Search results for: privacy enforcement
201 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya
Authors: Samuel Mwangi, Josephine K. Mule
Abstract:
Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.Keywords: facial recognition, access control, technology, learning
Procedia PDF Downloads 125200 Gender Justice and Empowerment: A Study of Chhara Bootlegger Women of Ahmedabad
Authors: Neeta Khurana, Ritu Sharma
Abstract:
This paper is an impact assessment study of the rehabilitation work done for Chhara women in the rural precincts of Ahmedabad. The Chharas constitute a denotified tribe and live in abject poverty. The women of this community are infamous absconders of law and active bootleggers of locally made liquor. As part of a psychological study with a local NGO, the authors headed a training program aimed at rehabilitating and providing these women alternate modes of employment, thereby driving them away from a life of crime. The paper centers on the idea of women entrepreneurship and women empowerment. It notes the importance of handholding in a conflict situation. Most of the research on Chharas is either focused on victimising them for state-sponsored violence or mostly makes a plea on reconditioning them in the mainstream. Going against this trend, this paper which documents the study argues that making these poor women self-dependent is a panacea for their sluggish development. The alienation caused due to the demonisation of the community has made them abandon traditional modes of employment. This has further led the community astray into making illegal country liquor causing further damage to their reputation. Women are at the centre of this vicious circle facing much repression and ostracisation. The study conducted by the PDPU team was an attempt to change this dogmatic alienation of these poor women. It was found that with consistent support and reformist approach towards law, it is possible to drive these women away from a life of penury repression and crime. The aforementioned study uses empirical tools to verify this claim. Placed at the confluence of the sociology of gender and psychology, this paper is a good way to argue that law enforcement cannot be effective without sensitisation to the ground realities of conflict. The study conducted from which the paper borrows was a scientific survey focused on markers of gender and caste realities of the Chharas. The paper mentions various dynamics involved in the training program that paved the way for the successful employment of the women. In an attempt to explain its uniqueness, the paper also has a section on comparing similar social experiments.Keywords: employment, gender, handholding, rehabilitation
Procedia PDF Downloads 131199 Price Gouging in Time of Covid-19 Pandemic: When National Competition Agencies are Weak Institutions that Exacerbate the Effects of Exploitative Economic Behaviour
Authors: Cesar Leines
Abstract:
The social effects of the pandemic are significant and diverse, most of those effects have widened the gap of economic inequality. Without a doubt, each country faces difficulties associated with the strengths and weaknesses of its own institutions that can address these causes and consequences. Around the world, pricing practices that have no connection to production costs have been used extensively in numerous markets beyond those relating to the supply of essential goods and services, and although it is not unlawful to adjust pricing considering the increased demand of certain products, shortages and disruption of supply chains, illegitimate pricing practices may arise and these tend to transfer wealth from consumers to producers that affect the purchasing power of the former, making people worse off. High prices with no objective justification indicate a poor state of the competitive process in any market and the impact of those underlying competition issues leading to inefficiency is increased when national competition agencies are weak and ineffective in enforcing competition in law and policy. It has been observed that in those countries where competition authorities are perceived as weak or ineffective, price increases of a wide range of products and services were more significant during the pandemic than those price increases observed in countries where the perception of the effectiveness of the competition agency is high. When a perception is created of a highly effective competition authority, one which enforces competition law and its non-enforcement activities result in the fulfillment of its substantive functions of protecting competition as the means to create efficient markets, the price rise observed in markets under its jurisdiction is low. A case study focused on the effectiveness of the national competition agency in Mexico (COFECE) points to institutional weakness as one of the causes leading to excessive pricing. There are many factors that contribute to its low effectiveness and which, in turn, have led to a very significant price hike, potentiated by the pandemic. This paper contributes to the discussion of these factors and proposes different steps that overall help COFECE or any other competition agency to increase the perception of effectiveness for the benefit of the consumers.Keywords: agency effectiveness, competition, institutional weakness, price gouging
Procedia PDF Downloads 176198 An Analysis of the Role of Watchdog Civil Society Organisations in the Public Governance in Southern Africa: A study of South Africa and Zimbabwe
Authors: Julieth Gudo
Abstract:
The prevalence of corruption in African countries and persisting unsatisfactory distribution by governments of state resources among the citizens are clear indicators of a festering problem. Civil society organisations (CSOs) in Southern African countries, as citizen representatives, have been involved in challenging the ongoing corruption and poor governance in the public sector that have caused tensions between citizens and their governments. In doing so, civil society organisations demand accountability, transparency, and citizen participation in public governance. The problem is that CSOs’ role in challenging governments is not clearly defined in both law and literature. This uncertainty has resulted in an unsatisfying operating and legal environment for CSOs and a strained relationship between themselves and the governments. This paper examines civil society organisations' role in advancing good public governance in South Africa and Zimbabwe. The study will be conducted by means of a literature review and case studies. The state of public governance in Southern Africa will be discussed. The historical role of CSOs in the region of Southern Africa will be explored, followed by their role in public governance in contemporary South Africa and Zimbabwe. The relationship between state and civil society organisations will be examined. Furthermore, the legal frameworks that regulate and authoriseCSOs in their part in challenging poor governance in the public sector will be identified and discussed. Loopholes in such provisions will be identified, and measures that CSOs use to hold those responsible for poor governance accountable for their actions will be discussed, consequently closing the existing gap on the undefined role of CSOs in public governance in Southern Africa. The research demonstrates the need for an enabling operating environment through better cooperation, communication, and the relationship between governments and CSOs, the speedy and effective amendment of existing laws, and the introduction of legal provisions that give express authority to CSOs to challenge poor governance on the part of Southern African governments. Also critical is the enforcement of laws so that those responsible for poor governance and corruption in government are held accountable.Keywords: civil society organisations, public governance, southern Africa, South Africa, zimbabwe
Procedia PDF Downloads 117197 H. P. Grice’s Cooperative Principle in a Reproductive Health Clinic in Kenya
Authors: Melvin Ouma
Abstract:
Language is one of the most crucial tools in medical interaction. Its importance is as great today as it was many decades ago. Difficulty in openly discussing certain diseases and body parts is one of the challenges in language use in medical contexts. Guided by H. P. Grice’s Cooperative Principle, this paper explores the flouting of the cooperative principles in Swahili speaking medical setting. The paper examines how men flout the maxims using the Swahili language when reporting reproductive health problems to the doctor. The data used was gathered from a qualitative study carried out in a reproductive health clinic in a public facility in Nakuru County, Kenya. All the research protocols were observed by acquiring all the research permits. Respondents' ethical considerations of consent, privacy, and confidentiality were observed. The respondents recruited were men who visited the reproductive health clinic and voluntarily agreed to participate in the study without coercion or compensation. Participant observation was the key data collection tool, with the doctor and patient conversation digitally recorded. The researcher was allowed into the clinic in a socially acceptable role. Male patients flouted the maxims of quantity, quality, relation, and manner in order to describe their reproductive health problems without embarrassment using the Swahili language. The flouting was done through the discursive strategies of narration and circumlocution. Flouting of the maxims was acceptable to the doctor and patient due to the fact that sexual intercourse and private body parts are taboo topics and uncomfortable to talk about. The quality of health care received by the patient depended on the doctor’s patience when all the maxims were flouted. In the reproductive health clinic, flouting of maxims hindered communication and, at the same time, enhanced communication between the doctor and patient.Keywords: cooperative principle, doctor, men, reproductive health
Procedia PDF Downloads 105196 Tender Systems and Processes within the Mauritian Construction Industry: Investigating the Predominance of International Firms and the Lack of Absorptive Capacity in Local Firms
Authors: K. Appasamy, P. Paul
Abstract:
Mauritius, a developing small-island-state, is facing a recession which is having a considerable economic impact particularly on its construction sector. Further, the presence of foreign entities, both as companies and workers, within this sector is creating a very competitive environment for local firms. This study investigates the key drivers that allow foreign firms to participate in this sector, in particular looking at the international and local tender processes, and the capacity of local industry to participate. This study also looks at how the current set up may hinder the latter’s involvement. The methodology used included qualitative semi-structured interviews conducted with established foreign companies, local companies, and public bodies. Study findings indicate: there is an adequate availability of professional skills and expertise within the Mauritian construction industry but a lack of skilled labour especially at the operative level; projects awarded to foreign firms are either due to their uniqueness and hence lack of local knowledge, or due to foreign firms having lower tender bids; tendering systems and processes are weak, including monitoring and enforcement, which encourages corruption and favouritism; a high level of ignorance of this sector’s characteristics and opportunities exists amongst the local population; local entities are very profit oriented and have short term strategies that discourage long term investment in workforce training and development; but most importantly, stakeholders do not grasp the importance of encouraging youngsters to join this sector, they have no long term vision, and there is a lack of mutual involvement and collaboration between them. Although local industry is highly competent, qualified and experienced, the tendering and procurement systems in Mauritius are not conducive enough to allow for effective strategic planning and an equitable allocation of projects during an economic downturn so that the broadest spread of stakeholders’ benefit. It is of utmost importance that all sector and government entities collaborate to formulate strategies and reforms on tender processes and capacity building to ensure fairness and continuous growth of this sector in Mauritius.Keywords: construction industry, tender process, international firms, local capacity, Mauritius
Procedia PDF Downloads 319195 Regenerating Historic Buildings: Policy Gaps
Authors: Joseph Falzon, Margaret Nelson
Abstract:
Background: Policy makers at European Union (EU) and national levels address the re-use of historic buildings calling for sustainable practices and approaches. Implementation stages of policy are crucial so that EU and national strategic objectives for historic building sustainability are achieved. Governance remains one of the key objectives to ensure resource sustainability. Objective: The aim of the research was to critically examine policies for the regeneration and adaptive re-use of historic buildings in the EU and national level, and to analyse gaps between EU and national legislation and policies, taking Malta as a case study. The impact of policies on regeneration and re-use of historic buildings was also studied. Research Design: Six semi-structured interviews with stakeholders including architects, investors and community representatives informed the research. All interviews were audio recorded and transcribed in the English language. Thematic analysis utilising Atlas.ti was conducted for the semi-structured interviews. All phases of the study were governed by research ethics. Findings: Findings were grouped in main themes: resources, experiences and governance. Other key issues included identification of gaps in policies, key lessons and quality of regeneration. Abandonment of heritage buildings was discussed, for which main reasons had been attributed to governance related issues both from the policy making perspective as well as the attitudes of certain officials representing the authorities. The role of authorities, co-ordination between government entities, fairness in decision making, enforcement and management brought high criticism from stakeholders along with time factors due to the lengthy procedures taken by authorities. Policies presented an array from different perspectives of same stakeholder groups. Rather than policy, it is the interpretation of policy that presented certain gaps. Interpretations depend highly on the stakeholders putting forward certain arguments. All stakeholders acknowledged the value of heritage in regeneration. Conclusion: Active stakeholder involvement is essential in policy framework development. Research informed policies and streamlining of policies are necessary. National authorities need to shift from a segmented approach to a holistic approach.Keywords: adaptive re-use, historic buildings, policy, sustainable
Procedia PDF Downloads 393194 Role of Vigilante in Crime Control in Bodija Market
Authors: Obadiah Nwabueze
Abstract:
Bodija market is classified as Central Business District (CBD) of Ibadan North Local Government Area of Oyo State (Nigeria) because of socio economic activities, so Crime is a peculiar social issue that causes insecurity. The law enforcement agencies tasked with crime prevention and control such as the Nigerian Police have insufficient manpower, and a resultant effect is the emergence of Vigilante groups as citizen’s response to crime control and prevention (self-help). The research design adopted for this study is a case study design exploring Vigilante activities in Bodija Market. The study utilizes both quantitative and qualitative approach, sources of data includes primary and secondary sources. A sample of 127 respondents randomly picked from the 4 sections of Bodija Market through questionnaire, comprising of 50 male and 77 females which alienates issues of gender bias in addition to the 4 in-depth interview, making a total of 131 respondents. Statistical package for Social Sciences (SPSS) was used. The descriptive statistics of simple frequency, percentage, charts and graphs were computed for the analysis. Finding in the study shows that the market vigilante is able to deter and disrupt criminal activities through strategic spiritual intelligence (SSI), use of charm and juju, physical presence in strategic locations vulnerable to crime occurrence. Findings in the study also show that vigilantes collaborate with the police by assisting them in surveillance, tracking down criminals, identifying black spots, acting as informants to the police, arrest and handover criminal to police. Their challenges include poor equipment, motivation, unhealthy rivalry between the vigilante and the police. The study recommends that the government should support vigilantes with logistics and training, including patrol vehicle and radio communication. The study also recommends the integration of the informal mechanism (juju and charm) of crime detection and prevention into the formal policing strategy, an office should be created in the force commands for use of SSI.Keywords: central business district, CBD, charm, Juju, strategic spiritual intelligence, SSI
Procedia PDF Downloads 249193 Factors Affecting M-Government Deployment and Adoption
Authors: Saif Obaid Alkaabi, Nabil Ayad
Abstract:
Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.Keywords: e-government, m-government, system dependability, system security, trust
Procedia PDF Downloads 381192 Criminal Laws Associated with Cyber-Medicine and Telemedicine in Current Law Systems in the World
Authors: Shahryar Eslamitabar
Abstract:
Currently, the internet plays an important role in the various scientific, commercial and service practices. Thanks to information and communication technology, the healthcare industry via the internet, generally known as cyber-medicine, can offer professional medical service in a wider geographical area. Having some appealing benefits such as convenience in offering healthcare services, improved accessibility to the services, enhanced information exchange, cost-effectiveness, time-saving, etc. Tele-health has increasingly developed innovative models of healthcare delivery. However, it presents many potential hazards to cyber-patients, inherent in the use of the system. First, there are legal issues associated with the communication and transfer of information on the internet. These include licensure, malpractice, liabilities and jurisdictions as well as privacy, confidentiality and security of personal data as the most important challenge brought about by this system. Additional items of concern are technological and ethical. Although, there are some rules to deal with pitfalls associated with cyber-medicine practices in the USA and some European countries, yet for all developments, it is being practiced in a legal vacuum in many countries. In addition to the domestic legislations to deal with potential problems arisen from the system, it is also imperative that some international or regional agreement should be developed to achieve the harmonization of laws among countries and states. This article discusses some implications posed by the practice of cyber-medicine in the healthcare system according to the experience of some developed countries using a comparative study of laws. It will also review the status of tele-health laws in Iran. Finally, it is intended to pave the way to outline a plan for countries like Iran, with newly-established judicial system for health laws, to develop appropriate regulations through providing some recommendations.Keywords: tele-health, cyber-medicine, telemedicine, criminal laws, legislations, time-saving
Procedia PDF Downloads 661191 Institutional Quality and Tax Compliance: A Cross-Country Regression Evidence
Authors: Debi Konukcu Onal, Tarkan Cavusoglu
Abstract:
In modern societies, the costs of public goods and services are shared through taxes paid by citizens. However, taxation has always been a frictional issue, as tax obligations are perceived to be a financial burden for taxpayers rather than being merit that fulfills the redistribution, regulation and stabilization functions of the welfare state. The tax compliance literature evolves into discussing why people still pay taxes in systems with low costs of legal enforcement. Related empirical and theoretical works show that a wide range of socially oriented behavioral factors can stimulate voluntary compliance and subversive effects as well. These behavioral motivations are argued to be driven by self-enforcing rules of informal institutions, either independently or through interactions with legal orders set by formal institutions. The main focus of this study is to investigate empirically whether institutional particularities have a significant role in explaining the cross-country differences in the tax noncompliance levels. A part of the controversy about the driving forces behind tax noncompliance may be attributed to the lack of empirical evidence. Thus, this study aims to fill this gap through regression estimates, which help to trace the link between institutional quality and noncompliance on a cross-country basis. Tax evasion estimates of Buehn and Schneider is used as the proxy measure for the tax noncompliance levels. Institutional quality is quantified by three different indicators (percentile ranks of Worldwide Governance Indicators, ratings of the International Country Risk Guide, and the country ratings of the Freedom in the World). Robust Least Squares and Threshold Regression estimates based on the sample of the Organization for Economic Co-operation and Development (OECD) countries imply that tax compliance increases with institutional quality. Moreover, a threshold-based asymmetry is detected in the effect of institutional quality on tax noncompliance. That is, the negative effects of tax burdens on compliance are found to be more pronounced in countries with institutional quality below a certain threshold. These findings are robust to all alternative indicators of institutional quality, supporting the significant interaction of societal values with the individual taxpayer decisions.Keywords: institutional quality, OECD economies, tax compliance, tax evasion
Procedia PDF Downloads 134190 Asylum Seekers' Legal Limbo under the Migrant Protection Protocols: Implications from a US-Mexico Border Project
Authors: Tania M. Guerrero, Ileana Cortes Santiago
Abstract:
Estamos Unidos Asylum Project has served more than 2,000 asylum seekers and migrants who are under the Migrant Protection Protocols (MPP) policy in Ciudad Juarez, Mexico. The U.S. policy, implemented in January 2019, has stripped asylum seekers of their rights—forcing people fleeing violence and discrimination to wait in similar or worse conditions from which they fled and navigate their entire asylum process in a different country. Several civil rights groups, including the American Civil Liberties Union (ACLU), challenged MPP in U.S. federal courts in February 2019, arguing a violation of international U.S. obligations towards refugees and asylum-seekers under the 1951 Refugee Convention and the Refugee Act of 1980 in regards to the non-refoulement principle. MPP has influenced Mexico's policies, enforcement, and prioritization of the presence of asylum seekers and migrants; it has also altered the way international non-governmental organizations work at the Mexican Northern border. Estamos Unidos is a project situated in a logistical conundrum, as it provides needed legal services to a population in a legal and humanitarian void, i.e., a liminal space. The liminal space occupied by asylum seekers living under MPP is one that, in today's world, should not be overlooked; it dilutes asylum law and U.S. commitments to international protections. This paper provides analysis of and broader implications from a project whose main goal is to uphold the protections of asylum seekers and international refugee law. The authors identified and analyzed four critical points based on field work conducted since August 2019: (1) strategic coalition building with international, local, and national organizations; (2) brokering between domestic and international contexts and critical legal constraints; (3) flexibility to sudden policy changes and the diverse needs of the multiethnic groups of migrants and asylum seekers served by the project; and (4) the complexity of providing legal assistance to asylum seekers who are survivors of trauma. The authors concur with scholarship when highlighting the erosion of protections of asylum seekers and migrants as a dangerous and unjust global phenomenon.Keywords: asylum, human rights, migrant protection protocols, refugees law
Procedia PDF Downloads 133189 Case Study of Sexual Violence Victim Assessment in Semarang Regency
Authors: Sujana T, Kurniasari MD, Ayakeding AM
Abstract:
Background: Sexual violence is one of the violence with high incidence in Indonesia. Purpose: This research aims to describe the implementation of sexual violence victim assessment in Semarang Regency. Method: This research is a qualitative research with embeded single case study design. Data is analized with two units of analysis. The first unit of analysis is victim’s examiner with minimum one year of work experience. Semi-structured interview method is used to obtain the data. The second unit of analysis is document related. The data is taken by observing the pathway and description of every document and how it supported each implementation of assessment. Results: This study is resulted with three themes, which are: The first theme is assessments of sexual violence in Semarang regency has been standardized. The laws of the Republic of Indonesia have regulated the handling of victims of sexual violence in outline. Victims of sexual violence can be dealt with by the police, the Integrated Service Center for Women and Children Empowerment and the Regional General Hospital. Each examination site has different operational procedures standards for dealing with victims of sexual violence. Cooperation with family and witnesses is also required in the review process to obtain accurate results and evidence; The second idea that resulted from this study is there are inhibits factors in the assessments process. Victims sometimes feel embarrassed and reluctant to recount the chronological events during reporting. The examining officer should be able to approach and build a trust to convince the victim to be able to cooperate. The third theme is there are other things to consider in the process of assessing victims of sexual violence. Ensuring implementation in accordance with applicable operational procedures standards, providing exclusive examination rooms, counseling and safeguarding the privacy of victims are important to be considered in the assessment.Keywords: assessment, case study, Semarang regency, sexual violence
Procedia PDF Downloads 140188 Conceptualizing Clashing Values in the Field of Media Ethics
Authors: Saadia Izzeldin Malik
Abstract:
Lack of ethics is the crisis of the 21-century. Today’s global world is filled with economic, political, environmental, media/communication, and social crises that all generated by the eroding fabric of ethics and moral values that guide human’s decisions in all aspects of live. Our global world is guided by liberal western democratic principles and liberal capitalist economic principles that define and reinforce each other. In economic terms, capitalism has turned world economic systems into one market place of ideas and products controlled by big multinational corporations that not only determine the conditions and terms of commodity production and commodity exchange between countries, but also transform the political economy of media systems around the globe. The citizen (read the consumer) today is the target of persuasion by all types of media at a time when her/his interests should be, ethically and in principle, the basic significant factor in the selection of media content. It is very important in this juncture of clashing media values –professional and commercial- and wide spread ethical lapses of media organizations and media professionals to think of a perspective to theorize these conflicting values within a broader framework of media ethics. Thus, the aim of this paper is to, epistemologically, bring to the center a perspective on media ethics as a basis for reconciliation of clashing values of the media. The paper focuses on conflicting ethical values in current media debate; namely ownership of media vs. press freedom, individual right for privacy vs. public right to know, and global western consumerism values vs. media values. The paper concludes that a framework to reconcile conflicting values of media ethics should focus on the “individual” journalist and his/her moral development as well as focus on maintaining ethical principles of the media as an institution with a primary social responsibility for the “public” it serves.Keywords: ethics, media, journalism, social responsibility, conflicting values, global
Procedia PDF Downloads 491187 Transforming Data into Knowledge: Mathematical and Statistical Innovations in Data Analytics
Authors: Zahid Ullah, Atlas Khan
Abstract:
The rapid growth of data in various domains has created a pressing need for effective methods to transform this data into meaningful knowledge. In this era of big data, mathematical and statistical innovations play a crucial role in unlocking insights and facilitating informed decision-making in data analytics. This abstract aims to explore the transformative potential of these innovations and their impact on converting raw data into actionable knowledge. Drawing upon a comprehensive review of existing literature, this research investigates the cutting-edge mathematical and statistical techniques that enable the conversion of data into knowledge. By evaluating their underlying principles, strengths, and limitations, we aim to identify the most promising innovations in data analytics. To demonstrate the practical applications of these innovations, real-world datasets will be utilized through case studies or simulations. This empirical approach will showcase how mathematical and statistical innovations can extract patterns, trends, and insights from complex data, enabling evidence-based decision-making across diverse domains. Furthermore, a comparative analysis will be conducted to assess the performance, scalability, interpretability, and adaptability of different innovations. By benchmarking against established techniques, we aim to validate the effectiveness and superiority of the proposed mathematical and statistical innovations in data analytics. Ethical considerations surrounding data analytics, such as privacy, security, bias, and fairness, will be addressed throughout the research. Guidelines and best practices will be developed to ensure the responsible and ethical use of mathematical and statistical innovations in data analytics. The expected contributions of this research include advancements in mathematical and statistical sciences, improved data analysis techniques, enhanced decision-making processes, and practical implications for industries and policymakers. The outcomes will guide the adoption and implementation of mathematical and statistical innovations, empowering stakeholders to transform data into actionable knowledge and drive meaningful outcomes.Keywords: data analytics, mathematical innovations, knowledge extraction, decision-making
Procedia PDF Downloads 75186 Enhancing Cooperation Between LEAs and Citizens: The INSPEC2T Approach
Authors: George Leventakis, George Kokkinis, Nikos Moustakidis, George Papalexandratos, Ioanna Vasiliadou
Abstract:
Enhancing the feeling of public safety and crime prevention are tasks customarily assigned to the Police. Police departments have, however, recognized that traditional ways of policing methods are becoming obsolete; Community Policing (CP) philosophy; however, when applied appropriately, leads to seamless collaboration between various stakeholders like the Police, NGOs and the general public and provides the opportunity to identify risks, assist in solving problems of crime, disorder, safety and crucially contribute to improving the quality of life for everyone in a community. Social Media, on the other hand, due to its high level of infiltration in modern life, constitutes a powerful mechanism which offers additional and direct communication channels to reach individuals or communities. These channels can be utilized to improve the citizens’ perception of the Police and to capture individual and community needs, when their feedback is taken into account by Law Enforcement Agencies (LEAs) in a structured and coordinated manner. This paper presents research conducted under INSPEC2T (Inspiring CitizeNS Participation for Enhanced Community PoliCing AcTions), a project funded by the European Commission’s research agenda to bridge the gap between CP as a philosophy and as an organizational strategy, capitalizing on the use of Social Media. The project aims to increase transparency, trust, police accountability, and the role of civil society. It aspires to build strong, trusting relationships between LEAs and the public, supporting two-way, contemporary communication while at the same time respecting anonymity of all affected parties. Results presented herein summarize the outcomes of four online multilingual surveys, focus group interviews, desktop research and interviews with experts in the field of CP practices. The above research activities were conducted in various EU countries aiming to capture requirements of end users from diverse backgrounds (social, cultural, legal and ethical) and determine public expectations regarding CP, community safety and crime prevention.Keywords: community partnerships, next generation community policing, social media, public safety
Procedia PDF Downloads 346185 Managing Maritime Security in the Mediterranean Sea: The Roles of the EU in Tackling Irregular Migration
Authors: Shazwanis Shukri
Abstract:
The Mediterranean Sea, at the crossroads of three continents has always been the focus of pan-European and worldwide attention. Over the past decade, the Mediterranean Sea has become a hotbed for irregular migration particularly from the African continent toward the Europe. Among the major transit routes in the Mediterranean Sea include the Strait of Gibraltar, Canary Island and island of Lampedusa. In recent years, Mediterranean Sea has witnessed significant numbers of accidents and shipwrecks involving the irregular migrants and refugees trying to reach Europe via the sea. The shipwrecks and traffickers exploitation of migrants draw most of the attention particularly for the European Union (EU). This incident has been a wakeup call for the EU and become the top political agenda in the EU policy to tackle irregular migration and human smuggling at sea. EU has repeatedly addressed irregular migration as one of the threats the EU and its citizens may be confronted with and therefore immediate measures are crucial to tackle the crisis. In light of this, various initiatives have been adopted by the EU to strengthen external border control and restrict access to irregular migrants, notably through the enforcement of Frontex and Eunavfor Med. This paper analyses current development of counter-migration operations by the EU in response to migration crisis in the Mediterranean Sea. The analysis is threefold. First, this study examines the patterns and trends of irregular migration’s movements from recent perspective. Second, this study concentrates on the evolution of the EU operations that are in place in the Mediterranean Sea, notably by Frontex and Eunavfor Med to curb the influx of irregular migrants to the European countries, including, among others, Greece and Italy. Third, this study investigates the EU approaches to fight against the proliferation of human trafficking networks at sea. This study is essential to determine the roles of the EU in tackling migration crisis and human trafficking in the Mediterranean Sea and the effectiveness of their counter-migration operations to reduce the number of irregular migrants travelling via the sea. Elite interviews and document analysis were used as a methodology in this study. The study discovers that the EU operations have successfully contributed to reduce the numbers of irregular migrant’s arrival to Europe. The study also shows that the operations were effective to disrupt smugglers business models particularly from Libya. This study provides essential understanding about the roles of the EU not limited to tackle the migration crisis and disrupt trafficking networks, but also pledged to prevent further loss of lives at sea.Keywords: European union, frontex, irregular migration, Mediterranean sea
Procedia PDF Downloads 328184 Save Lives: The Application of Geolocation-Awareness Service in Iranian Pre-hospital EMS Information Management System
Authors: Somayeh Abedian, Pirhossein Kolivand, Hamid Reza Lornejad, Amin Karampour, Ebrahim Keshavarz Safari
Abstract:
For emergency and relief service providers such as pre-hospital emergencies, quick arrival at the scene of an accident or any EMS mission is one of the most important requirements of effective service delivery. Response time (the interval between the time of the call and the time of arrival on scene) is a critical factor in determining the quality of pre-hospital Emergency Medical Services (EMS). This is especially important for heart attack, stroke, or accident patients. Location-based e-services can be broadly defined as any service that provides information pertinent to the current location of an active mobile handset or precise address of landline phone call at a specific time window, regardless of the underlying delivery technology used to convey the information. According to research, one of the effective methods of meeting this goal is determining the location of the caller via the cooperation of landline and mobile phone operators in the country. The follow-up of the Communications Regulatory Authority (CRA) organization has resulted in the receipt of two separate secured electronic web services. Thus, to ensure human privacy, a secure technical architecture was required for launching the services in the pre-hospital EMS information management system. In addition, to quicken medics’ arrival at the patient's bedside, rescue vehicles should make use of an intelligent transportation system to estimate road traffic using a GPS-based mobile navigation system independent of the Internet. This paper seeks to illustrate the architecture of the practical national model used by the Iranian EMS organization.Keywords: response time, geographic location inquiry service (GLIS), location-based service (LBS), emergency medical services information system (EMSIS)
Procedia PDF Downloads 170183 Safeguarding the Construction Industry: Interrogating and Mitigating Emerging Risks from AI in Construction
Authors: Abdelrhman Elagez, Rolla Monib
Abstract:
This empirical study investigates the observed risks associated with adopting Artificial Intelligence (AI) technologies in the construction industry and proposes potential mitigation strategies. While AI has transformed several industries, the construction industry is slowly adopting advanced technologies like AI, introducing new risks that lack critical analysis in the current literature. A comprehensive literature review identified a research gap, highlighting the lack of critical analysis of risks and the need for a framework to measure and mitigate the risks of AI implementation in the construction industry. Consequently, an online survey was conducted with 24 project managers and construction professionals, possessing experience ranging from 1 to 30 years (with an average of 6.38 years), to gather industry perspectives and concerns relating to AI integration. The survey results yielded several significant findings. Firstly, respondents exhibited a moderate level of familiarity (66.67%) with AI technologies, while the industry's readiness for AI deployment and current usage rates remained low at 2.72 out of 5. Secondly, the top-ranked barriers to AI adoption were identified as lack of awareness, insufficient knowledge and skills, data quality concerns, high implementation costs, absence of prior case studies, and the uncertainty of outcomes. Thirdly, the most significant risks associated with AI use in construction were perceived to be a lack of human control (decision-making), accountability, algorithm bias, data security/privacy, and lack of legislation and regulations. Additionally, the participants acknowledged the value of factors such as education, training, organizational support, and communication in facilitating AI integration within the industry. These findings emphasize the necessity for tailored risk assessment frameworks, guidelines, and governance principles to address the identified risks and promote the responsible adoption of AI technologies in the construction sector.Keywords: risk management, construction, artificial intelligence, technology
Procedia PDF Downloads 98182 Characterization of Kevlar 29 for Multifunction Applications
Authors: Doaa H. Elgohary, Dina M. Hamoda, S. Yahia
Abstract:
Technical textiles refer to textile materials that are engineered and designed to have specific functionalities and performance characteristics beyond their traditional use as apparel or upholstery fabrics. These textiles are usually developed for their unique properties such as strength, durability, flame retardancy, chemical resistance, waterproofing, insulation and other special properties. The development and use of technical textiles are constantly evolving, driven by advances in materials science, manufacturing technologies and the demand for innovative solutions in various industries. Kevlar 29 is a type of aramid fiber developed by DuPont. It is a high-performance material known for its exceptional strength and resistance to impact, abrasion, and heat. Kevlar 29 belongs to the Kevlar family, which includes different types of aramid fibers. Kevlar 29 is primarily used in applications that require strength and durability, such as ballistic protection, body armor, and body armor for military and law enforcement personnel. It is also used in the aerospace and automotive industries to reinforce composite materials, as well as in various industrial applications. Two different Kevlar samples were used coated with cooper lithium silicate (CLS); ten different mechanical and physical properties (weight, thickness, tensile strength, elongation, stiffness, air permeability, puncture resistance, thermal conductivity, stiffness, and spray test) were conducted to approve its functional performance efficiency. The influence of different mechanical properties was statistically analyzed using an independent t-test with a significant difference at P-value = 0.05. The radar plot was calculated and evaluated to determine the best-performing samples. The results of the independent t-test observed that all variables were significantly affected by yarn counts except water permeability, which has no significant effect. All properties were evaluated for samples 1 and 2, a radar chart was used to determine the best attitude for samples. The radar chart area was calculated, which shows that sample 1 recorded the best performance, followed by sample 2. The surface morphology of all samples and the coating materials was determined using a scanning electron microscope (SEM), also Fourier Transform Infrared Spectroscopy Measurement for the two samples.Keywords: cooper lithium silicate, independent t-test, kevlar, technical textiles.
Procedia PDF Downloads 80181 Extent of Knowledge, Preparedness and Perception on Telemedicine among Family Medicine Resident Physicians in Different Training Institutions in Cebu City, PH during COVID-19 Pandemic
Authors: Kristine Joy Y. Sumanga, Clarissa Mae D. Derecho
Abstract:
Telemedicine is providing health care services using electronic means at a distance, including the diagnosis, treatment, and prevention of diseases as well as the research and evaluation and education of health care providers. The role of telemedicine in this time of the COVID-19 pandemic is vital, especially in the practice of medicine. General Objective: To determine the extent of knowledge, preparedness and perception of telemedicine among Family Medicine Resident Physicians in different training institutions in Cebu City during the Coronavirus Disease 19 pandemic. Methods: A descriptive, cross-sectional survey research study was conducted in four hospital training institutions in Cebu City. A total of 41 respondents gave their consent and were given the online survey questionnaire pertaining to the extent of knowledge, preparedness and perceptions on telemedicine, including respondents’ demographic data and problems encountered in Telemedicine. Results: Out of the 41 respondents, 56.10% were young adults (26 to 30 years old), mostly females (70.73%), single (68.29%), first-year residents (43.90%), employed at a government hospital (70.73%) and are in the traditional residency pathway (82.93%). On relevant experience, 82.93% experienced telemedicine during residency, with 100% on follow-up consultations, and 95% were consulted due to infections. Respondents’ extent of knowledge was average, while the extent of preparedness and perception were great. Problems with low connectivity (80.48%) were noted by most of the respondents. Conclusion: Resident physicians moderately understood the information about telemedicine but with a great extent of preparedness and perception. They are always prepared for telemedicine modality because they are fully aware of its existence and need in the delivery of health care services among their patients at the time of the pandemic. Challenges to low connectivity and handling patients’ data privacy were the major concerns met by the resident physicians in the use of telemedicine.Keywords: telemedicine, knowledge, preparedness, perception, family medicine, residents, COVID 19
Procedia PDF Downloads 78180 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 67179 Exploring the Risks and Vulnerabilities of Child Trafficking in West Java, Indonesia
Authors: B. Rusyidi, D. Mariana
Abstract:
Although reforms in trafficking regulations have taken place since 2007, Indonesia is still struggling to fight child trafficking. This study aimed to identify and assess risk factors and vulnerabilities in the life of trafficked children prior to, during, and after being trafficked in order to inform the child protection system and its policies. The study was qualitative and utilized in-depth interviews to collect data. Data were gathered in 2014 and 2015 from 15 trafficked and sexually exploited girls aged 14 to 17 years originating from West Java. Social workers, safe home personnel and parents were also included as informants. Data analysis was guided by the ecological perspective and theme analyses. The study found that risks and vulnerabilities of the victims were associated with conditions at various levels of the environment. At the micro level, risk factors and vulnerabilities included young age, family conflict/violence, involvement with the “wrong” circle of friends/peers, family poverty, lack of social and economic support for the victim’s family, and psychological damages due to trafficking experiences. At the mezzo level, the lack of structured activities after school, economic inequality, stigma towards victims, lack of services for victims, and minimum public education on human trafficking were among the community hazards that increased the vulnerability and risks. Gender inequality, consumerism, the view of children as assets, corruption, weak law enforcement, the lack of institutional support, and community-wide ignorance regarding trafficking were found as factors that increased risks and vulnerabilities at the macro level. The findings from the study underline the necessity to reduce risk factors and promote protective factors at the individual, family, community and societal levels. Shifting the current focus from tertiary to primary/prevention policies and improving institutional efforts are pressing needs in the context of reducing child trafficking in Indonesia. The roles of human service providers including social work also should be promoted.Keywords: child trafficking, child sexual exploitation, ecological perspective, risks and vulnerabilities
Procedia PDF Downloads 277178 Hybrid Strategies of Crisis Intervention for Sexualized Violence Using Digital Media
Authors: Katharina Kargel, Frederic Vobbe
Abstract:
Sexualized violence against children and adolescents using digital media poses particular challenges for practitioners with a focus on crisis intervention (social work, psychotherapy, law enforcement). The technical delimitation of violence increases the burden on those affected and increases the complexity of interdisciplinary cooperation. Urgently needed recommendations for practical action do not yet exist in Germany. Funded by the Federal Ministry of Education and Research, these recommendations for action are being developed in the HUMAN project together with science and practice. The presentation introduces the participatory approach of the HUMAN project. We discuss the application-oriented, casuistic approach of the project and present its results using the example of concrete case-based recommendations for Action. The participants will be presented with concrete prototypical case studies from the project, which will be used to illustrate quality criteria for crisis intervention in cases of sexualized violence using digital media. On the basis of case analyses, focus group interviews and interviews with victims of violence, we present the six central challenges of sexualized violence with the use of digital media, namely: • Diffusion (Ambiguities regarding the extent and significance of violence) , • Transcendence (Space and time independence of the dynamics of violence, omnipresence), • omnipresent anxiety (considering diffusion and transcendence), • being haunted (repeated confrontation with digital memories of violence or the perpetrator), • disparity (conflicts of interpretative power between those affected and the social environment) • simultaneity (of all other factors). We point out generalizable principles with which these challenges can be dealt with professionally. Dealing professionally with sexualized violence using digital media requires a stronger networking of professional actors. A clear distinction must be made between their own mission and the mission of the network partners. Those affected by violence must be shown options for crisis intervention in the context of the aid networks. The different competencies and the professional mission of the offers of help are to be made transparent. The necessity of technical possibilities for deleting abuse images beyond criminal prosecution will be discussed. Those affected are stabilized by multimodal strategies such as a combination of rational emotive therapy, legal support and technical assistance.Keywords: sexualized violence, intervention, digital media, children and youth
Procedia PDF Downloads 233177 Report of Soundings in Tappeh Shahrestan in Order to Determine Its Field and Propose Privacy, Documenting and Systematic Review of Geophysical Studies
Authors: Reza Mehrafarin, Nafiseh Mirshekari, Mahyar Mehrafarin
Abstract:
In 25 km southeast of Zabul (center of Sistan, in the east of Iran), a large hill can be seen. This hill, which is located next to the bend of the Sistan river, is known as the Tappeh Shahrestan. The length of the Tappeh Shahrestan is 1350 meters, its width is 360 meters, and its height is 20 meters, which in total reaches to 48 hectares. The capital of Sistan province was Ram Shahrestan in the Sassanid period, according to Iranian historical texts and Sassanid Pahlavi traditions. The city was abandoned because the nearby river dried up. Then another capital was built in Sistan called Zarang. But due to the long passage of time since the destruction of the city, its real location was forgotten and and some archaeologists have suggested different areas as the main location of the Ram Shahrestan. In 2018, the first archaeological field activities took place on and around the hillin order to answer this question: was Tappe Shahristan the same as Ram Shahristan, the capital of Sistan, during the Sassanid period? In order to answer this question, archaeological field activities were carried out on and around the hill. The field activities of the first season included the followings: 1- Preparation of hill topography and plan metric 3-Archaeogeophysics studies 3-Methodical study of archeology 4-Determining the range of the hill by soundings5-Documentation of the hill 6-Classification, typology, and comparison of pottery typology. The results of archaeological field activities in the first phase of Tappeh Shahrestan showed that this ancient site was the same city of Ram Shahrestan, the capital of Sistan, during the Sassanid period. The beginning of settlement in this city was the third century BC and the time of leaving was the end of the third century AD. The most important factors in the creation of the city was the abundant water of the Sistan River and its convenient location, and the most important reason for the abandonment of the city was the Sistan River, whose water completely dried up.Keywords: archaeological surveys, archaeological soundings, ram shahrestan, sistan, tappeh shahrestan
Procedia PDF Downloads 110176 Mobility Management for Pedestrian Accident Predictability and Mitigation Strategies Using Multiple
Authors: Oscar Norman Nekesa, Yoshitaka Kajita
Abstract:
Tom Mboya Street is a vital urban corridor within the spectrum of Nairobi city, it experiences high volumes of pedestrian and vehicular traffic. Despite past intervention measures to lessen this catastrophe, rates have remained high. This highlights significant safety concerns that need urgent attention. This study investigates the correlation and pedestrian accident predictability with significant independent variables using multiple linear regression to model to develop effective mobility management strategies for accident mitigation. The methodology involves collecting and analyzing data on pedestrian accidents and various related independent variables. Data sources include the National Transport and Safety Authority (NTSA), Kenya National Bureau of Statistics, and Nairobi City County records, covering five years. This study aims to investigate that traffic volumes (pedestrian and vehicle), Vehicular speed, human factors, illegal parking, policy issues, urban-land use, built environment, traffic signals conditions, inadequate lighting, and insufficient traffic control measures significantly have predictability with the rate of pedestrian accidents. Explanatory variables related to road design and geometry are significant in predictor models for the Tom Mboya Road link but less influential in junction along the 5 km stretch road models. The most impactful variable across all models was vehicular traffic flow. The study recommends infrastructural improvements, enhanced enforcement, and public awareness campaigns to reduce accidents and improve urban mobility. These insights can inform policy-making and urban planning to enhance pedestrian safety along the dense packed Tom Mboya Street and similar urban settings. The findings will inform evidence-based interventions to enhance pedestrian safety and improve urban mobility.Keywords: multiple linear regression, urban mobility, traffic management, Nairobi, Tom Mboya street, infrastructure conditions., pedestrian safety, correlation and prediction
Procedia PDF Downloads 25175 Balance of Natural Resources to Manage Land Use Changes in Subosukawonosraten Area
Authors: Sri E. Wati, D. Roswidyatmoko, N. Maslahatun, Gunawan, Andhika B. Taji
Abstract:
Natural resource is the main sources to fulfill human needs. Its utilization must consider not only human prosperity but also sustainability. Balance of natural resources is a tool to manage natural wealth and to control land use change. This tool is needed to organize land use planning as stated on spatial plan in a certain region. Balance of natural resources can be calculated by comparing two-series of natural resource data obtained at different year. In this case, four years data period of land and forest were used (2010 and 2014). Land use data were acquired through satellite image interpretation and field checking. By means of GIS analysis, its result was then assessed with land use plan. It is intended to evaluate whether existing land use is suitable with land use plan. If it is improper, what kind of efforts and policies must be done to overcome the situation. Subosukawonosraten is rapid developed areas in Central Java Province. This region consists of seven regencies/cities which are Sukoharjo Regency, Boyolali Regency, Surakarta City, Karanganyar Regency, Wonogiri Regency, Sragen Regency, and Klaten Regency. This region is regarding to several former areas under Karasidenan Surakarta and their location is adjacent to Surakarta. Balance of forest resources show that width of forest area is not significantly changed. Some land uses within the area are slightly changed. Some rice field areas are converted into settlement (0.03%) whereas water bodies become vacant areas (0.09%). On the other hand, balance of land resources state that there are many land use changes in this region. Width area of rice field decreases 428 hectares and more than 50% of them have been transformed into settlement area and 11.21% is converted into buildings such as factories, hotels, and other infrastructures. It occurs mostly in Sragen, Sukoharjo, and Karanganyar Regency. The results illustrate that land use change in this region is mostly influenced by increasing of population number. Some agricultural lands have been converted into built-up area since demand of settlement, industrial area, and other infrastructures also increases. Unfortunately, recent utilization of more than a half of total area is not appropriate with land use plan declared in spatial planning document. It means, local government shall develop a strict regulation and law enforcement related to any violation in land use management.Keywords: balance, forest, land, spatial plan
Procedia PDF Downloads 319174 Walls against Legal Identity: A Qualitative Study on Children of Refugees without Birth Registration in Malaysia
Authors: Rodziana M. Razali, Tamara J. Duraisingham
Abstract:
Malaysia is not a signatory to the 1951 Refugee Convention and its 1967 Protocol despite receiving the largest share of refugee inflows in Southeast Asia aside from Thailand. In Peninsular Malaysia, the majority of refugees and asylum seekers are from Myanmar, with Rohingya refugees recording the highest number compared to all other ethnicities. In the eastern state of Sabah, the presence of refugees who have long established themselves in the state is connected to those who escaped military persecution in southern Philippines in the 1970’s and 1980’s. A combination of legal and non-legal factors has created and sustained an adverse atmosphere of deprivation of legal identity for children of migrants including refugees born in Malaysia. This paper aims to qualitatively analyse the barriers to birth registration as the cornerstone of every person’s legal identity for children of refugees born in this country, together with the associated human rights implications. Data obtained through semi-structured interviews with refugees in Kota Kinabalu, Sabah and Rohingya refugees in Peninsular Malaysia shall be studied alongside secondary sources. Results show that births out of medical facilities, suspension of birth records, illiteracy, lack of awareness on the importance and procedures of birth registration, inability to meet documentary requirements, as well as fear of immigration enforcement, are the key factors hindering birth registration. These challenges exist against the backdrop of restrictive integration policy to avoid destabilising demographic and racial balance, political sentiment stirring xenophobic prejudices, as well as other economic and national security considerations. With no proof of their legal identity, the affected children grow up in a legal limbo, facing multiple human rights violations across generations. This research concludes that the country’s framework and practice concerning birth registration is in need of serious reform and improvement to reflect equality and universality of access to its birth registration system. Such would contribute significantly towards meeting its commitments to the post-2015 sustainable development agenda that pledges to 'Leave no one behind', as well as its recently announced National Human Rights Action Plan.Keywords: birth registration, children, Malaysia, refugees
Procedia PDF Downloads 171173 The Implementation of Inclusive Education in Collaboration between Teachers of Special Education Classes and Regular Classes in a Preschool
Authors: Chiou-Shiue Ko
Abstract:
As is explicitly stipulated in Article 7 of the Enforcement Rules of the Special Education Act as amended in 1998, "in principle, children with disabilities should be integrated with normal children for preschool education". Since then, all cities and counties have been committed to promoting preschool inclusive education. The Education Department, New Taipei City Government, has been actively recruiting advisory groups of professors to assist in the implementation of inclusive education in preschools since 2001. Since 2011, the author of this study has been guiding Preschool Rainbow to implement inclusive education. Through field observations, meetings, and teaching demonstration seminars, this study explored the process of how inclusive education has been successfully implemented in collaboration with teachers of special education classes and regular classes in Preschool Rainbow. The implementation phases for inclusive education in a single academic year include the following: 1) Preparatory stage. Prior to implementation, teachers in special education and regular classes discuss ways of conducting inclusive education and organize reading clubs to read books related to curriculum modifications that integrate the eight education strategies, early treatment and education, and early childhood education programs to enhance their capacity to implement and compose teaching plans for inclusive education. In addition to the general objectives of inclusive education, the objective of inclusive education for special children is also embedded into the Individualized Education Program (IEP). 2) Implementation stage. Initially, a promotional program for special education is implemented for the children to allow all the children in the preschool to understand their own special qualities and those of special children. After the implementation of three weeks of reverse inclusion, the children in the special education classes are put into groups and enter the regular classes twice a week to implement adjustments to their inclusion in the learning area and the curriculum. In 2013, further cooperation was carried out with adjacent hospitals to perform development screening activities for the early detection of children with developmental delays. 3) Review and reflection stage. After the implementation of inclusive education, all teachers in the preschool are divided into two groups to record their teaching plans and the lessons learned during implementation. The effectiveness of implementing the objective of inclusive education is also reviewed. With the collaboration of all teachers, in 2015, Preschool Rainbow won New Taipei City’s “Preschool Light” award as an exceptional model for inclusive education. Its model of implementing inclusive education can be used as a reference for other preschools.Keywords: collaboration, inclusive education, preschool, teachers, special education classes, regular classes
Procedia PDF Downloads 429172 Challenges and Success Factors in Introducing Information Systems for Students' Online Registration
Authors: Stanley Fore, Sharon Chipeperekwa
Abstract:
The start of the 2011 academic year in South Africa saw a number of Institutions of Higher Learning introducing online registration for their students. The efficiency and effectiveness of Information Systems are increasingly becoming a necessity and not an option for many organizations. An information system should be able to allow end users to access information easily and navigate with ease. The selected University of Technology (UoT) in this research is one of the largest public institution of higher learning in the Western Cape Province and boasts of an enrolment of more than 30000 students per academic year. An observation was made that, during registration students’ stand in long queues waiting to register or for assistance to register. The system tends to ‘freeze’ whilst students are registering and students are in most cases unfamiliar with the system interface. They constantly have to enquire what to do next when going through online registration process. A mixed method approach will be adopted which comprises of quantitative and qualitative approaches. The study uses constructs of the updated DeLone and McLean IS success model (2003) to analyse and explain the student’s perceptions of the online registration system. The research was undertaken to establish the student’s perceptions of the online registration system. This research seeks to identify and analyse the challenges and success factors of introducing an online registration system whilst highlighting the extent to which this system has been able to solve the numerous problems associated with the manual era. The study will assist management and those responsible for managing the current system to determine how well the system is working or not working to achieve user satisfaction. It will also assist them going forward on what to consider before, during and after implementation of an information system. Respondents will be informed of the objectives of the research, and their consent to participate will be sought. Ethical considerations that will be applied to this study include; informed consent and protection from harm, right to privacy and involvement of the research.Keywords: online registration, information systems, University of Technology, end-users
Procedia PDF Downloads 258