Search results for: privacy enforcement
681 The Taiwan Environmental Impact Assessment Act Contributes to the Water Resources Saving
Authors: Feng-Ming Fan, Xiu-Hui Wen
Abstract:
Shortage of water resources is a crucial problem to be solved in Taiwan. However, lack of effective and mandatory regulation on water recovery and recycling leads to no effective water resource controls currently. Although existing legislation sets standards regarding water recovery, implementation and enforcement of legislation are facing challenges. In order to break through the dilemma, this study aims to find enforcement tools, improve inspection skills, develop an inspection system, to achieve sustainable development of precious water resources. The Taiwan Environmental Impact Assessment Act (EIA Act) was announced on 1994. The aim of EIA Act is to protect the environment by preventing and mitigating the adverse impact of development activity on the environment. During the EIA process, we can set standards that require enterprises to reach a certain percentage of water recycling based on different case characteristics, to promote sewage source reduction and water saving benefits. Next, we have to inspect how the enterprises handle their waste water and perform water recovery based on environmental assessment commitments, for the purpose of reviewing and measuring the implementation efficiency of water recycling and reuse, an eco-friendly measure. We invited leading experts in related fields to provide lecture on water recycling, strengthen law enforcement officials’ inspection knowledge, and write inspection reference manual to be used as basis of enforcement. Then we finalized the manual by reaching mutual agreement between the experts and relevant agencies. We then inspected 65 high-tech companies whose daily water consumption is over 1,000 tons individually, located at 3 science parks, set up by Ministry of Science and Technology. Great achievement on water recycling was achieved at an amount of 400 million tons per year, equivalent to 2.5 months water usage for general public in Taiwan. The amount is equal to 710 billion bottles of 600 ml cola, 170 thousand international standard swimming pools of 2,500 tons, irrigation water applied to 40 thousand hectares of rice fields, or 1.7 Taipei Feitsui Reservoir of reservoir storage. This study demonstrated promoting effects of environmental impact assessment commitments on water recycling, and therefore water resource sustainable development. It also confirms the value of EIA Act for environmental protection. Economic development should go hand in hand with environmental protection, and it’s a mainstream. It clearly shows the EIA regulation can minimize harmful effects caused by development activity to the environment, as well as pursuit water resources sustainable development.Keywords: the environmental impact assessment act, water recycling environmental assessment commitment, water resource sustainable development, water recycling, water reuse
Procedia PDF Downloads 247680 On the Path of Radicalization: Policing of Muslim Americans Post 9/11
Authors: Hagar Elsayed
Abstract:
This case study examines the framing of the diverse populations of Arab, Muslim and South Asian immigrants and their descendants in local communities by both federal and local law enforcement agencies. It explores how urban spaces and policing are constructed as necessary components of national security in the context of the war on terror by focusing on practices employed in local spaces such as Dearborn, Michigan and training methods adopted on a national level. The proliferation of American Arabs as ‘terrorist’ works to legitimize not only increasing state surveillance, but also military strategies which infringe on ‘inside’ spaces. Sustaining these progressively militarized civil policing operations, which demand intense mobilization of state power, requires that whole neighborhoods and districts are reimagined to portray these geographies in a certain light. This case study is central in understanding how Arab, South Asian, and Muslim civilians’ transformation into a “national security” issue have created militarized police enforcement agencies that employ military tactics to map the terrain of Otherness. This study looks at how race factors into key recent incidents, and asks whether this militarization builds from past forms of racist policing, and whether these specific incidents are reflective of larger patterns or whether they are just isolated incidents.Keywords: American-Muslims, Arabs, militarization, policing
Procedia PDF Downloads 136679 The Routes of Human Suffering: How Point-Source and Destination-Source Mapping Can Help Victim Services Providers and Law Enforcement Agencies Effectively Combat Human Trafficking
Authors: Benjamin Thomas Greer, Grace Cotulla, Mandy Johnson
Abstract:
Human trafficking is one of the fastest growing international crimes and human rights violations in the world. The United States Department of State (State Department) approximates some 800,000 to 900,000 people are annually trafficked across sovereign borders, with approximately 14,000 to 17,500 of these people coming into the United States. Today’s slavery is conducted by unscrupulous individuals who are often connected to organized criminal enterprises and transnational gangs, extracting huge monetary sums. According to the International Labour Organization (ILO), human traffickers collect approximately $32 billion worldwide annually. Surpassed only by narcotics dealing, trafficking of humans is tied with illegal arms sales as the second largest criminal industry in the world and is the fastest growing field in the 21st century. Perpetrators of this heinous crime abound. They are not limited to single or “sole practitioners” of human trafficking, but rather, often include Transnational Criminal Organizations (TCO), domestic street gangs, labor contractors, and otherwise seemingly ordinary citizens. Monetary gain is being elevated over territorial disputes and street gangs are increasingly operating in a collaborative effort with TCOs to further disguise their criminal activity; to utilizing their vast networks, in an attempt to avoid detection. Traffickers rely on a network of clandestine routes to sell their commodities with impunity. As law enforcement agencies seek to retard the expansion of transnational criminal organization’s entry into human trafficking, it is imperative that they develop reliable trafficking mapping of known exploitative routes. In a recent report given to the Mexican Congress, The Procuraduría General de la República (PGR) disclosed, from 2008 to 2010 they had identified at least 47 unique criminal networking routes used to traffic victims and that Mexico’s estimated domestic victims number between 800,000 adults and 20,000 children annually. Designing a reliable mapping system is a crucial step to effective law enforcement response and deploying a successful victim support system. Creating this mapping analytic is exceedingly difficult. Traffickers are constantly changing the way they traffic and exploit their victims. They swiftly adapt to local environmental factors and react remarkably well to market demands, exploiting limitations in the prevailing laws. This article will highlight how human trafficking has become one of the fastest growing and most high profile human rights violations in the world today; compile current efforts to map and illustrate trafficking routes; and will demonstrate how the proprietary analytical mapping analysis of point-source and destination-source mapping can help local law enforcement, governmental agencies and victim services providers effectively respond to the type and nature of trafficking to their specific geographical locale. Trafficking transcends state and international borders. It demands an effective and consistent cooperation between local, state, and federal authorities. Each region of the world has different impact factors which create distinct challenges for law enforcement and victim services. Our mapping system lays the groundwork for a targeted anti-trafficking response.Keywords: human trafficking, mapping, routes, law enforcement intelligence
Procedia PDF Downloads 381678 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique
Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam
Abstract:
With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services
Procedia PDF Downloads 119677 American Criminal Justice Responses to Terrorism in the Post 9/11 Era
Authors: Summer Jackson
Abstract:
September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.Keywords: terrorism, law enforcement, post-9/11, federal policy
Procedia PDF Downloads 119676 The Urgency of ASEAN Human Rights Court Establishment to Protect Human Rights in Southeast Asia
Authors: Tareq M. Aziz Elven
Abstract:
The issue of Human Rights enforcement in Southeast Asia has become the serious problem and attract the attention of international community. Principally, Association of Southeast Asian Nations (ASEAN) has mentioned the Human Rights as one of the focus and be a part of the ASEAN Charter in 2008. It was followed by the establishment of ASEAN Inter-Governmental Commission on Human Rights (AICHR). AICHR is the commission of Human Rights enforcement in Southeast Asia which has a duty, function, and an authority to conduct dissemination and protection of Human Rights. In the end of 2016, however, the function of protection mandated to AICHR have not achieved yet. It can be proved by several cases of Human Rights violation which still exist and have not settled yet. One of case which attracts the public attention recently is human rights violation towards Rohingya in Myanmar. Using the juridical-normative method, the research aims to examine the urgency of Human Rights court establishment in Southeast Asia region which able to issue the decision that binds the ASEAN members or the violating parties. The data shows that ASEAN needs to establish a regional court which intended to settle the Human Rights violations in ASEAN region. Furthermore, the research also highlights three strong factors should be settled by ASEAN for establishing human rights court i.e. the significant distinction of democracy and human rights development among the members, the strong implementation of non-intervention principle, and the financial matter to sustain the court.Keywords: AICHR, ASEAN, human rights, human rights court
Procedia PDF Downloads 346675 Beyond the Dust: Workers' Perspectives on Enhancing Silica Exposure Control in Tunnel Construction
Authors: Frederick Anlimah, Vinod Gopaldasani, Catherine MacPhail, Brian Davies
Abstract:
The construction industry, particularly tunnel construction, exposes workers to respirable crystalline silica (RCS), which can cause incurable illnesses such as silicosis and lung cancer. Despite various control measures, exposures remain inadequately controlled. This research aimed to examine what workers on a tunnelling project in Australia think should be done to reduce exposure to dust to protect them from RCS exposure. A qualitative research approach consisting of interviews and focus group discussions was employed for this research. The preliminary analysis of the data reveals a diverse array of solutions proposed to address the different sociotechnical factors that present challenges for effectively reducing dust exposure. Solutions are proposed to address challenges such as cost, time pressure, low-risk perception, inadequate awareness, inadequate enforcement and compliance with personal protective equipment. The findings highlight the need to make dust control a level playing field for all contractors during the bidding process, with more collaboration and enforcement after the signing of contracts. The research highlights that although improvements have been made in the past years regarding dust controls, many opportunities exist to reduce worker exposure to RCS.Keywords: tunnel, respirable crystalline silica, RCS, dust exposure, personal protective equipment, worker perspectives
Procedia PDF Downloads 80674 A Quantitative Analysis of the Conservation of Resources, Burnout, and Other Selected Behavioral Variables among Law Enforcement Officers
Authors: Nathan Moran, Robert Hanser, Attapol Kuanliang
Abstract:
The purpose of this study is to determine the relationship between personal and social resources and burnout for police officers. Current conceptualizations of the condition of burnout are challenged as being too phenomenological and ambiguous, and consequently, not given to direct empirical testing. The conservation of resources model is based on the supposition that people strive to retain, protect, and build resources as a means to protect them from the impacts of burnout. The model proposes that the effects of stress (i.e. burnout) can be manifested in personal and professional attitudes and attributes, which can measure burnout using self-reports to provide strong support for the conservation of resources model, in that, personal and professional demands are related to the exhaustion component of burnout, whereas personal and professional resources can be compiled to counteract the negative impact of the burnout condition. Highly similar patterns of burnout resistance factors were witnessed in police officers in two department precincts (N:81). In addition, results confirmed the positive influence of key demographic variables in burnout resistance using the conservation of resources model. Participants in this study are all sheriff’s deputies with a populous county in a Pacific Northwestern state (N = 274). Four instruments will be used in this quantitative study for data collection (a) a series of demographic questions, (b) the Organizational Citizenship Behavior, (c) the PANAS-X Scale (OCB: Watson& Clark, 1994), and (d) The Maslach Burnout Inventory.Keywords: behavioral, burnout, law enforcement, quantitative
Procedia PDF Downloads 286673 A Preliminary Comparative Study Between the United Kingdom and Taiwan: Public Private Collaboration and Cooperation in Tackling Large Scale Cyberattacks
Authors: Chi-Hsuan Cheng
Abstract:
This research aims to evaluate public-private partnerships against cyberattacks by comparing the UK and Taiwan. First, the study analyses major cyberattacks and factors influencing cybersecurity in both countries. Second, it assesses the effectiveness of current cyber defence strategies in combating cyberattacks by comparing the approaches taken in the UK and Taiwan, while also evaluating the cyber resilience of both nations. Lastly, the research evaluates existing public-private partnerships by comparing those in the UK and Taiwan, and proposes recommendations for enhancing cooperation and collaboration mechanisms in tackling cyberattacks. Grounded theory serves as the core research method. Theoretical sampling is used to recruit participants in both the UK and Taiwan, including investigators, police officers, and professionals from cybersecurity firms. Semi-structured interviews are conducted in English in the UK and Mandarin in Taiwan, recorded with consent, and pseudonymised for privacy. Data analysis involves open coding, grouping excerpts into codes, and categorising codes. Axial coding connects codes into categories, leading to the development of a codebook. The process continues iteratively until theoretical saturation is reached. Finally, selective coding identifies the core topic, evaluating public-private cooperation against cyberattacks and its implications for social and policing strategies in the UK and Taiwan, which highlights the current status of the cybersecurity industry, governmental plans for cybersecurity, and contributions to cybersecurity from both government sectors and cybersecurity firms, with a particular focus on public-private partnerships. In summary, this research aims to offer practical recommendations to law enforcement, private sectors, and academia for reflecting on current strategies and tailoring future approaches in cybersecurityKeywords: cybersecurity, cybercrime, public private partnerships, cyberattack
Procedia PDF Downloads 75672 Legal Status Of Children Living With Albinism In Nigeria
Authors: Ibhade Oluwabunlola Adisa Ibojo, Tolulope Funmilola Aladetan
Abstract:
Children living with albinism in Nigeria face significant legal and social challenges that threaten their rights and well-being. Despite existing laws aimed at protecting the rights of children, including the Child Rights Act of 2003, the unique vulnerabilities of children with albinism often go unaddressed. This abstract explores the legal status of these children, highlighting the gaps in legal protection and the prevalence of discrimination and violence against them. In many Nigerian communities, deep-seated myths and superstitions regarding albinism contribute to the marginalization and stigmatization of individuals with this condition. Consequently, children with albinism are at a heightened risk of violence, including abduction and ritualistic killings, often with impunity for the perpetrators. This situation is exacerbated by inadequate legal frameworks, ineffective enforcement of existing laws, and a lack of awareness among law enforcement officials and the general public. The paper also examines the implications of these challenges on the rights of children with albinism to life, education, and healthcare. Recommendations are proposed for improving the legal framework and implementing targeted awareness campaigns to protect these vulnerable children. By addressing these issues, the Nigerian legal system can better safeguard the rights and dignity of children living with albinism, ensuring they can lead safe and fulfilling lives. This research aims to raise awareness of the plight of these children and advocate for stronger legal protections to promote their rights and well-being in Nigerian society.Keywords: Albinism, vulnerable, children, laws
Procedia PDF Downloads 15671 Examples of Techniques and Algorithms Used in Wlan Security
Authors: Vahid Bairami Rad
Abstract:
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security
Procedia PDF Downloads 569670 Road Traffic Psychology: A Survey of Seat Belt Usage among Drivers in Ogbomoso, Oyo State, Nigeria
Authors: I. T. Adebayo, J. R. Aworemi, V. A. Ogundele, O. J. Babalola, J. O. Ajayi
Abstract:
The behavior of road users is a critical element in road safety. However, despite the proven effectiveness of the seat belt in reducing injury severity, some drivers still do not use the seat belt. The study, therefore, examined seat belt usage among drivers in Ogbomoso, Oyo State, Nigeria. Face-to-face surveys were conducted to elicit data on seat belt usage and road behaviors on 54,038 drivers plying the General-Lautech Road in Ogbomoso over a period of six months. Data collected were analyzed using both descriptive and inferential statistics. Findings revealed that seat belt usage was moderate among private car drivers in the morning (52.75 percent) and much lower in the evening (37.67 percent), while less than 30 percent of the commercial bus/taxi drivers used the seat during both periods. The paired T-test revealed a significant difference in seat belt usage by all the drivers in the morning and in the evening, as indicated with a T value of 113.977 and the level of significance p < 0.05. The study concluded that there is a significant difference in the usage of the seat belt by both private car and commercial bus/taxi drivers in Ogbomoso as most drivers made use of the seat belt, especially in the morning, to avoid being delayed when flagged down and fined for non-compliance with seat belt usage by the road traffic law enforcement agents. However, most of the drivers cited inadequate/lack of enforcement of compulsory use of seat belts by the relevant agencies and discomfort as the major reasons for not using the seat belt while driving.Keywords: drivers, road , seat belt, traffic psychology
Procedia PDF Downloads 200669 Being Your Own First Responder: A Training to Identify and Respond to Mental Health
Authors: Joe Voshall, Leigha Shoup
Abstract:
In 2022, the Ohio Peace Officer Training Council and the Attorney General required officers to complete a minimum of 24 hours of continued professional training for the year. Much of the training was based on Mental Health or similarly related topics. This includes Officer Wellness and Officer Mental Health. It is becoming clearer that the stigma of Officer / First Responder Mental Health is a topic that is becoming more prevalently faced. To assist officers and first responders in facing mental health issues, we are developing new training. This training will aid in recognizing mental health-related issues in officers/first responders and citizens, as well as further using the same information to better respond and interact with one another and the public. In general, society has many varying views of mental health, much of which is largely over-sensationalized by television, movies, and other forms of entertainment. There has also been a stigma in law enforcement / first responders related to mental health and being weak as a result of on-the-job-related trauma-induced struggles. It is our hope this new training will assist officers and first responders in not only positively facing and addressing their mental health but using their own experience and education to recognize signs and symptoms of mental health within individuals in the community. Further, we hope that through this recognition, officers and first responders can use their experiences and more in-depth understanding to better interact within the field and with the public. Through recognition and better understanding of mental health issues and more positive interaction with the public, additional achievements are likely to result. This includes in the removal of bias and stigma for everyone.Keywords: law enforcement, mental health, officer related mental health, trauma
Procedia PDF Downloads 164668 Access to Justice for Persons with Intellectual Disabilities in Indonesia: Case and Problem in Indonesian Criminal Justice System
Authors: Fines Fatimah, SH. MH.
Abstract:
Indonesia is one of the countries that has ratified the UNCRPD (United Nations Convention on the Rights of Persons with Disabilities). The ratification of this convention brings consequences on the adjustment of national legislation with the UNCRPD convention, where this ratification at the same time is a measure in the eyes of the international community that a state party could be consistent with the issues and problems of disability. Persons with disabilities often have little access to justice when they are forced to deal with the criminal justice system. Pursuit of justice through litigation are often not in their favor, therefore without any awareness of law enforcement/awareness of disability will further complicate access to justice for persons with disabilities. Under Article 13 of the UNCRPD, it appeared that the convention requires ratifying states to guarantee equal opportunity and treatment in justice for persons with disabilities. The States should also ensure that any judicial rules must be adapted to the circumstances of persons with disabilities so that people with disabilities can fully participate in all stages of the trial court and, for example, as a witness. Finally, the state must provide training to understand these persons with disabilities (for those who work in the judiciary institution such as police or prison officials). Further, this paper aims to describe problem faced by persons with intellectual disabilities to access justice in Indonesian Criminal Justice System. This paper tries to find and propose the alternative solutions to promote the quality of law enforcement in Indonesia, especially for persons with intellectual disabilities.Keywords: access to justice, Indonesian criminal justice system, intellectual disability, ratifying states
Procedia PDF Downloads 516667 Regulation, Supervision and Accounting Conservatism: Interaction of the Three Pillars of Basel II to Achieve Quality of Reporting Earnings in Worldwide Banks
Authors: I. Diaz Sanchez, I. M. Martinez-Conesa, M. Illueca
Abstract:
Accounting conservatism is a desirable quality of earnings that is positively associated with the stridency of regulatory and supervisory regimen and high market discipline. But how these three pillars interact each other is the main research question that is not empirically solved. We analyze how regulatory and supervisory regimes interact with the market discipline measures, such as listing status, ownership and market concentration using a sample of 14,651 bank-year observations covering 54 countries over the period 1997-2009. We evidence that regulation a supervision and extend on which they are enforcement is a strong mechanism to achieved accounting conservatism in those countries or situations where the market discipline fails. Generally, the supervisory power reinforces the effect of listing status, ownership and concentration on conservatism, while capital regulatory mitigates the effect of market discipline on conservatism. This paper may contribute to debate about the mechanism introduced by Basel III that strongly increases the regulation, his enforcement, and the supervisory power after long deregulation period. Although Market discipline is relevant to achieve the financial stability, strong Pillar I and II can ensure the quality of the accounting earnings to prevent bank failures.Keywords: accounting conservatism, bank regulation, bank supervision, loan loss recognition, market discipline
Procedia PDF Downloads 172666 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology
Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar
Abstract:
Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.Keywords: data privacy, distributed system, federated learning, machine learning
Procedia PDF Downloads 134665 Close-Out Netting Clauses from a Comparative Perspective
Authors: Lidija Simunovic
Abstract:
A Close-out netting cause is a clause within master agreements which reduces credit risks. This clause contains the parties ' advance agreement that the occurrence of a certain event (such as the commencement of bankruptcy proceedings) will result in the termination of the contract and that their mutual claims will be calculated as a net lump-sum to be paid by one party to the other. The legal treatment of the enforceability of close-out netting clauses opens up many legal matters in comparative legal systems because it is not uniformly treated in comparative laws. Certain legal systems take a liberal approach and allow the enforcement of close-out netting clauses. Others are much stricter, and they limit or completely prohibit the enforcement of close-out netting clauses through the mandatory provisions of their national bankruptcy laws. The author analyzes the concept of close-out netting clauses in selected comparative legal systems and examines the differences in their legal treatment by using the historical, analytical, and comparative method. It results that special treatment of the close-out netting in national laws with a liberal approach is often forced by financial industry lobbies and introduced in national laws without the justified reasons. Contrary to that in legal systems with limited or prohibited approach on close-out netting the uncertain enforceability of the close-out netting clause causes potential credit risks. The detected discrepancy on the national legal treatment and national financial markets regarding close-out netting lead to the conclusion to author’s best knowledge that is not possible to use any national model of close-out netting as a role model which perfectly fits all.Keywords: close-out netting clauses, derivatives, insolvency, offsetting
Procedia PDF Downloads 145664 Cloud Monitoring and Performance Optimization Ensuring High Availability
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy
Procedia PDF Downloads 60663 Association of Southeast Asian Nations Caught in between International and Regional Human Rights Frameworks: The Myanmar Rohingya Crisis
Authors: Lynamata Chhun
Abstract:
Human Rights enforcement in the newly independent countries like Asian and African has always been penetrating issues. In spite, the existing of the Universal Declaration of Human Rights (UDHR), regions like Africa and Asia where values and cultural norms far differ from the concept had formed their own Human Rights instruments to tackle Human Rights issues in their regions instead of embracing the concept of UDHR completely. ASEAN Human Rights Declaration is one of the examples. This paper aims to examine the enforcement of Human Rights in South East Asia in the context of ASEAN regional integration. Precisely, the author attempts to analyse the effectiveness in undertaking Human Rights issues in the region by applying both the existing international and regional frameworks using the Myanmar Rohingya Crisis as the case study. The methodology of the paper is qualitative analysis where cross-impact analysis is employed to examine the case study. It is anticipated that the main findings of this paper will illuminate how applicable the international instruments are in comparison to the regional instruments in apprehending the human rights issues and will shed light on how ASEAN and dialogue partners should cooperate in the future regarding with the challenging issues of Human Rights in the region.Keywords: ASEAN Human Rights Declaration, ASEAN integration, ASEAN way, international and regional instruments, Universal Declaration of Human Rights
Procedia PDF Downloads 254662 A Comparative and Doctrinal Analysis towards the Investigation of a Right to Be Forgotten in Hong Kong
Authors: Jojo Y. C. Mo
Abstract:
Memories are good. They remind us of people, places and experiences that we cherish. But memories cannot be changed and there may well be memories that we do not want to remember. This is particularly true in relation to information which causes us embarrassment and humiliation or simply because it is private – we all want to erase or delete such information. This desire to delete is recently recognised by the Court of Justice of the European Union in the 2014 case of Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González in which the court ordered Google to remove links to some information about the complainant which he wished to be removed. This so-called ‘right to be forgotten’ received serious attention and significantly, the European Council and the European Parliament enacted the General Data Protection Regulation (GDPR) to provide a more structured and normative framework for implementation of right to be forgotten across the EU. This development in data protection laws will, undoubtedly, have significant impact on companies and co-operations not just within the EU but outside as well. Hong Kong, being one of the world’s leading financial and commercial center as well as one of the first jurisdictions in Asia to implement a comprehensive piece of data protection legislation, is therefore a jurisdiction that is worth looking into. This article/project aims to investigate the following: a) whether there is a right to be forgotten under the existing Hong Kong data protection legislation b) if not, whether such a provision is necessary and why. This article utilises a comparative methodology based on a study of primary and secondary resources, including scholarly articles, government and law commission reports and working papers and relevant international treaties, constitutional documents, case law and legislation. The author will primarily engage literature and case-law review as well as comparative and doctrinal analyses. The completion of this article will provide privacy researchers with more concrete principles and data to conduct further research on privacy and data protection in Hong Kong and internationally and will provide a basis for policy makers in assessing the rationale and need for a right to be forgotten in Hong Kong.Keywords: privacy, right to be forgotten, data protection, Hong Kong
Procedia PDF Downloads 190661 Ethics Can Enable Open Source Data Research
Authors: Dragana Calic
Abstract:
The openness, availability and the sheer volume of big data have provided, what some regard as, an invaluable and rich dataset. Researchers, businesses, advertising agencies, medical institutions, to name only a few, collect, share, and analyze this data to enable their processes and decision making. However, there are important ethical considerations associated with the use of big data. The rapidly evolving nature of online technologies has overtaken the many legislative, privacy, and ethical frameworks and principles that exist. For example, should we obtain consent to use people’s online data, and under what circumstances can privacy considerations be overridden? Current guidance on how to appropriately and ethically handle big data is inconsistent. Consequently, this paper focuses on two quite distinct but related ethical considerations that are at the core of the use of big data for research purposes. They include empowering the producers of data and empowering researchers who want to study big data. The first consideration focuses on informed consent which is at the core of empowering producers of data. In this paper, we discuss some of the complexities associated with informed consent and consider studies of producers’ perceptions to inform research ethics guidelines and practice. The second consideration focuses on the researcher. Similarly, we explore studies that focus on researchers’ perceptions and experiences.Keywords: big data, ethics, producers’ perceptions, researchers’ perceptions
Procedia PDF Downloads 284660 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives
Authors: Nawt Almutairi, Ramzi El-Haddadeh
Abstract:
With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.Keywords: e-service, satisfaction, trust, loyalty
Procedia PDF Downloads 259659 Self-Disclosure of Location: Influences of Personality Traits, Intrinsic Motivations and Extrinsic Motivations
Authors: Chechen Liao, Sheng Yi Lin
Abstract:
With the popularity of smartphone usage and the flourish of social networks, many people began to use the 'check-in' functions to share their location information and days of live and self-disclosure. In order to increase exposure and awareness, some stores provide discounts and other benefits to attract consumers to 'check-in' in their stores. The purpose of this study was to investigate whether personality traits, intrinsic motivations, extrinsic motivations, and privacy concerns would affect self-disclosure of location for consumers. Research data were collected from 407 individuals that have used Facebook check-in in Taiwan. This study used SmartPLS 2.0 structural equation modeling to validate the model. The results show that information sharing, information storage, enjoyment, self-presentation, get a feedback, economic reward, and keep up with trends had significant positive effects on self-disclosure. While extroversion and openness to use have significant positive effects on self-disclosure, conscientiousness and privacy concerns have significant negative effects on self-disclosure. The results of the study provide academic and practical implications for the future growth of location-based self-disclosure.Keywords: check-in, extrinsic motivation, intrinsic motivation, personality trait, self-disclosure
Procedia PDF Downloads 170658 The Effect of Technology on Legal Securities and Privacy Issues
Authors: Nancy Samuel Reyad Farhan
Abstract:
even though international crook law has grown considerably inside the ultimate decades, it still remains fragmented and lacks doctrinal cohesiveness. Its idea is defined within the doctrine as pretty disputable. there is no concrete definition of the term. in the home doctrine, the hassle of crook law troubles that rise up within the worldwide setting, and international troubles that get up in the national crook regulation, is underdeveloped each theoretically and nearly. To the exceptional of writer’s know-how, there aren't any studies describing worldwide elements of crook law in a complete way, taking a more expansive view of the difficulty. This paper provides consequences of a part of the doctoral studies, assignment a theoretical framework of the worldwide crook law. It ambitions at checking out the present terminology on international components of criminal law. It demonstrates differences among the notions of global crook regulation, criminal regulation international and law worldwide crook. It confronts the belief of crook regulation with associated disciplines and indicates their interplay. It specifies the scope of international criminal regulation. It diagnoses the contemporary criminal framework of global components of criminal regulation, referring to each crook law issues that rise up inside the international setting, and international problems that rise up within the context of national criminal law. ultimately, de lege lata postulates had been formulated and route of modifications in global criminal law turned into proposed. The followed studies hypothesis assumed that the belief of international criminal regulation became inconsistent, not understood uniformly, and there has been no conformity as to its location inside the system of regulation, objective and subjective scopes, while the domestic doctrine did not correspond with international requirements and differed from the global doctrine. applied research strategies covered inter alia a dogmatic and legal technique, an analytical technique, a comparative approach, in addition to desk studies.Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures
Procedia PDF Downloads 31657 Functions of Public Policy in Private International Law
Authors: Fedorova Elena
Abstract:
In this article, we draw a distinction between two important functions of public policy in private international law. The first function is widely recognized and relates to the prevention of application of foreign laws and enforcement of foreign court judgments whenever their effects are incompatible with the domestic legal system of the forum. This effectively protects sovereign rights of the forum state as it allows to resist against the undesirable effects of foreign law-making and law-enforcement policies. The second function is less obvious, but not less important. As the internal private legal relationships, international private relationships are usually governed by rules of public policy, to which the parties can not derogate by mutual agreement. Thefore, for international private law relations public policy has a different function than previously mentioned: in this case, the public policy acts as a defense against unacceptable effects of the party autonomy. Thus, this second function of public policy consists in the limitation of the party autonomy wich effects would be unacceptable for the local legal system. In the frame of this second function the author will analyse two types of public policy which can limit the party autonomy: « substantial » public policy (which regulates the substance of international legal relationship) and « conflictual » public policy (which regulates the party autonomy to choose the law applicable for the substance of relationship). The author provides an analysis of these functions of the public policy in the field of international contract law because of the important role of the principle of party autonomy for international contract relations.Keywords: public policy, general theory of private international law, substantial public policy, conflictual public policy
Procedia PDF Downloads 573656 Preserving Wetlands: Legal and Ecological Challenges in the Face of Degradation: The Case Study of Miankaleh, Iran
Authors: Setareh Orak
Abstract:
Wetlands are essential guardians of global ecosystems, yet they remain vulnerable to increasing human interference and environmental stress. The Miankaleh wetland in northern Iran, designated as a Ramsar Convention site, represents a critical habitat known for its rich biodiversity and essential ecological functions. Despite the existence of national and international environmental laws aimed at preserving such critical ecosystems, the regulatory frameworks in place often fall short in terms of enforcement, monitoring, and overall effectiveness. Unfortunately, this wetland is undergoing severe degradation due to overexploitation, industrial contamination, unsustainable tourism, and land-use alterations. This study aims to assess the strengths and limitations of these regulations and examine their practical impacts on Miankaleh’s ecological health. Adopting a multi-method research approach, this study relies on a combination of case study analysis, legal and literature reviews, environmental data examination, stakeholder interviews, and comparative assessments. Through these methodologies, we scrutinize current national policies, international conventions, and their enforcement mechanisms, revealing the primary areas where they fail to protect Miankaleh effectively. The analysis is supported by two satellite maps linked to our tables, offering detailed visual representations of changes in land use, vegetation, and pollution sources over recent years. By connecting these visual data with quantitative measures, the study provides a comprehensive perspective on how human activities and regulatory shortcomings are contributing to environmental degradation. In conclusion, this study’s insights into the limitations of current environmental legislation and its recommendations for enhancing both policy and public engagement underscore the urgent need for integrated, multi-level efforts in conserving the Miankaleh wetland. Through strengthened legal frameworks, better enforcement, increased public awareness, and international cooperation, the hope is to establish a model of conservation that not only preserves Miankaleh but also serves as a template for protecting similar ecologically sensitive areas worldwide.Keywords: wetlands, tourism, industrial pollution, land use changes, Ramsar convention
Procedia PDF Downloads 12655 Anti-Corruption in Adverse Contexts: A Strategic Approach
Authors: Mushtaq H. Khan, Antonio Andreoni, Pallavi Roy
Abstract:
Developing countries are characterized by political settlements where formal rules are generally weakly enforced and widely violated. Conventional anti-corruption strategies that focus on improving the general enforcement of a rule of law and raising the costs of corruption facing individual public officials have typically delivered poor results in these contexts. Our alternative approach is to identify anti-corruption strategies that have a high impact and that are feasible to implement in these contexts. Our alternative approach identifies anti-corruption strategies from the bottom up. This involves identifying the characteristics of the corruption constraining particular development outcomes. By drawing on theories of rents and rent seeking, and theories of political settlements, we can assess the developmental impact of particular anti-corruption strategies and the feasibility of implementing these strategies. We argue that feasible anti-corruption in these contexts cannot be solely based on conventional anti-corruption strategies. In societies that have widespread rule violations, high-impact anti-corruption is only likely to be feasible if the overall strategy succeeds in aligning the interests and capabilities of powerful organizations at the sectoral level to support the enforcement of particular sets of rules. We examine four related strategies for changing these incentives and capabilities of critical stakeholders at the local or sectoral level, and we argue that this can provide a framework for organizing research on the impact and feasibility of anti-corruption activities in different priority areas in particular countries.Keywords: anti-corruption, development, political settlements analysis, rule of law
Procedia PDF Downloads 419654 Ethically Integrating Robots to Assist Elders and Patients with Dementia
Authors: Suresh Lokiah
Abstract:
The emerging trend of integrating robots into elderly care, particularly for assisting patients with dementia, holds the potential to greatly transform the sector. Assisted living facilities, which house a significant number of elderly individuals and dementia patients, constantly strive to engage their residents in stimulating activities. However, due to staffing shortages, they often rely on volunteers to introduce new activities. Despite the availability of social interaction, these residents, frequently overlooked in society, are in desperate need of additional support. Robots designed for elder care are categorized based on their design and functionality. These categories include companion robots, telepresence robots, health monitoring robots, and rehab robots. However, the integration of such robots raises significant ethical concerns, notably regarding privacy, autonomy, and the risk of dehumanization. Privacy issues arise as these robots may need to continually monitor patient activities. There is also a risk of patients becoming overly dependent on these robots, potentially undermining their autonomy. Furthermore, the replacement of human touch with robotic interaction may lead to the dehumanization of care. This paper delves into the ethical considerations of incorporating robotic assistance in eldercare. It proposes a series of guidelines and strategies to ensure the ethical deployment of these robots. These guidelines suggest involving patients in the design and development process of the robots and emphasize the critical need for human oversight to respect the dignity and rights of the elderly and dementia patients. The paper also recommends implementing robust privacy measures, including secure data transmission and data anonymization. In conclusion, this paper offers a thorough examination of the ethical implications of using robotic assistance in elder care. It provides a strategic roadmap to ensure this technology is utilized ethically, thereby maximizing its potential benefits and minimizing any potential harm.Keywords: human-robot interaction, robots for eldercare, ethics, health, dementia
Procedia PDF Downloads 99653 A Critical Analysis on Gaps Associated with Culture Policy Milieu Governing Traditional Male Circumcision in the Eastern Cape, South Africa
Authors: Thanduxolo Nomngcoyiya, Simon M. Kang’ethe
Abstract:
The paper aimed to critically analyse gaps pertaining to the cultural policy environments governing traditional male circumcision in the Eastern Cape as exemplified by an empirical case study. The original study which this paper is derived from utilized qualitative paradigm; and encompassed 28 participants. It used in-depth one-on-one interviews complemented by focus group discussions and key informants as a method of data collection. It also adopted interview guide as a data collection instrument. The original study was cross-sectional in nature, and the data was audio recorded and transcribed later during the data analysis and coding process. The study data analysis was content thematic analysis and identified the following key major findings on the culture of male circumcision policy: Lack of clarity on culture of male circumcision policy operations; Myths surrounding procedures on culture of male circumcision; Divergent views on cultural policies between government and male circumcision custodians; Unclear cultural policies on selection criteria of practitioners; and Lack of policy enforcement and implementation on transgressors of culture of male circumcision. It recommended: a stringent selection criteria of practitioners; a need to carry out death-free male circumcision; a need for male circumcision stakeholders to work with other culture and tradition-friendly stakeholders.Keywords: human rights, policy enforcement, traditional male circumcision, traditional surgeons and nurses
Procedia PDF Downloads 297652 Initiating Learning to Know among Fishers for Sustainable Fishery on Lake Victoria. A Case of Kigungu Fishing Ground Wakiso District
Authors: Namubiru Zula, Aganyira Kelle, Van der Linden Josje, Openjuru George Laadah
Abstract:
Learning to know is a key principle to lifelong learning, with self-direction as the cornerstone. This study sought to initiate self-direction for lifelong learning through social constructivism among fishers; with the major goal of creating a community of fishers who continuously learn from each other for sustainable fishing. Government of Uganda has instituted several mechanisms like co-management with Beach Management Unit (BMU) System against illegal fishing. However, illegal fishing persists, there is reduced fish stocks with several outcry on how fishers are handled. Some studies have indicated that it’s the poor orientation of BMU leaders and fishers which are top down. This initial engagement of fishers was conducted through a meeting and use of stake holder’s analysis tool to discuss the relevance of the study; harnessing fishers’ knowledge for sustainable fisheries on Lake Victoria, its objectives, the key stake holders to enable them fish sustainably. It revealed initial attempt to learn from each other and learning to know among fishers, with some elements of self-direction. However, fishers attempt to learning and self-direction are affected by prior brutal enforcement experiences. This meeting led to fishers gain some sense of hope towards enforcement brutality. The key stakeholders highlighted include MAAIF, FAO, UNBS, NaFIRRI, LVFO, BMU, UFPEA, Fishers m employers, Fisheries Protection Unit, GIZ, and any Non-Government organization but declined the Association of Fisheries and Lake Users in Uganda.Keywords: self direction, lifelong learning, social constructivism, sustainable fishing
Procedia PDF Downloads 85