Search results for: customer protection
2405 Asylum Seekers' Legal Limbo under the Migrant Protection Protocols: Implications from a US-Mexico Border Project
Authors: Tania M. Guerrero, Ileana Cortes Santiago
Abstract:
Estamos Unidos Asylum Project has served more than 2,000 asylum seekers and migrants who are under the Migrant Protection Protocols (MPP) policy in Ciudad Juarez, Mexico. The U.S. policy, implemented in January 2019, has stripped asylum seekers of their rights—forcing people fleeing violence and discrimination to wait in similar or worse conditions from which they fled and navigate their entire asylum process in a different country. Several civil rights groups, including the American Civil Liberties Union (ACLU), challenged MPP in U.S. federal courts in February 2019, arguing a violation of international U.S. obligations towards refugees and asylum-seekers under the 1951 Refugee Convention and the Refugee Act of 1980 in regards to the non-refoulement principle. MPP has influenced Mexico's policies, enforcement, and prioritization of the presence of asylum seekers and migrants; it has also altered the way international non-governmental organizations work at the Mexican Northern border. Estamos Unidos is a project situated in a logistical conundrum, as it provides needed legal services to a population in a legal and humanitarian void, i.e., a liminal space. The liminal space occupied by asylum seekers living under MPP is one that, in today's world, should not be overlooked; it dilutes asylum law and U.S. commitments to international protections. This paper provides analysis of and broader implications from a project whose main goal is to uphold the protections of asylum seekers and international refugee law. The authors identified and analyzed four critical points based on field work conducted since August 2019: (1) strategic coalition building with international, local, and national organizations; (2) brokering between domestic and international contexts and critical legal constraints; (3) flexibility to sudden policy changes and the diverse needs of the multiethnic groups of migrants and asylum seekers served by the project; and (4) the complexity of providing legal assistance to asylum seekers who are survivors of trauma. The authors concur with scholarship when highlighting the erosion of protections of asylum seekers and migrants as a dangerous and unjust global phenomenon.Keywords: asylum, human rights, migrant protection protocols, refugees law
Procedia PDF Downloads 1332404 From Industry 4.0 to Agriculture 4.0: A Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability
Authors: Angelo Corallo, Maria Elena Latino, Marta Menegoli
Abstract:
Agri-food value chain involves various stakeholders with different roles. All of them abide by national and international rules and leverage marketing strategies to advance their products. Food products and related processing phases carry with it a big mole of data that are often not used to inform final customer. Some data, if fittingly identified and used, can enhance the single company, and/or the all supply chain creates a math between marketing techniques and voluntary traceability strategies. Moreover, as of late, the world has seen buying-models’ modification: customer is careful on wellbeing and food quality. Food citizenship and food democracy was born, leveraging on transparency, sustainability and food information needs. Internet of Things (IoT) and Analytics, some of the innovative technologies of Industry 4.0, have a significant impact on market and will act as a main thrust towards a genuine ‘4.0 change’ for agriculture. But, realizing a traceability system is not simple because of the complexity of agri-food supply chain, a lot of actors involved, different business models, environmental variations impacting products and/or processes, and extraordinary climate changes. In order to give support to the company involved in a traceability path, starting from business model analysis and related business process a Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability was conceived. Studying each process task and leveraging on modeling techniques lead to individuate information held by different actors during agri-food supply chain. IoT technologies for data collection and Analytics techniques for data processing supply information useful to increase the efficiency intra-company and competitiveness in the market. The whole information recovered can be shown through IT solutions and mobile application to made accessible to the company, the entire supply chain and the consumer with the view to guaranteeing transparency and quality.Keywords: agriculture 4.0, agri-food suppy chain, industry 4.0, voluntary traceability
Procedia PDF Downloads 1472403 The Importance of Cultural Adaptation of B2C E-Services Design in Germany
Authors: Rasha Alhendawi
Abstract:
This research will give the introductory ideas for cultural adaption of B2C E-Service design in Germany. By the intense competition of E-Service development, many companies have realized the importance of understanding the emotional and cultural characteristics of their customers. Ignoring customers’ needs and requirements throughout the E-Service design can lead to faults, mistakes, and gaps. The term of E-Service usability now is changed not only to develop high quality E-Services, but also to be extended to include customer satisfaction and provide for them to feel local.Keywords: human computer interaction (HCI), usability, cultural usability, E-Services, business-to-consumer (B2C), e-services
Procedia PDF Downloads 4372402 The Urgency of ASEAN Human Rights Court Establishment to Protect Human Rights in Southeast Asia
Authors: Tareq M. Aziz Elven
Abstract:
The issue of Human Rights enforcement in Southeast Asia has become the serious problem and attract the attention of international community. Principally, Association of Southeast Asian Nations (ASEAN) has mentioned the Human Rights as one of the focus and be a part of the ASEAN Charter in 2008. It was followed by the establishment of ASEAN Inter-Governmental Commission on Human Rights (AICHR). AICHR is the commission of Human Rights enforcement in Southeast Asia which has a duty, function, and an authority to conduct dissemination and protection of Human Rights. In the end of 2016, however, the function of protection mandated to AICHR have not achieved yet. It can be proved by several cases of Human Rights violation which still exist and have not settled yet. One of case which attracts the public attention recently is human rights violation towards Rohingya in Myanmar. Using the juridical-normative method, the research aims to examine the urgency of Human Rights court establishment in Southeast Asia region which able to issue the decision that binds the ASEAN members or the violating parties. The data shows that ASEAN needs to establish a regional court which intended to settle the Human Rights violations in ASEAN region. Furthermore, the research also highlights three strong factors should be settled by ASEAN for establishing human rights court i.e. the significant distinction of democracy and human rights development among the members, the strong implementation of non-intervention principle, and the financial matter to sustain the court.Keywords: AICHR, ASEAN, human rights, human rights court
Procedia PDF Downloads 3462401 The Gaps of Environmental Criminal Liability in Armed Conflicts and Its Consequences: An Analysis under Stockholm, Geneva and Rome
Authors: Vivian Caroline Koerbel Dombrowski
Abstract:
Armed conflicts have always meant the ultimate expression of power and at the same time, lack of understanding among nations. Cities were destroyed, people were killed, assets were devastated. But these are not only the loss of a war: the environmental damage comes to be considered immeasurable losses in the short, medium and long term. And this is because no nation wants to bear that cost. They invest in military equipment, training, technical equipment but the environmental account yet finds gaps in international law. Considering such a generalization in rights protection, many nations are at imminent danger in a conflict if the water will be used as a mass weapon, especially if we consider important rivers such as Jordan, Euphrates and Nile. The top three international documents were analyzed on the subject: the Stockholm Convention (1972), Additional Protocol I to the Geneva Convention (1977) and the Rome Statute (1998). Indeed, some references are researched in doctrine, especially scientific articles, to substantiate with consistent data about the extent of the damage, historical factors and decisions which have been successful. However, due to the lack of literature about this subject, the research tends to be exhaustive. From the study of the indicated material, it was noted that international law - humanitarian and environmental - calls in some of its instruments the environmental protection in war conflicts, but they are generic and vague rules that do not define exactly what is the environmental damage , nor sets standards for measure them. Taking into account the mains conflicts of the century XX: World War II, the Vietnam War and the Gulf War, one must realize that the environmental consequences were of great rides - never deactivated landmines, buried nuclear weapons, armaments and munitions destroyed in the soil, chemical weapons, not to mention the effects of some weapons when used (uranium, agent Orange, etc). Extending the search for more recent conflicts such as Afghanistan, it is proven that the effects on health of the civilian population were catastrophic: cancer, birth defects, and deformities in newborns. There are few reports of nations that, somehow, repaired the damage caused to the environment as a result of the conflict. In the pitch of contemporary conflicts, many nations fear that water resources are used as weapons of mass destruction, because once contaminated - directly or indirectly - can become a means of disguised genocide side effect of military objective. In conclusion, it appears that the main international treaties governing the subject mention the concern for environmental protection, however leave the normative specifications vacancies necessary to effectively there is a prevention of environmental damage in armed conflict and, should they occur, the repair of the same. Still, it appears that there is no protection mechanism to safeguard natural resources and avoid them to become a mass destruction weapon.Keywords: armed conflicts, criminal liability, environmental damages, humanitarian law, mass weapon
Procedia PDF Downloads 4202400 The Implementation of Child Adoption as Legal Protection of Children
Authors: Sonny Dewi Judiasih
Abstract:
The principle of a marriage is to achieve a happy and eternity family based on the willing of the God. The family has a fundamental role in the society as a social individual and as a nuclear family consists of father, mother, and children. Thus, each family always would like to have children who will continue the family. However, not all family will be blessed with children and consequently, there is family without children. Therefore, the said the certain family will do any effort to fulfill the wish to have children. One of the ways is to adopt children. The implementation of child adoption is conducted by the family who does not have children but sometimes child adoption is conducted by a family who has already children. The implementation of child adoption is based on the interest of the welfare and the intellectual of the said child. Moreover, it should be based on the social liability of the individual in accordance with the developing of the traditional values as part of the nation culture. The child adoption is conducted for the welfare of the child demonstrates that a change on the basic motive (value) whereby in the past the child adoption is to fulfill the wish of foster parent (to have children in the family). Nowadays the purpose of child adoption is not merely for the interest of foster parent but in particular for the interest, welfare and the future of the child. The development of the society has caused the occurrence of changes of perspective in the society which lead to a need for new law. The court of justice has an impact of such changes. It is evidenced by the court order for child adoption in the legal framework of certainty of law. The changes of motives (value) of the child adoption in the society can be fully understood in the event that the society fully understand that the ultimate purpose of Indonesia nation is to achieve a justice and prosperity society, i.e., social welfare for all Indonesian people.Keywords: child adoption, family law, legal protection, children
Procedia PDF Downloads 4682399 Does Citizens’ Involvement Always Improve Outcomes: Procedures, Incentives and Comparative Advantages of Public and Private Law Enforcement
Authors: Avdasheva Svetlanaa, Kryuchkova Polinab
Abstract:
Comparative social efficiency of private and public enforcement of law is debated. This question is not of academic interest only, it is also important for the development of the legal system and regulations. Generally, involvement of ‘common citizens’ in public law enforcement is considered to be beneficial, while involvement of interest groups representatives is not. Institutional economics as well as law and economics consider the difference between public and private enforcement to be rather mechanical. Actions of bureaucrats in government agencies are assumed to be driven by the incentives linked to social welfare (or other indicator of public interest) and their own benefits. In contrast, actions of participants in private enforcement are driven by their private benefits. However administrative law enforcement may be designed in such a way that it would become driven mainly by individual incentives of alleged victims. We refer to this system as reactive public enforcement. Citizens may prefer using reactive public enforcement even if private enforcement is available. However replacement of public enforcement by reactive version of public enforcement negatively affects deterrence and reduces social welfare. We illustrate the problem of private vs pure public and private vs reactive public enforcement models with the examples of three legislation subsystems in Russia – labor law, consumer protection law and competition law. While development of private enforcement instead of public (especially in reactive public model) is desirable, replacement of both public and private enforcement by reactive model is definitely not.Keywords: public enforcement, private complaints, legal errors, competition protection, labor law, competition law, russia
Procedia PDF Downloads 4942398 Police Mothers at Home: Police Work and Danger-Protection Parenting Practices
Authors: Tricia Agocs, Debra Langan, Carrie B. Sanders
Abstract:
Studies of the challenges faced by women in policing have paid little attention to the specific experiences of Policewomen who are mothers. Guided by critical theorizing on the gendered nature of the police culture and domestic labor, 16 police officer mothers in Ontario, Canada, were interviewed. Our qualitative analyses explore their experiences of the “lion’s share” of domestic labor; the organizational, cultural, and operational features of policing; and the challenges of child care, and examine how these combine to foster particular stresses. In contrast to intensive mothering approaches that rely on the advice of external experts, our participants work to protect children by carefully constructing stories and asking questions that are based on their own on-the-job experiences with dangerous and/or abhorrent situations. As such, they engage in danger-protection parenting practices to prevent their children from becoming victims or offenders. Our research extends the theorizing on intensive/extensive mothering practices, builds on the scholarship on policing, and adds to the literature on women in nonstandard occupations. This sociological analysis of police mothers’ experiences and practices underscores the importance of understanding and working to change the social contexts, at work and at home, that compromise the well-being of police mothers and other emergency-response workers.Keywords: policewomen, mothers, parenting, danger, qualitative research
Procedia PDF Downloads 5552397 Teaching Business Process Management using IBM’s INNOV8 BPM Simulation Game
Authors: Hossam Ali-Hassan, Michael Bliemel
Abstract:
This poster reflects upon our experiences using INNOV8, IBM’s Business Process Management (BPM) simulation game, in online MBA and undergraduate MIS classes over a period of 2 years. The game is designed to gives both business and information technology players a better understanding of how effective BPM impacts an entire business ecosystem. The game includes three different scenarios: Smarter Traffic, which is used to evaluate existing traffic patterns and re-route traffic based on incoming metrics; Smarter Customer Service where players develop more efficient ways to respond to customers in a call centre environment; and Smarter Supply Chains where players balance supply and demand and reduce environmental impact in a traditional supply chain model. We use the game as an experiential learning tool, where students have to act as managers making real time changes to business processes to meet changing business demands and environments. The students learn how information technology (IT) and information systems (IS) can be used to intelligently solve different problems and how computer simulations can be used to test different scenarios or models based on business decisions without having to actually make the potentially costly and/or disruptive changes to business processes. Moreover, when students play the three different scenarios, they quickly see how practical process improvements can help meet profitability, customer satisfaction and environmental goals while addressing real problems faced by municipalities and businesses today. After spending approximately two hours in the game, students reflect on their experience from it to apply several BPM principles that were presented in their textbook through the use of a structured set of assignment questions. For each final scenario students submit a screenshot of their solution followed by one paragraph explaining what criteria you were trying to optimize, and why they picked their input variables. In this poster we outline the course and the module’s learning objectives where we used the game to place this into context. We illustrate key features of the INNOV8 Simulation Game, and describe how we used them to reinforce theoretical concepts. The poster will also illustrate examples from the simulation, assignment, and learning outcomes.Keywords: experiential learning, business process management, BPM, INNOV8, simulation, game
Procedia PDF Downloads 3292396 Formation of Stable Aqueous Dispersions of Polyaniline-Silica Particles for Application in Anticorrosive Coatings on Steel
Authors: K. Kamburova, N. Boshkova, N. Boshkov, T. Radeva
Abstract:
Coatings based on polyaniline (PANI) can improve the resistance of steel against corrosion. Two forms of PANI are generally accepted to have effective protection of steel: the conducting emeraldine salt (ES) and the non-conducting emeraldine base (EB). The ability to intercept electrons at the metal surface and to transport them is typically attributed to ES, while the success of EB as an anticorrosive additive in the coating is attributed to its ability to oxidize and reduce in a reversible way. This electrochemical mechanism is probably combined with barrier effect against corrosion species. In this work, we describe the preparation of stable suspensions of colloidal PANI-SiO₂ particles, suitable for obtaining of composite anticorrosive coating on steel. Electrokinetic data as a function of pH are presented, showing that the zeta potentials of the PANI-SiO₂ particles are governed primarily by the charged groups at the silica oxide surface. Electrosteric stabilization of the PANI-SiO₂ particles’ suspension against aggregation is realized at pH > 5.5 (EB form of PANI) by adsorption of positively charged polyelectrolyte molecules onto negatively charged PANI-SiO₂ particles. We anticipate that incorporation of the small particles will provide a more homogeneous distribution in the coating matrix and will decrease the negative effect on barrier properties of the composite coating.Keywords: particles, stable dispersion, composite coatings, corrosion protection
Procedia PDF Downloads 1752395 Functional Plasma-Spray Ceramic Coatings for Corrosion Protection of RAFM Steels in Fusion Energy Systems
Authors: Chen Jiang, Eric Jordan, Maurice Gell, Balakrishnan Nair
Abstract:
Nuclear fusion, one of the most promising options for reliably generating large amounts of carbon-free energy in the future, has seen a plethora of ground-breaking technological advances in recent years. An efficient and durable “breeding blanket”, needed to ensure a reactor’s self-sufficiency by maintaining the optimal coolant temperature as well as by minimizing radiation dosage behind the blanket, still remains a technological challenge for the various reactor designs for commercial fusion power plants. A relatively new dual-coolant lead-lithium (DCLL) breeder design has exhibited great potential for high-temperature (>700oC), high-thermal-efficiency (>40%) fusion reactor operation. However, the structural material, namely reduced activation ferritic-martensitic (RAFM) steel, is not chemically stable in contact with molten Pb-17%Li coolant. Thus, to utilize this new promising reactor design, the demand for effective corrosion-resistant coatings on RAFM steels represents a pressing need. Solution Spray Technologies LLC (SST) is developing a double-layer ceramic coating design to address the corrosion protection of RAFM steels, using a novel solution and solution/suspension plasma spray technology through a US Department of Energy-funded project. Plasma spray is a coating deposition method widely used in many energy applications. Novel derivatives of the conventional powder plasma spray process, known as the solution-precursor and solution/suspension-hybrid plasma spray process, are powerful methods to fabricate thin, dense ceramic coatings with complex compositions necessary for the corrosion protection in DCLL breeders. These processes can be used to produce ultra-fine molten splats and to allow fine adjustment of coating chemistry. Thin, dense ceramic coatings with chosen chemistry for superior chemical stability in molten Pb-Li, low activation properties, and good radiation tolerance, is ideal for corrosion-protection of RAFM steels. A key challenge is to accommodate its CTE mismatch with the RAFM substrate through the selection and incorporation of appropriate bond layers, thus allowing for enhanced coating durability and robustness. Systematic process optimization is being used to define the optimal plasma spray conditions for both the topcoat and bond-layer, and X-ray diffraction and SEM-EDS are applied to successfully validate the chemistry and phase composition of the coatings. The plasma-sprayed double-layer corrosion resistant coatings were also deposited onto simulated RAFM steel substrates, which are being tested separately under thermal cycling, high-temperature moist air oxidation as well as molten Pb-Li capsule corrosion conditions. Results from this testing on coated samples, and comparisons with bare RAFM reference samples will be presented and conclusions will be presented assessing the viability of the new ceramic coatings to be viable corrosion prevention systems for DCLL breeders in commercial nuclear fusion reactors.Keywords: breeding blanket, corrosion protection, coating, plasma spray
Procedia PDF Downloads 3092394 Deconstructing Reintegration Services for Survivors of Human Trafficking: A Feminist Analysis of Australian and Thai Government and Non-Government Responses
Authors: Jessica J. Gillies
Abstract:
Awareness of the tragedy that is human trafficking has increased exponentially over the past two decades. The four pillars widely recognised as global solutions to the problem are prevention, prosecution, protection, and partnership between government and non-government organisations. While ‘sex-trafficking’ initially received major attention, this focus has shifted to other industries that conceal broader experiences of exploitation. However, within the regions of focus for this study, namely Australia and Thailand, trafficking for the purpose of sexual exploitation remains the commonly uncovered narrative of criminal justice investigations. In these regions anti-trafficking action is characterised by government-led prevention and prosecution efforts; whereas protection and reintegration practices have received criticism. Typically, non-government organisations straddle the critical chasm between policy and practice; therefore, they are perfectly positioned to contribute valuable experiential knowledge toward understanding how both sectors can support survivors in the post-trafficking experience. The aim of this research is to inform improved partnerships throughout government and non-government post-trafficking services by illuminating gaps in protection and reintegration initiatives. This research will explore government and non-government responses to human trafficking in Thailand and Australia, in order to understand how meaning is constructed in this context and how the construction of meaning effects survivors in the post-trafficking experience. A qualitative, three-stage methodology was adopted for this study. The initial stage of enquiry consisted of a discursive analysis, in order to deconstruct the broader discourses surrounding human trafficking. The data included empirical papers, grey literature such as publicly available government and non-government reports, and anti-trafficking policy documents. The second and third stages of enquiry will attempt to further explore the findings of the discourse analysis and will focus more specifically on protection and reintegration in Australia and Thailand. Stages two and three will incorporate process observations in government and non-government survivor support services, and semi-structured interviews with employees and volunteers within these settings. Two key findings emerged from the discursive analysis. The first exposed conflicting feminist arguments embedded throughout anti-trafficking discourse. Informed by conflicting feminist discourses on sex-work, a discursive relationship has been constructed between sex-industry policy and anti-trafficking policy. In response to this finding, data emerging from the process observations and semi-structured interviews will be interpreted using a feminist theoretical framework. The second finding progresses from the construction in the first. The discursive construction of sex-trafficking appears to have had influence over perceptions of the legitimacy of survivors, and therefore the support they receive in the post-trafficking experience. For example; women who willingly migrate for employment in the sex-industry, and on arrival are faced with exploitative conditions, are not perceived to be deserving of the same support as a woman who is not coerced, but rather physically forced, into such circumstances, yet both meet the criteria for a victim of human trafficking. The forthcoming study is intended to contribute toward building knowledge and understanding around the implications of the construction of legitimacy; and contextualise this in reference to government led protection and reintegration support services for survivors in the post-trafficking experience.Keywords: Australia, government, human trafficking, non-government, reintegration, Thailand
Procedia PDF Downloads 1122393 The Effect of Technology on International Marketing Trading Researches and Analysis
Authors: Omil Nady Mahrous Maximous
Abstract:
The article deals with the use of modern information technologies to achieve pro-ecological marketing goals in company-customer relationships. The purpose of the article is to show the possibilities of implementing modern information technologies. In B2C relationships, marketing departments face challenges stemming from the need to quickly segment customers and the current fragmentation of data across many systems, which significantly hinders the achievement of marketing goals. Thus, Article proposes the use of modern IT solutions in the field of marketing activities of companies, taking into account their environmental goals. As a result, its importance for the economic and social development of the emerging countries has increased. While traditional companies emphasize profit maximization as a core business principle, social enterprises must solve social problems at the expense of profit. This rationale gives social enterprises an edge over traditional businesses by meeting the needs of those at the bottom of the pyramid. This also represents a major challenge for social business, since social business acts on the one hand for the benefit of the public and on the other strives for financial stability. Otherwise, the company is unlikely to be fired from the company. Cultures play a role in business communication and research. Using the example of language in international relations, the article presents the problem of the articulation of research cultures in management and linguistics and of cultures as such. After an overview of current research on language in international relations, this article presents the approach to communication in international economy from a linguistic point of view and tries to explain the problems of communication in business starting from linguistic research. A step towards interdisciplinary research that brings together research in the fields of management and linguistics.Keywords: international marketing, marketing mix, marketing research, small and medium-sized enterprises, strategic marketing, B2B digital marketing strategy, digital marketing, digital marketing maturity model, SWOT analysis consumer behavior, experience, experience marketing, marketing employee organizational performance, internal marketing, internal customer, direct marketing, mobile phones mobile marketing, Sms advertising
Procedia PDF Downloads 452392 Integrated Plant Protection Activities against (Tuta absoluta Meyrik) Moth in Tomato Plantings in Azerbaijan
Authors: Nazakat Ismailzada, Carol Jones
Abstract:
Tomato drilling moth Tuta absoluta (Meyrick) (Lepidoptera: Gelechiidae) is the main pest of tomato plants in many countries. The larvae of tomato leaves, the stems inside, in the end buds, they opened the gallery in green and ripe fruit. In this way the harmful products can be fed with all parts of the tomato plant can cause damage to 80-100%. Pest harms all above ground parts of the tomato plant. After the seedlings are planted in areas and during blossoming holder traps with tomato moth’s rubber capsule inside should be placed in the area by using five-tomato moth’s feremon per ha. Then there should be carried out observations in the fields in every three days regularly. During the researches, it was showed that in field condition Carogen 20 SC besides high-level biological efficiency also has low ecological load for environment, and should be used against tomato moth in farms. Therefore it was showed that in field condition Carogen 20 SC besides high-level biological efficiency also has low ecological load for environment, and should be used against tomato moth in farms with insecticide expenditure norm 320 qr\ha. In farms should be used plant rotation, plant fields should be plowed on the 25-30 sm depth, before sowing seeds should be proceeded by insecticides. As element of integrated plant protection activities, should be used pheromones trap. In tomato plant fields as an insecticide should be used AGROSAN 240 SC and Carogen 20 SP.Keywords: lepidoptera, Tuta absoluta, chemical control, integrated pest management
Procedia PDF Downloads 1652391 Safety Risks of Gaseous Toxic Compounds Released from Li Batteries
Authors: Jan Karl, Ondrej Suchy, Eliska Fiserova, Milan Ruzicka
Abstract:
The evolving electromobility and all the electronics also bring an increase of danger with used Li-batteries. Li-batteries have been used in many industries, and currently many types of the batteries are available. Batteries have different compositions that affect their behavior. In the field of Li-battery safety, there are some areas of little discussion, such as extinguishing of fires caused by Li-batteries as well as toxicity of gaseous compounds released from Li batteries, transport or storage. Technical Institute of Fire Protection, which is a part of Fire Brigades of the Czech Republic, is dealing with the safety of Li batteries. That is the reason why we are dealing with toxicity of gaseous compounds released under conditions of fire, mechanical damage, overcharging and other emergencies that may occur. This is necessary for protection of intervening of fire brigade units, people in the vicinity and other envirnomental consequences. In this work, different types of batteries (Li-ion, Li-Po, LTO, LFP) with different kind of damage were tested, and the toxicity and total amount of released gases were studied. These values were evaluated according to their environmental hazard. FTIR spectroscopy was used for the evaluation of toxicity. We used a FTIR gas cell for continuous measurement. The total amount of released gases was determined by collecting the total gas phase through the absorbers and then determining the toxicants absorbed into the solutions. Based on the obtained results, it is possible to determine the protective equipment necessary for the event of an emergency with a Li-battery, to define the environmental load and the immediate danger in an emergency.Keywords: Li-battery, toxicity, gaseous toxic compounds, FTIR spectroscopy
Procedia PDF Downloads 1532390 The Regulation of Vaccine-Related Intellectual Property Rights in Light of the Areas of Divergence between the Agreement on Trade-Related Aspects of Intellectual Property Rights and Investment Treaties in the Kingdom of Saudi Arabia and Australia
Authors: Abdulrahman Fahim M. Alsulami
Abstract:
The current research seeks to explore the regulation of vaccine-related IP rights in light of the areas of divergence between the Trade-Related Aspects of Intellectual Property Rights (TRIPS) Agreement and investment treaties. The study is conducted in the context of the COVID-19 pandemic; therefore, it seems natural that a specific chapter is devoted to the examination of vaccine arrangements related to vaccine supplies. The chapter starts with the examination of a typical vaccine from the perspective of IP rights. It presents the distinctive features of vaccines as pharmaceutical products and investments, reviews the basics of their patent protection, reviews vaccines’ components, and discusses IPR protection of different components of vaccines. The subsection that focuses on vaccine development and licensing reviews vaccine development stages investigates differences between vaccine licensing in different countries and presents barriers to vaccine licensing. The third subsection, at the same time, introduces the existing arrangements related to COVID-19 vaccine supplies, including COVAX arrangements, international organizations’ assistance, and direct negotiations between governments and vaccine manufacturers.Keywords: bilateral investment treaties, COVID-19 vaccine, IP rights, TRIPs agreement
Procedia PDF Downloads 1832389 Study of the Efficiency of a Synthetic Wax for Corrosion Protection of Steel in Aggressive Environments
Authors: Laidi Babouri
Abstract:
The remarkable properties of steel, such as hardness and impact resistance, motivate their use in the automotive manufacturing industry. However, due to the very vulnerable environmental conditions of use, the steel that makes up the car body can corrode. This situation is motivating more and more automobile manufacturers to develop research to develop processes minimizing the rate of degradation of the physicomechanical properties of these materials. The present work falls within this perspective; it presents the results of a research study focused on the use of synthetic wax for the protection of steel, type XES (DC04), against corrosion in aggressive environments. The media used in this study are an acid medium with a pH=5.6, a 3% chloride medium, and a dry medium. Evaluation of the protective power of synthetic wax in different environments was carried out using mass loss techniques (immersion), completed by electrochemical techniques (stationary and transient). The results of the immersion of the steel samples, with a surface area of (1.44 cm²), in the various media, for a period of 30 days, using the immersion technique, showed high protective efficiency of synthetic wax in acidic and saline environments, with a lesser degree in a dry environment. Moreover, the study of the protective power, using electrochemical techniques, confirmed the results obtained in static mode (loss of mass), the protective efficiency of synthetic wax, against the corrosion of steel, in different environments, which reaches a maximum rate of 99.87% in a saline environment.Keywords: corrosion, steel, industrial wax, environment, mass loss, electrochemical techniques
Procedia PDF Downloads 762388 Design of an Ensemble Learning Behavior Anomaly Detection Framework
Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia
Abstract:
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing
Procedia PDF Downloads 1282387 The Conflict Between the Current International Copyright Regime and the Islamic Social Justice Theory
Authors: Abdelrahman Mohamed
Abstract:
Copyright law is a branch of the Intellectual Property Law that gives authors exclusive rights to copy, display, perform, and distribute copyrightable works. In theory, copyright law aims to promote the welfare of society by granting exclusive rights to the creators in exchange for the works that these creators produce for society. Thus, there are two different types of rights that a just regime should balance between them which are owners' rights and users' rights. The paper argues that there is a conflict between the current international copyright regime and the Islamic Social Justice Theory. This regime is unjust from the Islamic Social Justice Theory's perspective regarding access to educational materials because this regime was unjustly established by the colonizers to protect their interests, starting from the Berne Convention for the Protection of Literary and Artistic Works 1886 and reaching to the Trade-Related Aspects of Intellectual Property Rights 1994. Consequently, the injustice of this regime was reflected in the regulations of these agreements and led to an imbalance between the owners' rights and the users' rights in favor of the former at the expense of the latter. As a result, copyright has become a barrier to access to knowledge and educational materials. The paper starts by illustrating the concept of justice in Islamic sources such as the Quran, Sunnah, and El-Maslha-Elmorsalah. Then, social justice is discussed by focusing on the importance of access to knowledge and the right to education. The theory assumes that the right to education and access to educational materials are necessities; thus, to achieve justice in this regime, the users' rights should be granted regardless of their region, color, and financial situation. Then, the paper discusses the history of authorship protection under the Islamic Sharia and to what extent this right was recognized even before the existence of copyright law. According to this theory, the authors' rights should be protected, however, this protection should not be at the expense of the human's rights to education and the right to access to educational materials. Moreover, the Islamic Social Justice Theory prohibits the concentration of wealth among a few numbers of people, 'the minority'. Thus, if knowledge is considered an asset or a good, the concentration of knowledge is prohibited from the Islamic perspective, which is the current situation of the copyright regime where a few countries control knowledge production and distribution. Finally, recommendations will be discussed to mitigate the injustice of the current international copyright regime and to fill the gap between the current international copyright regime and the Islamic Social Justice Theory.Keywords: colonization, copyright, intellectual property, Islamic sharia, social justice
Procedia PDF Downloads 212386 Provide Adequate Protection to Avoid Secondary Victimization: Ensuring the Rights of the Child Victims in the Criminal Justice System
Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella
Abstract:
The necessity of protection of the rights of victims of crime is a matter of concerns today. In the criminal justice system, child victims who are subjected to sexual abuse/violence are more vulnerable than the other crime victims. When they go to the police to lodge the complaint and until the end of the court proceedings, these victims are re-victimized in the criminal justice system. The rights of the suspects, accused and convicts are recognized and guaranteed by the constitution under fair trial norm, contemporary penal laws where crime is viewed as an offence against the State and existing criminal justice system in many jurisdictions including Sri Lanka. In this backdrop, a reasonable question arises as to whether the existing criminal justice system, especially which follow the adversarial mode of judicial trial protect the fair trial norm in the criminal justice process. Therefore, this paper intends to discuss the rights of the sexually abused child victims in the criminal justice system in order to restore imbalance between the rights of the wrongdoer and victim and suggest legal reforms to strengthen their rights in the criminal justice system which is essential to end secondary victimization. The paper considers Sri Lanka as a sample to discuss this issue. The paper looks at how the child victims are marginalized in the traditional adversarial model of the justice process, whether the contemporary penal laws adequately protect the right of these victims and whether the current laws set out the provisions to provide sufficient assistance and protection to them. The study further deals with the important principles adopted in international human rights law relating to the protection of the rights of the child victims in sexual offences cases. In this research paper, rights of the child victims in the investigation, trial and post-trial stages in the criminal justice process will be assessed. This research contains an extensive scrutiny of relevant international standards and local statutory provisions. Case law, books, journal articles, government publications such as commissions’ reports under this topic are rigorously reviewed as secondary resources. Further, randomly selected 25 child victims of sexual offences from the decided cases in last two years, police officers from 5 police divisions where the highest numbers of sexual offences were reported in last two years and the judicial officers both Magistrates and High Court Judges from the same judicial zones are interviewed. These data will be analyzed in order to find out the reasons for this specific sexual victimization, needs of these victims in various stages of the criminal justice system, relationship between victimization and offending and the difficulties and problems that these victims come across in criminal justice system. The author argues that the child victims are considerably neglected and their rights are not adequately protected in the adversarial model of the criminal justice process.Keywords: child victims of sexual violence, criminal justice system, international standards, rights of child victims, Sri Lanka
Procedia PDF Downloads 3692385 Contribution to the Development of a New Design of Dentist's Gowns: A Case Study of Using Infra-Red Technology and Pressure Sensors
Authors: Tran Thi Anh Dao, M. Arnold, L. Schacher, D. C. Adolphe, G. Reys
Abstract:
During tooth extraction or implant surgery, dentists are in contact with numerous infectious germs from patients' saliva and blood. For that reason, dentist's clothes have to play their role of protection from contamination. In addition, dentist's apparels should be not only protective but also comfortable and breathable because dentists have to perform many operations and treatments on patients throughout the day with high concentration and intensity. However, this type of protective garments has not been studied scientifically, whereas dentists are facing new risks and eager for looking for a comfortable personal protective equipment. For that reason, we have proposed some new designs of dentist's gown. They were expected to diminish heat accumulation that are considered as an important factor in reducing the level of comfort experienced by users. Experiments using infra-red technology were carried out in order to compare the breathable properties between a traditional gown and a new design with open zones. Another experiment using pressure sensors was also carried out to study ergonomic aspects trough the flexibility of movements of sleeves. The sleeves-design which is considered comfortable and flexible will be chosen for the further step. The results from the two experiments provide valuable information for the development of a new design of dentists' gowns in order to achieve maximum levels of cooling and comfort for the human body.Keywords: garment, dentists, comfort, design, protection, thermal
Procedia PDF Downloads 2212384 Sun Protection Factor (SPF) Determination of Sericin Cream and Niosomal Gel
Authors: Farzad Doostishoar, Abbas Pardakhty, Abdolreza Hassanzadeh, Sudeh salarpour, Elham Sharif
Abstract:
Background: Sericin is a protein extracted from silk and has antioxidant, antimicrobial, antineoplastic, wound healing and moisturizing properties. Different cosmetic formulation of sericin is available in different countries such as Japan and the other south-eastern Asian countries. We formulated and evaluated the sunscreen properties of topical formulations of sericin by an in vitro method. Method: Niosomes composed of sorbitan palmitate (Span 40), polysorbate 40 (Tween 40) and cholesterol (300 µmol, 3.5:3.5:3 molar ratio) were prepared by film hydration technique. Sericin was dissolved in normal saline and the lipid hydration was carried out at 60°C and the niosomes were incorporated in a Carbomer gel base. A W/O cream was also prepared and the release of sericin was evaluated by using Franz diffusion cell. Particle size analysis, sericin encapsulation efficiency measurement, morphological studies and stability evaluation were done in niosomal formulations. SPF was calculated by using Transpore tape in vitro method for both formulations. Results: Niosomes had high stability during 6 months storage at 4-8°C. The mean volume diameter of niosomes was less than 7 µm which is ideal for sustained release of drugs in topical formulations. The SPF of niosomal gel was 25 and higher than sericin cream with a diffusion based release pattern of active material. Conclusion: Sericin can be successfully entrapped in niosomes with sustained release pattern and relatively high SPF.Keywords: sericin, niosomes, sun protection factor, cream, gel
Procedia PDF Downloads 5002383 Rock Slope Stabilization and Protection for Roads and Multi-Storey Structures in Jabal Omar, Saudi Arabia
Authors: Ibrahim Abdel Gadir Malik, Dafalla Siddig Dafalla, Abdelazim Ibrahim
Abstract:
Jabal Omar is located in the western side of Makkah city in Saudi Arabia. The proposed Jabal Omar Development project includes several multi-storey buildings, roads, bridges and below ground structures founded at various depths. In this study, geological mapping and site inspection which covered pre-selected areas were carried out within the easily accessed parts. Geological features; including rock types, structures, degree of weathering, and geotechnical hazards were observed and analyzed with specified software and also were documented in form of photographs. The presence of joints and fractures in the area made the rock blocks small and weak. The site is full of jointing; it was observed that, the northern side consists of 3 to 4 jointing systems with 2 random fractures associated with dykes. The southern part is affected by 2 to 3 jointing systems with minor fault and shear zones. From the field measurements and observations, it was concluded that, the Jabal Omar intruded by andesitic and basaltic dykes of different thickness and orientation. These dykes made the outcrop weak, highly deformed and made the rock masses sensitive to weathering.Keywords: rock, slope, stabilization, protection, Makkah
Procedia PDF Downloads 8092382 The Effect of the Spinacia oleracea Extract on the Control of the Green Mold 'Penilillium digitatum' at the Post Harvested Citrus
Authors: Asma Chbani, Douaa Salim, Josephine Al Alam, Pascale De Caro
Abstract:
Penicillium digitatum, the causal agent of citrus green mold, is responsible for 90% of post-harvest losses. Chemical fungicides remain the most used products for protection against this pathogen but are also responsible for damage to human health and the environment. The aim of this study is to evaluate the ability of Spinacia oleracea extract to serve as biological control agents, an alternative to harmful synthetic fungicides, against orange decay for storing fruit caused by P. digitatum. In this study, we studied the implication of a crude extract of a green plant, Spinacia oleracea, in the protection of oranges against P. digitatum. Thus, in vivo antifungal tests as well as adhesion test were done. For in vivo antifungal test, oranges were pulverized with the prepared crude extracts at different concentrations ranged from 25 g L⁻¹ to 200 g L⁻¹, contaminated by the fungus and then observed during 8 weeks for their macroscopic changes at 24°C. For adhesion test, the adhesion index is defined as the number of Penicillium digitatum spores fixed per orange cell. An index greater than 25 is the indicator of a strong adhesion, whereas for an index less than 10, the adhesion is low. Ten orange cells were examined in triplicate for each extract, and the averages of adherent cells were calculated. Obtained results showed an inhibitory activity of the Penicillium development with the aqueous extract of dry Spinacia oleracea with a concentration of 50 g L⁻¹ considered as the minimal protective concentration. The prepared extracts showed a greater inhibition of the development of P. digitatum up to 10 weeks, even greater than the fungicide control Nystatin. Adhesion test’s results showed that the adhesion of P. digitatum spores to the epidermal cells of oranges in the presence of the crude spinach leaves extract is weak; the mean of the obtained adhesion index was estimated to 2.7. However, a high adhesion was observed with water used a negative control. In conclusion, all these results confirm that the use of this green plant highly rich in chlorophyll having several phytotherapeutic activities, could be employed as a great treatment for protection of oranges against mold and also as an alternative for chemical fungicides.Keywords: Penicillium digitatum, Spinacia oleracea, oranges, biological control, postharvest diseases
Procedia PDF Downloads 1722381 Design of a Photovoltaic Power Generation System Based on Artificial Intelligence and Internet of Things
Authors: Wei Hu, Wenguang Chen, Chong Dong
Abstract:
In order to improve the efficiency and safety of photovoltaic power generation devices, this photovoltaic power generation system combines Artificial Intelligence (AI) and the Internet of Things (IoT) to control the chasing photovoltaic power generation device to track the sun to improve power generation efficiency and then convert energy management. The system uses artificial intelligence as the control terminal, the power generation device executive end uses the Linux system, and Exynos4412 is the CPU. The power generating device collects the sun image information through Sony CCD. After several power generating devices feedback the data to the CPU for processing, several CPUs send the data to the artificial intelligence control terminal through the Internet. The control terminal integrates the executive terminal information, time information, and environmental information to decide whether to generate electricity normally and then whether to convert the converted electrical energy into the grid or store it in the battery pack. When the power generation environment is abnormal, the control terminal authorizes the protection strategy, the power generation device executive terminal stops power generation and enters a self-protection posture, and at the same time, the control terminal synchronizes the data with the cloud. At the same time, the system is more intelligent, more adaptive, and longer life.Keywords: photo-voltaic power generation, the pursuit of light, artificial intelligence, internet of things, photovoltaic array, power management
Procedia PDF Downloads 1232380 Accessing the 'No-Harm' Principle of Protection of the Mekong River’s Environment
Authors: Hang Thuy Tran, Hanh Hong Pham, Ha Thanh Hoa
Abstract:
From 2009 up to now, the water quantity and water quality of the Mekong River, located in the South of Vietnam, have been significantly reduced. The phenomenon happened as a result of climate change and human activities. The Mekong River is an international source of water, flowing across the borders of 6 countries, with Vietnam downstream. Activities to block the flow or build dams to construct hydroelectricity or diversion in upstream countries are either the direct cause or the risk of further deterioration of the water quality and quantity of the Mekong River, as evidenced by two phenomena which are a saline intrusion and transboundary water pollution. The protection of the crucial source of water is done through bilateral and multilateral cooperation mechanisms, notably the Mekong River Commission, established by members of the Agreement on the Cooperation for the Sustainable Development of the Mekong River Basin 1995. In this document, under Article 7, the 'no-harm' principle requires member states to take appropriate measures to prevent causing substantial damage to other member states. This principle has been practiced through the work of a number of committees established by the commission. However, the content of the rules is undetailed, lacks an implementation monitoring mechanism, and has an unreasonable dispute solution. With such difficulties, the provisions in the principle of no-harm are not adequate to protect the Mekong River's water resources in the current context.Keywords: no-harm principle, transboundary water pollution, Mekong Commission, international source of water
Procedia PDF Downloads 1912379 Examinations of Sustainable Protection Possibilities against Granary Weevil (Sitophilus granarius L.) on Stored Products
Authors: F. Pal-Fam, R. Hoffmann, S. Keszthelyi
Abstract:
Granary weevil, Sitophilus granarius (L.) (Col.: Curculionidae) is a typical cosmopolitan pest. It can cause significant damage to stored grains, and can drastically decrease yields. Damaged grain has reduced nutritional and market value, weaker germination, and reduced weight. The commonly used protectants against stored-product pests in Europe are residual insecticides, applied directly to the product. Unfortunately, these pesticides can be toxic to mammals, the residues can accumulate in the treated products, and many pest species could become resistant to the protectants. During recent years, alternative solutions of grain protection have received increased attention. These solutions are considered as the most promising alternatives to residual insecticides. The aims of our comparative study were to obtain information about the efficacies of the 1. diatomaceous earth, 2. sterile insect technology and 3. herbal oils against the S. granarius on grain (foremost maize), and to evaluate the influence of the dose rate on weevil mortality and progeny. The main results of our laboratory experiments are the followings: 1. Diatomaceous earth was especially efficacious against S. granarius, but its insecticidal properties depend on exposure time and applied dose. The efficacy on barley was better than on maize. Mortality value of the highest dose was 85% on the 21st day in the case of barley. It can be ascertained that complete elimination of progeny was evidenced on both gain types. To summarize, a satisfactory efficacy level was obtained only on barley at a rate of 4g/kg. Alteration of efficacy between grain types can be explained with differences in grain surface. 2. The mortality consequences of Roentgen irradiation on the S. granarius was highly influenced by the exposure time, and the dose applied. At doses of 50 and 70Gy, the efficacy accepted in plant protection (mortality: 95%) was recorded only on the 21st day. During the application of 100 and 200Gy doses, high mortality values (83.5% and 97.5%) were observed on the 14th day. Our results confirmed the complete sterilizing effect of the doses of 70Gy and above. The autocide effect of 50 and 70Gy doses were demonstrated when irradiated specimens were mixed into groups of fertile specimens. Consequently, these doses might be successfully applied to put sterile insect technique (SIT) into practice. 3. The results revealed that both studied essential oils (Callendula officinalis, Hippophae rhamnoides) exerted strong toxic effect on S. granarius, but C. officinalis triggered higher mortality. The efficacy (94.62 ± 2.63%) was reached after a 48 hours exposure to H. rhamnoides oil at 2ml/kg while the application of 2ml/kg of C. officinalis oil for 24 hours produced 98.94 ± 1.00% mortality rate. Mortality was 100% at 5 ml/kg of H. rhamnoides after 24 hours duration of its application, while with C. officinalis the same value could be reached after a 12 hour-exposure to the oil. Both essential oils applied were eliminated the progeny.Keywords: Sitophilus granarius, stored product, protection, alternative solutions
Procedia PDF Downloads 1702378 Therapeutic Effects of Toll Like Receptor 9 Ligand CpG-ODN on Radiation Injury
Authors: Jianming Cai
Abstract:
Exposure to ionizing radiation causes severe damage to human body and an safe and effective radioprotector is urgently required for alleviating radiation damage. In 2008, flagellin, an agonist of TLR5, was found to exert radioprotective effects on radiation injury through activating NF-kB signaling pathway. From then, the radioprotective effects of TLR ligands has shed new lights on radiation protection. CpG-ODN is an unmethylated oligonucleotide which activates TLR9 signaling pathway. In this study, we demonstrated that CpG-ODN has therapeutic effects on radiation injuries induced by γ ray and 12C6+ heavy ion particles. Our data showed that CpG-ODN increased the survival rate of mice after whole body irradiation and increased the number of leukocytes as well as the bone marrow cells. CpG-ODN also alleviated radiation damage on intestinal crypt through regulating apoptosis signaling pathway including bcl2, bax, and caspase 3 etc. By using a radiation-induced pulmonary fibrosis model, we found that CpG-ODN could alleviate structural damage, within 20 week after whole–thorax 15Gy irradiation. In this model, Th1/Th2 imbalance induced by irradiation was also reversed by CpG-ODN. We also found that TGFβ-Smad signaling pathway was regulated by CpG-ODN, which accounts for the therapeutic effects of CpG-ODN in radiation-induced pulmonary injury. On another hand, for high LET radiation protection, we investigated protective effects of CpG-ODN against 12C6+ heavy ion irradiation and found that after CpG-ODN treatment, the apoptosis and cell cycle arrest induced by 12C6+ irradiation was reduced. CpG-ODN also reduced the expression of Bax and caspase 3, while increased the level of bcl2. Then we detected the effect of CpG-ODN on heavy ion induced immune dysfunction. Our data showed that CpG-ODN increased the survival rate of mice and also the leukocytes after 12C6+ irradiation. Besides, the structural damage of immune organ such as thymus and spleen was also alleviated by CpG-ODN treatment. In conclusion, we found that TLR9 ligand, CpG-ODN reduced radiation injuries in response to γ ray and 12C6+ heavy ion irradiation. On one hand, CpG-ODN inhibited the activation of apoptosis induced by radiation through regulating bcl2, bax and caspase 3. On another hand, through activating TLR9, CpG-ODN recruit MyD88-IRAK-TRAF6 complex, activating TAK1, IRF5 and NF-kB pathway, and thus alleviates radiation damage. This study provides novel insights into protection and therapy of radiation damages.Keywords: TLR9, CpG-ODN, radiation injury, high LET radiation
Procedia PDF Downloads 4802377 A Comprehensive Framework for Fraud Prevention and Customer Feedback Classification in E-Commerce
Authors: Samhita Mummadi, Sree Divya Nagalli, Harshini Vemuri, Saketh Charan Nakka, Sumesh K. J.
Abstract:
One of the most significant challenges faced by people in today’s digital era is an alarming increase in fraudulent activities on online platforms. The fascination with online shopping to avoid long queues in shopping malls, the availability of a variety of products, and home delivery of goods have paved the way for a rapid increase in vast online shopping platforms. This has had a major impact on increasing fraudulent activities as well. This loop of online shopping and transactions has paved the way for fraudulent users to commit fraud. For instance, consider a store that orders thousands of products all at once, but what’s fishy about this is the massive number of items purchased and their transactions turning out to be fraud, leading to a huge loss for the seller. Considering scenarios like these underscores the urgent need to introduce machine learning approaches to combat fraud in online shopping. By leveraging robust algorithms, namely KNN, Decision Trees, and Random Forest, which are highly effective in generating accurate results, this research endeavors to discern patterns indicative of fraudulent behavior within transactional data. Introducing a comprehensive solution to this problem in order to empower e-commerce administrators in timely fraud detection and prevention is the primary motive and the main focus. In addition to that, sentiment analysis is harnessed in the model so that the e-commerce admin can tailor to the customer’s and consumer’s concerns, feedback, and comments, allowing the admin to improve the user’s experience. The ultimate objective of this study is to ramp up online shopping platforms against fraud and ensure a safer shopping experience. This paper underscores a model accuracy of 84%. All the findings and observations that were noted during our work lay the groundwork for future advancements in the development of more resilient and adaptive fraud detection systems, which will become crucial as technologies continue to evolve.Keywords: behavior analysis, feature selection, Fraudulent pattern recognition, imbalanced classification, transactional anomalies
Procedia PDF Downloads 272376 Role of Social Workers in Juvenile Justice Board as a Child Protection Mechanism for Children in Conflict with Law
Authors: Ida D. Souza, Lena Ashok
Abstract:
Every child has a fundamental right to be protected and it is only a safe, supported child who can effectively cope with difficult circumstances and lead a happy childhood. The vulnerability of children has increased due to emerging lifestyles, raising cost of living, higher expectations from adults, parental and care-giver stress /burn-out and a general raise in demand for services for children. A major area of concern is the rise of juvenile crimes in the overall crimes committed in the country. The UNCRC 1989 and JJ Act 2000 enables the structures to handle the juvenile children in care and concern in its real terms. One of the mechanisms to protect the children is the JJB a justice system. The aim is to hold a child culpable (guilty) for offence they committed, not through punishment, but counseling the child to understand their actions and persuade them away from such deviated activities in the future. The JJB consists of two social workers and a judicial magistrate and one of whom should be a woman. This study aims at understanding the role of social workers in best practices in deciding the best course of action for the rehabilitation of the child. Two case studies were carried out through in-depth interviews with the social worker member of the JJB of two Udupi and Mangalore districts. The best practices reported in which children are being allowed to express themselves in a child friendly environment and in the best interest of the child. The study highlighted team work to be very effective in understanding the child in their reformation.Keywords: child protection, best practices, juvenile justice, reformation teamwork
Procedia PDF Downloads 363