Search results for: victims' rights
1005 Learning Grammars for Detection of Disaster-Related Micro Events
Authors: Josef Steinberger, Vanni Zavarella, Hristo Tanev
Abstract:
Natural disasters cause tens of thousands of victims and massive material damages. We refer to all those events caused by natural disasters, such as damage on people, infrastructure, vehicles, services and resource supply, as micro events. This paper addresses the problem of micro - event detection in online media sources. We present a natural language grammar learning algorithm and apply it to online news. The algorithm in question is based on distributional clustering and detection of word collocations. We also explore the extraction of micro-events from social media and describe a Twitter mining robot, who uses combinations of keywords to detect tweets which talk about effects of disasters.Keywords: online news, natural language processing, machine learning, event extraction, crisis computing, disaster effects, Twitter
Procedia PDF Downloads 4801004 Intellectual Property Laws: Protection of Celebrities’ Identity
Authors: Soumya Chaturvedi
Abstract:
Ever since India opened its doors for the world economy to enter, there has not been a single instance of recoil. A consequence of this move by the government of India resulted in India evolving as a consumer-driven market and in order to survive in this era of extreme competition, the corporate houses have employed every possible means to reach out and hit onto the sentiments of the consumers. The most obvious way to ensure a strong perseverance towards the specific product or brand is through celebrity endorsements. In a country like India, whose film industry accounts for the largest sales and output, it is indeed appalling to acknowledge the fact that it lacks an effective mechanism of protection of the commercial exploitation of celebrities’ attributes under the ambit of law. The western half of the globe has very well accepted and recognized the rights of the celebrities to decide upon the quantum of commercial exploitation of their own attributes and earn profit out of the same. However, the eastern half seems to be a little reluctant in accepting and enforcing these views per se. A celebrity has a right to publicity over the traits of his personality which involves voice, autographs, reputation, and style, so on and so forth as it is these attributes that are responsible for huge trade profits concerning the products to which such traits are attributed to. This clearly involves the right of the celebrity to benefit himself by commercially exploiting the same and refraining the unauthorized gain to third parties. The market is making it nearly impossible to proceed further with such weak laws considering the escalating rate of celebrity endorsements in the nation. This paper discusses the lacunae in law per se to identify a right as such by a celebrity over his traits that are potentially under the circle of commercial exploitation and the need of a definite legislation that would ensure a change in the paradigm of the Courts in India. Also, it discusses the only remedy available currently for violation, which is, a suit for passing off by Indian Courts under Trademark and Copyright laws and a comparison of the same with the mechanisms adopted by the legal systems across the globe.Keywords: celebrity, rights, intellectual property, trademark, copyrights
Procedia PDF Downloads 3351003 Child Abuse: Emotional, Physical, Neglect, Sexual and the Psychological Effects: A Case Scenario in Lagos State
Authors: Aminu Ololade Matilda
Abstract:
Child abuse is a significant issue worldwide, affecting the socio-development and mental and physical health of young individuals. It is the maltreatment of a child by an adult or a child. This paper focuses on child abuse in Communities in Lagos State. The aim of this study is to investigate the extent of child abuse and its impact on the mood, social activities, self-worth, concentration, and academic performance of children in Communities in Lagos State. The primary research instrument used in this study was the interview (Forensic), which consisted of two sections. The first section gathered data on the details of the child and the forms and impacts of abuse experienced, while the second section focused on parental style. The study found that children who experienced various forms of abuse, such as emotional, neglect, physical, or sexual abuse, were hesitant to report it out of fear of threats or even death from the abuser. These abused children displayed withdrawn behaviour, depression, and low self-worth and underperformed academically compared to their peers who did not experience abuse. The findings align with socio-learning and intergenerational transmission of violence theories, which suggest that parents and caregivers who engage in child abuse often do so because they themselves experienced or witnessed abuse as children, thereby normalizing violence. The study highlights the prevalent issue of child abuse in Lagos State and emphasizes the need for advocacy programs and capacity building to raise awareness about child abuse and prevention. The distribution of the Child’s Rights Act in various sectors is also recommended to underscore the importance of protecting the rights of children. Additionally, the inclusion of courses on child abuse in the school curriculum is proposed to ensure children are educated on recognizing and reporting abuse.Keywords: abuse, child, awareness, effects, emotional, neglect, physical, psychological, sexual, recognize, reporting, right
Procedia PDF Downloads 811002 Accessing Single Parenting and Disabled Children: A Case Study of Ghana
Authors: Edwina Owusu Panin
Abstract:
Families may face significant obstacles as a result of single parenting and disabilities. The amenities and support those single parents need to give their children with disabilities the care they need are frequently out of their reach. These can include financial hardship, limited access to health and education, and social isolation. In addition, cultural attitudes toward disability can worsen these challenges, making it difficult for families to get the support and resources they need. Despite these challenges, many single parents have shown resilience and strength to overcome these difficulties and defend the rights of their children; some, too, have failed in taking care of their disabled children in Ghana. The study traces the developmental process of how single parents cope with disabled children. There is a discouraging fact that single father’s face a much more dreadful task in taking care of their disabled children in Ghana, which is later highlighted in the article. Additional research and support are needed to address the unique needs of families facing these challenges. This case study explores the experiences of single parents raising children with disabilities in Ghana. Using a qualitative approach, the study examines the challenges facing lone parents in caring for children, including access to healthcare, education and social support. In addition, the study examines the impact of cultural disability attitudes on the experiences of single parents and their children and what causes it in Ghana. Findings indicate that single parents in Ghana face significant challenges in accessing resources and support for their children and that cultural attitudes toward disability may aggravate these challenges. However, the study recommends the tenacity and strengths of how to create awareness, protect the welfare and also by encouraging single parents to face these challenges and protect the rights of their children, swaying away influences of bad cultural attitudes.Keywords: disability, single parenting, case study, assessing
Procedia PDF Downloads 931001 Examining Child Rape Provisions of Bangladesh in Comparison with Other South Asian Countries
Authors: Monira Nazmi Jahan
Abstract:
Child rape or child abuse is a serious and fearsome crime against children, which is an epidemic almost in every state of today’s world. However, in the case of Bangladesh, the scenario is terrifying. The objective of this paper is to examine the laws relating to child rape in Bangladesh as according to a renowned Daily Newspaper 'Prothom Alo', nearly 346 children are being raped since January 2019. This paper discusses and draws the difference of child rape provisions of Bangladesh with other South-Asian countries, comprises of India, Maldives, Pakistan, Sri Lanka, Nepal, Bhutan, and Afghanistan. In Bangladesh, girls below 18 years are considered to be a child. ‘The Penal Code, 1860’ and a special law ‘Nari O Shishu Nirjatan Daman Ain, 2012’ provides that any person committing child rape will be punished with rigorous life imprisonment and fine. This piece of law also gives provisions for punishment in case of child’s death after the commission of rape and gang rape, and the punishment is the death penalty. In India there is ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) which has separate provisions for sexual assault, penetrative sexual assault and aggravated penetrative sexual assault by different categories of person such as relatives, institutional officers and trustees and also for mentally and physically challenged child victims and provides punishment up to death penalty. In Pakistan, there is ‘Pakistan Penal Code Amended Act, 2016’ which has only two provisions for child rape. In case offence committed by one person, the punishment is 10 to 25 years of imprisonment and fine. In case of offence committed by two or more persons, each shall be liable to death or imprisonment for life. Unfortunately, Afghanistan has no laws for the protection of rape victims of women let alone children, whereas there are a lot of child rape cases, including both girls and boys who are used for sexual slavery. The Maldives has a special law named ‘Special Provisions Act to Deal with Child Sex Abuse Offenders.’ This has categorized the offenders like POSCO and has provided punishments accordingly. The punishments are: punishments range from 1 to 25 years accordingly, whereas Bangladesh has lesser provisions, but the gravity and duration of punishments are much higher. The Penal Code of Sri Lanka imposes a minimum sentence of 10 years for those convicted of raping a child under 18 years. In Bhutan, child rape provision is made according to the age of a child. ‘The Penal Code of Bhutan, 2004’, mentions provisions for the rape of a child in case of child rape below and above 12 years, gang rape of a child below and above 12 years and has graded the punishments as first, second and third degree. Though Bangladesh has better provisions for punishments, the ages are not categorized in the laws. In Nepal there is ‘Act relating to Children, 2018’ provisions are made for offenders who use or cause or engage child sexual exploitation, and the punishment is same for rape offenders according to prevailing laws in Nepal. No separate punishments for child offenders are made. The ultimate conclusion that can be drawn is Bangladesh has better punishments than all other South-Asian countries and same punishment as India however, Bangladesh can make or amend the laws and categorize offenders as like POSCO of India, Special provisions of Maldives and Bhutan.Keywords: child rape, death penalty, sexual slavery, South Asia
Procedia PDF Downloads 1111000 Programmatic Actions of Social Welfare State in Service to Justice: Law, Society and the Third Sector
Authors: Bruno Valverde Chahaira, Matheus Jeronimo Low Lopes, Marta Beatriz Tanaka Ferdinandi
Abstract:
This paper proposes to dissect the meanings and / or directions of the State, in order, to present the State models to elaborate a conceptual framework about its function in the legal scope. To do so, it points out the possible contracts established between the State and the Society, since the general principles immanent in them can guide the models of society in force. From this orientation arise the contracts, whose purpose is by the effect to modify the status (the being and / or the opinion) of each of the subjects in presence - State and Society. In this logic, this paper announces the fiduciary contracts and “veredicção”(portuguese word) contracts, from the perspective of semiotics discourse (or greimasian). Therefore, studies focus on the issue of manifest language in unilateral and bilateral or reciprocal relations between the State and Society. Thus, under the biases of the model of the communicative situation and discourse, the guidelines of these contractual relations will be analyzed in order to see if there is a pragmatic sanction: positive when the contract is signed between the subjects (reward), or negative when the contract between they are broken (punishment). In this way, a third path emerges which, in this specific case, passes through the subject-third sector. In other words, the proposal, which is systemic in nature, is to analyze whether, since the contract of the welfare state is not carried out in the constitutional program on fundamental rights: education, health, housing, an others. Therefore, in the structure of the exchange demanded by the society according to its contractual obligations (others), the third way (Third Sector) advances in the empty space left by the State. In this line, it presents the modalities of action of the third sector in the social scope. Finally, the normative communication organization of these three subjects is sought in the pragmatic model of discourse, namely: State, Society and Third Sector, in an attempt to understand the constant dynamics in the Law and in the language of the relations established between them.Keywords: access to justice, state, social rights, third sector
Procedia PDF Downloads 145999 Preference Heterogeneity as a Positive Rather Than Negative Factor towards Acceptable Monitoring Schemes: Co-Management of Artisanal Fishing Communities in Vietnam
Authors: Chi Nguyen Thi Quynh, Steven Schilizzi, Atakelty Hailu, Sayed Iftekhar
Abstract:
Territorial Use Rights for Fisheries (TURFs) have been emerged as a promising tool for fisheries conservation and management. However, illegal fishing has undermined the effectiveness of TURFs, profoundly degrading global fish stocks and marine ecosystems. Conservation and management of fisheries, therefore, largely depends on effectiveness of enforcing fishing regulations, which needs co-enforcement by fishers. However, fishers tend to resist monitoring participation, as their views towards monitoring scheme design has not been received adequate attention. Fishers’ acceptability of a monitoring scheme is likely to be achieved if there is a mechanism allowing fishers to engage in the early planning and design stages. This study carried out a choice experiment with 396 fishers in Vietnam to elicit fishers’ preferences for monitoring scheme and to estimate the relative importance that fishers place on the key design elements. Preference heterogeneity was investigated using a Scale-Adjusted Latent Class Model that accounts for both preference and scale variance. Welfare changes associated with the proposed monitoring schemes were also examined. It is found that there are five distinct preference classes, suggesting that there is no one-size-fits-all scheme well-suited to all fishers. Although fishers prefer to be compensated more for their participation, compensation is not a driving element affecting fishers’ choice. Most fishers place higher value on other elements, such as institutional arrangements and monitoring capacity. Fishers’ preferences are driven by their socio-demographic and psychological characteristics. Understanding of how changes in design elements’ levels affect the participation of fishers could provide policy makers with insights useful for monitoring scheme designs tailored to the needs of different fisher classes.Keywords: Design of monitoring scheme, Enforcement, Heterogeneity, Illegal Fishing, Territorial Use Rights for Fisheries
Procedia PDF Downloads 324998 Gender Norms and Psychological Mechanisms that Make Sexual Assault Possible
Authors: Moor Avigail
Abstract:
This research examines gender norms that underlie the propensity to commit sexual assault and to carry it out. Factors that have been shown to relate to such propensity will be enumerated and tied to their ramifications. These include sexual objectification of women, endorsement of gender-based rape myths blaming the victim, masculine entitlement, low empathy to victims, along with elevated empathy towards rapists. Heavy use of pornography as well as a misconstruing of the meaning of refusal to sex, have also been implicated. Additionally, a cutting-edge investigation, which we have just completed, examined what seems to occur in the perpetrator's mind during the assault. No research to date has ventured to uncover what essentially allows the rape to be carried out in real time, in the sense of what mental mechanisms go into operation in rapists during the assault itself. Our findings demonstrate that dehumanization and rationalization are pivotal. On the one hand, the perpetrator apparently allows himself to disregard the victim's humanity while simultaneously justifying his actions in relation to the victim's behavior.Keywords: gender norms, gender psychology, sexual assault, gender
Procedia PDF Downloads 72997 Confusion on the Definition of Terrorism and Difficulty in Criminalizing Terrorist Financing
Authors: Hamed Tofangsaz
Abstract:
In the absence of an internationally agreed definition of terrorism, the question which needs to be posed is whether there is a clear and common understanding of what constitutes terrorism, terrorist acts and terrorist groups, the financing of which needs to be stopped. That is, from a criminal law perspective, whether the Terrorist Financing Convention, as the backbone of the counter-terrorist financing regime, clarifies what types of conduct, by who, in what circumstances and when, against whom (targets or victims) and with what intention or motivation should be considered terrorism? It will be explained how and why it has been difficult to reach an agreement on the definition of terrorism. The endeavour of the drafters of the Terrorist Financing Convention and others involved in countering terrorist financing to establish a general definition of terrorism will be examined. The record of attempts to define the elements of terrorism proves that it is hardly possible to reach an agreement on a generic definition of terrorism because the concept of terrorism is elusive and subject to various understandings. Even the definition provided by the Terrorist Financing Convention, is not convincing. With regard to the findings, this paper calls for further research on the legal consequences of the implementation of the terrorist financing-counter measures while the scope of terrorism, terrorist acts and terrorist organizations have been left vague.Keywords: terrorism, terrorist financing, crime, convention
Procedia PDF Downloads 570996 Argentine Immigrant Policy: A Qualitative Analysis of Changes and Trends from 2016 on
Authors: Romeu Bonk Mesquita
Abstract:
Argentina is the South American number 1 country of destiny to intraregional migration flows. This research aims to shed light on the main trends of the Argentine immigrant policy from 2016 on, when Mauricio Marci was elected President, taking the approval of the current and fairly protective of human rights Ley de Migraciones (2003) as an analytical starting point. Foreign Policy Analysis (FPA) serves as the theoretical background, highlighting decision-making processes and institutional designs that encourage or constraint political and social actors. The analysis goes through domestic and international levels, observing how immigration policy is formulated as a public policy and is simultaneously connected to Mercosur and other international organizations, such as the International Organization for Migration (IOM) and the United Nations High Commissioner for Refugees (UNHCR). Thus, the study revolves around the Direccion Nacional de Migraciones, which is the state agency in charge of executing the country’s immigrant policy, as to comprehend how its internal processes and the connections it has with both domestic and international institutions shape Argentina’s immigrant policy formulation and execution. Also, it aims to locate the migration agenda within the country’s contemporary social and political context. The methodology is qualitative, case-based and oriented by process-tracing techniques. Empirical evidence gathered includes official documents and data, media coverage and interviews to key-informants. Recent events, such as the Decreto de Necesidad y Urgencia 70/2017 issued by President Macri, and the return of discursive association between migration and criminality, indicate a trend of nationalization and securitization of the immigration policy in contemporary Argentina.Keywords: Argentine foreign policy, human rights, immigrant policy, Mercosur
Procedia PDF Downloads 168995 Public Participation in Political Transformation: From the Coup D’etat in 2014 to the Events Leading up to the Proposed Election in 2018 in Thailand
Authors: Pataramon Satalak, Sakrit Isariyanon, Teerapong Puripanik
Abstract:
This article uses the recent events in Thailand as a case study for examining why democratic transition is necessary during political upheaval to ensure that the people’s power remains unaffected. After seizing power in May 2014, the military, backed by anti-government protestors, selected and established their own system to govern the country. They set up the National Council for Peace and Order (NCPO) which established a People’s Assembly, aiming to reach a compromise between the conflicting opinions of former, pro-government and anti-government protesters. It plans to achieve this through political reform before returning sovereign power to the people via an election in 2018. If a governmental authority is not representative of the people (e.g. a military government) it does not count as a legitimate government. During the last four years of military government, from May 2014 to January 2018, their rule of Thailand has been widely controversial, specifically regarding their commitment to democracy, human rights violations and their manipulation of the rule of law. Democratic legitimacy relies not only on established mechanisms for public participation (like referendums or elections) but also public participation based on accessible and educational reform (often via NGOs) to ensure that the free and fair will of the people can be expressed. Through their actions over the last three years, the Thai military government has damaged both of these components, impacting future public participation in politics. The authors make some observations about the specific actions the military government has taken to erode the democratic legitimacy of future public participation: the increasing dominance of military courts over civil courts; civil society’s limited involvement in political activities; the drafting of a new constitution and their attempt to master support through referenda and its consequence for delaying organic law-making process; the structure of the legislative powers (Senate and the members of parliament); and the control of people’s basic freedoms of expression, movement and assembly in political activities. One clear consequence of the military government’s specific actions over the last three years is the increased uncertainty amongst Thai people that their fundamental freedoms and political rights will be respected in the future. This will directly affect their participation in future democratic processes. The military government’s actions (e.g. their response to the UN representatives) will also have influenced potential international engagement in Thai civil society to help educate disadvantaged people about their rights, and their participation in the political arena. These actions challenge the democratic idea that there should be a checking and balancing of power between people and government. These examples provide evidence that a democratic transition is crucial during any process of political transformation.Keywords: political tranformation, public participation, Thailand coup d'etat 2014, election 2018
Procedia PDF Downloads 149994 Neuropsychological Aspects in Adolescents Victims of Sexual Violence with Post-Traumatic Stress Disorder
Authors: Fernanda Mary R. G. Da Silva, Adriana C. F. Mozzambani, Marcelo F. Mello
Abstract:
Introduction: Sexual assault against children and adolescents is a public health problem with serious consequences on their quality of life, especially for those who develop post-traumatic stress disorder (PTSD). The broad literature in this research area points to greater losses in verbal learning, explicit memory, speed of information processing, attention and executive functioning in PTSD. Objective: To compare the neuropsychological functions of adolescents from 14 to 17 years of age, victims of sexual violence with PTSD with those of healthy controls. Methodology: Application of a neuropsychological battery composed of the following subtests: WASI vocabulary and matrix reasoning; Digit subtests (WISC-IV); verbal auditory learning test RAVLT; Spatial Span subtest of the WMS - III scale; abbreviated version of the Wisconsin test; concentrated attention test - D2; prospective memory subtest of the NEUPSILIN scale; five-digit test - FDT and the Stroop test (Trenerry version) in adolescents with a history of sexual violence in the previous six months, referred to the Prove (Violence Care and Research Program of the Federal University of São Paulo), for further treatment. Results: The results showed a deficit in the word coding process in the RAVLT test, with impairment in A3 (p = 0.004) and A4 (p = 0.016) measures, which compromises the verbal learning process (p = 0.010) and the verbal recognition memory (p = 0.012), seeming to present a worse performance in the acquisition of verbal information that depends on the support of the attentional system. A worse performance was found in list B (p = 0.047), a lower priming effect p = 0.026, that is, lower evocation index of the initial words presented and less perseveration (p = 0.002), repeated words. Therefore, there seems to be a failure in the creation of strategies that help the mnemonic process of retention of the verbal information necessary for learning. Sustained attention was found to be impaired, with greater loss of setting in the Wisconsin test (p = 0.023), a lower rate of correct responses in stage C of the Stroop test (p = 0.023) and, consequently, a higher index of erroneous responses in C of the Stroop test (p = 0.023), besides more type II errors in the D2 test (p = 0.008). A higher incidence of total errors was observed in the reading stage of the FDT test p = 0.002, which suggests fatigue in the execution of the task. Performance is compromised in executive functions in the cognitive flexibility ability, suggesting a higher index of total errors in the alternating step of the FDT test (p = 0.009), as well as a greater number of persevering errors in the Wisconsin test (p = 0.004). Conclusion: The data from this study suggest that sexual violence and PTSD cause significant impairment in the neuropsychological functions of adolescents, evidencing risk to quality of life in stages that are fundamental for the development of learning and cognition.Keywords: adolescents, neuropsychological functions, PTSD, sexual violence
Procedia PDF Downloads 137993 Face Sketch Recognition in Forensic Application Using Scale Invariant Feature Transform and Multiscale Local Binary Patterns Fusion
Authors: Gargi Phadke, Mugdha Joshi, Shamal Salunkhe
Abstract:
Facial sketches are used as a crucial clue by criminal investigators for identification of suspects when the description of eyewitness or victims are only available as evidence. A forensic artist develops a sketch as per the verbal description is given by an eyewitness that shows the facial look of the culprit. In this paper, the fusion of Scale Invariant Feature Transform (SIFT) and multiscale local binary patterns (MLBP) are proposed as a feature to recognize a forensic face sketch images from a gallery of mugshot photos. This work focuses on comparative analysis of proposed scheme with existing algorithms in different challenges like illumination change and rotation condition. Experimental results show that proposed scheme can lead to better performance for the defined problem.Keywords: SIFT feature, MLBP, PCA, face sketch
Procedia PDF Downloads 338992 Family Carers' Experiences in Striving for Medical Care and Finding Their Solutions for Family Members with Mental Illnesses
Authors: Yu-Yu Wang, Shih-Hua Hsieh, Ru-Shian Hsieh
Abstract:
Wishes and choices being respected, and the right to be supported rather than coerced, have been internationally recognized as the human rights of persons with mental illness. In Taiwan, ‘coerced hospitalization’ has become difficult since the revision of the mental health legislation in 2007. Despite trend towards human rights, the real problem families face when their family members are in mental health crisis is the lack of alternative services. This study aims to explore: 1) When is hospitalization seen as the only solution by family members? 2) What are the barriers for arranging hospitalization, and how are they managed? 3) What have family carers learned, in their experiences of caring for their family members with mental illness? To answer these questions, qualitative approach was adopted, and focus group interviews were taken to collect data. This study includes 24 family carers. The main findings of this research include: First, hospital is the last resort for carers in helplessness. Family carers tend to do everything they could to provide care at home for their family members with mental illness. Carers seek hospitalization only when a patient’s behavior is too violent, weird, and/or abnormal, and beyond their ability to manage. Hospitalization, nevertheless, is never an easy choice. Obstacles emanate from the attitudes of the medical doctors, the restricted areas of ambulance service, and insufficient information from the carers’ part. On the other hand, with some professionals’ proactive assistance, access to medical care while in crisis becomes possible. Some family carers obtained help from the medical doctor, nurse, therapist and social workers. Some experienced good help from policemen, taxi drivers, and security guards at the hospital. The difficulty in accessing medical care prompts carers to work harder on assisting their family members with mental illness to stay in stable states. Carers found different ways of helping the ‘person’ to get along with the ‘illness’ and have better quality of life. Taking back ‘the right to control’ in utilizing medication, from passiveness to negotiating with medical doctors and seeking alternative therapies, are seen in many carers’ efforts. Besides, trying to maintain regular activities in daily life and play normal family roles are also experienced as important. Furthermore, talking with the patient as a person is also important. The authors conclude that in order to protect the human rights of persons with mental illness, it is crucial to make the medical care system more flexible and to make the services more humane: sufficient information should be provided and communicated, and efforts should be made to maintain the person’s social roles and to support the family.Keywords: family carers, independent living, mental health crisis, persons with mental illness
Procedia PDF Downloads 309991 Mapping and Measuring the Vulnerability Level of the Belawan District Community in Encountering the Rob Flood Disaster
Authors: Dessy Pinem, Rahmadian Sembiring, Adanil Bushra
Abstract:
Medan Belawan is one of the subdistricts of 21 districts in Medan. Medan Belawan Sub-district is directly adjacent to the Malacca Strait in the North. Due to its direct border with the Malacca Strait, the problem in this sub-district, which has continued for many years, is a flood of rob. In 2015, rob floods inundated Sicanang urban village, Belawan I urban village, Belawan Bahagia urban village and Bagan Deli village. The extent of inundation in the flood of rob that occurred in September 2015 reached 540, 938 ha. Rob flood is a phenomenon where the sea water is overflowing into the mainland. Rob floods can also be interpreted as a puddle of water on the coastal land that occurs when the tidal waters. So this phenomenon will inundate parts of the coastal plain or lower place of high tide sea level. Rob flood is a daily disaster faced by the residents in the district of Medan Belawan. Rob floods can happen every month and last for a week. The flood is not only the residents' houses, the flood also soaked the main road to Belawan Port reaching 50 cm. To deal with the problems caused by the flood and to prepare coastal communities to face the character of coastal areas, it is necessary to know the vulnerability of the people who are always the victims of the rob flood. Are the people of Medan Belawan sub-district, especially in the flood-affected villages, able to cope with the consequences of the floods? To answer this question, it is necessary to assess the vulnerability of the Belawan District community in the face of the flood disaster. This research is descriptive, qualitative and quantitative. Data were collected by observation, interview and questionnaires in 4 urban villages often affected by rob flood. The vulnerabilities measured are physical, economic, social, environmental, organizational and motivational vulnerabilities. For vulnerability in the physical field, the data collected is the distance of the building, floor area ratio, drainage, and building materials. For economic vulnerability, data collected are income, employment, building ownership, and insurance ownership. For the vulnerability in the social field, the data collected is education, number of family members, children, the elderly, gender, training for disasters, and how to dispose of waste. For the vulnerability in the field of organizational data collected is the existence of organizations that advocate for the victims, their policies and laws governing the handling of tidal flooding. The motivational vulnerability is seen from the information center or question and answer about the rob flood, and the existence of an evacuation plan or path to avoid disaster or reduce the victim. The results of this study indicate that most people in Medan Belawan sub-district have a high-level vulnerability in physical, economic, social, environmental, organizational and motivational fields. They have no access to economic empowerment, no insurance, no motivation to solve problems and only hope to the government, not to have organizations that support and defend them, and have physical buildings that are easily destroyed by rob floods.Keywords: disaster, rob flood, Medan Belawan, vulnerability
Procedia PDF Downloads 127990 Modern Problems of Russian Sport Legislation
Authors: Yurlov Sergey
Abstract:
The author examines modern problems of Russian sport legislation and whether it need to be changed in order to allow all sportsmen to participate, train and have another sportsmen’s rights as Russian law mandates. The article provides an overview of Russian sport legislation problems, provides examples of foreign countries. In addition, the author suggests solutions for existing legal problems.Keywords: amendment, legal problem, right, sport
Procedia PDF Downloads 415989 Determination of Authorship of the Works Created by the Artificial Intelligence
Authors: Vladimir Sharapaev
Abstract:
This paper seeks to address the question of the authorship of copyrighted works created solely by the artificial intelligence or with the use thereof, and proposes possible interpretational or legislative solutions to the problems arising from the plurality of the persons potentially involved in the ultimate creation of the work and division of tasks among such persons. Being based on the commonly accepted assumption that a copyrighted work can only be created by a natural person, the paper does not deal with the issues regarding the creativity of the artificial intelligence per se (or the lack thereof), and instead focuses on the distribution of the intellectual property rights potentially belonging to the creators of the artificial intelligence and/or the creators of the content used for the formation of the copyrighted work. Moreover, the technical development and rapid improvement of the AI-based programmes, which tend to be reaching even greater independence on a human being, give rise to the question whether the initial creators of the artificial intelligence can be entitled to the intellectual property rights to the works created by such AI at all. As the juridical practice of some European courts and legal doctrine tends to incline to the latter opinion, indicating that the works created by the AI may not at all enjoy copyright protection, the questions of authorships appear to be causing great concerns among the investors in the development of the relevant technology. Although the technology companies dispose with further instruments of protection of their investments, the risk of the works in question not being copyrighted caused by the inconsistency of the case law and a certain research gap constitutes a highly important issue. In order to assess the possible interpretations, the author adopted a doctrinal and analytical approach to the research, systematically analysing the European and Czech copyright laws and case law in some EU jurisdictions. This study aims to contribute to greater legal certainty regarding the issues of the authorship of the AI-created works and define possible clues for further research.Keywords: artificial intelligence, copyright, authorship, copyrighted work, intellectual property
Procedia PDF Downloads 122988 The Causes of Non-Disclosure of Intrafamilial Childhood Sexual Abuse and Its Effects
Authors: Ishtiaque Qureshi, Erum Muzaffar
Abstract:
This study aimed to analyze the causes of non-disclosure of intrafamilial childhood sexual abuse (IFCSA) among survivors studying in higher education institutions in Sindh, Pakistan. Employing a mixed-method approach, the research investigated the reasons behind non-disclosure. A quantitative survey conducted in higher education institutions identified IFCSA victims through purposive sampling, and the causes were assessed through in-depth interviews with 18 respondents. Subsequent analysis of the interview transcripts resulted in the categorization of respondents into three groups: (1) those fearing the consequences of revealing facts to their parents, (2) individuals unwilling to subject their parents to conflict with the perpetrator, and (3) those who could not disclose the abuse due to reasons not understood by them. Correlations among non-disclosing respondents were examined with respect to their socio-economic status, family structure, emotional availability of parents, and parenting style.Keywords: intrafamilial childhood sexual abuse, non-disclosure, survivors of IFCSA, in-depth interviews
Procedia PDF Downloads 52987 Racism as a Biopolitical Bordering: Experiences of the Lhotshampa People Displaced from Bhutan
Authors: Karun Karki
Abstract:
The Lhotshampa are Bhutanese people of Nepali origin who have been in Bhutan since the early 1600s. A significant number of these people migrated to Bhutan in the nineteenth century. The 1958 Nationality Law of Bhutan granted citizenship to many Lhotshampa people; however, in the late 1970s, the government of Bhutan introduced a series of laws and policies intended for the socio-political and cultural exclusion of the Lhotshampa due to their ancestry. These exclusionary policies and ethnic and racial injustices not only removed the rights and citizenship of the Lhotshampa but also forcibly displaced thousands of families with no choice but to seek refuge in Nepal. In this context, racism becomes a biopolitical tool designed to govern and regulate populations in a way that determines who may live and who must die. The governance and the management of the population, what Stephan Scheel terms as biopolitical bordering, depends on boundaries between residents and non-residents, citizens and non-citizens, and emigrants and immigrants. Drawing on Foucault’s biopolitics and Mbembe’s necropolitics, this paper argues that the concept of racism should be examined within the context of political discourses because it is intertwined with the colonial project, enslavement, and diaspora. This paper critically explores ethnic and racial injustices the Lhotshampa people experienced and the ways in which they negotiated and resisted such injustices in their resettlement processes, including before displacement, in refugee camps, and after the third-country resettlement. Critical examination of these issues helps shed light on the notion of racial difference that justifies dehumanization, discrimination, and racist attitudes against the Lhotshampa people. The study's findings are critical in promoting human rights, social justice, and the health and well-being of the Lhotshampa community in the context of trauma and stressors in their resettlement processes.Keywords: lhotshampa people, bhutanese refugees, racism, dehumanization, social justice, biopower, necropower
Procedia PDF Downloads 54986 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment
Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan
Abstract:
With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.Keywords: data sharing, cross-domain, data exchange, publish-subscribe
Procedia PDF Downloads 124985 Female Victimization and Capitalist Patriarchy in Literature: An Eco-Feminist Study
Authors: Uzma Imtiaz
Abstract:
Ecological feminism adheres to the basic philosophy that patriarchy is the wellspring of natural and gender domination. It explores the relationship between women and nature in a patriarchal society. Eco-feminism argues that women and nature have an intrinsic association and exploitation of women is the exploitation of nature itself. It further views the world as a holistic institution that offers equal opportunities for men and women. Eco-feminism rejects male domination in a patriarchal society where men and women do not get equal rights to survival. Furthermore, it investigates modern capitalist practices that exert unjust male dominance over nature and women. Cultural eco-feminist theorists argue that industrialization and modern science are male-centered and exhibit male chauvinistic views in attempts to control females’ ability to reproduce. This research intends to analyze an eco-feminist novel by Laila Halaby from the eco-feminism theoretical framework of Maria Mies and Vandana Shiva. The feminist dystopian novel throws light on the double-faced processes of capitalism and housewifization that destroy the autonomy of women over their bodies and life. Moreover, this study aims to highlight the unjust capitalistic processes and policies that turn other countries and women into colonies to exploit them by white men in the name of progress and civilization. The novel brings the patriarchal ways of dominance over women into question. This research paper concludes that women and men should get equal opportunities to survive in society, and women should have given rights over their bodies to decide their future. The research is qualitative in nature, so the method of close reading is selected to analyze the hypodermic effect of patriarchy in society. This study is valuable in highlighting the exploitative ways of men to subjugate women and nature and helps to give awareness to women against gender exploitation in society.Keywords: housewifization, exploitation, capitalist patriarchy, female victimization
Procedia PDF Downloads 77984 A Family Development Approach to Understanding the Transfer of Family Business Ownership
Authors: Susan Lanz, Gary T. Burke, Omid Omidvar
Abstract:
The intention to transfer ownership control across family generations is acknowledged to be central to developing a theoretical understanding of how family businesses differ and are distinct as a business group. However, in practice, most business-owning families face challenges to transfer their business ownership from one family generation to the next. To date, researchers have paid little attention to how and when ownership is passed across family generations and what the dynamics of such transitions are. This is primarily due to the prevailing assumption that ownership transfer is an unimportant and legalistic issue that occurs within a wider family management succession process. Yet, the limited evidence available suggests that family ownership transfer occurs inside and outside of the management succession process and is a difficult process for business-owning families to navigate. As a result, many otherwise viable family businesses are closing, leading to unnecessary loss of jobs and knowledge. This qualitative paper examines how family members understand and navigate the ownership transfer process. This study uses an inductive qualitative research design, conducted through in-depth interviews within eight business-owning families. It draws on family development theory and shows how a wide range of family-related events and dynamics outside of family business involvement underlie and shape the ownership transfer process. The findings extend the theory on how these events trigger ownership transfer and how they shape the ownership meanings held within business-owning families. This study found that ownership transfer meanings extend beyond that of transferring the legal control and financial appropriation rights of shareholders. The study concludes there are three different stages in the process of ownership transfer -symbolic, re-balancing, and protectionist. Each stage creates distinct family social constructions of the rights of family members to hold business ownership, and each stage occurs within a specific family development phase.Keywords: business-owning family, family development theory, ownership transfer, process
Procedia PDF Downloads 156983 The Active Social Live of #Lovewins: Understanding the Discourse of Homosexual Love and Rights in Thailand
Authors: Tinnaphop Sinsomboonthong
Abstract:
The hashtag, #LoveWins, has been widely used for celebrating the victory of the LGBTQ movement since June 2015 when the US Supreme Court enacted the rights of same-sex marriage. Nowadays, the hashtag is generally used among active social media users in many countries, including Thailand. Amidst the political conflict between advocates of the junta-backed legislation related to same-sex marriage laws, known as ‘Thailand’s Civil Partnership Draft Bills,’ and its detractors, the hashtag becomes crucial for Thailand’s 2019 national election season and shortly afterward as it was one of the most crucial parts of a political campaign to rebrand many political parties’ image, create an LGBT-friendly atmosphere and neutralize the bi-polarized politics of the law. The use of the hashtag is, therefore, not just an online entertainment but a politico-discursive tool, used by many actors for many purposes. Behind the confrontation between supporters and opposers of the law, the hashtag is used by both sides to highlight the Western-centric normativity of homosexual love, closely associated with Eurocentric modernity and heteronormativity. As an online ethnographical study, this paper aims to analyze how #LoveWins is used among Thai social media users in late 2018 to mid-2019 and how it is signified by Thai social media users during the Drafted-Bills period and the 2019 national election. A number of preliminary surveys of data on Twitter were conducted in December 2018 and, more intensely, in January 2019. Later, the data survey was officially conducted twice during February and April 2019, while the data collection was done during May-June 2019. Only public posts on Twitter that include the hashtag, #LoveWins, or any hashtags quoting ‘love’ and ‘wins’ are the main targets of this research. As a result of this, the use of the hashtag can be categorized into three levels, including banal decoration, homosexual love celebration, and colonial discourse on homosexual love. Particularly in the third type of the use of the hashtag, discourse analysis is applied to reveal that this hashtag is closely associated with the discourse of development and modernity as most of the descriptive posts demonstrate aspirations to become more ‘developed and modernized’ like many Western countries and Taiwan, the LGBT capital in Asia. Thus, calls for the ‘right to homosexual love’ and the ‘right to same-sex marriage’ in Thailand are shaped and formulated within the discursive linkage between modernity, development, and love. Also, the use of #LoveWins can be considered as a de-queering process of love as only particular types of gender identity, sexual orientation, and relationships that reflect Eurocentric modernity and heteronormativity are acceptable and advocated. Due to this, more inclusive queer loves should be supported rather than a mere essentialist-traditionalist homosexual love. Homonormativity must be deconstructed, and love must no longer be reserved for only one particular type of relationship that is standardized from/by the West. It must become more inclusive.Keywords: #LoveWins, homosexual love, LGBT rights, same-sex marriage
Procedia PDF Downloads 140982 Re-Thinking Community Relationship for Resolving Conflict and Building Peace in Ethiopia: The Need to Shift from Com-Animation to Communication
Authors: Sisaye Tamrat Ayalew
Abstract:
In Ethiopia, the relationships between different communities have been characterized by mistrust, prejudice, and conflict, resulting in mass killings, displacement, and human rights violations. These relationships are mainly based on ethnic, religious, and linguistic lines, leading to a polarized society. The aim of this study is to appraise the nature of two major community relationships, namely the I-Thou relationship, characterized by genuine dialogue and mutual understanding, and the I-It relationship, characterized by a monologue and mutual suspicion. The study also aims to analyze how these two types of relationships contribute to either resolving or aggravating conflicts and building or deteriorating peace in Ethiopia. The study adopts a qualitative approach, specifically hermeneutics, to explore the nature of the I-Thou and I-It relationships in the Ethiopian context. It also examines how political elites shape these relationships within the community. The study finds that the dominant relationship in Ethiopian society is the I-It relationship, which is manifested as "com-animation." This relationship is characterized by mutual mistrust, prejudice, hostility, and misunderstanding. As a result, conflicts have arisen, leading to violence, displacement, and human rights violations. The study concludes that there is a need to shift from the I-It (com-animation) relationship to the I-Thou (communication) relationship in Ethiopian society. This shift would involve rethinking and readjusting societal relationships, especially among political elites, to foster genuine dialogue, mutual understanding, and lasting peace. It is imperative to overcome mutual mistrust, prejudice, and misunderstanding in order to resolve conflicts and build a harmonious society in Ethiopia. The study's findings and recommendations contribute to raising awareness among both Ethiopians and the international community on the potential for conflict resolution and peacebuilding through a shift in community relationships.Keywords: dialogue, I-Thou relationship, I-It relationship, conflict resolution, building peace
Procedia PDF Downloads 113981 Biodiversity Conservation Practices and Extent of Environmental Stewardship Among Indigenous Peoples in Caraga Region, Mindanao, Philippines
Authors: Milagros S. Salibad, Levita B. Grana
Abstract:
The presence and role of Indigenous Peoples (IPs) residing in key biodiversity, protected, and watershed areas within the ancestral domain in the Caraga region, Mindanao, Philippines, hold immense significance. Recognizing their importance and rights, this study aimed to determine the level of biodiversity conservation practices and extent of environmental stewardship among the Mamanwas, Manobos, and Higaonons, assess potential differences in these practices, and identify factors that facilitate or hinder them. Employing an explanatory sequential mixed-method research design, 421 respondents participated through a researcher-made questionnaire. Additional data were collected through focus group discussions, key informant interviews, researcher field notes, community immersions, and secondary sources. The results revealed a high level of biodiversity conservation practices across the three IP groups, with variations influenced by their cultural and traditional practices, awareness, and access to resources and information. Each group exhibited unique environmental practices shaped by their distinct cultures, traditions, and customary knowledge. They have a strong sense of ownership and responsibility towards their ancestral lands and territories and adopt traditional knowledge and practices that promote sustainable resource management and biodiversity conservation. These practices align with the Indigenous Peoples Rights Act (IPRA), also known as Republic Act No. 8371. Various facilitating and hindering factors influenced their conservation efforts. To uphold the region's biodiversity resources, it is recommended that government agencies continue to evaluate and monitor the sustainability of IPs' local biodiversity conservation practices. Additionally, efforts should be made to involve IP communities as essential contributors and stakeholders in these conservation endeavors.Keywords: biodiversity, conservation, indigenous peoples, traditional knowledge, environmental stewardship
Procedia PDF Downloads 77980 Male Sex Workers’ Constructions of Selling Sex in South Africa
Authors: Tara Panday, Despina Learmonth
Abstract:
Sex work is often constructed as being an interaction between male clients and female sex workers. As a result, street-based male sex workers are continuously overlooked in the South African literature. This qualitative study explored male sex workers’ subjective experiences and constructions of their male clients’ identities and the client-sex worker relationship. This research was conducted from a social-constructionist perspective, which allowed for a deeper understanding of the reasons and context driving the choices and actions of male sex workers. Semi-structured face-to-face interviews were conducted with 10 South African men working as sex workers in Cape Town. Data was analysed through thematic analysis. The findings of the study construct the client-sex worker relationship in terms of a professional relationship, constrained choice, sexual identity and need, as well as companionship for pay, potentially highlighting underlying reasons for supply and demand. The data which emerged around the client-sex worker relationship and the clients’ identities also served to illuminate the power-dynamics in the client-sex worker relationship. This data increases insight into the exploitation and disempowerment experienced by male sex workers through verbal abuse, physical and sexual violence, and unfairly enforced laws and regulations. The findings of this study suggest that, in the context of South Africa, male sex workers' experiences of the client-sex worker relationship cannot be completely understood without considering the intersectionality of the triple stigmatisation of: the criminality of sex work, race, and the lack of economic power, which systematically maintains marginalization. Motivating for the Law Reform Commission to continue to review all emerging research may assist with guiding related policy and thereby, the provision of equal human rights and adequate health and social interventions for all sex workers in South Africa.Keywords: human rights, prostitution, power relations, sex work
Procedia PDF Downloads 483979 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network
Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad
Abstract:
Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway
Procedia PDF Downloads 486978 COVID-19 Laws and Policy: The Use of Policy Surveillance For Better Legal Preparedness
Authors: Francesca Nardi, Kashish Aneja, Katherine Ginsbach
Abstract:
The COVID-19 pandemic has demonstrated both a need for evidence-based and rights-based public health policy and how challenging it can be to make effective decisions with limited information, evidence, and data. The O’Neill Institute, in conjunction with several partners, has been working since the beginning of the pandemic to collect, analyze, and distribute critical data on public health policies enacted in response to COVID-19 around the world in the COVID-19 Law Lab. Well-designed laws and policies can help build strong health systems, implement necessary measures to combat viral transmission, enforce actions that promote public health and safety for everyone, and on the individual level have a direct impact on health outcomes. Poorly designed laws and policies, on the other hand, can fail to achieve the intended results and/or obstruct the realization of fundamental human rights, further disease spread, or cause unintended collateral harms. When done properly, laws can provide the foundation that brings clarity to complexity, embrace nuance, and identifies gaps of uncertainty. However, laws can also shape the societal factors that make disease possible. Law is inseparable from the rest of society, and COVID-19 has exposed just how much laws and policies intersects all facets of society. In the COVID-19 context, evidence-based and well-informed law and policy decisions—made at the right time and in the right place—can and have meant the difference between life or death for many. Having a solid evidentiary base of legal information can promote the understanding of what works well and where, and it can drive resources and action to where they are needed most. We know that legal mechanisms can enable nations to reduce inequities and prepare for emerging threats, like novel pathogens that result in deadly disease outbreaks or antibiotic resistance. The collection and analysis of data on these legal mechanisms is a critical step towards ensuring that legal interventions and legal landscapes are effectively incorporated into more traditional kinds of health science data analyses. The COVID-19 Law Labs see a unique opportunity to collect and analyze this kind of non-traditional data to inform policy using laws and policies from across the globe and across diseases. This global view is critical to assessing the efficacy of policies in a wide range of cultural, economic, and demographic circumstances. The COVID-19 Law Lab is not just a collection of legal texts relating to COVID-19; it is a dataset of concise and actionable legal information that can be used by health researchers, social scientists, academics, human rights advocates, law and policymakers, government decision-makers, and others for cross-disciplinary quantitative and qualitative analysis to identify best practices from this outbreak, and previous ones, to be better prepared for potential future public health events.Keywords: public health law, surveillance, policy, legal, data
Procedia PDF Downloads 142977 Exploring Twitter Data on Human Rights Activism on Olympics Stage through Social Network Analysis and Mining
Authors: Teklu Urgessa, Joong Seek Lee
Abstract:
Social media is becoming the primary choice of activists to make their voices heard. This fact is coupled by two main reasons. The first reason is the emergence web 2.0, which gave the users opportunity to become content creators than passive recipients. Secondly the control of the mainstream mass media outlets by the governments and individuals with their political and economic interests. This paper aimed at exploring twitter data of network actors talking about the marathon silver medalists on Rio2016, who showed solidarity with the Oromo protesters in Ethiopia on the marathon race finish line when he won silver. The aim is to discover important insight using social network analysis and mining. The hashtag #FeyisaLelisa was used for Twitter network search. The actors’ network was visualized and analyzed. It showed the central influencers during first 10 days in August, were international media outlets while it was changed to individual activist in September. The degree distribution of the network is scale free where the frequency of degrees decay by power low. Text mining was also used to arrive at meaningful themes from tweet corpus about the event selected for analysis. The semantic network indicated important clusters of concepts (15) that provided different insight regarding the why, who, where, how of the situation related to the event. The sentiments of the words in the tweets were also analyzed and indicated that 95% of the opinions in the tweets were either positive or neutral. Overall, the finding showed that Olympic stage protest of the marathoner brought the issue of Oromo protest to the global stage. The new research framework is proposed based for event-based social network analysis and mining based on the practical procedures followed in this research for event-based social media sense making.Keywords: human rights, Olympics, social media, network analysis, social network ming
Procedia PDF Downloads 258976 Taking What Each Needs - The Basic Logic of Everyday Practice in State-backed Cultural Infrastructure in China
Authors: Yiling Shao, Megan Dai
Abstract:
This paper attempts to explore whether the cultural infrastructure supported by the Chinese government is still subject to a logic of “strict regulation”.Previous studies have pointed out that the "paternalism" tendency of China's cultural policy always leads to excessive government intervention in cultural development, while Chinese cultural practitioners can only seek cultural autonomy in the cracks of supervision. This can also explain why Chinese cultural policies sometimes have different effects than the official expectations.But this only reflects one aspect of China's cultural policy. In fact, the welfare cultural infrastructure funded by the government seems to highlight the principles of "safeguarding citizens' cultural rights" and "citizens' voluntary" rather than "indoctrination" and "enlightenment", What new features of China's cultural policy are reflected behind this policy orientation that is completely different from the logic of "regulation", which has also become an important issue in this paper. Based on the field survey of a cultural infrastructure (Gao ming District Cultural Center) in Gao ming District, Fo shan City, Guangdong Province, China, for nearly one year, the authors have obtained many text and picture materials.The paper discusses the dual role of cultural centers in China's cultural policy -both as a formal commitment by the state to protect citizens' basic cultural rights and as a social space for citizens to use preferential policies to obtain cultural capital. All in all, the author have conclued three operational logics of the cultural infrastructure currently supported by the Chinese government (at least in developed areas): first, the cultural center has become a versatile cultural space; second, grass-roots cultural cadres can be described as "policy entrepreneurs"; third, ordinary citizens will use the officially supported cultural infrastructure to increase cultural capital. This paper argues that, in comparison to the common “regulatory hand” in the field of cultural industries, in cultural infrastructure supported by state, the authorities and citizens are not in conflict. On the contrary, authorities must adopt a de-regulatory "pleasing" strategy to gain the support of citizens.Keywords: cultural infrastructure, cultural capital, deregulation, policy entrepreneur
Procedia PDF Downloads 98