Search results for: legal and regulatory framework
5877 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education
Authors: Hongmei Chi
Abstract:
The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning
Procedia PDF Downloads 995876 Real-Time Big-Data Warehouse a Next-Generation Enterprise Data Warehouse and Analysis Framework
Authors: Abbas Raza Ali
Abstract:
Big Data technology is gradually becoming a dire need of large enterprises. These enterprises are generating massively large amount of off-line and streaming data in both structured and unstructured formats on daily basis. It is a challenging task to effectively extract useful insights from the large scale datasets, even though sometimes it becomes a technology constraint to manage transactional data history of more than a few months. This paper presents a framework to efficiently manage massively large and complex datasets. The framework has been tested on a communication service provider producing massively large complex streaming data in binary format. The communication industry is bound by the regulators to manage history of their subscribers’ call records where every action of a subscriber generates a record. Also, managing and analyzing transactional data allows service providers to better understand their customers’ behavior, for example, deep packet inspection requires transactional internet usage data to explain internet usage behaviour of the subscribers. However, current relational database systems limit service providers to only maintain history at semantic level which is aggregated at subscriber level. The framework addresses these challenges by leveraging Big Data technology which optimally manages and allows deep analysis of complex datasets. The framework has been applied to offload existing Intelligent Network Mediation and relational Data Warehouse of the service provider on Big Data. The service provider has 50+ million subscriber-base with yearly growth of 7-10%. The end-to-end process takes not more than 10 minutes which involves binary to ASCII decoding of call detail records, stitching of all the interrogations against a call (transformations) and aggregations of all the call records of a subscriber.Keywords: big data, communication service providers, enterprise data warehouse, stream computing, Telco IN Mediation
Procedia PDF Downloads 1755875 Concept for Planning Sustainable Factories
Authors: T. Mersmann, P. Nyhuis
Abstract:
In the current economic climate, for many businesses it is generally no longer sufficient to pursue exclusively economic interests. Instead, integrating ecological and social goals into the corporate targets is becoming ever more important. However, the holistic integration of these new goals is missing from current factory planning approaches. This article describes the conceptual framework for a planning methodology for sustainable factories. To this end, the description of the key areas for action is followed by a description of the principal components for the systematization of sustainability for factories and their stakeholders. Finally, a conceptual framework is presented which integrates the components formulated into an established factory planning procedure.Keywords: factory planning, stakeholder, systematization, sustainability
Procedia PDF Downloads 4525874 Torture and Turkey: Legal Situation Related to Torture in Turkey and the Issue of Impunity of Torture
Authors: Zeynep Üskül Engin
Abstract:
Looking upon the world’s history, one can easily understand that the most drastic and evil comes to the human from his own kind. Human, proving that Hobbs was actually right, finally have agreed on taking some necessary measures after the destructive effects of the great World Wars. Surely after this, human rights have been more commonly mentioned in written form and now the priority of the values and goals of a democratic society is to protect its individuals. Due to this fact, the right of living is found to be valuable and all the existing forms of torture, anti-human and humiliating activities have been banned. Turkey, having signed the international papers of human rights, has aimed for eliminating torture through changing its laws and regulations to a certain extent. Monitoring Turkey’s experience, it is likely to say that during certain periods of time systematic torture has been applied. The urge to enter the European Union and verdicts against Turkey, have led to considerable progress in human rights. Besides, changes in law and the comprehensive training for the police, judges, medical and prison staff have resulted in positive improvement related to this issue. Certainly, this current legal update does not completely mean the total elimination of the practice of torture; however, in the commitment of this crime, the ones who have committed are standing a trial and facing severe punishments. In this article, Turkey, with a notorious reputation in international arena is going to be examined through its policy towards torture and defects in practice.Keywords: torture, human rights, impunity of torture, sociology
Procedia PDF Downloads 4635873 Radio Frequency Identification Device Based Emergency Department Critical Care Billing: A Framework for Actionable Intelligence
Authors: Shivaram P. Arunachalam, Mustafa Y. Sir, Andy Boggust, David M. Nestler, Thomas R. Hellmich, Kalyan S. Pasupathy
Abstract:
Emergency departments (EDs) provide urgent care to patients throughout the day in a complex and chaotic environment. Real-time location systems (RTLS) are increasingly being utilized in healthcare settings, and have shown to improve safety, reduce cost, and increase patient satisfaction. Radio Frequency Identification Device (RFID) data in an ED has been shown to compute variables such as patient-provider contact time, which is associated with patient outcomes such as 30-day hospitalization. These variables can provide avenues for improving ED operational efficiency. A major challenge with ED financial operations is under-coding of critical care services due to physicians’ difficulty reporting accurate times for critical care provided under Current Procedural Terminology (CPT) codes 99291 and 99292. In this work, the authors propose a framework to optimize ED critical care billing using RFID data. RFID estimated physician-patient contact times could accurately quantify direct critical care services which will help model a data-driven approach for ED critical care billing. This paper will describe the framework and provide insights into opportunities to prevent under coding as well as over coding to avoid insurance audits. Future work will focus on data analytics to demonstrate the feasibility of the framework described.Keywords: critical care billing, CPT codes, emergency department, RFID
Procedia PDF Downloads 1315872 Strategic Cyber Sentinel: A Paradigm Shift in Enhancing Cybersecurity Resilience
Authors: Ayomide Oyedele
Abstract:
In the dynamic landscape of cybersecurity, "Strategic Cyber Sentinel" emerges as a revolutionary framework, transcending traditional approaches. This paper pioneers a holistic strategy, weaving together threat intelligence, machine learning, and adaptive defenses. Through meticulous real-world simulations, we demonstrate the unprecedented resilience of our framework against evolving cyber threats. "Strategic Cyber Sentinel" redefines proactive threat mitigation, offering a robust defense architecture poised for the challenges of tomorrow.Keywords: cybersecurity, resilience, threat intelligence, machine learning, adaptive defenses
Procedia PDF Downloads 835871 Human Security as a Tool of Protecting International Human Rights Law
Authors: Arenca Trashani
Abstract:
20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.Keywords: human security, international human rights law, development, Albania, international law
Procedia PDF Downloads 7585870 Modified Model-Based Systems Engineering Driven Approach for Defining Complex Energy Systems
Authors: Akshay S. Dalvi, Hazim El-Mounayri
Abstract:
The internal and the external interactions between the complex structural and behavioral characteristics of the complex energy system result in unpredictable emergent behaviors. These emergent behaviors are not well understood, especially when modeled using the traditional top-down systems engineering approach. The intrinsic nature of current complex energy systems has called for an elegant solution that provides an integrated framework in Model-Based Systems Engineering (MBSE). This paper mainly presents a MBSE driven approach to define and handle the complexity that arises due to emergent behaviors. The approach provides guidelines for developing system architecture that leverages in predicting the complexity index of the system at different levels of abstraction. A framework that integrates indefinite and definite modeling aspects is developed to determine the complexity that arises during the development phase of the system. This framework provides a workflow for modeling complex systems using Systems Modeling Language (SysML) that captures the system’s requirements, behavior, structure, and analytical aspects at both problem definition and solution levels. A system architecture for a district cooling plant is presented, which demonstrates the ability to predict the complexity index. The result suggests that complex energy systems like district cooling plant can be defined in an elegant manner using the unconventional modified MBSE driven approach that helps in estimating development time and cost.Keywords: district cooling plant, energy systems, framework, MBSE
Procedia PDF Downloads 1305869 Optimal Price Points in Differential Pricing
Authors: Katerina Kormusheva
Abstract:
Pricing plays a pivotal role in the marketing discipline as it directly influences consumer perceptions, purchase decisions, and overall market positioning of a product or service. This paper seeks to expand current knowledge in the area of discriminatory and differential pricing, a main area of marketing research. The methodology includes developing a framework and a model for determining how many price points to implement in differential pricing. We focus on choosing the levels of differentiation, derive a function form of the model framework proposed, and lastly, test it empirically with data from a large-scale marketing pricing experiment of services in telecommunications.Keywords: marketing, differential pricing, price points, optimization
Procedia PDF Downloads 935868 Improving Energy Efficiency through Industrial Symbiosis: A Conceptual Framework of Energy Management in Energy-Intensive Industries
Authors: Yuanjun Chen, Yongjiang Shi
Abstract:
Rising energy prices have drawn a focus to global energy issues, and the severe pollution that has resulted from energy-intensive industrial sectors has yet to be addressed. By combining Energy Efficiency with Industrial Symbiosis, the practices of efficient energy utilization and improvement can be not only enriched at the factory level but also upgraded into “within and/or between firm level”. The academic contribution of this paper provides a conceptual framework of energy management through IS. The management of waste energy within/between firms can contribute to the reduction of energy consumption and provides a solution to the environmental issues.Keywords: energy efficiency, energy management, industrial symbiosis, energy-intensive industry
Procedia PDF Downloads 4375867 Sustainable Project Management: Driving the Construction Industry Towards Sustainable Developmental Goals
Authors: Francis Kwesi Bondinuba, Seidu Abdullah, Mewomo Cecilia, Opoku Alex
Abstract:
Purpose: The purpose of this research is to develop a framework for understanding how sustainable project management contributes to the construction industry's pursuit of sustainable development goals. Study design/methodology/approach: The study employed a theoretical methodology to review existing theories and models that support Sustainable Project Management (SPM) in the construction industry. Additionally, a comprehensive review of current literature on SPM is conducted to provide a thorough understanding of this study. Findings: Sustainable Project Management (SPM) practices, including stakeholder engagement and collaboration, resource efficiency, waste management, risk management, and resilience, play a crucial role in achieving the Sustainable Development Goals (SDGs) within the construction industry. Conclusion: Adopting Sustainable Project Management (SPM) practices in the Ghanaian construction industry enhances social inclusivity by engaging communities and creating job opportunities. The adoption of these practices faces significant challenges, including a lack of awareness and understanding, insufficient regulatory frameworks, financial constraints, and a shortage of skilled professionals. Recommendation: There should be a comprehensive approach to project planning and execution that includes stakeholders such as local communities, government bodies, and environmental organisations, the use of green building materials and technologies, and the implementation of effective waste management strategies, all of which will ensure the achievement of SDGs in Ghana's construction industry. Originality/value: This paper adds to the current literature by offering the various theories and models in Sustainable Project Management (SPM) and a detailed review of how Sustainable Project Management (SPM) contribute to the achievement of the Sustainable Development Goals (SDGs) in the Ghanaian Construction Industry.Keywords: sustainable development, sustainable development goals, construction industry, ghana, sustainable project management
Procedia PDF Downloads 235866 Citizen Becoming: ‘In-between’ State and Tibetan Self-Fashioning (1946- 1986)
Authors: Noel Mariam George
Abstract:
This paper explores the history of Tibetan citizenship, one of the primary non-partition refugee communities, and their negotiation of 'in-betweenness' as a mode of political and legal belonging in India. While South Asian citizenship histories have primarily centered around the 1947 and 1971 Partitions, this paper uncovers an often-overlooked period, spanning the 1950s, 60s, and 70s, when Tibetans began to assert their claims within the Indian state. This paper challenges the conventional teleological narrative of partition by highlighting a distinct period when the Indian state negotiated boundaries of belonging for non-partition refugees differently. It explores how Tibetans occupied an 'in-between' status, existing as both foreigners and potential citizens, thereby complicating the traditional citizen-refugee binary. Moreover, it underscores that citizenship during this era was not solely determined by legal frameworks. Instead, it was a dynamic process shaped by historical contexts, practices, and relationships. Tibetans pursued citizen-like claims through legal battles, lobbying, protests, volunteering, and collective solidarity, revealing citizenship as an 'act' embedded in their daily lives. Tibetan liminality is characterized by their simultaneous maintenance of exile identity and pursuit of citizen-like claims in India. The cautious Indian state, reluctant to label Tibetans as either 'refugees' or 'citizens,' has contributed to this liminal status. This duality has intensified Tibetans' precarity but has also led to creative and transformative practices that have expanded the boundaries of democracy and citizenship in India. Beyond traditional narratives of Indian benevolence, this paper scrutinizes the geopolitical factors driving Indian support for Tibetans. Additionally, it challenges 'common-sensical' narratives by demonstrating how Tibetans strategically navigated Indian citizenship. Using archival sources from the British Library and the National Archives in London and Delhi along with digitized materials, the paper reveals citizenship as a multi-faceted historical process. It examines how Tibetans exercised agency within the Indian state despite their liminal status.Keywords: citizenship, borderlands, forced displacement, refugees in India
Procedia PDF Downloads 765865 Digital Forensic Exploration Framework for Email and Instant Messaging Applications
Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed
Abstract:
Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.Keywords: forensics, network sessions, packet reconstruction, packet reordering
Procedia PDF Downloads 3445864 The Shape of the Sculptor: Exploring Psychologist’s Perceptions of a Model of Parenting Ability to Guide Intervention in Child Custody Evaluations in South Africa
Authors: Anthony R. Townsend, Robyn L. Fasser
Abstract:
This research project provides an interpretative phenomenological analysis of a proposed conceptual model of parenting ability that has been designed to offer recommendations to guide intervention in child custody evaluations in South Africa. A recent review of the literature on child custody evaluations reveals that while there have been significant and valuable shifts in the capacity of the legal system aided by mental health professionals in understanding children and family dynamics, there remains a conceptual gap regarding the nature of parenting ability. With a view to addressing this paucity of a theoretical basis for considering parenting ability, this research project reviews a dimensional model for the assessment of parenting ability by conceiving parenting ability as a combination of good parenting and parental fitness. This model serves as a conceptual framework to guide child-custody evaluation and refine intervention in such cases to better meet the best interests of the child in a manner that bridges the professional gap between parties, legal entities, and mental health professionals. Using a model of good parenting as a point of theoretical departure, this model incorporates both intra-psychic and interpersonal attributes and behaviours of parents to form an impression of parenting ability and identify areas for potential enhancement. This research, therefore, hopes to achieve the following: (1) to provide nuanced descriptions of parents’ parenting ability; (2) to describe parents’ parenting potential; (3) to provide a parenting assessment tool for investigators in forensic family matters that will enable more useful recommendations and interventions; (4) to develop a language of consensus for investigators, attorneys, judges and parents, in forensic family matters, as to what comprises parenting ability and how this can be assessed; and (5) that all of the aforementioned will serve to advance the best interests of the children involved in such litigious matters. The evaluative promise and post-assessment prospects of this model are illustrated through three interlinking data sets: (1) the results of interviews with South African psychologists about the model, (2) retrospective analysis of care and contact evaluation reports using the model to determine if different conclusions or more specific recommendations are generated with its use and (3) the results of an interview with a psychologist who piloted this model by using it in care and contact evaluation.Keywords: alienation, attachment, best interests of the child, care and contact evaluation, children’s act (38 of 2005), child custody evaluation, civil forensics, gatekeeping, good parenting, good-enough parenting, health professions council of South Africa, family law, forensic mental healthcare practitioners, parental fitness, parenting ability, parent management training, parenting plan, problem-determined system, psychotherapy, support of other child-parent relationship, voice of the child
Procedia PDF Downloads 1155863 The Interplay between Autophagy and Macrophages' Polarization in Wound Healing: A Genetic Regulatory Network Analysis
Authors: Mayada Mazher, Ahmed Moustafa, Ahmed Abdellatif
Abstract:
Background: Autophagy is a eukaryotic, highly conserved catabolic process implicated in many pathophysiologies such as wound healing. Autophagy-associated genes serve as a scaffolding platform for signal transduction of macrophage polarization during the inflammatory phase of wound healing and tissue repair process. In the current study, we report a model for the interplay between autophagy-associated genes and macrophages polarization associated genes. Methods: In silico analysis was performed on 249 autophagy-related genes retrieved from the public autophagy database and gene expression data retrieved from Gene Expression Omnibus (GEO); GSE81922 and GSE69607 microarray data macrophages polarization 199 DEGS. An integrated protein-protein interaction network was constructed for autophagy and macrophage gene sets. The gene sets were then used for GO terms pathway enrichment analysis. Common transcription factors for autophagy and macrophages' polarization were identified. Finally, microRNAs enriched in both autophagy and macrophages were predicated. Results: In silico prediction of common transcription factors in DEGs macrophages and autophagy gene sets revealed a new role for the transcription factors, HOMEZ, GABPA, ELK1 and REL, that commonly regulate macrophages associated genes: IL6,IL1M, IL1B, NOS1, SOC3 and autophagy-related genes: Atg12, Rictor, Rb1cc1, Gaparab1, Atg16l1. Conclusions: Autophagy and macrophages' polarization are interdependent cellular processes, and both autophagy-related proteins and macrophages' polarization related proteins coordinate in tissue remodelling via transcription factors and microRNAs regulatory network. The current work highlights a potential new role for transcription factors HOMEZ, GABPA, ELK1 and REL in wound healing.Keywords: autophagy related proteins, integrated network analysis, macrophages polarization M1 and M2, tissue remodelling
Procedia PDF Downloads 1525862 Absolute Liability in International Human Rights Law
Authors: Gassem Alfaleh
Abstract:
In Strict liability, a person can be held liable for any harm resulting from certain actions or activities without any mistake. The liability is strict because a person can be liable when he or she commits any harm with or without his intention. The duty owed is the duty to avoid causing the plaintiff any harm. However, “strict liability is imposed at the International level by two types of treaties, namely those limited to giving internal effect to treaty provisions and those that impose responsibilities on states. The basic principle of strict liability is that there is a liability on the operator or the state (when the act concerned is attributable to the state) for damage inflicted without there being a need to prove unlawful behavior”. In international human rights law, strict liability can exist when a defendant is in legal jeopardy by virtue of an internationally wrongful act, without any accompanying intent or mental state. When the defendant engages in an abnormally dangerous activity against the environment, he will be held liable for any harm it causes, even if he was not at fault. The paper will focus on these activities under international human rights law. First, the paper will define important terms in the first section of the paper. Second, it will focus on state and non-state actors in terms of strict liability. Then, the paper will cover three major areas in which states should be liable for hazardous activities: (1) nuclear energy, (2) maritime pollution, (3) Space Law, and (4) other hazardous activities which damage the environment.Keywords: human rights, law, legal, absolute
Procedia PDF Downloads 1485861 'Typical' Criminals: A Schutzian Influenced Theoretical Framework Exploring Type and Stereotype Formation
Authors: Mariam Shah
Abstract:
The way the human mind interprets and comprehends the world it occupies has long been a topic of discussion amongst philosophers and phenomenologists. This paper will focus predominantly on the ideologies espoused by the phenomenologist Alfred Schutz and will investigate how we attribute meaning to an event through the process of typification, and the production and usage of ‘types' and ‘stereotypes.' This paper will then discuss how subjective ideologies innate within us result in unique and subjective decision outcomes, based on a phenomenologically influenced theoretical framework which will illustrate how we form ‘types’ in order to ‘typecast’ and form judgements of everything and everyone we experience. The framework used will be founded in theory espoused by Alfred Schutz, and will review the different types of knowledge we rely on innately to inform our judgements, the relevance we attribute to the information which we acquire, and how we consciously and unconsciously apply this framework to everyday situations. An assessment will then be made of the potential impact that these subjective meaning structures can present when dispensing justice in criminal courts. This paper will investigate how these subjective meaning structures can influence our consciousness on both a conscious and unconscious level, and how this could potentially result in bias judicial outcomes due to negative ‘types’ or ‘stereotypes.' This paper will ultimately illustrate that we unconsciously and unreflexively use pre-formed types and stereotypes to inform our judgements and give meaning to what we have just experienced.Keywords: Alfred Schutz, criminal courts, decision making, judicial decision making, phenomenology, Schutzian stereotypes, types, typification
Procedia PDF Downloads 2255860 Cross Carpeting in Nigerian Politics: Some Legal and Moral Issues Generated
Authors: Agbana Olaseinde Julius, Opadere Olaolu Stephen
Abstract:
The concept of cross carpeting is as old as politics itself. Basically, it entails an individual leaving a political party/group, to join another. The reasons for which cross carpeting is embarked upon are diverse: ideological differences; ethnic and/or religious differences; access to actual or perceived better political opportunities; liberty of association; rancor; etc. The current democratic dispensation in Nigeria has experienced renewed and rather alarming rate of cross carpeting, for reasons including those enumerated above and others. Right to cross carpet is inherent in a democratic setting as well as the political stakeholder; so does it also comprise of the constitutional right of ‘freedom of association’. However, the current species of cross carpeting in Nigeria requires scrutiny, in view of some potential legal and moral challenges it poses for both the present and the future. Cross carpeting is considered both legal and constitutional, but the current spate raises the question of expediency, particularly in a nascent democracy. It is considered to have a propensity of negatively impacting political stability in a polity with fragile nerves. Importantly too, cross carpeting is considered a potential damage to the psyche of posterity with regards to a warped disposition to promises, honour and integrity. The perceived peculiar dimension of cross carpeting in Nigeria raises questions on the quality of leadership presently obtainable in the country, vis-à-vis greed, self-centeredness, disregard for the concern and interest of avowed followers/fans, entrenchment of distrust, etc. Thus, the study made use of primary and secondary sources of information. The primary sources included the Constitutions of the Federal Republic of Nigeria 1999 (as amended); judicial decisions; and the Electoral Act, 2010 (as Amended). The secondary sources comprised of information from books, journals, newspapers, magazines and Internet documents. Data obtained from these sources were subjected to content analysis. Findings of this study show that though the act of cross carpeting may not be in breach of any Statute or Law, it however, in most cases, breaches the morals of expediency. The morality thereof is far from justifiable, and should be condemned in the interest of the present and posterity. There is a great and urgent need to embark on a re-entrenchment of the culture of political ideology in the Nigerian polity, as obtainable in developed democracies. In conclusion, the need to exercise the right of cross carpeting with caution cannot be overemphasized. Membership of a political group/party should be backed by commitment to well defined ideologies and values. Commitment to them should be regarded akin to that found in the family, which is not easily or flippantly jettisoned.Keywords: cross-carpeting, Nigeria, legal, moral issues, politics
Procedia PDF Downloads 4475859 The Framework of System Safety for Multi Human-in-The-Loop System
Authors: Hideyuki Shintani, Ichiro Koshijima
Abstract:
In Cyber Physical System (CPS), if there are a large number of persons in the process, a role of person in CPS might be different comparing with the one-man system. It is also necessary to consider how Human-in-The-Loop Cyber Physical Systems (HiTLCPS) ensure safety of each person in the loop process. In this paper, the authors discuss a system safety framework with an illustrative example with STAMP model to clarify what point for safety should be considered and what role of person in the should have.Keywords: cyber-physical-system, human-in-the-loop, safety, STAMP model
Procedia PDF Downloads 3255858 Constrains to Financial Engineering for Liquidity Management: A Multiple Case Study of Islamic Banks
Authors: Sadia Bibi, Karim Ullah
Abstract:
Islamic banks have excess liquidity, which needs proper management to earn a high rate of return on them to remain competitive. However, they lack assets-backed avenues and rely on a few sukuks, which led them to liquidity management issues. Financial engineering comes forward to innovate and develop instruments for the requisite financial problem. Still, they face many challenges, explored in the context of liquidity management in Islamic banks. The rigorous literature review shows that Shariah compliance, competition from the conventional banks, lack of sufficient instruments, derivatives are still not accepted as legitimate products, the inter-bank market being less developed, and no possibility of lender of last resort is the six significant constraints to financial engineering for liquidity management of Islamic banks. To further explore the problem, a multiple case study strategy is used to extend and develop the theory with the philosophical stance of social constructivism. Narrative in-depth interviews over the telephone are conducted with key personnel at treasury departments of selected banks. Data is segregated and displayed using NVivo 11 software, and the thematic analysis approach identifies themes related to the constraints. The exploration of further constraints to financial engineering for liquidity management of Islamic banks achieves the research aim. The theory is further developed by the addition of three more constraints to the theoretical framework, which are i) lack of skilled human resources, ii) lack of unified vision, and iii) lack of government support to the Islamic banks. These study findings are fruitful for the use of the government, regulatory authorities of the banking sector, the State Bank of Pakistan (Central Bank), and the product design & development division of Islamic banks to make the financial engineering process feasible and resolve liquidity management issues of Islamic banks.Keywords: financial engineering, liquidity management, Islamic banks, shariah compliance
Procedia PDF Downloads 835857 The Development of a Comprehensive Sustainable Supply Chain Performance Measurement Theoretical Framework in the Oil Refining Sector
Authors: Dina Tamazin, Nicoleta Tipi, Sahar Validi
Abstract:
The oil refining industry plays vital role in the world economy. Oil refining companies operate in a more complex and dynamic environment than ever before. In addition, oil refining companies and the public are becoming more conscious of crude oil scarcity and climate changes. Hence, sustainability in the oil refining industry is becoming increasingly critical to the industry's long-term viability and to the environmental sustainability. Mainly, it is relevant to the measurement and evaluation of the company's sustainable performance to support the company in understanding their performance and its implication more objectively and establishing sustainability development plans. Consequently, the oil refining companies attempt to re-engineer their supply chain to meet the sustainable goals and standards. On the other hand, this research realized that previous research in oil refining sustainable supply chain performance measurements reveals that there is a lack of studies that consider the integration of sustainability in the supply chain performance measurement practices in the oil refining industry. Therefore, there is a need for research that provides performance guidance, which can be used to measure sustainability and assist in setting sustainable goals for oil refining supply chains. Accordingly, this paper aims to present a comprehensive oil refining sustainable supply chain performance measurement theoretical framework. In development of this theoretical framework, the main characteristics of oil refining industry have been identified. For this purpose, a thorough review of relevant literature on performance measurement models and sustainable supply chain performance measurement models has been conducted. The comprehensive oil refining sustainable supply chain performance measurement theoretical framework introduced in this paper aims to assist oil refining companies in measuring and evaluating their performance from a sustainability aspect to achieve sustainable operational excellence.Keywords: oil refining industry, oil refining sustainable supply chain, performance measurement, sustainability
Procedia PDF Downloads 2875856 The Admissibility of Evidence Obtained in Contravention of the Right to Privacy in a Criminal Trial: A Comparative Study of Poland and Germany
Authors: Konstancja Syller
Abstract:
International law and European regulations remain hardly silent about the admissibility of evidence obtained illegally in a criminal trial. However, Article 6 of the European Convention on Human Rights guarantees the right to a fair trial, it does not normalise a proceeding status of specified sources or means of proof outright. Therefore, it is the preserve of national legislation and national law enforcement authorities to decide on this matter. In most countries, especially in Germany and Poland, a rather complex normative approach to the issue of proof obtained in violation of the right to privacy is evident, which pursues in practise to many interpretive doubts. In Germany the jurisprudence has a significant impact within the range of the matter mentioned above. The Constitutional Court and the Supreme Court of Germany protect the right to privacy quite firmly - they ruled on inadmissibility of obtaining a proof in the form of a diary or a journal as a protection measure of constitutional guaranteed right. At the same time, however, the Supreme Court is not very convinced with reference to the issue of whether materials collected as a result of an inspection, call recordings or listening to the premises, which were carried out in breach of law, can be used in a criminal trial. Generally speaking, German courts indicate a crucial importance of the principle of Truth and the principle of proportionality, which both enable a judgement to be made as to the possibility of using an evidence obtained unlawfully. Comparing, in Poland there is almost no jurisprudence of the Constitutional Tribunal relating directly to the issue of illegal evidence. It is somehow surprising, considering the doctrinal analysis of the admissibility of using such proof in a criminal trial is performed in relation to standards resulted from the Constitution. Moreover, a crucial de lega lata legal provision, which enables allowing a proof obtained in infringement of the provisions in respect of criminal proceedings or through a forbidden act, is widely criticised within the legal profession ant therefore many courts give it their own interpretation at odds with legislator’s intentions. The comparison of two civil law legal systems’ standards regarding to the admissibility of an evidence obtained in contravention of the right to privacy in a criminal trial, taking also into account EU legislation and judicature, is the conclusive aim of this article.Keywords: criminal trial, evidence, Germany, right to privacy, Poland
Procedia PDF Downloads 1565855 A Tale of Seven Districts: Reviewing The Past, Present and Future of Patent Litigation Filings to Form a Two-Step Burden-Shifting Framework for 28 U.S.C. § 1404(a)
Authors: Timothy T. Hsieh
Abstract:
Current patent venue transfer laws under 28 U.S.C. § 1404(a) e.g., the Gilbert factors from Gulf Oil Corp. v. Gilbert, 330 U.S. 501 (1947) are too malleable in that they often lead to frequent mandamus orders from the U.S. Court of Appeals for the Federal Circuit (“Federal Circuit”) overturning district court rulings on venue transfer motions. Thus, this paper proposes a more robust two-step burden-shifting framework that replaces the eight Gilbert factors. Moreover, a brief history of venue transfer patterns in the seven most active federal patent district courts is covered, with special focus devoted to the venue transfer orders from Judge Alan D Albright of the U.S. District Court for the Western District of Texas. A comprehensive data summary of 45 case sets where the Federal Circuit ruled on writs of mandamus involving Judge Albright’s transfer orders is subsequently provided, with coverage summaries of certain cases including four precedential ones from the Federal Circuit. This proposed two-step burden shifting framework is then applied to these venue transfer cases, as well as Federal Circuit mandamus orders ruling on those decisions. Finally, alternative approaches to remedying the frequent reversals for venue transfer will be discussed, including potential legislative solutions, adjustments to common law framework approaches to venue transfer, deference to the inherent powers of Article III U.S. District Judge, and a unified federal patent district court. Overall, this paper seeks to offer a more robust and consistent three-step burden-shifting framework for venue transfer and for the Federal Circuit to follow in administering mandamus orders, which might change somewhat in light of Western District of Texas Chief Judge Orlando Garcia’s order on redistributing Judge Albright’s patent cases.Keywords: Patent law, venue, judge Alan Albright, minimum contacts, western district of Texas
Procedia PDF Downloads 1095854 Bringing Design Science Research Methodology into Real World Applications
Authors: Maya Jaber
Abstract:
In today's ever-changing world, organizational leaders will need to transform their organizations to meet the demands they face from employees, consumers, local and federal governments, and the global market. Change agents and leaders will need a new paradigm of thinking for creative problem solving and innovation in a time of uncertainty. A new framework that is developed from Design Science Research foundations with holistic design thinking methodologies (HTDM) and action research approaches has been developed through Dr. Jaber’s research. It combines these philosophies into a three-step process that can be utilized in practice for any sustainability, change, or project management applications. This framework was developed to assist in the pedagogy for the implementation of her holistic strategy formalized framework Integral Design Thinking (IDT). Her work focuses on real world application for the streamlining and adoption of initiatives into organizational culture transformation. This paper will discuss the foundations of this philosophy and the methods for utilization in practice developed in Dr. Jaber's research.Keywords: design science research, action research, critical thinking, design thinking, organizational transformation, sustainability management, organizational culture change
Procedia PDF Downloads 1805853 Introducing, Testing, and Evaluating a Unified JavaScript Framework for Professional Online Studies
Authors: Caspar Goeke, Holger Finger, Dorena Diekamp, Peter König
Abstract:
Online-based research has recently gained increasing attention from various fields of research in the cognitive sciences. Technological advances in the form of online crowdsourcing (Amazon Mechanical Turk), open data repositories (Open Science Framework), and online analysis (Ipython notebook) offer rich possibilities to improve, validate, and speed up research. However, until today there is no cross-platform integration of these subsystems. Furthermore, implementation of online studies still suffers from the complex implementation (server infrastructure, database programming, security considerations etc.). Here we propose and test a new JavaScript framework that enables researchers to conduct any kind of behavioral research in the browser without the need to program a single line of code. In particular our framework offers the possibility to manipulate and combine the experimental stimuli via a graphical editor, directly in the browser. Moreover, we included an action-event system that can be used to handle user interactions, interactively change stimuli properties or store participants’ responses. Besides traditional recordings such as reaction time, mouse and keyboard presses, the tool offers webcam based eye and face-tracking. On top of these features our framework also takes care about the participant recruitment, via crowdsourcing platforms such as Amazon Mechanical Turk. Furthermore, the build in functionality of google translate will ensure automatic text translations of the experimental content. Thereby, thousands of participants from different cultures and nationalities can be recruited literally within hours. Finally, the recorded data can be visualized and cleaned online, and then exported into the desired formats (csv, xls, sav, mat) for statistical analysis. Alternatively, the data can also be analyzed online within our framework using the integrated Ipython notebook. The framework was designed such that studies can be used interchangeably between researchers. This will support not only the idea of open data repositories but also constitutes the possibility to share and reuse the experimental designs and analyses such that the validity of the paradigms will be improved. Particularly, sharing and integrating the experimental designs and analysis will lead to an increased consistency of experimental paradigms. To demonstrate the functionality of the framework we present the results of a pilot study in the field of spatial navigation that was conducted using the framework. Specifically, we recruited over 2000 subjects with various cultural backgrounds and consequently analyzed performance difference in dependence on the factors culture, gender and age. Overall, our results demonstrate a strong influence of cultural factors in spatial cognition. Such an influence has not yet been reported before and would not have been possible to show without the massive amount of data collected via our framework. In fact, these findings shed new lights on cultural differences in spatial navigation. As a consequence we conclude that our new framework constitutes a wide range of advantages for online research and a methodological innovation, by which new insights can be revealed on the basis of massive data collection.Keywords: cultural differences, crowdsourcing, JavaScript framework, methodological innovation, online data collection, online study, spatial cognition
Procedia PDF Downloads 2575852 Imaging of Peritoneal Malignancies - A Pictorial Essay and Proposed Imaging Framework
Authors: T. Hennedige
Abstract:
Imaging plays a crucial role in the evaluation of the extent of peritoneal disease, which in turn determines prognosis and treatment choice. Despite advances in imaging technology, assessment of the peritoneum remains relatively challenging secondary to its large surface area, complex anatomy, and variety of imaging modalities available. This poster will review the mechanisms of spread, namely intraperitoneal dissemination, directly along peritoneal pathways, haematogeneous dissemination, and lymphatic spread. This will be followed by a side-by-side pictorial comparison of the detection of peritoneal deposits using CT, MRI, and PET/CT, depicting the advantages and shortcomings of each modality. An imaging selection framework will then be presented, which may aid the clinician in selecting the appropriate imaging modality for the malignancy in question.Keywords: imaging, CT, malignancy, MRI, peritoneum, PET
Procedia PDF Downloads 1475851 Enhancing Police Accountability through the Malawi Independent Police Complaints Commission: Prospects and Challenges That Lie Ahead
Authors: Esther Gumboh
Abstract:
The police play a critical role in society and are an integral aspect of the rule of law. Equally, respect for human rights is an integral part of professional policing. In view of the vast powers that the police enjoy and the attendant risk of abuse and resulting human rights violations, the need for police accountability and civilian police oversight is internationally and regionally recognised. Policing oversight springs from the duty to investigate human rights violations. Those implicated in perpetrating or covering up violations must be disciplined or prosecuted to ensure effective accountability. Police accountability is particularly important in Malawi given the dark history of policing in the country during the 30-year dictatorial era under President Kamuzu Banda. Described as one of the most repressive regimes in Africa, the Banda administration was characterised by gross state-sponsored violence, repressive policing and human rights violations. Indeed, the police were involved in various forms of human rights abuse including arbitrary arrests and unlawful detentions, torture, and excessive use of force in conducting arrests and public order policing. This situation flourished within a culture of police impunity bolstered in part by the absence of clear oversight mechanisms for police accountability. In turn, there was immense public mistrust of the police. Unsurprisingly, the criminal justice system was one of the priority areas for reform when Malawi adopted its first democratic Constitution in 1994. Section 153 of the Constitution envisions a police service that is, for all intents and purposes, there to provide for the protection of public safety and the rights of persons in Malawi according to the prescriptions of the Constitution and any other law. This position reflects the view that the duty to protect and promote human rights is not incompatible with effective policing. Despite this, the police continue to engage in questionable behaviour in public order policing, excessive use of force, deaths in police custody, ill-treatment, torture and other forms of abuse including sexual abuse. Perpetrators of abuses are occasionally punished, but investigations are often delayed, abandoned, or remain inconclusive. Police accountability remains largely elusive. Commendably, the law does subject the police to significant oversight both internally and externally. However, until 2010, Malawi lacked a wholly independent civilian oversight mechanism specifically mandated to monitor the activities of the Malawi Police Service and held it accountable. This void has since been filled by the Independent Complaints Commission established under the Police Act. This is a positive development that reiterates Malawi’s commitment to the investigation of human rights violations by the police and to ending police impunity. This contribution examines the legal framework for this Commission to project the effectiveness of the Commission. While the framework looks promising on various fronts, there are potential challenges that lie ahead. Malawi must pre-emptively deal with these challenges carefully if the Commission is to have any practical significance in transforming police accountability in the country. Drawing on lessons from other jurisdictions like South Africa, the paper makes recommendations for legislative reform to strengthen the Commission’s framework.Keywords: civilian policing oversight, Malawi, police, police accountability, policing, policing oversight
Procedia PDF Downloads 2345850 Governance Challenges for the Management of Water Resources in Agriculture: The Italian Way
Authors: Silvia Baralla, Raffaella Zucaro, Romina Lorenzetti
Abstract:
Water management needs to cope with economic, societal, and environmental changes. This could be guaranteed through 'shifting from government to governance'. In the last decades, it was applied in Europe through and within important legislative pillars (Water Framework Directive and Common Agricultural Policy) and their measures focused on resilience and adaptation to climate change, with particular attention to the creation of synergies among policies and all the actors involved at different levels. Within the climate change context, the agricultural sector can play, through sustainable water management, a leading role for climate-resilient growth and environmental integrity. A recent analysis on the water management governance of different countries identified some common gaps dealing with administrative, policy, information, capacity building, funding, objective, and accountability. The ability of a country to fill these gaps is an essential requirement to make some of the changes requested by Europe, in particular the improvement of the agro-ecosystem resilience to the effect of climatic change, supporting green and digital transitions, and sustainable water use. This research aims to contribute in sharing examples of water governances and related advantages useful to fill the highlighted gaps. Italy has developed a strong and exhaustive model of water governance in order to react with strategic and synergic actions since it is one of the European countries most threatened by climate change and its extreme events (drought, floods). In particular, the Italian water governance model was able to overcome several gaps, specifically as concerns the water use in agriculture, adopting strategies as a systemic/integrated approach, the stakeholder engagement, capacity building, the improvement of planning and monitoring ability, and an adaptive/resilient strategy for funding activities. They were carried out, putting in place regulatory, structural, and management actions. Regulatory actions include both the institution of technical committees grouping together water decision-makers and the elaboration of operative manuals and guidelines by means of a participative and cross-cutting approach. Structural actions deal with the funding of interventions within European and national funds according to the principles of coherence and complementarity. Finally, management actions regard the introduction of operational tools to support decision-makers in order to improve planning and monitoring ability. In particular, two cross-functional and interoperable web databases were introduced: SIGRIAN (National Information System for Water Resources Management in Agriculture) and DANIA (National Database of Investments for Irrigation and the Environment). Their interconnection allows to support sustainable investments, taking into account the compliance about irrigation volumes quantified in SIGRIAN, ensuring a high level of attention on water saving, and monitoring the efficiency of funding. Main positive results from the Italian water governance model deal with a synergic and coordinated work at the national, regional, and local level among institutions, the transparency on water use in agriculture, a deeper understanding from the stakeholder side of the importance of their roles and of their own potential benefits and the capacity to guarantee continuity to this model, through a sensitization process and the combined use of management operational tools.Keywords: agricultural sustainability, governance model, water management, water policies
Procedia PDF Downloads 1175849 Malpractice, Even in Conditions of Compliance With the Rules of Dental Ethics
Authors: Saimir Heta, Kers Kapaj, Rialda Xhizdari, Ilma Robo
Abstract:
Despite the existence of different dental specialties, the dentist-patient relationship is unique, in the very fact that the treatment is performed by one doctor and the patient identifies the malpractice presented as part of that doctor's practice; this is in complete contrast to cases of medical treatments where the patient can be presented to a team of doctors, to treat a specific pathology. The rules of dental ethics are almost the same as the rules of medical ethics. The appearance of dental malpractice affects exactly this two-party relationship, created on the basis of professionalism, without deviations in this direction, between the dentist and the patient, but with very narrow individual boundaries, compared to cases of medical malpractice. Main text: Malpractice can have different reasons for its appearance, starting from professional negligence, but also from the lack of professional knowledge of the dentist who undertakes the dental treatment. It should always be seen in perspective that we are not talking about the individual - the dentist who goes to work with the intention of harming their patients. Malpractice can also be a consequence of the impossibility, for anatomical or physiological reasons of the tooth under dental treatment, to realize the predetermined dental treatment plan. On the other hand, the dentist himself is an individual who can be affected by health conditions, or have vices that affect the systemic health of the dentist as an individual, which in these conditions can cause malpractice. So, depending on the reason that led to the appearance of malpractice, the method of treatment from a legal point of view also varies, for the dentist who committed the malpractice, evaluating the latter if the malpractice came under the conditions of applying the rules of dental ethics. Conclusions: The deviation from the predetermined dental plan is the minimum sign of malpractice and the latter should not be definitively related only to cases of difficult dental treatments. The identification of the reason for the appearance of malpractice is the initial element, which makes the difference in the way of its treatment, from a legal point of view, and the involvement of the dentist in the assessment of the malpractice committed, must be based on the legislation in force, which must be said to have their specific changes in different states. Malpractice should be referred to, or included in the lectures or in the continuing education of professionals, because it serves as a method of obtaining professional experience in order not to repeat the same thing several times, by different professionals.Keywords: dental ethics, malpractice, negligence, legal basis, continuing education, dental treatments
Procedia PDF Downloads 615848 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 167