Search results for: investor protection
2427 An Online Adaptive Thresholding Method to Classify Google Trends Data Anomalies for Investor Sentiment Analysis
Authors: Duygu Dere, Mert Ergeneci, Kaan Gokcesu
Abstract:
Google Trends data has gained increasing popularity in the applications of behavioral finance, decision science and risk management. Because of Google’s wide range of use, the Trends statistics provide significant information about the investor sentiment and intention, which can be used as decisive factors for corporate and risk management fields. However, an anomaly, a significant increase or decrease, in a certain query cannot be detected by the state of the art applications of computation due to the random baseline noise of the Trends data, which is modelled as an Additive white Gaussian noise (AWGN). Since through time, the baseline noise power shows a gradual change an adaptive thresholding method is required to track and learn the baseline noise for a correct classification. To this end, we introduce an online method to classify meaningful deviations in Google Trends data. Through extensive experiments, we demonstrate that our method can successfully classify various anomalies for plenty of different data.Keywords: adaptive data processing, behavioral finance , convex optimization, online learning, soft minimum thresholding
Procedia PDF Downloads 1672426 Jurisdictional Issues between Competition Law and Data Protection Law in Protection of Privacy of Online Consumers
Authors: Pankhudi Khandelwal
Abstract:
The revenue models of digital giants such as Facebook and Google, use targeted advertising for revenues. Such a model requires huge amounts of consumer data. While the data protection law deals with the protection of personal data, however, this data is acquired by the companies on the basis of consent, performance of a contract, or legitimate interests. This paper analyses the role that competition law can play in evading these loopholes for the protection of data and privacy of online consumers. Digital markets have certain distinctive features such as network effects and feedback loop, which gives incumbents of these markets a first-mover advantage. This creates a situation where the winner takes it all, thus creating entry barriers and concentration in the market. It has been also seen that this dominant position is then used by the undertakings for leveraging in other markets. This can be harmful to the consumers in form of less privacy, less choice, and stifling innovation, as seen in the cases of Facebook Cambridge Analytica, Google Shopping, and Google Android. Therefore, the article aims to provide a legal framework wherein the data protection law and competition law can come together to provide a balance in regulating digital markets. The issue has become more relevant in light of the Facebook decision by German competition authority, where it was held that Facebook had abused its dominant position by not complying with data protection rules, which constituted an exploitative practice. The paper looks into the jurisdictional boundaries that the data protection and competition authorities can work from and suggests ex ante regulation through data protection law and ex post regulation through competition law. It further suggests a change in the consumer welfare standard where harm to privacy should be considered as an indicator of low quality.Keywords: data protection, dominance, ex ante regulation, ex post regulation
Procedia PDF Downloads 1832425 Factors Affecting the Effective Management of the Employee Welfare Fund at the Department of Labour Protection and Welfare
Authors: Nareerut Rodwring
Abstract:
The purposes of this research were to study the current problems of the management of welfare fund at the department of labor protection and welfare, to study important factors affecting the management of welfare fund at the department of labor protection and welfare, to study major influences of the management of welfare fund at the department of labor protection and welfare, and finally to propose the proper guidelines for the management of welfare fund at the department of labor protection and welfare. This research study utilized the information from document, laws, rules, and regulations of the government, handbook for welfare, and government policy in the past. Moreover, the qualitative research was conducted by retrieving insight information from key informants, 15 persons for the committee of welfare employees, and 10 persons from a high level of management in the welfare area, academics, and experts. In terms of quantitative method, the study covers all 76 provinces and 10 areas of Bangkok. Independent variables included strategy, structure, shared value, system, whereas the dependent variables included the management factors such as speed, punctuation, and quality of work.Keywords: strategy, welfare, labor protection, management
Procedia PDF Downloads 1792424 The Relationship Between Policy Design and Poverty Reduction: The Case of Ghana
Authors: Joseph Kwame Sarfo-Adu
Abstract:
Social protection programs have been rolled out by successive governments in the quest of bridging the inequality gap in Ghana. Despite notable positive impacts of these programs across the country, there still remains worrying experience of the exclusion of the poor and vulnerable especially in rural Ghana Notwithstanding the rhetoric of participation within the discussion of social protection programs, less attention has been given to the design of these programs. In view of this, the study seeks to address how social protection programs are designed to address the needs of the poor. This study focused on five selected social protection programs in Ghana because they are programs with nationwide coverage. Qualitative thematic analysis was applied to analyze our data with the use of the Nvivo 12 version. We found out that there is a strong link between policy design and poverty alleviation. Our findings revealed that a well-designed program can significantly alleviate poverty, a poorly designed program can create more damage.Keywords: social protection, poverty alleviation, policy design, effective outcome
Procedia PDF Downloads 1632423 Simulation of Surge Protection for a Direct Current Circuit
Authors: Pedro Luis Ferrer Penalver, Edmundo da Silva Braga
Abstract:
In this paper, the performance of a simple surge protection for a direct current circuit was simulated. The protection circuit was developed from modified electric macro models of a gas discharge tube and a transient voltage suppressor diode. Moreover, a combination wave generator circuit was used as source of energy surges. The simulations showed that the circuit presented ensures immunity corresponding with test level IV of the IEC 61000-4-5:2014 international standard. The developed circuit can be modified to meet the requirements of any other equipment to be protected. Similarly, the parameters of the combination wave generator can be changed to provide different surge amplitudes.Keywords: combination wave generator, IEC 61000-4-5, Pspice simulation, surge protection
Procedia PDF Downloads 3262422 Interconnected Market Hypothesis: A Conceptual Model of Individualistic, Information-Based Interconnectedness
Authors: James Kinsella
Abstract:
There is currently very little understanding of how the interaction between in- vestors, consumers, the firms (agents) affect a) the transmission of information, and b) the creation and transfer of value and wealth between these two groups. Employing scholarly ideas from multiple research areas (behavioural finance, emotional finance, econo-biology, and game theory) we develop a conceptual the- oretic model (the ‘bow-tie’ model) as a framework for considering this interaction. Our bow-tie model views information transfer, value and wealth creation, and transfer through the lens of “investor-consumer connection facilitated through the communicative medium of the ‘firm’ (agents)”. We confront our bow-tie model with theoretical and practical examples. Next, we utilise consumer and business confidence data alongside index data, to conduct quantitative analy- sis, to support our bow-tie concept, and to introduce the concept of “investor- consumer connection”. We highlight the importance of information persuasiveness, knowledge, and emotional categorization of characteristics in facilitating a communicative relationship between investors, consumers, and the firm (agents), forming academic and practical applications of the conceptual bow-tie model, alongside applications to wider instances, such as those seen within the Covid-19 pandemic.Keywords: behavioral finance, emotional finance, economy-biology, social mood
Procedia PDF Downloads 1262421 Modern Trends in Pest Management Agroindustry
Authors: Amarjit S Tanda
Abstract:
Integrated Pest Management Technology (IPMT) offers a crop protection model with sustainable agriculture production with minimum damage to the environment and human health. A concept of agro-ecological crop protection seems unsuitable under dynamic environmental systems. To remedy this, we are proposing Genetically Engineered Crop Protection System (GECPS), as an alternate concept in IPMT that suggests how GE cultivars can be optimally put to the service of crop protection. Genetically engineered cultivars which are developed by gene editing biotechnology may provide a preventive defense against the insect pests and plant diseases, a suitable alternative crop system for blending in IPMT program, in the future agro-industry.Keywords: integrated, pest, management, technology
Procedia PDF Downloads 732420 Protection of Minor's Privacy in Bosnian Herzegovinian Media (Legal Regulation and Current Media Reporting)
Authors: Ilija Musa
Abstract:
Positive legal regulation of juvenile privacy protection, current state of showing a child in BH media and possibilities of a child’s privacy protection by more adequate media legislature which should be arranged in accordance to recommendations of the UN Committee on the Rights of the Child for Bosnia and Herzegovina. Privacy of the minors in Bosnian-Herzegovinian media is insufficiently legally arranged. Due to the fact that there is no law on media area arrangement at the state level, electronic media are under jurisdiction of Communications regulatory agency, which at least partially, regulated the sector of radio and television broadcasting by adequate protection of child’s privacy. However, print and online media are under jurisdiction of non-governmental association Print and online media council in B&H which is not authorized to punish violators of this body’s Codex, what points out the necessity of passing the unique media law which would enable sanctioning the child’s privacy violation. The analysis of media content, which is a common violation of the child's privacy, analysis of positive legislation which regulates the media, confirmed the working hypothesis by which the minor’s protection policy in BH media is not protected at the appropriate level. Taking this into consideration, in the conclusion of this article the author gives recommendations for the regulation of legal protection of minor’s privacy in BH media.Keywords: children, media, legislation, privacy protection, Bosnia Herzegovina
Procedia PDF Downloads 4922419 Subjective Probability and the Intertemporal Dimension of Probability to Correct the Misrelation Between Risk and Return of a Financial Asset as Perceived by Investors. Extension of Prospect Theory to Better Describe Risk Aversion
Authors: Roberta Martino, Viviana Ventre
Abstract:
From a theoretical point of view, the relationship between the risk associated with an investment and the expected value are directly proportional, in the sense that the market allows a greater result to those who are willing to take a greater risk. However, empirical evidence proves that this relationship is distorted in the minds of investors and is perceived exactly the opposite. To deepen and understand the discrepancy between the actual actions of the investor and the theoretical predictions, this paper analyzes the essential parameters used for the valuation of financial assets with greater attention to two elements: probability and the passage of time. Although these may seem at first glance to be two distinct elements, they are closely related. In particular, the error in the theoretical description of the relationship between risk and return lies in the failure to consider the impatience that is generated in the decision-maker when events that have not yet happened occur in the decision-making context. In this context, probability loses its objective meaning and in relation to the psychological aspects of the investor, it can only be understood as the degree of confidence that the investor has in the occurrence or non-occurrence of an event. Moreover, the concept of objective probability does not consider the inter-temporality that characterizes financial activities and does not consider the condition of limited cognitive capacity of the decision maker. Cognitive psychology has made it possible to understand that the mind acts with a compromise between quality and effort when faced with very complex choices. To evaluate an event that has not yet happened, it is necessary to imagine that it happens in your head. This projection into the future requires a cognitive effort and is what differentiates choices under conditions of risk and choices under conditions of uncertainty. In fact, since the receipt of the outcome in choices under risk conditions is imminent, the mechanism of self-projection into the future is not necessary to imagine the consequence of the choice and the decision makers dwell on the objective analysis of possibilities. Financial activities, on the other hand, develop over time and the objective probability is too static to consider the anticipatory emotions that the self-projection mechanism generates in the investor. Assuming that uncertainty is inherent in valuations of events that have not yet occurred, the focus must shift from risk management to uncertainty management. Only in this way the intertemporal dimension of the decision-making environment and the haste generated by the financial market can be cautioned and considered. The work considers an extension of the prospectus theory with the temporal component with the aim of providing a description of the attitude towards risk with respect to the passage of time.Keywords: impatience, risk aversion, subjective probability, uncertainty
Procedia PDF Downloads 1072418 Impact of Very Small Power Producers (VSPP) on Control and Protection System in Distribution Networks
Authors: Noppatee Sabpayakom, Somporn Sirisumrannukul
Abstract:
Due to incentive policies to promote renewable energy and energy efficiency, high penetration levels of very small power producers (VSPP) located in distribution networks have imposed technical barriers and established new requirements for protection and control of the networks. Although VSPPs have economic and environmental benefit, they may introduce negative effects and cause several challenges on the issue of protection and control system. This paper presents comprehensive studies of possible impacts on control and protection systems based on real distribution systems located in a metropolitan area. A number of scenarios were examined primarily focusing on state of islanding, and un-disconnected VSPP during faults. It is shown that without proper measures to address the issues, the system would be unable to maintain its integrity of electricity power supply for disturbance incidents.Keywords: control and protection systems, distributed generation, renewable energy, very small power producers
Procedia PDF Downloads 4772417 Access to Health Data in Medical Records in Indonesia in Terms of Personal Data Protection Principles: The Limitation and Its Implication
Authors: Anny Retnowati, Elisabeth Sundari
Abstract:
This research aims to elaborate the meaning of personal data protection principles on patient access to health data in medical records in Indonesia and its implications. The method uses normative legal research by examining health law in Indonesia regarding the patient's right to access their health data in medical records. The data will be analysed qualitatively using the interpretation method to elaborate on the limitation of the meaning of personal data protection principles on patients' access to their data in medical records. The results show that patients only have the right to obtain copies of their health data in medical records. There is no right to inspect directly at any time. Indonesian health law limits the principle of patients' right to broad access to their health data in medical records. This restriction has implications for the reduction of personal data protection as part of human rights. This research contribute to show that a limitaion of personal data protection may abuse the human rights.Keywords: access, health data, medical records, personal data, protection
Procedia PDF Downloads 932416 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report
Authors: Elizabeta Krstić Vukelja
Abstract:
Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.Keywords: regulation, healthcare system, personal dana protection, quality data assurance
Procedia PDF Downloads 382415 Techno-Economic Analysis of Solar Energy for Cathodic Protection of Oil and Gas Buried Pipelines in Southwestern of Iran
Authors: M. Goodarzi, M. Mohammadi, A. Gharib
Abstract:
Solar energy is a renewable energy which has attracted special attention in many countries. Solar cathodic protectionsystems harness the sun’senergy to protect underground pipelinesand tanks from galvanic corrosion. The object of this study is to design and the economic analysis a cathodic protection system by impressed current supplied with solar energy panels applied to underground pipelines. In the present study, the technical and economic analysis of using solar energy for cathodic protection system in southwestern of Iran (Khuzestan province) is investigated. For this purpose, the ecological conditions such as the weather data, air clearness and sunshine hours are analyzed. The economic analyses were done using computer code to investigate the feasibility analysis from the using of various energy sources in order to cathodic protection system. The overall research methodology is divided into four components: Data collection, design of elements, techno economical evaluation, and output analysis. According to the results, solar renewable energy systems can supply adequate power for cathodic protection system purposes.Keywords: renewable energy, solar energy, solar cathodic protection station, lifecycle cost method
Procedia PDF Downloads 5422414 Judicial Trendsetting: European Courts as Pacemakers for Defining, Redefining, and Potentially Expanding Protection for People Fleeing Armed Conflict and Natural Disasters
Authors: Charlotte Lülf
Abstract:
Migration flows cannot be tackled by single states but need to be addressed as a transnational and international responsibility. However, the current international framework staggers. Widely excluded from legal protection are people that flee from the indiscriminate effects of an armed conflict as well as people fleeing natural disasters. This paper as part of an on-going PhD Project deals with the current and partly contradicting approaches to the protection of so-called war- and climate refugees in the European Union. The analysis will emphasize and evaluate the role of the European judiciary to define, redefine and potentially expand legal protection. Changing jurisprudential practice of national and regional courts will be assessed, as will be their dialogue to interpret the international obligations of human rights law, migration laws and asylum laws in an interacting world.Keywords: human rights law, asylum law, migration, refugee protection
Procedia PDF Downloads 2662413 Porosity and Ultraviolet Protection Ability of Woven Fabrics
Authors: Polona Dobnik Dubrovski, Abhijit Majumdar
Abstract:
The increasing awareness of negative effects of ultraviolet radiation and regular, effective protection are actual themes in many countries. Woven fabrics as clothing items can provide convenient personal protection however not all fabrics offer sufficient UV protection. Porous structure of the material has a great effect on UPF. The paper is focused on an overview of porosity in woven fabrics, including the determination of porosity parameters on the basis of an ideal geometrical model of porous structure. Our experiment was focused on 100% cotton woven fabrics in a grey state with the same yarn fineness (14 tex) and different thread densities (to achieve relative fabric density between 59 % and 87 %) and different type of weaves (plain, 4-end twill, 5-end satin). The results of the research dealing with the modelling of UPF and the influence of volume and open porosity of tested samples on UPF are exposed. The results show that open porosity should be lower than 12 % to achieve good UV protection according to AS/NZ standard of tested samples. The results also indicate that there is no direct correlation between volume porosity and UPF, moreover, volume porosity namely depends on the type of weave and affects UPF as well. Plain fabrics did not offer any UV protection, while twill and satin fabrics offered good UV protection when volume porosity was less than 64 % and 66 %, respectively.Keywords: fabric engineering, UV radiation, porous materials, woven fabric construction, modelling
Procedia PDF Downloads 2682412 Rural Tourism Planning from the Perspective of Development and Protection of the River and Regional Integration: Taking Nanliangdu Village as an Example
Authors: Yadi Xu, Qingping Luo
Abstract:
Currently, there is a great tendency that more and more villages in China are trying to increase income by development of tourism. 'Beautiful Rural Construction' provides an excellent opportunity for the development of tourism. In this context, development orientation, transportation routes, and tourism service facilities are analyzed under the perspective of existing landscape utilization and regional integration based on the development tourism industry of the Nanliangdu Village in Jingxing Town, Shijiazhuang Province as a research object. In the program, the biggest issue is the contradiction between the ecological development and protection of the river and the development of economy. How to deal with the relationship between protection and development is the key to the design of this case. Furthermore, the streets and courtyard space, existing buildings, public environment, specific landscape of the ancient village with a history of thousands of years have strong regional characteristics. The article is actively exploring for suggestions and countermeasures to promote the development premised on protection and based on a regional view.Keywords: development, integration, protection, rural tourism
Procedia PDF Downloads 2952411 An Implementation of Incentive Systems within Property Life Cycles Will Reward Investors, Planners and Users
Authors: Nadine Wills
Abstract:
The whole life thinking of buildings (independent if these are commercial properties or residential properties) will raise if incentive systems are provided to investors, planners and users. The Use of Building Information Modelling (BIM)-Systems offers planners the possibility to plan and re-plan buildings for decades after a period of utilization without spending many capacities. The strategy-incentive should be to plan the building in a way that makes rescheduling possible by changing just parameters in the system and not re-planning the whole building. If users receive the chance to patient incentive systems, the building stock will have a long life period. Business models of tenant electricity or self-controlled operating costs are incentive systems for building –users to let fixed running costs decline without producing damages due to wrong purposes. BIM is the controlling body to ensure that users do not abuse the incentive solution and take negative influence on the building stock. The investor benefits from the planner’s and user’s incentives: the fact that the building becomes useful for the whole life without making unnecessary investments provides possibilities to make investments in different assets. Moreover, the investor gains the facility to achieve higher rents by merchandise the property with low operating costs. To execute BIM offers whole property life cycles.Keywords: BIM, incentives, life cycle, sustainability
Procedia PDF Downloads 2972410 Intellectual Property and SMEs in the Baltic Sea Region: A Comparative Study on the Use of the Utility Model Protection
Authors: Christina Wainikka, Besrat Tesfaye
Abstract:
Several of the countries in the Baltic Sea region are ranked high in international innovations rankings, such as the Global Innovation Index and European Innovation Scoreboard. There are however some concerns in the performance of different countries. For example, there is a widely spread notion about “The Swedish Paradox”. Sweden is ranked high due to investments in R&D and patent activity, but the outcome is not as high as could be expected. SMEs in Sweden are also below EU average when it comes to registering intellectual property rights such as patents and trademarks. This study is concentrating on the protection of utility model. This intellectual property right does not exist in Sweden, but in for example Finland and Germany. The utility model protection is sometimes referred to as a “patent light” since it is easier to obtain than the patent protection but at the same time does cover technical solutions. In examining statistics on patent activities and activities in registering utility models it is clear that utility model protection is scarcely used in the countries that have the protection. In Germany 10 577 applications were made in 2021. In Finland there were 259 applications made in 2021. This can be compared with patent applications that were 58 568 in Germany in 2021 and 1 662 in Finland in 2021. In Sweden there has never been a protection for utility models. The only protection for technical solutions is patents and business secrets. The threshold for obtaining a patent is high, due to the legal requirements and the costs. The patent protection is there for often not chosen by SMEs in Sweden. This study examines whether the protection of utility models in other countries in the Baltic region provide SMEs in these countries with better options to protect their innovations. The legal methodology is comparative law. In order to study the effects of the legal differences statistics are examined and interviews done with SMEs from different industries.Keywords: baltic sea region, comparative law, SME, utility model
Procedia PDF Downloads 1142409 Protection of Television Programme Formats in Comparative Law
Authors: Mustafa Arikan, Ibrahim Ercan
Abstract:
In this paper, protection of program formats was investigated in terms of program formats. Protection of program formats was studied in the French Law in the sense of competition law and CPI. Since the English Judicial system exhibits differences from the legal system of Continental Europe, its investigation bears a special significance. The subject was also handled in German Law at length. Indeed, German Law was investigated in detail within the overall framework of the study. Here, the court decisions in the German Law and the views in the doctrine were expressed in general. There are many court decisions in the American legal system concerning the subject. These decisions also present alternatives in terms of a solution to the problem.Keywords: comparative law, protection of television programme formats, intellectual property, american legal system
Procedia PDF Downloads 3312408 Tax Avoidance During The Financial Crisis: Role Of Independent Commissioners And External Auditors
Authors: Yasir Ramadhan
Abstract:
This study aims to investigate tax avoidance practices when a financial crisis occurs due to the effects of the COVID-19 pandemic. This study also finds out how the influence of independent commissioners and external auditors on tax avoidance practices during the COVID-19 pandemic. Tax avoidance practices are measured by the current ETR. The role of the independent board of commissioners is measured by the proportion of independent commissioners in the composition of the board of commissioners, while the external auditor is measured by audit quality. In this study, there were 342 observations of companies listed on the Indonesia Stock Exchange from 2019 to 2020. This study used the difference-in-differences (DiD) method in data analysis. The results of this study indicate that companies do tax avoidance during the COVID-19 pandemic. Meanwhile, independent commissioners and qualified audits are not proven to be able to negate tax avoidance practices during the COVID-19 Pandemic. These results also show that a higher proportion of independent commissioners and audit quality are not sufficient for countries with low levels of auditor litigation and investor protection and weak regulatory frameworks.Keywords: audit, commissioner, tax avoidance, COVID-19 pandemic
Procedia PDF Downloads 1472407 The Research of Effectiveness of Animal Protection Act Implementation Reducing Animal Abuse
Authors: Yu Ling Chang
Abstract:
Since the United Nations announced Universal Declaration of Human Rights in 1948, people are paying more and more attention to the value of lives. On the other hand, life education is being vigorously pushed in different countries. Unfortunately, the results have been only moderately successful by reason that the concept is not implemented in everyone’s daily life. Even worse, animal abuse and killing events keep happening. This research is focused on generalizing a conclusion from different countries’ Animal Protection Act and actual execution by case studies, in order to make an approach of whether the number of animal abuse is directly influenced by different laws and regimes or not. It concludes the central notion and spirit of Animal Protection Act in German, Japan, and Taiwan. Providing the reference of specific schemes and analysis based on Taiwanese social culture.Keywords: animal abuse, Animal Management Act, Animal Protection Act, social culture
Procedia PDF Downloads 2142406 The Economic Valuation of Public Support Ecosystem: A Contingent Valuation Study in Setiu Wetland, Terengganu Malaysia
Authors: Elmira Shamshity
Abstract:
This study aimed to explore the economic approach for the Setiu wetland evaluation as a future protection strategy. A questionnaire survey was used based on the single-bounded dichotomous choice, contingent valuation method to differentiate individuals’ Willingness to Pay (WTP) for the conservation of the Setiu wetland. The location of study was Terengganu province in Malaysia. The results of the random questionnaire survey showed that protection of Setiu ecosystem is important to the indigenous community. The mean WTP for protection of ecosystem Setiu wetland was 12.985 Ringgit per month per household for 10 years. There was significant variation in the stated amounts of WTP based on the respondents’ knowledge, household income, educational level, and the bid amounts. The findings of this study may help improving understanding the WTP of indigenous people for the protection of wetland, and providing useful information for policy makers to design an effective program of ecosystem protection.Keywords: willingness to pay, ecosystem, setiu wetland, Terengganu Malaysia
Procedia PDF Downloads 6052405 The Need to Enhance Online Consumer Protection in KSA
Authors: Abdulrahman Aloufi
Abstract:
E-commerce has evolved to become a functional and mainstream tool of global trading, including in the Kingdom of Saudi Arabia. Consequently, online consumers need protection just as much as consumers in the offline world. In 2019, the Ministry of Commerce in Saudi Arabia established a so-called ‘e-commerce law’; however, this law does not cover the court enforcement of contracts entered into by international vendors, so it is not applicable in cross-border situations. The purpose of this paper is to identify the gaps present in this new e-commerce law in Saudi Arabia.Keywords: consumer protection, e-commerce law, Saudi consumer, international vendor
Procedia PDF Downloads 1752404 The Potential Dark and Bright Part of Behavioral Biases in Investor’s Investment Decisions: Mediated Moderation of Stock Market Anomalies and Financial Literacy
Authors: Zain Ul Abideen
Abstract:
The study examines the potentially dark and bright parts of behavioral biases in investors’ investment decisions in the Pakistani equity market. These biases, directly and indirectly, play a comprehensive role in controlling and deciding the investor’s investment decisions. Stock market anomalies are used as a mediator, while financial literacy is used as a moderator to check the mentioned relationship. The sample consisted of investors who have trading experience of more than two years in the stock market. The result indicates that calendar anomalies do not mediate between overconfidence bias and investment decisions. However, the study investigates the mediating role of fundamental and technical anomalies between overconfidence bias and investment decisions. Furthermore, calendar anomalies play a significant role between the disposition effect and investment decisions. Calendar anomalies also mediate between herding bias and investment decisions. Financial literacy significantly moderates between behavioral biases and stock market anomalies. This research would be beneficial for individual and professional investors in their investment decisions. They should be financially literate, consequently less biased and have no market anomalies. Investors in emerging and developed economies can make optimal decisions in their respective stock markets.Keywords: behavioral biases, financial literacy, stock market anomalies, investment decision
Procedia PDF Downloads 722403 Study of the Behavior of an Organic Coating Applied on Algerian Oil Tanker in Seawater
Authors: N. Hammouda, K. Belmokre
Abstract:
The paints are used extensively today in the industry to protect the metallic structures of the aggressive environments. This work is devoted to the study of corrosion resistance and aging behavior of a paint coating providing external protection for oil tankers. To avoid problems related to corrosion of these vessels, two protection modes are provided: An electro chemical active protection (cathodic protection of the hull). A passive protection by external painting. Investigations are conducted using stationary and non-stationary electro chemical tools such as electro chemical impedance spectroscopy has allowed us to characterize the protective qualities of these films. The application of the EIS on our damaged in-situ painting shows the existence of several capacitive loops which is an indicator of the failure of our tested paint. Microscopic analysis (micrograph) helped bring essential elements in understanding the degradation of our paint condition and immersion training corrosion products.Keywords: epoxy paints, electrochemical impedance spectroscopy, corrosion mechanisms, seawater
Procedia PDF Downloads 3912402 Application Potential of Selected Tools in Context of Critical Infrastructure Protection and Risk Analysis
Authors: Hromada Martin
Abstract:
Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and within the framework of risk analysis and critical infrastructure protection. Use of the information in relation to their risk analysis can be viewed as a form of simplifying the analytical process. It is clear that these instruments (information support) for these purposes are countless, so they were selected representatives who have already been applied in the selected area of critical infrastructure, or they can be used. All presented fact were the basis for critical infrastructure resilience evaluation methodology development.Keywords: critical infrastructure, protection, resilience, risk analysis
Procedia PDF Downloads 6382401 The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory
Authors: Ari S. Prabowo, Nia Febriyanti, Haryono B. Santosa
Abstract:
Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions.Keywords: laboratory, physical protection system, security culture, security function
Procedia PDF Downloads 1852400 Modeling of Power Network by ATP-Draw for Lightning Stroke Studies
Authors: John Morales, Armando Guzman
Abstract:
Protection relay algorithms play a crucial role in Electric Power System stability, where, it is clear that lightning strokes produce the mayor percentage of faults and outages of Transmission Lines (TLs) and Distribution Feeders (DFs). In this context, it is imperative to develop novel protection relay algorithms. However, in order to get this aim, Electric Power Systems (EPS) network have to be simulated as real as possible, especially the lightning phenomena, and EPS elements that affect their behavior like direct and indirect lightning, insulator string, overhead line, soil ionization and other. However, researchers have proposed new protection relay algorithms considering common faults, which are not produced by lightning strokes, omitting these imperative phenomena for the transmission line protection relays behavior. Based on the above said, this paper presents the possibilities of using the Alternative Transient Program ATP-Draw for the modeling and simulation of some models to make lightning stroke studies, especially for protection relays, which are developed through Transient Analysis of Control Systems (TACS) and MODELS language corresponding to the ATP-Draw.Keywords: back-flashover, faults, flashover, lightning stroke, modeling of lightning, outages, protection relays
Procedia PDF Downloads 3162399 Protection of Transformers Against Surge Voltage
Authors: Anil S. Khopkar, Umesh N. Soni
Abstract:
Surge voltage arises in the system either by switching operations of heavy load or by natural lightning. Surge voltages cause significant failure of power system equipment if adequate protection is not provided. A Surge Arrester is a device connected to a power system to protect the equipment against surge voltages. To protect the transformers against surge voltages, metal oxide surge arresters (MOSA) are connected across each terminal. Basic Insulation Level (BIL) has been defined in national and international standards of transformers based on their voltage rating. While designing transformer insulation, the BIL of the transformer, Surge arrester ratings and its operating voltage have to be considered. However, the performance of transformer insulation largely depends on the ratings of the surge arrester connected, the location of the surge arrester, the margin considered in the insulation design, the quantity of surge voltage strike, etc. This paper demonstrates the role of Surge arresters in the protection of transformers against over-voltage, transformer insulation design, optimum location of surge arresters and their connection lead length, Insulation coordination for transformer, protection margin in BIL and methods of protection of transformers against surge voltages, in detail.Keywords: surge voltage, surge arresters, insulation coordination, protection margin
Procedia PDF Downloads 632398 The Feminism of Data Privacy and Protection in Africa
Authors: Olayinka Adeniyi, Melissa Omino
Abstract:
The field of data privacy and data protection in Africa is still an evolving area, with many African countries yet to enact legislation on the subject. While African Governments are bringing their legislation to speed in this field, how patriarchy pervades every sector of African thought and manifests in society needs to be considered. Moreover, the laws enacted ought to be inclusive, especially towards women. This, in a nutshell, is the essence of data feminism. Data feminism is a new way of thinking about data science and data ethics that is informed by the ideas of intersectional feminism. Feminising data privacy and protection will involve thinking women, considering women in the issues of data privacy and protection, particularly in legislation, as is the case in this paper. The line of thought of women inclusion is not uncommon when even international and regional human rights specific for women only came long after the general human rights. The consideration is that these should have been inserted or rather included in the original general instruments in the first instance. Since legislation on data privacy is coming in this century, having seen the rights and shortcomings of earlier instruments, then the cue should be taken to ensure inclusive wholistic legislation for data privacy and protection in the first instance. Data feminism is arguably an area that has been scantily researched, albeit a needful one. With the spate of increase in the violence against women spiraling in the cyber world, compounding the issue of COVID-19 and the needful response of governments, and the effect of these on women and their rights, fast forward, the research on the feminism of data privacy and protection in Africa becomes inevitable. This paper seeks to answer the questions, what is data feminism in the African context, why is it important in the issue of data privacy and protection legislation; what are the laws, if any, existing on data privacy and protection in Africa, are they women inclusive, if not, why; what are the measures put in place for the privacy and protection of women in Africa, and how can this be made possible. The paper aims to investigate the issue of data privacy and protection in Africa, the legal framework, and the protection or provision that it has for women if any. It further aims to research the importance and necessity of feminizing data privacy and protection, the effect of lack of it, the challenges or bottlenecks in attaining this feat and the possibilities of accessing data privacy and protection for African women. The paper also researches the emerging practices of data privacy and protection of women in other jurisprudences. It approaches the research through the methodology of review of papers, analysis of laws, and reports. It seeks to contribute to the existing literature in the field and is explorative in its suggestion. It suggests a draft of some clauses to make any data privacy and protection legislation women inclusive. It would be useful for policymaking, academic, and public enlightenment.Keywords: feminism, women, law, data, Africa
Procedia PDF Downloads 205