Search results for: enforcement of laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1190

Search results for: enforcement of laws

1130 Political Antinomy and Its Resolution in Islam

Authors: Abdul Nasir Zamir

Abstract:

After the downfall of Ottoman Caliphate, it scattered into different small Muslim states. Muslim leaders, intellectuals, revivalists as well as modernists started trying to boost up their nation. Some Muslims are also trying to establish the caliphate. Every Muslim country has its own political system, i.e., kingship, dictatorship or democracy, etc. But these are not in their original forms as the historian or political science discussed in their studies. The laws and their practice are mixed, i.e., others with Islamic laws, e.g., Saudi Arabia (K.S.A) and the Islamic Republic of Pakistan, etc. There is great conflict among the revivalist Muslim parties (groups) and governments about political systems. The question is that the subject matter is Sharia or political system? Leaders of Modern Muslim states are alleged as disbelievers due to neglecting the revelation in their laws and decisions. There are two types of laws; Islamic laws and management laws. The conflict is that the non-Islamic laws are in practice in Muslim states. Non-Islamic laws can be gradually changed with Islamic laws with a legal and peaceful process according to the practice of former Muslim leaders and scholars. The bloodshed of Muslims is not allowed in any case. Weak Muslim state is a blessing than nothing. The political system after Muhammad and guided caliphs is considered as kingship. But during this period Muslims not only developed in science and technology but conquered many territories also. If the original aim is in practice, then the Modern Muslim states can be stabled with different political systems. Modern Muslim states are the hope of survival, stability, and development of Muslim Ummah. Islam does not allow arm clash with Muslim army or Muslim civilians. The caliphate is based on believing in one Allah Almighty and good deeds according to Quran and Sunnah. As faith became weak and good deeds became less from its standard level, caliphate automatically became weak and even ended. The last weak caliphate was Ottoman Caliphate which was a hope of all the Muslims of the world. There is no caliphate or caliph present in the world. But every Muslim country or state is like an Amarat (a part of caliphate or small and alternate form of the caliphate) of Muslims. It is the duty of all Muslims to stable these modern Muslim states with tolerance.

Keywords: caliphate, conflict resolution, modern Muslim state, political conflicts, political systems, tolerance

Procedia PDF Downloads 153
1129 Tracing the History of Indian Legal System Vis-A-Vis the Code of Hammurabi

Authors: Vandana Kumari

Abstract:

One of the most ancient and detailed legal codes proclaimed the Babylonian King Hammurabi during his reign in the erstwhile Mesopotamian society, provides a fascinating account of the social and justice system of Babylon. The 282 laws intricately carved on eight feet black stone stela serve as an important source of contemporary commercial, family and criminals laws. This paper attempts an inquiry into the contemporary relevance of this legal code to our current legal system. An exhaustive study of one of ancient legal system based on a series of practical experiences rather than being founded on mere theoretical ideologies can be assumed pertinent to the promulgation of practically viable laws in our country. The first chapter of the paper focuses on law seven which established the rules of commerce and the role of government in overseeing justice and honesty regarding the law of property. The second chapter deals with the laws of family, marriages, divorce and adoption prevailing in the Babylonian era. The third chapter traces the earliest known history of criminal jurisprudence which impregnated the principle of an eye for an eye. The paper is not merely a theoretical account of the Mesopotamian way of living but a novice attempt to discover the roots of Indian laws in the ruins of the courtrooms of the Hammurabi Empire.

Keywords: Babylonian legal system, Contemporary relevance, criminal jurisprudence, Hammurabi Code

Procedia PDF Downloads 305
1128 Preserving Wetlands: Legal and Ecological Challenges in the Face of Degradation: The Case Study of Miankaleh, Iran

Authors: Setareh Orak

Abstract:

Wetlands are essential guardians of global ecosystems, yet they remain vulnerable to increasing human interference and environmental stress. The Miankaleh wetland in northern Iran, designated as a Ramsar Convention site, represents a critical habitat known for its rich biodiversity and essential ecological functions. Despite the existence of national and international environmental laws aimed at preserving such critical ecosystems, the regulatory frameworks in place often fall short in terms of enforcement, monitoring, and overall effectiveness. Unfortunately, this wetland is undergoing severe degradation due to overexploitation, industrial contamination, unsustainable tourism, and land-use alterations. This study aims to assess the strengths and limitations of these regulations and examine their practical impacts on Miankaleh’s ecological health. Adopting a multi-method research approach, this study relies on a combination of case study analysis, legal and literature reviews, environmental data examination, stakeholder interviews, and comparative assessments. Through these methodologies, we scrutinize current national policies, international conventions, and their enforcement mechanisms, revealing the primary areas where they fail to protect Miankaleh effectively. The analysis is supported by two satellite maps linked to our tables, offering detailed visual representations of changes in land use, vegetation, and pollution sources over recent years. By connecting these visual data with quantitative measures, the study provides a comprehensive perspective on how human activities and regulatory shortcomings are contributing to environmental degradation. In conclusion, this study’s insights into the limitations of current environmental legislation and its recommendations for enhancing both policy and public engagement underscore the urgent need for integrated, multi-level efforts in conserving the Miankaleh wetland. Through strengthened legal frameworks, better enforcement, increased public awareness, and international cooperation, the hope is to establish a model of conservation that not only preserves Miankaleh but also serves as a template for protecting similar ecologically sensitive areas worldwide.

Keywords: wetlands, tourism, industrial pollution, land use changes, Ramsar convention

Procedia PDF Downloads 10
1127 Law and its Implementation and Consequences in Pakistan

Authors: Amir Shafiq, Asif Shahzad, Shabbar Mehmood, Muhammad Saeed, Hamid Mustafa

Abstract:

Legislation includes the law or the statutes which is being reputable by a sovereign authority and generally can be implemented by the courts of law time to time to accomplish the objectives. Historically speaking upon the emergence of Pakistan in 1947, the intact laws of the British Raj remained effective after ablution by Islamic Ideology. Thus, there was an intention to begin the statutes book afresh for Pakistan's legal history. In consequence thereof, the process of developing detailed plans, procedures and mechanisms to ensure legislative and regulatory requirements are achieved began keeping in view the cultural values and the local customs. This article is an input to the enduring discussion about implementing rule of law in Pakistan whereas; the rule of law requires the harmony of laws which is mostly in the arrangement of codified state laws. Pakistan has legal plural civilizations where completely different and independent systems of law like the Mohammadan law, the state law and the traditional law exist. The prevailing practiced law in Pakistan is actually the traditional law though the said law is not acknowledged by the State. This caused the main problem of the rule of law in the difference between the state laws and the cultural values. These values, customs and so-called traditional laws are the main obstacle to enforce the State law in true letter and spirit which has caused dissatisfaction of the masses and distrust upon the judicial system of the country.

Keywords: consequences, implement, law, Pakistan

Procedia PDF Downloads 431
1126 Challenges of Solid Waste Management: Insights into the Management and Disposal Behaviour in Bauchi Metropolis of Northeast Nigeria

Authors: Salisu Abdullahi Dalhat, Ibrahim Aliyu Adamu, Abubakar Magaji, Ridwan Adebola Adedigba

Abstract:

The paper examined the municipal solid waste disposal methods and the environmental issues associated with the management of solid waste in Bauchi Metropolis, Nigeria. Data were obtained through the administration of structured questionnaires, oral interviews, and field observations, as well as the desk review method. The research identifies how the city was composed of both biodegradable and non-biodegradable materials, which are mostly paper waste, polythene, and plastic materials. Most of the solid wastes are left unattended for a long period. Poor design of dump sites, ineffective management of urban development plans, and poor enforcement of environmental laws were observed to be the major causes of poor waste management, and in a few areas where large waste containers are provided, they are hardly used by the community. The major environmental issues resulting from improper disposal and poor management of solid waste in the Bauchi metropolis are a nuisance of the waste to the environment, emitting of methane gas which contributes to climate change, blockage of drainages during rainstorms causing flooding within the metropolis as well as the decomposition of such waste leading to contamination of groundwater thereby leading to the cholera outbreak. Relevant stakeholders should, without compromise, design enforceable short, workable bye-laws; local supervisors should be stationed at the designated dump sites across the city as well as public enlightenment/sensitization campaigns could be the way out.

Keywords: biodegradable, contamination, cholera outbreak, solid waste, solid waste management, urban development

Procedia PDF Downloads 123
1125 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies

Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk

Abstract:

Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.

Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)

Procedia PDF Downloads 92
1124 Sustainability of Offshore Petroleum Resources Extraction and Management of Bangladesh: International and Regional Frameworks

Authors: Muhammad Farhad Hosen

Abstract:

This article examines the sustainability of offshore petroleum resource extraction and management in Bangladesh, focusing on international and regional frameworks. The analysis includes international conventions such as UNCLOS, IMO regulations, and SDGs, as well as regional cooperation through organizations like BIMSTEC and SAARC. The objective is to highlight the impact of these frameworks on sustainable extraction practices, address challenges, and offer recommendations for enhancing Bangladesh's legal and regulatory approaches to offshore resource management. The article underscores the need for harmonizing national laws with international standards, enhancing enforcement mechanisms, and promoting regional cooperation to ensure sustainable development.

Keywords: Bangladesh, international frameworks, offshore petroleum, regional framework, sustainability

Procedia PDF Downloads 26
1123 Malaysian Challenges and Experiences with National Higher Education Fund Corporation’s Educational Loan Default

Authors: Anjali Dewi Krishnan

Abstract:

This paper attempts to explore the factors causing student loan defaults among NHEFC borrower besides measuring the enforcement actions that have been took by NHEFC to improve repayment rate. It starts by reviewing the causes of student loan default from the perspective of the loan borrowers besides finding out about the effectiveness of approaches taken by NHEFC (National Higher Education Fund Corporation) until now in order to increase the repayment rate and recover student loan default. The results gathered from the research used to investigate or identify the relationship between job statuses, gender, and ethnicity of the borrowers with repayment status, enforcement from the NHEFC side in the sense of student loan repayment; and respondent's opinion about enforcement in encouraging repayment of student loan and recover loan default. A combination of unemployment, financial constraint, inefficient repayment method and some other reasons of student loan defaults were discovered through this research. It finishes by presenting the reality whereby a student loan default is a result of inability to pay back and not about willingness to pay back.

Keywords: loan default, loan recovery, loan repayment, national higher education fund corporation

Procedia PDF Downloads 335
1122 Provider Perceptions of the Effects of Current U.S. Immigration Enforcement Policies on Service Utilization in a Border Community

Authors: Isabel Latz, Mark Lusk, Josiah Heyman

Abstract:

The rise of restrictive U.S. immigration policies and their strengthened enforcement has reportedly caused concerns among providers about their inadvertent effects on service utilization among Latinx and immigrant communities. This study presents perceptions on this issue from twenty service providers in health care, mental health, nutrition assistance, legal assistance, and immigrant advocacy in El Paso, Texas. All participants were experienced professionals, with fifteen in CEO, COO, executive director, or equivalent positions, and based at organizations that provide services for immigrant and/or low-income populations in a bi-national border community. Quantitative and qualitative data were collected by two primary investigators via semi-structured telephone interviews with an average length of 20 minutes. A survey script with closed and open-ended questions inquired about participants’ demographic information and perceptions of impacts of immigration enforcement policies under the current federal administration on their work and patient or client populations. Quantitative and qualitative data were analyzed to produce descriptive statistics and identify salient themes, respectively. Nearly all respondents stated that their work has been negatively (N=13) or both positively and negatively (N=5) affected by current immigration enforcement policies. Negative effects were most commonly related to immigration enforcement-related fear and uncertainty among patient or client populations. Positive effects most frequently referred to a sense of increased community organizing and greater cooperation among organizations. Similarly, the majority of service providers either reported an increase (N=8) or decrease (N=6) in service utilization due to changes in immigration enforcement policies. Increased service needs were primarily related to a need for public education about immigration enforcement policy changes, information about how new policies impact individuals’ service eligibility, legal status, and civil rights, as well as a need to correct misinformation. Decreased service utilization was primarily related to fear-related service avoidance. While providers observed changes in service utilization among undocumented immigrants and mixed-immigration status families, in particular, participants also noted ‘spillover’ effects on the larger Latinx community, including legal permanent and temporary residents, refugees or asylum seekers, and U.S. citizens. This study reveals preliminary insights into providers’ widespread concerns about the effects of current immigration enforcement policies on health, social, and legal service utilization among Latinx individuals. Further research is necessary to comprehensively assess impacts of immigration enforcement policies on service utilization in Latinx and immigrant communities. This information is critical to address gaps in service utilization and prevent an exacerbation of health disparities among Latinx, immigrant, and border populations. In a global climate of rising nationalism and xenophobia, it is critical for policymakers to be aware of the consequences of immigration enforcement policies on the utilization of essential services to protect the well-being of minority and immigrant communities.

Keywords: immigration enforcement, immigration policy, provider perceptions, service utilization

Procedia PDF Downloads 145
1121 Human Trafficking and Prostitution in Amsterdam

Authors: Isabel Roiz, Alejandra Cossio

Abstract:

This essay will talk about the problems of forced prostitution, human trafficking, and sexual exploitation in the Netherlands. This work conveys information from different sources stating the numbers and statistics of human trafficking throughout Europe and the different types of sexual exploitation as well as the means used for coercing victims into this illegal net. The research aims to inform and compare the way this business is handled and the ways used by criminals to lure and retain victims in spite of the law. It also tries to compare the laws in the Netherlands and Sweden regarding prostitution affects the illegal migration problems and how they change the ways those who work as prostitutes are treated. The aim of the paper is to take all of these aspects into consideration and reach a decision of what laws would most beneficiate the victims.

Keywords: human trafficking, prostitution, laws of migration, Amsterdam

Procedia PDF Downloads 346
1120 New Media and Social Media Laws and Ethics in United Arab Emirates

Authors: Ahmed Farouk Radwan, Sheren Mousa

Abstract:

There are many laws and regulations governing the use of new and social media in the United Arab Emirates. During the past few years, the importance of using these platforms in the fields of media and government communication has increased, as well as at the level of individual use. In 2016, the National Media Council Law was issued to regulate traditional and new media field, and gave the council the power to oversee and undertake the media affairs in the state. NMC is mandated to: Develop the UAE’s media policy, Draft media legislation and ensure its execution and Prohibited media content ,Co-ordinate the media policy between the emirates in line with the UAE’s domestic and foreign policy, Ensure support for the federation and project national unity. All media organizations in the UAE must comply with the regulations and rules issued by council. Social media influencers have to be licensed by NMC if they accept paid ads to be published on their accounts. The study explores other laws concerning of new media and social media regulations and ethics including Combatting Cybercrimes law, Combating Discrimination and Hatred law, The Government Guidelines for social media users in the UAE, The Guidelines for the practices of electronic participation and social networking, Copyright Law, and Child Rights Law. The study clarifies the legal articles, items and standards in all these laws which related with the new media and social platforms and also determines the prohibited digital practices and the cultural norms governing it.

Keywords: media laws, media ethics, new media , UAE

Procedia PDF Downloads 166
1119 The Formulation of the Mecelle and Other Codified Laws in the Ottoman Empire: Transformation Overturning the Sharia Principles

Authors: Tianqi Yin

Abstract:

The sharia had been the legislative basis in the Ottoman Empire since its emergence. The authority of sharia was superlative in the Islamic society compared to the power of the sulta, the nominal ruler of the nation, regulating essentially every aspect of people’s lives according to an ethical code. In modernity, however, as European sovereignty employed forces to re-engineer the Islamic world to make it more like their own, a society ruled by a state, the Ottoman legislation system encountered a great challenge of adopting codified laws to replace sharia with the formulation of the Mecelle being a prominent case. Interpretations of this transformation have been contentious, with the key debate revolving around whether these codified laws are authentic representations of sharia or alien legal formulations authorized by the modern nation-state under heavy European colonial influence. Because of the difference in methodology of the diverse theories, challenges toward having a universal conclusion on this issue remain. This paper argues that the formulation of the Mecelle and other codified laws is a discontinuity of sharia due to European modernity’s influence and that the emphasis on elements of Islamic laws is a tactic employed to promote this process. These codified laws signals a complete social transformation from the Islamic society ruled by the sharia to a replication of the European society that is ruled by a comprehensive ruling system of the modern state. In addition to advancing the discussion on the characterization of the codification movement in the Ottoman Empire in modernity, the research also promotes the determination of the nature of the modern codification movement globally.

Keywords: codification, mecelle, modernity, sharia, ottoman empire

Procedia PDF Downloads 89
1118 Artificial intelligence and Law

Authors: Mehrnoosh Abouzari, Shahrokh Shahraei

Abstract:

With the development of artificial intelligence in the present age, intelligent machines and systems have proven their actual and potential capabilities and are mindful of increasing their presence in various fields of human life in the fields of industry, financial transactions, marketing, manufacturing, service affairs, politics, economics and various branches of the humanities .Therefore, despite the conservatism and prudence of law enforcement, the traces of artificial intelligence can be seen in various areas of law. Including judicial robotics capability estimation, intelligent judicial decision making system, intelligent defender and attorney strategy adjustment, dissemination and regulation of different and scattered laws in each case to achieve judicial coherence and reduce opinion, reduce prolonged hearing and discontent compared to the current legal system with designing rule-based systems, case-based, knowledge-based systems, etc. are efforts to apply AI in law. In this article, we will identify the ways in which AI is applied in its laws and regulations, identify the dominant concerns in this area and outline the relationship between these two areas in order to answer the question of how artificial intelligence can be used in different areas of law and what the implications of this application will be. The authors believe that the use of artificial intelligence in the three areas of legislative, judiciary and executive power can be very effective in governments' decisions and smart governance, and helping to reach smart communities across human and geographical boundaries that humanity's long-held dream of achieving is a global village free of violence and personalization and human error. Therefore, in this article, we are going to analyze the dimensions of how to use artificial intelligence in the three legislative, judicial and executive branches of government in order to realize its application.

Keywords: artificial intelligence, law, intelligent system, judge

Procedia PDF Downloads 117
1117 Brazilian Public Security: Governability and Constitutional Change

Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari

Abstract:

Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.

Keywords: public security, governability, rule of law, federalism

Procedia PDF Downloads 677
1116 The Routes of Human Suffering: How Point-Source and Destination-Source Mapping Can Help Victim Services Providers and Law Enforcement Agencies Effectively Combat Human Trafficking

Authors: Benjamin Thomas Greer, Grace Cotulla, Mandy Johnson

Abstract:

Human trafficking is one of the fastest growing international crimes and human rights violations in the world. The United States Department of State (State Department) approximates some 800,000 to 900,000 people are annually trafficked across sovereign borders, with approximately 14,000 to 17,500 of these people coming into the United States. Today’s slavery is conducted by unscrupulous individuals who are often connected to organized criminal enterprises and transnational gangs, extracting huge monetary sums. According to the International Labour Organization (ILO), human traffickers collect approximately $32 billion worldwide annually. Surpassed only by narcotics dealing, trafficking of humans is tied with illegal arms sales as the second largest criminal industry in the world and is the fastest growing field in the 21st century. Perpetrators of this heinous crime abound. They are not limited to single or “sole practitioners” of human trafficking, but rather, often include Transnational Criminal Organizations (TCO), domestic street gangs, labor contractors, and otherwise seemingly ordinary citizens. Monetary gain is being elevated over territorial disputes and street gangs are increasingly operating in a collaborative effort with TCOs to further disguise their criminal activity; to utilizing their vast networks, in an attempt to avoid detection. Traffickers rely on a network of clandestine routes to sell their commodities with impunity. As law enforcement agencies seek to retard the expansion of transnational criminal organization’s entry into human trafficking, it is imperative that they develop reliable trafficking mapping of known exploitative routes. In a recent report given to the Mexican Congress, The Procuraduría General de la República (PGR) disclosed, from 2008 to 2010 they had identified at least 47 unique criminal networking routes used to traffic victims and that Mexico’s estimated domestic victims number between 800,000 adults and 20,000 children annually. Designing a reliable mapping system is a crucial step to effective law enforcement response and deploying a successful victim support system. Creating this mapping analytic is exceedingly difficult. Traffickers are constantly changing the way they traffic and exploit their victims. They swiftly adapt to local environmental factors and react remarkably well to market demands, exploiting limitations in the prevailing laws. This article will highlight how human trafficking has become one of the fastest growing and most high profile human rights violations in the world today; compile current efforts to map and illustrate trafficking routes; and will demonstrate how the proprietary analytical mapping analysis of point-source and destination-source mapping can help local law enforcement, governmental agencies and victim services providers effectively respond to the type and nature of trafficking to their specific geographical locale. Trafficking transcends state and international borders. It demands an effective and consistent cooperation between local, state, and federal authorities. Each region of the world has different impact factors which create distinct challenges for law enforcement and victim services. Our mapping system lays the groundwork for a targeted anti-trafficking response.

Keywords: human trafficking, mapping, routes, law enforcement intelligence

Procedia PDF Downloads 381
1115 Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types

Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke

Abstract:

The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age.

Keywords: cybercrime legislation, cyber attacks, consumer privacy and protection law, detection, electronic transaction law, prevention, privacy and data protection law, prohibition, prosecution

Procedia PDF Downloads 39
1114 Leadership Education for Law Enforcement Mid-Level Managers: The Mediating Role of Effectiveness of Training on Transformational and Authentic Leadership Traits

Authors: Kevin Baxter, Ron Grove, James Pitney, John Harrison, Ozlem Gumus

Abstract:

The purpose of this research is to determine the mediating effect of effectiveness of the training provided by Northwestern University’s School of Police Staff and Command (SPSC), on the ability of law enforcement mid-level managers to learn transformational and authentic leadership traits. This study will also evaluate the leadership styles, of course, graduates compared to non-attendees using a static group comparison design. The Louisiana State Police pay approximately $40,000 in salary, tuition, housing, and meals for each state police lieutenant attending the 10-week program of the SPSC. This school lists the development of transformational leaders as an increasing element. Additionally, the SPSC curriculum addresses all four components of authentic leadership - self-awareness, transparency, ethical/moral, and balanced processing. Upon return to law enforcement in roles of mid-level management, there are questions as to whether or not students revert to an “autocratic” leadership style. Insufficient evidence exists to support claims for the effectiveness of management training or leadership development. Though it is widely recognized that transformational styles are beneficial to law enforcement, there is little evidence that suggests police leadership styles are changing. Police organizations continue to hold to a more transactional style (i.e., most senior police leaders remain autocrats). Additionally, research in the application of transformational, transactional, and laissez-faire leadership related to police organizations is minimal. The population of the study is law enforcement mid-level managers from various states within the United States who completed leadership training presented by the SPSC. The sample will be composed of 66 active law enforcement mid-level managers (lieutenants and captains) who have graduated from SPSC and 65 active law enforcement mid-level managers (lieutenants and captains) who have not attended SPSC. Participants will answer demographics questions, Multifactor Leadership Questionnaire, Authentic Leadership Questionnaire, and the Kirkpatrick Hybrid Evaluation Survey. Analysis from descriptive statistics, group comparison, one-way MANCOVA, and the Kirkpatrick Evaluation Model survey will be used to determine training effectiveness in the four levels of reaction, learning, behavior, and results. Independent variables are SPSC graduates (two groups: upper and lower) and no-SPSC attendees, and dependent variables are transformational and authentic leadership scores. SPSC graduates are expected to have higher MLQ scores for transformational leadership traits and higher ALQ scores for authentic leadership traits than SPSC non-attendees. We also expect the graduates to rate the efficacy of SPSC leadership training as high. This study will validate (or invalidate) the benefits, costs, and resources required for leadership development from a nationally recognized police leadership program, and it will also help fill the gap in the literature that exists between law enforcement professional development and transformational and authentic leadership styles.

Keywords: training effectiveness, transformational leadership, authentic leadership, law enforcement mid-level manager

Procedia PDF Downloads 104
1113 From Protector to Violator: Assessing State's Role in Protecting Freedom of Religion in Indonesia

Authors: Manotar Tampubolon

Abstract:

Indonesia is a country that upholds the law, human rights and religious freedom. The freedom that implied in various laws and constitution (Undang-undang 1945) is not necessarily applicable in practice of religious life. In one side, the state has a duty as protector and guarantor of freedom, on the other side, however, it turns into one of the actors of freedom violations of religion minority. State action that interferes freedom of religion is done in various ways both intentionally or negligently or not to perform its obligations in the enforcement of human rights (human rights due diligence). Besides the state, non-state actors such as religious organizations, individuals also become violators of the rights of religious freedom. This article will discuss two fundamental issues that interfere freedom of religion in Indonesia after democratic era. In addition, this article also discusses a comprehensive state policy that discriminates minority religions to manifest their faith.

Keywords: religious freedom, constitution, minority faith, state actor

Procedia PDF Downloads 401
1112 An Analysis of Digital Forensic Laboratory Development among Malaysia’s Law Enforcement Agencies

Authors: Sarah K. Taylor, Miratun M. Saharuddin, Zabri A. Talib

Abstract:

Cybercrime is on the rise, and yet many Law Enforcement Agencies (LEAs) in Malaysia have no Digital Forensics Laboratory (DFL) to assist them in the attrition and analysis of digital evidence. From the estimated number of 30 LEAs in Malaysia, sadly, only eight of them owned a DFL. All of the DFLs are concentrated in the capital of Malaysia and none at the state level. LEAs are still depending on the national DFL (CyberSecurity Malaysia) even for simple and straightforward cases. A survey was conducted among LEAs in Malaysia owning a DFL to understand their history of establishing the DFL, the challenges that they faced and the significance of the DFL to their case investigation. The results showed that the while some LEAs faced no challenge in establishing a DFL, some of them took seven to 10 years to do so. The reason was due to the difficulty in convincing their management because of the high costs involved. The results also revealed that with the establishment of a DFL, LEAs were better able to get faster forensic result and to meet agency’s timeline expectation. It is also found that LEAs were also able to get more meaningful forensic results on cases that require niche expertise, compared to sending off cases to the national DFL. Other than that, cases are getting more complex, and hence, a continuous stream of budget for equipment and training is inevitable. The result derived from the study is hoped to be used by other LEAs in justifying to their management the benefits of establishing an in-house DFL.

Keywords: digital evidence, digital forensics, digital forensics laboratory, law enforcement agency

Procedia PDF Downloads 174
1111 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe

Authors: Shivalaxmi Arumugham

Abstract:

Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.

Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA

Procedia PDF Downloads 95
1110 Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups

Authors: Erhan Turgut, Salih Ergün, Abdülkadir Öz

Abstract:

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed.

Keywords: terrorism, counter-terrorism, military status law-enforcement, terrorist groups

Procedia PDF Downloads 459
1109 The Standard of Best Interest of the Child in Custody Adjudication under the Malaysian Laws

Authors: Roslina Che Soh

Abstract:

Best interest of the child has been the prevailing principle of the custody legislations of most nations in the world. The tremendous shift from parental rights to parental responsibilities throughout the centuries had made the principle of best interests of the child as the utmost matter which parents must uphold in child upbringing. Despite the commitment to this principle is significantly enshrined in the United Nation Convention on Rights of the Child, the content and application of the principle differs across borders. Differences persist notwithstanding many countries have experienced a substantial shift over the last several decades in the types of custodial arrangements that are thought to best serve children’s interests. The laws in Malaysia similarly uphold this principle but do not provide further deliberation on the principle itself. The principle is entirely developed by the courts through decided cases. Thus, this paper seeks to discuss the extent of the application of best interest of the child principle in custody disputes. In doing so, it attempts to provide an overview of the current laws and the approach of the Civil and the Shariah courts in Malaysia in applying the principle in determining custody disputes. For purposes of comparison, it briefly examines the legislations and the courts practices in Australia and England on this matter. The purpose is to determine the best standard to be adopted by Malaysia and to propose improvement to the laws whenever appropriate.

Keywords: child custody, best interest, Malaysian law, bioinformatics, biomedicine

Procedia PDF Downloads 273
1108 The Social Area Disclosure to Reduce Conflicts between Community and the State: A Case of Mahakan Fortress, Bangkok

Authors: Saowapa Phaithayawat

Abstract:

The purposes of this study are 1) to study the over 20-year attempt of Mahakan fort community to negotiate with Bangkok Metropolitan Administration (BMA) to remain in their residential area belonging to the state, and 2) to apply the new social and cultural dimension between the state and the community as an alternative for local participation in keeping their residential area. This is a qualitative research, and the findings reveal that the community claimed their ancestors’ right as owners of this piece of land for over 200 years. The community, therefore, requested to take part in the preservation of land, culture and local intellect and the area management in terms of being a learning resource on the cultural road in Rattanakosin Island. However, BMA imposed the law concerning the community area relocation in Rattanakosin Island. The result of law enforcement led to the failure of the area relocation, and the hard hit on physical structure of the area including the overall deterioration of the cultural road renovated in the year 1982, the 200 years’ celebration of Bangkok. The enforcement of law by the state required the move of the community, and the landscape improvement based on the capital city plan. However, this enforcement resulted in the unending conflicts between the community and the state, and the solution of this problem was unclear. At the same time the community has spent a long time opposing the state’s action, and preparing themselves by administrating the community behind Mahakan fortress with community administrative committee under the suggestion of external organization by registering all community members, providing funds for community administration. At the meantime the state lacked the continuation of the enforcement due to political problem and BMA’s administration problem. It is, therefore, suggested that an alternative solution to this problem lie at the negotiation between the state and the community with the purpose of the collaboration between the two to develop the area under the protective law of each side.

Keywords: Pom-Mahakan community, reduction of conflicts, social area disclosure, residential area

Procedia PDF Downloads 313
1107 A Statistical Study on Young UAE Driver’s Behavior towards Road Safety

Authors: Sadia Afroza, Rakiba Rouf

Abstract:

Road safety and associated behaviors have received significant attention in recent years, reflecting general public concern. This paper portrays a statistical scenario of the young drivers in UAE with emphasis on various concern points of young driver’s behavior and license issuance. Although there are many factors contributing to road accidents, statistically it is evident that age plays a major role in road accidents. Despite ensuring strict road safety laws enforced by the UAE government, there is a staggering correlation among road accidents and young driver’s at UAE. However, private organizations like BMW and RoadSafetyUAE have extended its support on conducting surveys on driver’s behavior with an aim to ensure road safety. Various strategies such as road safety law enforcement, license issuance, adapting new technologies like safety cameras and raising awareness can be implemented to improve the road safety concerns among young drivers.

Keywords: driving behavior, Graduated Driver Licensing System (GLDS), road safety, UAE drivers, young drivers

Procedia PDF Downloads 260
1106 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 113
1105 Client Importance and Audit Quality under Civil Law versus Common Law Societies

Authors: Kelly Grani Yuen

Abstract:

Accounting scandals and auditing frauds are perceived to be driven by aggressive companies and misrepresentation of audit reports. However, local legal systems and law enforcements may affect the services auditors provide to their ‘important’ clients. Under the civil law and common law jurisdictions, the standard setters, the government, and the regulatory bodies treat cases differently. As such, whether or not different forms of legal systems and extent of law enforcement plays an important role in auditor’s Audit Quality is a question this paper attempts to explore. The paper focuses on the investigation in Asia, where Hong Kong represents the common-law jurisdiction, while Taiwan and China represent the civil law jurisdiction. Only the ten reputable accounting firms are used in this study due to the differences in rankings and establishments of some of the small local audit firms. This will also contribute to the data collected between the years 2007-2013. By focusing on the use of multiple regression based on the dependent (Audit Quality) and independent variables (Client Importance, Law Enforcement, and Press Freedom), six different models are established. Results demonstrate that since different jurisdictions have different legal systems and market regulations, auditor’s treatment on ‘important’ clients will vary. However, with the moderators in place (law enforcement and press freedom), the relationship between client importance and audit quality may be smoothed out. With that in mind, this study contributes to local governments and standard setters’ consideration on legal reform and proper law enforcement in the market. Perhaps, with such modifications on the economic systems, collusion between companies and auditors can finally be put to a halt.

Keywords: audit quality, client importance, jurisdiction, modified audit opinions

Procedia PDF Downloads 409
1104 Gender Equality and the Politics of Presence among the Maasai in Kenya

Authors: Shillah Memusi

Abstract:

Underrepresentation of women in governance structures is a global phenomenon, with patriarchal considerations being among the main, if not the top, reason for this in Sub Saharan Africa. This paper demonstrates that gender norms and informal rules have perpetuated a culture of stereotypical gender roles that have limited women’s public participation and leadership in society. To achieve this, the paper explores barriers to women’s political engagement, and how these are navigated in the face of gender equality laws. Situated in Kenya’s Maasai community, the paper investigates the influence of set laws on the increased involvement of women from the patriarchal community in the political economy. It gives special attention to the intersectionality of formal and informal laws and the subsequent interpretation and implementation of gender equality. The paper then concludes by demonstrating the benefits of exploring alternative gender equality pathways, as informed by contextual realities of settings such as patriarchal communities.

Keywords: equality, Kenya, patriarchy, public participation, women

Procedia PDF Downloads 299
1103 From Knives to Kites: Developments and Dilemmas around the Use of Force in the Israeli–Palestinian Conflict since "Protective Edge"

Authors: Hilly Moodrick-Even Khen

Abstract:

This study analyzes the legal regulation of the use of force in international law in the context of three emerging Palestinian forms of struggle against Israeli occupation: the Knife Intifada, Gaza border disturbances, and the launching of incendiary kites. It discusses what legal paradigms or concepts should regulate the type and level of force used in each situation—a question that is complicated by various dilemmas—and appraises the Israel Defence Forces policies tailored in response. Methodologically, the study is based on analysis of scholarship on the conceptual legal issues as well as dicta of the courts. It evaluates the applicability of two legal paradigms regulating the use of force in military operations—(i) the conduct of hostilities and (ii) law enforcement—as well as the concept of self-defense in international law and the escalation of force procedure. While the “Knife Intifada” clearly falls under the law enforcement paradigm, the disturbances at the border and the launching of incendiary kites raise more difficult questions, as applying law enforcement, especially in the latter case, can have undesirable ramifications for safeguarding humanitarian interests. The use of force in the cases of the border disturbances and the incendiary kites should thus be regulated, mutatis mutandis, by the concept of self-defense and escalation of force procedures; and in the latter case, the hostilities paradigm can also be applied. The study provides a factual description and analysis of the background and nature of the forms of struggle in Gaza and the West Bank—in each case surveying the geo-political developments since operation Protective Edge, contextualizing how the organized and unorganized violent activities evolved, and analyzing them in terms of level of organization and intensity. It then presents the two paradigms of the use of force—law enforcement and conduct of hostilities—and the concept of self-defense. Lastly, it uses the factual findings as the basis for legally analyzing which paradigm or concept regulating the use of force applies for each form of struggle. The study concludes that in most cases, the concept of self-defense is preferable to the hostilities or the law enforcement paradigms, as it best safeguards humanitarian interests and ensures the least loss of civilian lives.

Keywords: Israeli-Palestinian conflict, self defense, terrorism, use of force

Procedia PDF Downloads 122
1102 The Consequences of Complaint Offenses against Copyright Protection

Authors: Chryssantus Kastowo, Theresia Anita Christiani, Anny Retnowati

Abstract:

Copyright infringement as a form of infringement does not always mean causing harm to the creator. This can be proven with so many copyright violations in society and there is no significant law enforcement effort when compared with the violations that occurred. Copyright law as a form of appreciation from the state to the creator becomes counter productive if there is omission of violations. The problem raised in this article is how is the model of copyright regulation in accordance with the purpose of the law of copyright protection. This article is based on normative legal research focusing on secondary data. The analysis used is a conceptual approach. The analysis shows that the regulation of copyright emphasizes as a subjective right that is wholly within the author's power. This perspective will affect the claim of rights by the creator or allow violations. The creator is obliged to maintain the overall performance of copyright protection, especially in the event of a violation.

Keywords: copyright, enforcement, law, violation

Procedia PDF Downloads 131
1101 Conflating Voluntary Sex Work and Trafficked Sex Work in Malaysia

Authors: Haezreena Begum Abdul Hamid

Abstract:

This article will explore the conflation between voluntary sex work and trafficked sex work. In doing so, the article will analyse the meaning of trafficking according to the United Nations ‘Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children’ and the Malaysian Anti-Trafficking in Persons and Anti-Migrant Smuggling Act, 2007 (ATIP), and discuss the ambiguities that may arise in understanding the term. While the law on human trafficking has long been understood by scholars, key stakeholders, and enforcement officers, identifying a victim of trafficking is far from being straight forward. This is because of the diverse understanding on sex trafficking and sex work, and the fact that ‘consent’ by trafficked persons remains irrelevant in cases of trafficking. As a result, women who voluntarily engage in sex work are sometimes categorised as ‘trafficked’ and are ‘rescued’ by the authorities in the name of ‘protection’, while those who insist of having agency can be charged for violating the immigration laws. In light of such circumstances, this article aims to explore the conflation between voluntary sex work and trafficked sex work and how such conflation have succeeded in fostering distrust between sex workers and authorities.

Keywords: voluntary sex work, trafficked sex work, sex work, coercion, protection

Procedia PDF Downloads 239