Search results for: IVF legal frameworks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2187

Search results for: IVF legal frameworks

1287 Using the Family Justice System to Respond to ISIS Returnees: The UK Experience

Authors: Fatima Ahdash

Abstract:

Over the last 6-7 years, the UK has resorted to using the family courts and the family justice system more generally as a way of dealing with children and young people either traveling to or returning from ISIS territories in the Middle East. This is an important innovation in counter-terrorism laws and practices in the UK: never before have the family courts been used for the purpose of preventing and countering terrorism anywhere in the world. This paper will examine this innovation; it will explore how, why, and the implications of the interaction between family law and counter-terrorism, particularly on the human rights of the parents and children involved. It will question whether the use of the family courts provides a more useful, and perhaps human rights compliant, method of tackling terrorism and extremism when compared to other more Draconian legal and administrative methods.

Keywords: counter-terrorism, family justice, law, human rights

Procedia PDF Downloads 196
1286 Mobilizing Resources for Social Entrepreneurial Opportunity: A Framework of Engagement Strategy

Authors: Balram Bhushan

Abstract:

The emergence of social entrepreneurship challenges the strict categorization of not-for-profit, for-profit and hybrid organizations. Although the blurring of boundaries helps social entrepreneurial organizations (SEOs) make better use of emerging opportunities, it poses a significant challenge while mobilizing money from different sources. Additionally, for monetary resources, the legal framework of the host country may further complicate the issue by imposing strict accounting standards. Under such circumstances, the resource providers fail to recognize the suitable engagement strategy with the SEO of their choice. Based on the process of value creation and value capture, this paper develops a guiding framework for resource providers to design an appropriate mix of engagement with the identified SEOs. Essentially, social entrepreneurship creates value at the societal level, but value capture is a characteristic of an organization. Additionally, SEOs prefer value creation over value capture. The paper argued that the nature of the relationship between value creation and value capture determines the extent of blurred boundaries of the organization. Accordingly, synergistic, antagonistic and sequential relationships were proposed between value capture and value creation. When value creation is synergistically associated with value creation, the preferred nature of such action falls within the nature of for-profit organizations within the strictest legal framework. Banks offering micro-loans are good examples of this category. Opposite to this, the antagonist relationship between value creation and value capture, where value capture opportunities are sacrificed for value creation, dictates non-profit organizational structure. Examples of this category include non-government organizations and charity organizations. Finally, the sequential relationship between value capture opportunities is followed for value creation opportunities and guides the action closer to the hybrid structure. Examples of this category include organizations where a non-for-profit unit controls for-profit units of the organization either legally or structurally. As an SEO may attempt to utilize multiple entrepreneurial opportunities falling across any of the three relationships between value creation and value capture, the resource providers need to evaluate an appropriate mix of these relationships before designing their engagement strategies. The paper suggests three guiding principles for the engagement strategy. First, the extent of investment should be proportional to the synergistic relationship between value capture and value creation. Second, the subsidized support should be proportional to the sequential relationship. Finally, the funding (charity contribution) should be proportional to the antagonistic relationship. Finally, the resource providers are needed to keep a close watch on the evolving relationship between value creation and value capture for introducing appropriate changes in their engagement strategy.

Keywords: social entrepreneurship, value creation, value capture, entrepreneurial opportunity

Procedia PDF Downloads 113
1285 The Epistemology of Human Rights Cherished in Islamic Law and Its Compatibility with International Law

Authors: Malik Imtiaz Ahmad

Abstract:

Human beings are the super organism granted the gift of consciousness of life by the Almighty God and endowed with an intrinsic legal value to their humanity that shall be guarded and protected respecting dignity regardless of your cultural, religious, race, or physical background; you want to be treated equally for a reason for being human. Islam graces the essential integrity of humanity and confirms the freedom and accountability impact on individuality and the open societal sphere, including the moral, economic, and political aspects. Human Rights allow people to live with dignity, equality, justice, freedom, and peace. The Kantian approach to morality expresses that ethical actions follow universal moral laws. Hence, human rights are based upon the normative approaches setting the international standards to promote, guard, and protect the fundamental rights of the people. Islam is a divine religion commanding human rights based upon the principles of social justice and regulates all facets of the moral and spiritual ethics of Muslims besides bringing balance abreast in the non-Muslims to respect their lives with safety and security and property. The Canon law manifests the faith and equality amongst Christianity, regulating the communal dignity to build and promote the sanctity of Holy life (can. 208 to 223). This concept of the community is developed after the insight of the Islamic 'canon law', which is the code of revelation itself and inseparable from the natural part of the salvation of mankind. The etymology and history of human rights is a polemical debate in a preview of Islamic and Western culture. On the other hand, international law is meticulous about the fundamental part of Conon law that focuses on the communal political, social and economic relationship. The evolving process of human rights is considered to be an exclusive universal thought regarding an open society that forms a legal base for the constituent of international instruments of the protection of Human Rights, viz. UDHR. On the other side, Muslim scholars emphasize that human rights are devolving around Islamic law. Both traditions need a dire explanation of contemporary openness for bringing the harmonious universal law acceptable and applicable to the international communities concerning the anthropology of political, economic, and social aspects of a human being.

Keywords: human rights-based approach (HRBA), human rights in Islam, evolution of universal human rights, conflict in western, Islamic human rights

Procedia PDF Downloads 74
1284 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 172
1283 International Conference on Comparative Religion and Mythology

Authors: Mara Varelaki

Abstract:

In response to the challenge of the environmental crisis the discipline of environmental ethics examines the relation of human beings towards the environment and the value of the non-human constituents of the surrounding world. In the face of this crisis, assumptions regarding human and nature relations ought to be traced and reexamined because they can cause difficulties in diagnosing problematic attitudes towards the environment and non-human animals. This paper presents the claims that European and the Judea-Christian cosmogonic myths place the human figure in the core of the creation of the cosmos, thus verifying a hierarchical structure where humans occupy the top, and they establish a perception of nature as a non-human other. By doing so, these narratives provide some justification to the notion of the human-nature dichotomy and the human domination over other life forms and ecosystems. These anthropocentric assumptions evolved into what Hilde Lindemann terms master narratives and their influence extents to ecocentric ethical theories which attempt, and often fail, to shed the anthropocentrism of the western ethical tradition. The goal of this paper is (1) to trace the anthropocentric assumptions embedded in western thought and (2) articulate how they maintain their grip on our contemporary understanding of the human relation to and position within the environment, thus showing the need for a method of detecting and bracketing anthropocentric assumptions in social narratives and ethical frameworks.

Keywords: cosmogonies, anthropocentrism, human/nature dichotomy, master narratives, ecocentrism

Procedia PDF Downloads 90
1282 Using Deep Learning in Lyme Disease Diagnosis

Authors: Teja Koduru

Abstract:

Untreated Lyme disease can lead to neurological, cardiac, and dermatological complications. Rapid diagnosis of the erythema migrans (EM) rash, a characteristic symptom of Lyme disease is therefore crucial to early diagnosis and treatment. In this study, we aim to utilize deep learning frameworks including Tensorflow and Keras to create deep convolutional neural networks (DCNN) to detect images of acute Lyme Disease from images of erythema migrans. This study uses a custom database of erythema migrans images of varying quality to train a DCNN capable of classifying images of EM rashes vs. non-EM rashes. Images from publicly available sources were mined to create an initial database. Machine-based removal of duplicate images was then performed, followed by a thorough examination of all images by a clinician. The resulting database was combined with images of confounding rashes and regular skin, resulting in a total of 683 images. This database was then used to create a DCNN with an accuracy of 93% when classifying images of rashes as EM vs. non EM. Finally, this model was converted into a web and mobile application to allow for rapid diagnosis of EM rashes by both patients and clinicians. This tool could be used for patient prescreening prior to treatment and lead to a lower mortality rate from Lyme disease.

Keywords: Lyme, untreated Lyme, erythema migrans rash, EM rash

Procedia PDF Downloads 222
1281 Budgeting Procedures and Fiscal Stance of OECD Countries in the Wake of Global Economic Crisis

Authors: Yulia Kasperskaya, Ramon Xifré

Abstract:

Budgetary procedures are considered to be important for countries’ fiscal performance. The objective of this paper is to analyze this relationship for the OECD countries in the wake of global economic crisis taking into consideration countries’ fiscal conditions and institutional arrangements. We test whether groups of countries that are fiscally different after the crisis differ in their use of budgetary procedures including performance budgeting, transparency mechanisms and medium-term expenditure framework. For this purpose, we classify OECD countries in two groups according to the variations, in debt to GDP ratio between 2008 and 2014. We then analyze the intensity of use of budget procedures taking into account countries’ economic conditions during the crisis. Our first finding is that there is no monotonic relationship between the intensity of use of these three budgetary procedures and enhanced fiscal performance. Countries showing similar fiscal performance scored differently in terms of on budgetary procedures. We, therefore, review the budgetary frameworks and trajectories of several countries that are fiscally sound. From this qualitative analysis, we derive a set of factors that may enhance the efficiency of budgetary procedures. This suggests that a given budgetary procedure may have different effects in different countries depending on their economic and administrative settings. Our results are thus in line with those studies that reject one-size-fits-all approaches.

Keywords: budget procedures, fiscal performance, OECD, performance budgeting

Procedia PDF Downloads 224
1280 E-Marketing Strategies and Destination Branding for the Tourism Industry in Nigeria

Authors: Abdullahi Marshal Idris, Murtala Mohammed Alamai, Adama Jummai Idris, Bello Mohammed Gwagwada

Abstract:

The technological revolution of the 1990s have brought about many new opportunities and challenges for the tourism and hospitality industries mostly in Nigeria and with tourism having global industry information as its life-blood and technology becoming fundamental to the ability of the industry to operate effectively and competitively. The whole system of information technologies is being rapidly diffused throughout the tourism industry and no player will escape information technologies impacts. The paper gives an insight into the importance of destination branding and the application of information technologies and the use of Internet in tourism and hospitality industries in Nigeria giving strategic frameworks, providing analysis of the Internet and its impact on these sectors. It also aims to show how technological innovations and information system can be beneficial for destinations companies like game reserves national parks, and other resorts by using the literature of existing efforts in global industry players as well as documented evidences where recommendations for destinations and companies is made to seek to foster the development of this connection by investing considerable resources in marketing activities on social networks and by reinforcing the trust of users, because credibility and reliability are still critical in this area.

Keywords: branding, marketing, technology, tourism product

Procedia PDF Downloads 426
1279 Sustainable Framework Integration for Construction Project Management: A Multi-Dimensional Analysis

Authors: Tharaki S. Hettiarachchi

Abstract:

Sustainable construction has gained massive attention in the present world as the construction industry is highly responsible for carbon emissions and other types of unsustainable practices. Yet, the construction industry has not been able to completely attain sustainable goals. Therefore, the present study aims to identify the extent to which sustainability has been considered within the scope of construction project management and to analyze the challenges, gaps, and constraints associated. Accordingly, this study develops a sustainable framework to integrate in construction project management. In accomplishing the research aim, this research integrates a qualitative approach while relying on secondary data sources. The data shall be then analyzed with the use of a systematic literature review (SLR) method while following the PRISMA (2020) guideline and represented in a statistical form. The outcomes of this study may become highly significant in identifying the nature of the existing sustainable frameworks associated with construction project management scopes and to develop a new framework to integrate in order to enhance the effectiveness of sustainable applications in construction management. The outcomes of this research may benefit present and future construction professionals and academicians to organize sustainable construction-related knowledge in a useful way to apply in practical implementation for effective project management. Overall, this study directs present and future construction professionals toward an advanced construction project management mechanism.

Keywords: construction, framework development, project management, sustainability

Procedia PDF Downloads 41
1278 Concept, Modules and Objectives of the Syllabus Course: Small Power Plants and Renewable Energy Sources

Authors: Rade M. Ciric, Nikola L. J. Rajakovic

Abstract:

This paper presents a curriculum of the subject small power plants and renewable energy sources, dealing with the concept of distributed generation, renewable energy sources, hydropower, wind farms, geothermal power plants, cogeneration plants, biogas plants of agriculture and animal origin, solar power and fuel cells. The course is taught the manner of connecting small power plants to the grid, the impact of small generators on the distribution system, as well as economic, environmental and legal aspects of operation of distributed generators.

Keywords: distributed generation, renewable energy sources, energy policy, curriculum

Procedia PDF Downloads 341
1277 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 26
1276 Utilizing Extended Reality in Disaster Risk Reduction Education: A Scoping Review

Authors: Stefano Scippo, Damiana Luzzi, Stefano Cuomo, Maria Ranieri

Abstract:

Background: In response to the rise in natural disasters linked to climate change, numerous studies on Disaster Risk Reduction Education (DRRE) have emerged since the '90s, mainly using a didactic transmission-based approach. Effective DRRE should align with an interactive, experiential, and participatory educational model, which can be costly and risky. A potential solution is using simulations facilitated by eXtended Reality (XR). Research Question: This study aims to conduct a scoping review to explore educational methodologies that use XR to enhance knowledge among teachers, students, and citizens about environmental risks, natural disasters (including climate-related ones), and their management. Method: A search string of 66 keywords was formulated, spanning three domains: 1) education and target audience, 2) environment and natural hazards, and 3) technologies. On June 21st, 2023, the search string was used across five databases: EBSCOhost, IEEE Xplore, PubMed, Scopus, and Web of Science. After deduplication and removing papers without abstracts, 2,152 abstracts (published between 2013 and 2023) were analyzed and 2,062 papers were excluded, followed by the exclusion of 56 papers after full-text scrutiny. Excluded studies focused on unrelated technologies, non-environmental risks, and lacked educational outcomes or accessible texts. Main Results: The 34 reviewed papers were analyzed for context, risk type, research methodology, learning objectives, XR technology use, outcomes, and educational affordances of XR. Notably, since 2016, there has been a rise in scientific publications, focusing mainly on seismic events (12 studies) and floods (9), with a significant contribution from Asia (18 publications), particularly Japan (7 studies). Methodologically, the studies were categorized into empirical (26) and non-empirical (8). Empirical studies involved user or expert validation of XR tools, while non-empirical studies included systematic reviews and theoretical proposals without experimental validation. Empirical studies were further classified into quantitative, qualitative, or mixed-method approaches. Six qualitative studies involved small groups of users or experts, while 20 quantitative or mixed-method studies used seven different research designs, with most (17) employing a quasi-experimental, one-group post-test design, focusing on XR technology usability over educational effectiveness. Non-experimental studies had methodological limitations, making their results hypothetical and in need of further empirical validation. Educationally, the learning objectives centered on knowledge and skills for surviving natural disaster emergencies. All studies recommended XR technologies for simulations or serious games but did not develop comprehensive educational frameworks around these tools. XR-based tools showed potential superiority over traditional methods in teaching risk and emergency management skills. However, conclusions were more valid in studies with experimental designs; otherwise, they remained hypothetical without empirical evidence. The educational affordances of XR, mainly user engagement, were confirmed by the studies. Authors’ Conclusions: The analyzed literature lacks specific educational frameworks for XR in DRRE, focusing mainly on survival knowledge and skills. There is a need to expand educational approaches to include uncertainty education, developing competencies that encompass knowledge, skills, and attitudes like risk perception.

Keywords: disaster risk reduction education, educational technologies, scoping review, XR technologies

Procedia PDF Downloads 0
1275 TeleEmergency Medicine: Transforming Acute Care through Virtual Technology

Authors: Ashley L. Freeman, Jessica D. Watkins

Abstract:

TeleEmergency Medicine (TeleEM) is an innovative approach leveraging virtual technology to deliver specialized emergency medical care across diverse healthcare settings, including internal acute care and critical access hospitals, remote patient monitoring, and nurse triage escalation, in addition to external emergency departments, skilled nursing facilities, and community health centers. TeleEM represents a significant advancement in the delivery of emergency medical care, providing healthcare professionals the capability to deliver expertise that closely mirrors in-person emergency medicine, exceeding geographical boundaries. Through qualitative research, the extension of timely, high-quality care has proven to address the critical needs of patients in remote and underserved areas. TeleEM’s service design allows for the expansion of existing services and the establishment of new ones in diverse geographic locations. This ensures that healthcare institutions can readily scale and adapt services to evolving community requirements by leveraging on-demand (non-scheduled) telemedicine visits through the deployment of multiple video solutions. In terms of financial management, TeleEM currently employs billing suppression and subscription models to enhance accessibility for a wide range of healthcare facilities. Plans are in motion to transition to a billing system routing charges through a third-party vendor, further enhancing financial management flexibility. To address state licensure concerns, a patient location verification process has been integrated through legal counsel and compliance authorities' guidance. The TeleEM workflow is designed to terminate if the patient is not physically located within licensed regions at the time of the virtual connection, alleviating legal uncertainties. A distinctive and pivotal feature of TeleEM is the introduction of the TeleEmergency Medicine Care Team Assistant (TeleCTA) role. TeleCTAs collaborate closely with TeleEM Physicians, leading to enhanced service activation, streamlined coordination, and workflow and data efficiencies. In the last year, more than 800 TeleEM sessions have been conducted, of which 680 were initiated by internal acute care and critical access hospitals, as evidenced by quantitative research. Without this service, many of these cases would have necessitated patient transfers. Barriers to success were examined through thorough medical record review and data analysis, which identified inaccuracies in documentation leading to activation delays, limitations in billing capabilities, and data distortion, as well as the intricacies of managing varying workflows and device setups. TeleEM represents a transformative advancement in emergency medical care that nurtures collaboration and innovation. Not only has advanced the delivery of emergency medicine care virtual technology through focus group participation with key stakeholders, rigorous attention to legal and financial considerations, and the implementation of robust documentation tools and the TeleCTA role, but it’s also set the stage for overcoming geographic limitations. TeleEM assumes a notable position in the field of telemedicine by enhancing patient outcomes and expanding access to emergency medical care while mitigating licensure risks and ensuring compliant billing.

Keywords: emergency medicine, TeleEM, rural healthcare, telemedicine

Procedia PDF Downloads 63
1274 The Fight against Terrorist Radicalization: A French Perspective

Authors: Julia Burchett

Abstract:

After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms.

Keywords: criminal law, France, fundamental freedoms, radicalization, terrorism

Procedia PDF Downloads 418
1273 Analysis of Genomics Big Data in Cloud Computing Using Fuzzy Logic

Authors: Mohammad Vahed, Ana Sadeghitohidi, Majid Vahed, Hiroki Takahashi

Abstract:

In the genomics field, the huge amounts of data have produced by the next-generation sequencers (NGS). Data volumes are very rapidly growing, as it is postulated that more than one billion bases will be produced per year in 2020. The growth rate of produced data is much faster than Moore's law in computer technology. This makes it more difficult to deal with genomics data, such as storing data, searching information, and finding the hidden information. It is required to develop the analysis platform for genomics big data. Cloud computing newly developed enables us to deal with big data more efficiently. Hadoop is one of the frameworks distributed computing and relies upon the core of a Big Data as a Service (BDaaS). Although many services have adopted this technology, e.g. amazon, there are a few applications in the biology field. Here, we propose a new algorithm to more efficiently deal with the genomics big data, e.g. sequencing data. Our algorithm consists of two parts: First is that BDaaS is applied for handling the data more efficiently. Second is that the hybrid method of MapReduce and Fuzzy logic is applied for data processing. This step can be parallelized in implementation. Our algorithm has great potential in computational analysis of genomics big data, e.g. de novo genome assembly and sequence similarity search. We will discuss our algorithm and its feasibility.

Keywords: big data, fuzzy logic, MapReduce, Hadoop, cloud computing

Procedia PDF Downloads 284
1272 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 280
1271 Layouting for Phase II of New Priok Project Using Adaptive Port Planning Frameworks

Authors: Mustarakh Gelfi, Poonam Taneja, Tiedo Vellinga, Delon Hamonangan

Abstract:

The initial masterplan of New Priok in the Port of Tanjung Priok was developed in 2012 is being updated to cater to new developments and new demands. In the new masterplan (2017), Phase II of development will start from 2035-onwards, depending on the future conditions. This study is about creating a robust masterplan for Phase II, which will remain functional under future uncertainties. The methodology applied in this study is scenario-based planning in the framework of Adaptive Port Planning (APP). Scenario-based planning helps to open up the perspective of the future as a horizon of possibilities. The scenarios are built around two major uncertainties in a 2x2 matrix approach. The two major uncertainties for New Priok port are economics and sustainability awareness. The outcome is four plausible scenarios: Green Port, Business As Usual, Moderate Expansion, and No Expansion. Terminal needs in each scenario are analyzed through traffic analysis and identifying the key cargos and commodities. In conclusion, this study gives the wide perspective for Port of Tanjung Priok for the planning Phase II of the development. The port has to realize that uncertainties persevere and are very likely to influence the decision making as to the future layouts. Instead of ignoring uncertainty, the port needs to make the action plans to deal with these uncertainties.

Keywords: Indonesia Port, port's layout, port planning, scenario-based planning

Procedia PDF Downloads 514
1270 Novel Marketing Strategy To Increase Sales Revenue For SMEs Through Social Media

Authors: Kruti Dave

Abstract:

Social media marketing is an essential component of 21st-century business. Social media platforms enable small and medium-sized businesses to enhance brand recognition, generate leads and sales. However, the research on social media marketing is still fragmented and focuses on specific topics, such as effective communication techniques. Since the various ways in which social media impacts individuals and companies alike, the authors of this article focus on the origin, impacts, and current state of Social Media, emphasizing their significance as customer empowerment agents. It illustrates their potential and current responsibilities as part of the corporate business strategy and also suggests several methods to engage them as marketing tools. The focus of social media marketing ranges from defenders to explorers, the culture of Social media marketing encompasses the poles of conservatism and modernity, social media marketing frameworks lie between hierarchies and networks, and its management goes from autocracy to anarchy. This research proposes an integrative framework for small and medium-sized businesses through social media, and the influence of the same will be measured. This strategy will help industry experts to understand this new era. We propose an axiom: Social Media is always a function of marketing as a revenue generator.

Keywords: social media, marketing strategy, media marketing, brand awareness, customer engagement, revenue generator, brand recognition

Procedia PDF Downloads 172
1269 Position of the Constitutional Court of the Russian Federation on the Matter of Restricting Constitutional Rights of Citizens Concerning Banking Secrecy

Authors: A. V. Shashkova

Abstract:

The aim of the present article is to analyze the position of the Constitutional Court of the Russian Federation on the matter of restricting the constitutional rights of citizens to inviolability of professional and banking secrecy in effecting controlling activities. The methodological ground of the present Article represents the dialectic scientific method of the socio-political, legal and organizational processes with the principles of development, integrity, and consistency, etc. The consistency analysis method is used while researching the object of the analysis. Some public-private research methods are also used: the formally-logical method or the comparative legal method, are used to compare the understanding of the ‘secrecy’ concept. The aim of the present article is to find the root of the problem and to give recommendations for the solution of the problem. The result of the present research is the author’s conclusion on the necessity of the political will to improve Russian legislation with the aim of compliance with the provisions of the Constitution. It is also necessary to establish a clear balance between the constitutional rights of the individual and the limit of these rights when carrying out various control activities by public authorities. Attempts by the banks to "overdo" an anti-money laundering law under threat of severe sanctions by the regulators actually led to failures in the execution of normal economic activity. Therefore, individuals face huge problems with payments on the basis of clearing, in addition to problems with cash withdrawals. The Bank of Russia sets requirements for banks to execute Federal Law No. 115-FZ too high. It is high place to attract political will here. As well, recent changes in Russian legislation, e.g. allowing banks to refuse opening of accounts unilaterally, simplified banking activities in the country. The article focuses on different theoretical approaches towards the concept of “secrecy”. The author gives an overview of the practices of Spain, Switzerland and the United States of America on the matter of restricting the constitutional rights of citizens to inviolability of professional and banking secrecy in effecting controlling activities. The Constitutional Court of the Russian Federation basing on the Constitution of the Russian Federation has its special understanding of the issue, which should be supported by further legislative development in the Russian Federation.

Keywords: constitutional court, restriction of constitutional rights, bank secrecy, control measures, money laundering, financial control, banking information

Procedia PDF Downloads 170
1268 Long-Term Climate Patterns in Eastern and Southeastern Ethiopia

Authors: Messay Mulugeta, Degefa Tolossa

Abstract:

The purpose of this paper is to scrutinize trends of climate risks in eastern and southeastern parts of Ethiopia. This part of the country appears severely affected by recurrent droughts, erratic rainfall, and increasing temperature condition. Particularly, erratic rains and moisture stresses have been forcibly threatening and shoving the people over many decades coupled with unproductive policy frameworks and weak institutional setups. These menaces have been more severe in dry lowlands where rainfall is more erratic and scarce. Long-term climate data of nine weather stations in eastern and southeastern parts of Ethiopia were obtained from National Meteorological Agency of Ethiopia (NMA). As issues related to climate risks are very intricate, different techniques and indices were applied to deal with the objectives of the study. It is concluded that erratic rainfall, moisture scarcity, and increasing temperature conditions have been the main challenges in eastern and southeastern Ethiopia. In fact, these risks can be eased by putting in place efficient and integrated rural development strategies, environmental rehabilitation plans of action in overworked areas, proper irrigation and water harvesting practices and well thought-out and genuine resettlement schemes.

Keywords: rainfall variability, erratic rains, precipitation concentration index (PCI), climatic pattern, Ethiopia

Procedia PDF Downloads 218
1267 Surrogacy in India: Emerging Business or Disguised Human Trafficking

Authors: Priya Sepaha

Abstract:

Commercial Surrogacy refers to a contract in which a woman carries a pregnancy for intended parents. There are two types of surrogacy; first, Traditional Surrogacy, in which, sperm of the donor or father is artificially inseminated in the women and carries the fetus till birth. Second, Gestational Surrogacy, in which the egg and sperm of the intended parent are collected for artificial fertilization through In Vitro Fertilization (IVF) technique and after the embryo formation, it is transferred into the womb of a surrogate mother with the help of Assisted Reproductive Technique. Surrogacy has become so widespread in India that it has now been nicknamed the "rent-a-womb" capital of the world due to relatively low cost and lack of stringent regulatory legalisation. The legal aspects surrounding surrogacy are complex, diverse and mostly unsettled. Although this appears to be beneficial for the parties concerned, there are certain sensitive issues which need to be addressed to ensure ample protection to all stakeholders. Commercial surrogacy is an emerging business and a new means of human trafficking particularly in India. Poor and illiterate women are often lured in such deals by their spouse or broker for earning easy money. Traffickers also use force, fraud, or coercion at times to intimidate the probable surrogate mothers. A major chunk of money received from covert surrogacy agreement is taken away by the brokers. The Law Commission of India has specifically reviewed the issue as India is emerging as a major global surrogacy destination. The Supreme Court of India held in the Manji's case in 2008, that commercial surrogacy can be permitted with certain restrictions but had directed the Legislature to pass an appropriate Law for governing Surrogacy in India. The draft Assisted Reproductive Technique (ART) Bill, 2010 is still pending for approval. At present, the Surrogacy Contract between the parties and the ART Clinics Guidelines are perhaps the only guiding force. The Immoral Trafficking Prevention Act (ITPA), 1956 and Sections 366(A) and 372 of the Indian Penal Code, 1860 are perhaps the only existing laws, which deal with human trafficking. Yet, none of these provisions specifically deal with the serious issue of trafficking for the purpose of Commercial Surrogacy. India remains one of the few countries that still allow commercial surrogacy. International Surrogacy involves bilateral issues, where the laws of both the nations have to be at par in order to ensure that the concerns and interests of parties involved get amicably resolved. There is urgent need to pass a comprehensive law by incorporating the latest developments in this field in order to make it ethical on the one hand and to curb disguised human trafficking on the other.

Keywords: business, human trafficking, legal, surrogacy

Procedia PDF Downloads 330
1266 Domain Driven Design vs Soft Domain Driven Design Frameworks

Authors: Mohammed Salahat, Steve Wade

Abstract:

This paper presents and compares the SSDDD “Systematic Soft Domain Driven Design Framework” to DDD “Domain Driven Design Framework” as a soft system approach of information systems development. The framework use SSM as a guiding methodology within which we have embedded a sequence of design tasks based on the UML leading to the implementation of a software system using the Naked Objects framework. This framework has been used in action research projects that have involved the investigation and modelling of business processes using object-oriented domain models and the implementation of software systems based on those domain models. Within this framework, Soft Systems Methodology (SSM) is used as a guiding methodology to explore the problem situation and to develop the domain model using UML for the given business domain. The framework is proposed and evaluated in our previous works, a comparison between SSDDD and DDD is presented in this paper, to show how SSDDD improved DDD as an approach to modelling and implementing business domain perspectives for Information Systems Development. The comparison process, the results, and the improvements are presented in the following sections of this paper.

Keywords: domain-driven design, soft domain-driven design, naked objects, soft language

Procedia PDF Downloads 279
1265 Relations between the Internal Employment Conditions of International Organizations and the Characteristics of the National Civil Service

Authors: Renata Hrecska

Abstract:

This research seeks to fully examine the internal employment law of international organizations by comparing it with the characteristics of the national civil service. The aim of the research is to compare the legal system that has developed over many centuries and the relatively new internal staffing regulations to find out what solution schemes can help each other through mutual legal development in order to respond effectively to the social challenges of everyday life. Generally, the rules of civil service of any country or international entity have in common that they have, in their pragmatics inherently, the characteristic that makes them serving public interests. Though behind the common base there are many differences: there is the clear fragmentation of state regulation and the unity of organizational regulation. On the other hand, however, this difference disappears to some extent: the public service regulation of international organizations can be considered uniform until we examine it within, but not outside an organization. As soon as we compare the different organizations we may find many different solutions for staffing regulations. It is clear that the national civil service is a strong model for international organizations, but the question may be whether the staffing policy of international organizations can serve the national civil service as an example, too. In this respect, the easiest way to imagine a legislative environment would be to have a single comprehensive code, the general part of which is the Civil Service Act itself, and the specific part containing specific, necessarily differentiating rules for each layer of the civil service. Would it be advantageous to follow the footsteps of the leading international organizations, or is there any speciality in national level civil service that we cannot avoid during regulating processes? In addition to the above, the personal competencies of officials working in international organizations and public administrations also show a high degree of similarity, regardless of the type of employment. Thus, the whole public service system is characterized by the fundamental and special values that a person capable of holding a public office must be able to demonstrate, in some cases, even without special qualifications. It is also interesting how we can compare the two spheres of employment in light of the theory of Lawyer Louis Brandeis, a judge at the US Supreme Court, who formulated a complex theory of profession as distinguished from other occupations. From this point of view we can examine the continuous development of research and specialized knowledge at work; the community recognition and social status; that to what extent we can see a close-knit professional organization of altruistic philosophy; that how stability grows in the working conditions due to the stability of the profession; and that how the autonomy of the profession can prevail.

Keywords: civil service, comparative law, international organizations, regulatory systems

Procedia PDF Downloads 113
1264 Property Rights and Trade Specialization

Authors: Sarma Binti Aralas

Abstract:

The relationship between property rights and trade specialization is examined for developing and developed countries using panel data analysis. Property rights is measured using the international property rights index while trade specialization is measured using the comparative advantage index. Cross country differences in property rights are hypothesized to lead to differences in trade specialization. Based on the argument that a weak protection of natural resources implies greater trade in resource-intensive goods, developing countries with less defined property rights are hypothesized to have a comparative advantage in resource-based exports while countries with more defined property rights will not have an advantage in resource-intensive goods. Evidence suggests that developing countries with weaker environmental protection index but are rich in natural resources do specialize in the trade of resource-intensive goods. The finding suggests that institutional frameworks to increase the stringency of environmental protection of resources may be needed to diversify exports away from the trade of resource-intensive goods.

Keywords: environmental protection, panel data, renewable resources, trade specialization

Procedia PDF Downloads 432
1263 Improve the Provisions in the Life Imprisonment Law in Vietnam

Authors: Nguyen Xuan Thuy

Abstract:

The provisions on life imprisonment in the legal system enable to differentiate criminal liability and individualize the penalties for particularly serious crimes. This punishment acts as an intermediary between the determined imprisonment of a maximum of 20 years and the capital punishment, enabling the penalty system to maintain its internal unity. However, the practice of applying the punishment has been posing many problems that need to be studied in order to come up with solutions to improve the provisions related to the penalty and its effectiveness in the fight against crimes. The article summarizes the law on life imprisonment sentence in the current criminal law to highlight its characteristics and role in Vietnam's Penal Code. It also suggests some solutions to improve the law and its effectiveness in preventing and combating crimes.

Keywords: life imprisonment, Vietnam, law, penalty, provisions

Procedia PDF Downloads 81
1262 ‘Transnationalism and the Temporality of Naturalized Citizenship

Authors: Edward Shizha

Abstract:

Citizenship is not only political, but it is also a socio-cultural expectation that naturalized immigrants desire for. However, the outcomes of citizenship desirability are determined by forces outside the individual’s control based on legislation and laws that are designed at the macro and exosystemic levels by politicians and policy makers. These laws are then applied to determine the status (permanency or temporariness) of citizenship for immigrants and refugees, but the same laws do not apply to non-immigrant citizens who attain it by birth. While theoretically, citizenship has generally been considered an irrevocable legal status and the highest and most secure legal status one can hold in a state, it is not inviolate for immigrants. While Article 8 of the United Nations Convention on the Reduction of Statelessness provides grounds for revocation of citizenship obtained by immigrants and refugees in host countries, nation-states have their own laws tied to the convention that provide grounds for revocation. Ever since the 9/11 attacks in the USA, there has been a rise in conditional citizenship and the state’s withdrawal of citizenship through revocation laws that denaturalize citizens who end up not merely losing their citizenship but also the right to reside in the country of immigration. Because immigrants can be perceived as a security threat, the securitization of citizenship and the legislative changes have been adopted to specifically allow greater discretionary power in stripping people of their citizenship.The paper ‘Do We Really Belong Here?’ Transnationalism and the Temporality of Naturalized Citizenship examines literature on the temporality of naturalized citizenship and questions whether citizenship, for newcomers (immigrants and refugees), is a protected human right or a privilege. The paper argues that citizenship in a host country is a well sought-after status by newcomers. The question is whether their citizenship, if granted, has a permanent or temporary status and whether it is treated in the same way as that of non-immigrant citizens. The paper further argues that, despite citizenship having generally been considered an irrevocable status in most Western countries, in practice, if not in law, for immigrants and refugees, citizenship comes with strings attached because of policies and laws that control naturalized citizenship. These laws can be used to denationalize naturalized citizens through revocations for those stigmatized as ‘undesirables’ who are threatened with deportation. Whereas non-immigrant citizens (those who attain it by birth) have absolute right to their citizenship, this is seldom the case for immigrants.This paper takes a multidisciplinary approach using Urie Bronfenbrenner’s ecological systems theory, the macrosystem and exo-system, to examine and review literature on the temporality of naturalized citizenship and questions whether citizenship is a protected right or a privilege for immigrants. The paper challenges the human rights violation of citizenship revocation and argues for equality of treatment for all citizens despite how they acquired their citizenship. The fragility of naturalized citizenship undermines the basic rights and securities that citizenship status can provide to the person as an inclusive practice in a diverse society.

Keywords: citizenship, citizenship revocation, dual citizenship, human rights, naturalization, naturalized citizenship

Procedia PDF Downloads 52
1261 Gender issues in Law and society in India

Authors: Sunil Gaikwad

Abstract:

Gender discrimination is a very prevalent and much used word in the legal parlance. , The more socially, culturally, economically and educationally backward the community, the more gender discrimination is seen there. Gender discrimination is a worldwide Phenomena. In India it was more prevalent, due to illiteracy, bad social and religious customs. in Indian family system male child is considered as inheritor of the family clan, support for parents in their old age and girls as the property of others and unnecessary load on parents and on property as the dowry has to be give at her marriage as also some festivals like Raksha Bandhan and Bhau Teej during Deepawali (wherein having brother is compulsory)insist on having a male child in the family, hence most couples try to give birth only to male child at the cost of female child, hence the female feticide was going on a large scale due to which, sex ratio had considerably decreased creating problem for geeting groom for bride groom thereby putting question mark on family system. To redo the damage done to the society due to the female feticide Government of India has enacted various Laws and introduced various welfare schemes for the upliftment of girl child and also launched countrywide awareness campaign to create awareness among people about the importance of girl child and punitive laws for infanticide which is now bearing fruits but still cases of female feticide are coming fore. There is an urgent need to go to the roots of the problem and to find practicable and effective legal and social measures to overcome this issue, and the purpose of this research paper is the same. The research paper discusses in detail the reasons and superstitions that are responsible for the gender discriminations and comes out with effective measures including necessary and effective changes in the existing Laws, effective awareness campaign against religious superstitions for gender equality. For this research paper doctrinal research methodology is used to drive the research to its logical conclusion, for which various primary and secondary sources literature has been perused and studied. It is worth noting that while working on the paper suggestions and recommendations and conclusions have been drawn where it is suggested and concluded that there is an urgent need to re think about the festivals which encourages gender discriminations, to sensitize and create ample of awareness among people by effectively utilizing Radio, Television, Social Media folk arts, public shows and to make existing laws more effective and strict implementation for the purpose and zero tolerance for female feticide.

Keywords: awareness, effective laws, female foeticide, festivals, superstitions

Procedia PDF Downloads 71
1260 Beware the Trolldom: Speculative Interests and Policy Implications behind the Circulation of Damage Claims

Authors: Antonio Davola

Abstract:

Moving from the evaluations operated by Richard Posner in his judgment on the case Carhart v. Halaska, the paper seeks to analyse the so-called ‘litigation troll’ phenomenon and the development of a damage claims market, i.e. a market in which the right to propose claims is voluntary exchangeable for money and can be asserted by private buyers. The aim of our study is to assess whether the implementation of a ‘damage claims market’ might represent a resource for victims or if, on the contrary, it might operate solely as a speculation tool for private investors. The analysis will move from the US experience, and will then focus on the EU framework. Firstly, the paper will analyse the relation between the litigation troll phenomenon and the patent troll activity: even though these activities are considered similar by Posner, a comparative study shows how these practices significantly differ in their impact on the market and on consumer protection, even moving from similar economic perspectives. The second part of the paper will focus on the main specific concerns related to the litigation trolling activity. The main issues that will be addressed are the risk that the circulation of damage claims might spur non-meritorious litigation and the implications of the misalignment between the victim of a tort and the actual plaintiff in court arising from the sale of a claim. In its third part, the paper will then focus on the opportunities and benefits that the introduction and regulation of a claims market might imply both for potential claims sellers and buyers, in order to ultimately assess whether such a solution might actually increase individual’s legal empowerment. Through the damage claims market compensation would be granted more quickly and easily to consumers who had suffered harm: tort victims would, in fact, be compensated instantly upon the sale of their claims without any burden of proof. On the other hand, claim-buyers would profit from the gap between the amount that a consumer would accept for an immediate refund and the compensation awarded in court. In the fourth part of the paper, the analysis will focus on the legal legitimacy of the litigation trolling activity in the US and the EU framework. Even though there is no express provision that forbids the sale of the right to pursue a claim in court - or that deems such a right to be non-transferable – procedural laws of single States (especially in the EU panorama) must be taken into account in evaluating this aspect. The fifth and final part of the paper will summarize the various data collected to suggest an evaluation on if, and through which normative solutions, the litigation trolling might comport benefits for competition and which would be its overall effect over consumer’s protection.

Keywords: competition, claims, consumer's protection, litigation

Procedia PDF Downloads 220
1259 Remote Criminal Proceedings as Implication to Rethink the Principles of Criminal Procedure

Authors: Inga Žukovaitė

Abstract:

This paper aims to present postdoc research on remote criminal proceedings in court. In this period, when most countries have introduced the possibility of remote criminal proceedings in their procedural laws, it is not only possible to identify the weaknesses and strengths of the legal regulation but also assess the effectiveness of the instrument used and to develop an approach to the process. The example of some countries (for example, Italy) shows, on the one hand, that criminal procedure, based on orality and immediacy, does not lend itself to easy modifications that pose even a slight threat of devaluation of these principles in a society with well-established traditions of this procedure. On the other hand, such strong opposition and criticism make us ask whether we are facing the possibility of rethinking the traditional ways to understand the safeguards in order to preserve their essence without devaluing their traditional package but looking for new components to replace or compensate for the so-called “loss” of safeguards. The reflection on technological progress in the field of criminal procedural law indicates the need to rethink, on the basis of fundamental procedural principles, the safeguards that can replace or compensate for those that are in crisis as a result of the intervention of technological progress. Discussions in academic doctrine on the impact of technological interventions on the proceedings as such or on the limits of such interventions refer to the principles of criminal procedure as to a point of reference. In the context of the inferiority of technology, scholarly debate still addresses the issue of whether the court will not gradually become a mere site for the exercise of penal power with the resultant consequences – the deformation of the procedure itself as a physical ritual. In this context, this work seeks to illustrate the relationship between remote criminal proceedings in court and the principle of immediacy, the concept of which is based on the application of different models of criminal procedure (inquisitorial and adversarial), the aim is to assess the challenges posed for legal regulation by the interaction of technological progress with the principles of criminal procedure. The main hypothesis to be tested is that the adoption of remote proceedings is directly linked to the prevailing model of criminal procedure, arguing that the more principles of the inquisitorial model are applied to the criminal process, the more remote criminal trial is acceptable, and conversely, the more the criminal process is based on an adversarial model, more the remote criminal process is seen as incompatible with the principle of immediacy. In order to achieve this goal, the following tasks are set: to identify whether there is a difference in assessing remote proceedings with the immediacy principle between the adversarial model and the inquisitorial model, to analyse the main aspects of the regulation of remote criminal proceedings based on the examples of different countries (for example Lithuania, Italy, etc.).

Keywords: remote criminal proceedings, principle of orality, principle of immediacy, adversarial model inquisitorial model

Procedia PDF Downloads 49
1258 Online Pose Estimation and Tracking Approach with Siamese Region Proposal Network

Authors: Cheng Fang, Lingwei Quan, Cunyue Lu

Abstract:

Human pose estimation and tracking are to accurately identify and locate the positions of human joints in the video. It is a computer vision task which is of great significance for human motion recognition, behavior understanding and scene analysis. There has been remarkable progress on human pose estimation in recent years. However, more researches are needed for human pose tracking especially for online tracking. In this paper, a framework, called PoseSRPN, is proposed for online single-person pose estimation and tracking. We use Siamese network attaching a pose estimation branch to incorporate Single-person Pose Tracking (SPT) and Visual Object Tracking (VOT) into one framework. The pose estimation branch has a simple network structure that replaces the complex upsampling and convolution network structure with deconvolution. By augmenting the loss of fully convolutional Siamese network with the pose estimation task, pose estimation and tracking can be trained in one stage. Once trained, PoseSRPN only relies on a single bounding box initialization and producing human joints location. The experimental results show that while maintaining the good accuracy of pose estimation on COCO and PoseTrack datasets, the proposed method achieves a speed of 59 frame/s, which is superior to other pose tracking frameworks.

Keywords: computer vision, pose estimation, pose tracking, Siamese network

Procedia PDF Downloads 137