political and social activity has important implications for the broader arena of governance in any country. This research work will highlights some of the key issues that concerned with the impact of constitutional & Legal provision on the Indian women Status in present century. The principle of gender equality is enshrined in the Indian Constitution in its Preamble, Fundamental Rights, Fundamental Duties and Directive Principles. The Constitution not only grants equality to women, but also empowers the State to adopt measures of positive discrimination in favour of women. In recent years, the empowerment of women has been recognized as the central issue in determining the status of women. The main objective of this research is to analyzed the status of Indian women and the existing wide gap between the goals enunciated in the Constitution, legislation, policies, plans, programmes, and related mechanisms on the one hand and the situational reality of the status of women in India, This work encourage and inspire to women empowerment, will be beneficial to build a well-organized ideal society through Gender Equality and Development & Peace in the 21st century.Keywords: awareness, constitution, development, empowerment
Procedia PDF Downloads 5156221 Comparison of Various Policies under Different Maintenance Strategies on a Multi-Component System
Authors: Demet Ozgur-Unluakin, Busenur Turkali, Ayse Karacaorenli
Abstract:
Maintenance strategies can be classified into two types, which are reactive and proactive, with respect to the time of the failure and maintenance. If the maintenance activity is done after a breakdown, it is called reactive maintenance. On the other hand, proactive maintenance, which is further divided as preventive and predictive, focuses on maintaining components before a failure occurs to prevent expensive halts. Recently, the number of interacting components in a system has increased rapidly and therefore, the structure of the systems have become more complex. This situation has made it difficult to provide the right maintenance decisions. Herewith, determining effective decisions has played a significant role. In multi-component systems, many methodologies and strategies can be applied when a component or a system has already broken down or when it is desired to identify and avoid proactively defects that could lead to future failure. This study focuses on the comparison of various maintenance strategies on a multi-component dynamic system. Components in the system are hidden, although there exists partial observability to the decision maker and they deteriorate in time. Several predefined policies under corrective, preventive and predictive maintenance strategies are considered to minimize the total maintenance cost in a planning horizon. The policies are simulated via Dynamic Bayesian Networks on a multi-component system with different policy parameters and cost scenarios, and their performances are evaluated. Results show that when the difference between the corrective and proactive maintenance cost is low, none of the proactive maintenance policies is significantly better than the corrective maintenance. However, when the difference is increased, at least one policy parameter for each proactive maintenance strategy gives significantly lower cost than the corrective maintenance.Keywords: decision making, dynamic Bayesian networks, maintenance, multi-component systems, reliability
Procedia PDF Downloads 1296220 Exploring How Online Applications Help Students to Learn Music Virtually: A Study in an Australian Music Academy
Authors: Ali Shah
Abstract:
This paper outlines the case study experience of using a variety of online strategies in an Australian music academy context during covid times. The study aimed at exploring how online applications help students to learn music, specifically playing musical instruments, composing songs, and performing virtually. To explore this, music teachers’ perceptions and experiences regarding online learning, the teaching strategies they implemented, and the challenges they faced were examined. For the purpose of this study, a qualitative research structure was adopted through the use of three data collection tools. These methods included pre- and post-research individual interviews of teachers and students, analysis of their lesson plans, virtual classroom observations of the teachers followed by the researcher’sown reflections, post-observation discussions, and teachers’ reflective journals. The findings revealed that teachers had a theoretical understanding of virtual learning and recent musical application such as Flowkey, Skoove, and Piano marvel, which are benefits of e-learning. While teachers faced challenges in implementing strategies to teach keyboard/piano online, overall, both students and teachers felt the positive impact of online applications and strategies on their learning and felt that modern technology made it possible for anyone to take music lessons at home.Keywords: music, keyboard, piano, online learning, virtual learning
Procedia PDF Downloads 756219 Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types
Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke
Abstract:
The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age.Keywords: cybercrime legislation, cyber attacks, consumer privacy and protection law, detection, electronic transaction law, prevention, privacy and data protection law, prohibition, prosecution
Procedia PDF Downloads 416218 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases
Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee
Abstract:
Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements
Procedia PDF Downloads 2296217 The Influence of Teachers Anxiety-Reducing Strategies on Learners Foreign Language Anxiety
Authors: Fakieh Alrabai
Abstract:
This study investigated the effects on learner anxiety of anxiety-reducing strategies utilized by English as foreign language teachers in Saudi Arabia. The study was conducted in two stages. In the first stage, sources of foreign language anxiety for Saudi learners of English (N = 596) were identified using The Foreign Language Classroom Anxiety Scale (FLCAS). In the second stage, 465 learners who were divided almost equally into two groups (experimental vs. control) and 12 teachers were recruited. Anxiety-reducing strategies were implemented exclusively in the treatment group for approximately eight weeks. FLCAS was used to assess learners’ FL anxiety levels before and after treatment. Statistical analyses (e.g. ANOVA and ANCOVA) were used to evaluate the study findings. These findings revealed that the intervention led to significantly decreased levels of FL anxiety for learners in the experimental group compared with increased levels of anxiety for those in the control group.Keywords: communication apprehension, EFL teaching/learning, fear of negative evaluation, foreign language anxiety
Procedia PDF Downloads 3546216 Innovative Strategies for Improving Writing Skills of Secondary Level Students
Authors: Ihsan Ullah Khan, Asim Kareem, Naveed Saif
Abstract:
This research study examined the application of innovative strategies for improving writing skills of Secondary level students. It also examined the steps taken by Secondary level teachers for the improvement of writing skills of their students. Effective written communication is the problem faced by all the ESL students at secondary level. The objective of the study was to help the secondary level students to overcome this problem. More specifically, this research study aimed to guide the teachers, teaching at secondary level, to bring innovation in their teaching by showing the results of innovative strategies. In order to know about the practices of the teachers, inside the classroom, data was calculated through rating scale questionnaire. After that experimental study was carried out. For the experimental study a 10th grade class was selected. Results were drawn by analyzing the pre and post-tests of the students with the help of independent sample t-test. The results showed that a significant change occurred in the writing skills of the students, belonging to Treatment group. No improvement was observed in the writing skills of the students, belonging to Control group. Thus this research study proved to be a great contribution by guiding the teachers to bring a significant change in the writing skills of the students.Keywords: writing skills, innovative strategies, teachers, students, treatment group, control group
Procedia PDF Downloads 4426215 Coordinated Community Response to Intimate Partner Violence on College Campuses
Authors: Robert D. Hanser, Gina M. Hanser
Abstract:
This paper provides an overview of Coordinated Community Response Teams (CCRT) to Intimate Partner Violence (IPV). The CCRT, as a partnership and collaborative effort between multiple agencies is highlighted. This paper is a legal analysis that showcases new legislation and legal requirements in the United States for investigating, processing, and reporting to acts of victimization have transformed the role of the university’s CCRT on campus, making its mission all the more important, both internal and external to the campus. As a specific example, discussion of the CCRT in Northeast Louisiana at the University of Louisiana at Monroe is provided as an example of involvement in this initiative, where federal grant funding has allowed a micro version of the region’s CCRT to be implemented on that campus. Simultaneously, university personnel also work with external agencies throughout the community in intimate partner violence response. Amidst this, the result is a genuine partnership between practitioners and researchers who work together to provide public awareness, prevention, first-responder, and intervention services in a comprehensive manner throughout Northeast Louisiana.Keywords: interperaonal violence, sexual assault, dating violence, campus violence
Procedia PDF Downloads 3096214 A Temporal Analysis on the Legal Status of the Turkish Straits in the Scope of National and International Legislation
Authors: Gizem Kodak, Birsen Koldemir
Abstract:
The Turkish Straits are at the crossroads of Europe and Asia continents and are unique waterways connecting the Black Sea countries to the rest of the world. Because of the geostrategic value of the location, passage of trade and war ships through the Turkish Straits has become a vital attraction and importance for the great powers and the riparian states throughout the history. This study contains a temporal analysis of the legal measures implemented in the Turkish Straits System. In this context, the historical alternation of the Turkish Straits has been examined, taking into account the relevant national and international regulations. In other words, relevant national and international regulations have been examined in this study according to historical time schedules. Parallel to the main concept mentioned above, the first chapter focuses on international regulations. These arrangements are organized according to date order and in three subheadings: Sèvres Treaty (1920), Lausanne Treaty (1923) and Montreux Convention (1936). Another topic, the national regulations, has been examined under five subheadings. These; (1982), Port Regulations of Canakkale (1982), Marine Traffic Regulations of the Turkish Straits and Marmara Region (1994) and Maritime Traffic Regulations for the Turkish Straits (1998). In doing so, the aim was to identify the differences in legal arrangements throughout the time regarding the navigation through the Turkish Straits. The current situation of the Turkish Straits has been presented in detail in the last part of the work, taking Montreux Convention into consideration. In this context, the articles of the Convention which regulate the passage of trade vessels have been examined from two perspectives; Peace time and war time. As for the measures that can be implemented in time of war, three options put forward depending on Turkey's stance: ‘Turkey not being belligerent’, ‘Turkey being belligerent’ and ‘situation in which Turkey considers herself threatened with imminent danger of war’.Keywords: temporal analysis, maritime law, Turkish straits, maritime accidents
Procedia PDF Downloads 1526213 Effective Corporate Image Management as a Strategy for Enhancing Profitability
Authors: Shola Haruna Adeosun, Ajoke F. Adebiyi
Abstract:
Business organizations in Nigeria have failed to realize the role of a good corporate image policy in business dealings. This is probably because they do not understand the concept of corporate image and the necessary tools for promoting it. Corporate image goes beyond attractive products or rendering quality services, advertising and paying good salary. It pervades every aspect of business concern, from the least worker’s personality to the dealings within the organization and with the large society. In the face of the societal dynamics, especially in the business world, brought by technology, companies are faced with stiff competition that maintaining a competitive edge requires aggressive strategies. One of such strategies in effective corporate image management is promotion. This study investigates the strategies that could be deployed in order to build and promote the effective corporate image, as well as enhance profit margins of an organization, using Phinomar Nigeria Limited, Ngwo as case study. The study reveals that Phinomar Nigeria Limited has a laid down corporate image policy but not effectively managed; and that, strategies deployed to promote corporate image are limited; while responses to Phinomar products are fairly high. It, therefore, suggests profitable products but requires periodical improvement in the employee's welfare and work environment; as well as, the need to increase the scope of Phinomar’s social responsibility.Keywords: corporate image, effective, enhancing, management, profitability, strategy
Procedia PDF Downloads 3136212 Hybrid Strategies of Crisis Intervention for Sexualized Violence Using Digital Media
Authors: Katharina Kargel, Frederic Vobbe
Abstract:
Sexualized violence against children and adolescents using digital media poses particular challenges for practitioners with a focus on crisis intervention (social work, psychotherapy, law enforcement). The technical delimitation of violence increases the burden on those affected and increases the complexity of interdisciplinary cooperation. Urgently needed recommendations for practical action do not yet exist in Germany. Funded by the Federal Ministry of Education and Research, these recommendations for action are being developed in the HUMAN project together with science and practice. The presentation introduces the participatory approach of the HUMAN project. We discuss the application-oriented, casuistic approach of the project and present its results using the example of concrete case-based recommendations for Action. The participants will be presented with concrete prototypical case studies from the project, which will be used to illustrate quality criteria for crisis intervention in cases of sexualized violence using digital media. On the basis of case analyses, focus group interviews and interviews with victims of violence, we present the six central challenges of sexualized violence with the use of digital media, namely: • Diffusion (Ambiguities regarding the extent and significance of violence) , • Transcendence (Space and time independence of the dynamics of violence, omnipresence), • omnipresent anxiety (considering diffusion and transcendence), • being haunted (repeated confrontation with digital memories of violence or the perpetrator), • disparity (conflicts of interpretative power between those affected and the social environment) • simultaneity (of all other factors). We point out generalizable principles with which these challenges can be dealt with professionally. Dealing professionally with sexualized violence using digital media requires a stronger networking of professional actors. A clear distinction must be made between their own mission and the mission of the network partners. Those affected by violence must be shown options for crisis intervention in the context of the aid networks. The different competencies and the professional mission of the offers of help are to be made transparent. The necessity of technical possibilities for deleting abuse images beyond criminal prosecution will be discussed. Those affected are stabilized by multimodal strategies such as a combination of rational emotive therapy, legal support and technical assistance.Keywords: sexualized violence, intervention, digital media, children and youth
Procedia PDF Downloads 2336211 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism
Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe
Abstract:
National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.Keywords: counter-terrorism, discourse, Nigeria, security, terrorism
Procedia PDF Downloads 4866210 Developing the Skills of Reading Comprehension of Learners of English as a Second Language
Authors: Indu Gamage
Abstract:
Though commonly utilized as a language improvement technique, reading has not been fully employed by both language teachers and learners to develop reading comprehension skills in English as a second language. In a Sri Lankan context, this area has to be delved deep into as the learners’ show more propensity to analyze. Reading comprehension is an area that most language teachers and learners struggle with though it appears easy. Most ESL learners engage in reading tasks without being properly aware of the objective of doing reading comprehension. It is observed that when doing reading tasks, the language learners’ concern is more on the meanings of individual words than on the overall comprehension of the given text. The passiveness with which the ESL learners engage themselves in reading comprehension makes reading a tedious task for the learner thereby giving the learner a sense of disappointment at the end. Certain reading tasks take the form of translations. The active cognitive participation of the learner in the mode of using productive strategies for predicting, employing schemata and using contextual clues seems quite less. It was hypothesized that the learners’ lack of knowledge of the productive strategies of reading was the major obstacle that makes reading comprehension a tedious task for them. This study is based on a group of 30 tertiary students who read English only as a fundamental requirement for their degree. They belonged to the Faculty of Humanities and Social Sciences of the University of Ruhuna, Sri Lanka. Almost all learners hailed from areas where English was hardly utilized in their day to day conversations. The study is carried out in the mode of a questionnaire to check their opinions on reading and a test to check whether the learners are using productive strategies of reading when doing reading comprehension tasks. The test comprised reading questions covering major productive strategies for reading. Then the results were analyzed to see the degree of their active engagement in comprehending the text. The findings depicted the validity of the hypothesis as grounds behind the difficulties related to reading comprehension.Keywords: reading, comprehension, skills, reading strategies
Procedia PDF Downloads 1756209 Constitution and Self-Consciousness in Hegel's Philosophy
Authors: Akbar Jamali
Abstract:
According to Hegel’s philosophy, constitution of any given nation is the best expression of its national Self-Consciousness. Since constitution is the place in which freedom and Universal Rights is expressed, and since the essence of Self-consciousness is freedom, the development of self-consciousness and consequently freedom, is the direct cause of the development of constitution. Self-consciousness develops in the human history according to its own internal and external dialectic; therefore, it is essentially a dynamic phenomenon. However, constitution is supposed to be a stable foundation for the legal system of state and society. Therefore, the dilemma is: how the dynamic and contradictory nature of Self-Consciousness is the foundation of constitution that supposed to be the stable base of legal system of state and society. According to Hegel’s philosophy, the contradiction between the dynamic self- consciousness and the static constitution and state has an essential role in the formation of social movements within any given state. Self-consciousness is the phenomenology of Spirit in the human history. Subjective Spirit expresses itself in the different shapes of Self-consciousness in human spirit. These different shapes of self-consciousness must be identical with its contradiction; Objective Spirit. State is the highest form of the objective Spirit. Therefore, state and its foundation namely ‘constitution’ must be identical with Self-consciousness. "Spirit cannot remain forever alienated from its expression." Hegel states. Self-consciousness is the Subjective Spirit, it freely develops according to its internal and external contradictions, but since it must be always identical with its expression namely constitution, its development results to alienation. They way by which self-consciousness became again identical with the constitution determines the nature of legal and political development of any given society and state. In the democratic states, self-consciousness shows itself partially in the public opinion. In the process of election, this public opinion changes the ruling parties that construct the government. In democracies, self-consciousness or subjective spirit is in a dialectical relationship with state or the Objective Spirit. Therefore, it cannot remain alienated with its expression that is political system and its constitution. But, in the autocracies Self-consciousness cannot easily express itself in the government and its constitution. More Self-consciousness develops more it becomes alienated with its expression that is the state and its constitution. Rebel and revolution are the symptom of alienation of Spirit (self-consciousness) with its expression (state and its constitution).Keywords: alienation, constitution, self-consciousness, spirit
Procedia PDF Downloads 3626208 Legal Problems with the Thai Political Party Establishment
Authors: Paiboon Chuwatthanakij
Abstract:
Each of the countries around the world has different ways of management and many of them depend on people to administrate their country. Thailand, for example, empowers the sovereignty of Thai people under constitution; however, our Thai voting system is not able to flow fast enough under the current Political management system. The sovereignty of Thai people is addressing this problem through representatives during current elections, in order to set a new policy for the countries ideology to change in the House and the Cabinet. This is particularly important in a democracy to be developed under our current political institution. The Organic Act on Political Parties 2007 is the establishment we have today that is causing confrontations within the establishment. There are many political parties that will soon be abolished. Many political parties have already been subsidized. This research study is to analyze the legal problems with the political party establishment under the Organic Act on Political Parties 2007. This will focus on the freedom of each political establishment compared to an effective political operation. Textbooks and academic papers will be referenced from studies home and abroad. The study revealed that Organic Act on Political Parties 2007 has strict provisions on the political structure over the number of members and the number of branches involved within political parties system. Such operations shall be completed within one year; but under the existing laws the small parties are not able to participate with the bigger parties. The cities are capable of fulfilling small political party requirements but fail to become coalesced because the current laws won't allow them to be united as one. It is important to allow all independent political parties to join our current political structure. Board members can’t help the smaller parties to become a large organization under the existing Thai laws. Creating a new establishment that functions efficiently throughout all branches would be one solution to these legal problems between all political parties. With this new operation, individual political parties can participate with the bigger parties during elections. Until current political institutions change their system to accommodate public opinion, these current Thai laws will continue to be a problem with all political parties in Thailand.Keywords: coalesced, political party, sovereignty, elections
Procedia PDF Downloads 314