Search results for: definition of terrorism
1045 The Concept of the Family and Its Principles from the Perspective of International Human Rights Instruments
Authors: Mahya Saffarinia
Abstract:
The family has existed as a natural unit of human relations from the beginning of creation and life of human society until now and has been the core of the relationship between women, men, and children. However, in the field of human relations, the definition of family, related rights and duties, principles governing the family, the impact of the family on other individual or social phenomena and various other areas have changed over time, especially in recent decades, and the subject has now become one of the important categories of studies including interdisciplinary studies. It is difficult to provide an accurate and comprehensive definition of the family, and in the context of different cultures, customs, and legal systems, different definitions of family are presented. The meaning of legal principles governing the family is the general rules of law that determine the organization of different dimensions of the family, and dozens of partial rules are inferred from it or defined in the light of these general rules. How each of these principles was formed has left its own detailed history. In international human rights standards, which have been gradually developed over the past 72 years, numerous data can be found that in some way represent a rule in the field of family law or provide an interpretation of existing international rules which also address obligations of governments in the field of family. Based on a descriptive-analytical method and by examining human rights instruments, the present study seeks to explain the effective elements in defining and the principles governing the family. This article makes it clear that international instruments do not provide a clear definition of the family and that governments are empowered to define the family in terms of the cultural context of their community. But at the same time, it has been stipulated that governments do not have the exclusive authority to provide this definition, and certain principles should be considered as essential elements. Also, 7 principles have been identified as general legal rules governing all international human rights instruments related to the family, such as the principle of voluntary family formation and the prohibition of forced marriage, and the principle of respecting human dignity for all family members. Each of these 7 principles has led to different debates, and the acceptance or non-acceptance of each of them has different consequences in the rights and duties related to the family and the relations between its members and even the family's interactions with others and society. One of the consequences of the validity of these principles in family-related human rights standards is that many of the existing legal systems of countries in some cases need to be amended and their regulations revised, and some established cultural traditions in societies that are considered inhumane in terms of these principles need to be modified and changed. Of course, this process of governing the principles derived from human rights standards over the family also has vulnerabilities and misinterpretations that should not be neglected.Keywords: family, human rights, international instruments, principles
Procedia PDF Downloads 1791044 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'
Authors: Arianna Vedaschi
Abstract:
This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.Keywords: radicalization, free speech, international terrorism, national security
Procedia PDF Downloads 1971043 Understanding Strategic Engagement on the Conversation Table: Countering Terrorism in Nigeria
Authors: Anisah Ari
Abstract:
Effects of organized crime permeate all facets of life, including public health, socio-economic endeavors, and human security. If any element of this is affected, it impacts large-scale national and global interest. Seeking to address terrorist networks through technical thinking is like trying to kill a weed by just cutting off its branches. It will re-develop and expand in proportions beyond one’s imagination, even in horrific ways that threaten human security. The continent of Africa has been bedeviled by this menace, with little or no solution to the problem. Nigeria is dealing with a protracted insurgency that is perpetrated by a sect against any form of westernization. Reimagining approaches to dealing with pressing issues like terrorism may require engaging the right set of people in the conversation for any sustainable change. These are people who have lived through the daily effects of the violence that ensues from the activities of terrorist activities. Effective leadership is required for an inclusive process, where spaces are created for diverse voices to be heard, and multiple perspectives are listened to, and not just heard, that supports a determination of the realistic outcome. Addressing insurgency in Nigeria has experienced a lot of disinformation and uncertainty. This may be in part due to poor leadership or an iteration of technical solutions to adaptive challenge peacemaking efforts in Nigeria has focused on behaviors, attitudes and practices that contribute to violence. However, it is important to consider the underlying issues that build-up, ignite and fan the flames of violence—looking at conflict as a complex system, issues like climate change, low employment rates, corruption and the impunity of discrimination due to ethnicity and religion. This article will be looking at an option of the more relational way of addressing insurgency through adaptive approaches that embody engagement and solutions with the people rather than for the people. The construction of a local turn in peacebuilding is informed by the need to create a locally driven and sustained peace process that embodies the culture and practices of the people in enacting an everyday peace beyond just a perennial and universalist outlook. A critical analysis that explores the socially identified individuals and situations will be made, considering the more adaptive approach to a complex existential challenge rather than a universalist frame. Case Study and Ethnographic research approach to understand what other scholars have documented on the matter and also a first-hand understanding of the experiences and viewpoints of the participants.Keywords: terrorism, adaptive, peace, culture
Procedia PDF Downloads 1031042 Wasting Human and Computer Resources
Authors: Mária Csernoch, Piroska Biró
Abstract:
The legends about “user-friendly” and “easy-to-use” birotical tools (computer-related office tools) have been spreading and misleading end-users. This approach has led us to the extremely high number of incorrect documents, causing serious financial losses in the creating, modifying, and retrieving processes. Our research proved that there are at least two sources of this underachievement: (1) The lack of the definition of the correctly edited, formatted documents. Consequently, end-users do not know whether their methods and results are correct or not. They are not aware of their ignorance. They are so ignorant that their ignorance does not allow them to realize their lack of knowledge. (2) The end-users’ problem-solving methods. We have found that in non-traditional programming environments end-users apply, almost exclusively, surface approach metacognitive methods to carry out their computer related activities, which are proved less effective than deep approach methods. Based on these findings we have developed deep approach methods which are based on and adapted from traditional programming languages. In this study, we focus on the most popular type of birotical documents, the text-based documents. We have provided the definition of the correctly edited text, and based on this definition, adapted the debugging method known in programming. According to the method, before the realization of text editing, a thorough debugging of already existing texts and the categorization of errors are carried out. With this method in advance to real text editing users learn the requirements of text-based documents and also of the correctly formatted text. The method has been proved much more effective than the previously applied surface approach methods. The advantages of the method are that the real text handling requires much less human and computer sources than clicking aimlessly in the GUI (Graphical User Interface), and the data retrieval is much more effective than from error-prone documents.Keywords: deep approach metacognitive methods, error-prone birotical documents, financial losses, human and computer resources
Procedia PDF Downloads 3821041 Contemporary Living Spaces – Exploring, Differentiating, and Defining the Terms and Requirements of “Micro” and “Small” Homes in Bulgaria
Authors: Evgenia Dimova-Aleksandrova, Elitsa Deianova
Abstract:
Dynamic changes in modern life and habitation due to demographic, urban, technology, and ecological factors affect the size of modern homes leading to a trend of decreasing their area. The current paper aims to investigate the differences between “micro” homes and “small” homes. In Bulgaria, these two types are not included in legal regulations, and therefore, a precise definition and special requirements are needed and sought in order to include their characteristic features in contemporary individual habitation. The purpose of the current study is to determine limits in built-up volume for the two types, to create a definition of the terms “micro” and “small” home, and to find methods to distinguish them. A comparative analysis will differentiate these types of habitation units, thus determining the boundaries for the built-up area for both concepts. The analysis is based on a case study from European practices and is focused on defining minimal requirements for “micro” and “small” home in the context of contemporary demands for high quality habitation in limited areas.Keywords: Bulgaria, differentiation, micro home, requirements, small home
Procedia PDF Downloads 991040 Definition and Core Components of the Role-Partner Allocation Problem in Collaborative Networks
Authors: J. Andrade-Garda, A. Anguera, J. Ares-Casal, M. Hidalgo-Lorenzo, J.-A. Lara, D. Lizcano, S. Suárez-Garaboa
Abstract:
In the current constantly changing economic context, collaborative networks allow partners to undertake projects that would not be possible if attempted by them individually. These projects usually involve the performance of a group of tasks (named roles) that have to be distributed among the partners. Thus, an allocation/matching problem arises that will be referred to as Role-Partner Allocation problem. In real life this situation is addressed by negotiation between partners in order to reach ad hoc agreements. Besides taking a long time and being hard work, both historical evidence and economic analysis show that such approach is not recommended. Instead, the allocation process should be automated by means of a centralized matching scheme. However, as a preliminary step to start the search for such a matching mechanism (or even the development of a new one), the problem and its core components must be specified. To this end, this paper establishes (i) the definition of the problem and its constraints, (ii) the key features of the involved elements (i.e., roles and partners); and (iii) how to create preference lists both for roles and partners. Only this way it will be possible to conduct subsequent methodological research on the solution method.Keywords: collaborative network, matching, partner, preference list, role
Procedia PDF Downloads 2341039 Translation Methods Applied While Dealing With System-Bound Terms (Polish-English Translation)
Authors: Anna Kizinska
Abstract:
The research aims at discussing Polish and British incongruent terms that refer to company law. The Polish terms under analysis appear in the Polish Code of Commercial Partnerships and Companies and constitute legal terms or factual terms. The English equivalents of each Polish term under research appear in two Polish Code of Commercial Partnerships and Companies translations into English. The theoretical part of the paper includes the presentation of the definitions of a system-bound term and incongruity of terms. The aim of the analysis is to check if the classification of translation methods used in civil law terms translation comprehends the translation methods applied while translating company law terms into English. The translation procedures are defined according to Newmark. The stages of the research include 1) presentation of a definition of a Polish term, 2) enumerating the so-far published English equivalents of a given Polish term and comparing their definitions (as long as they appear in English law dictionaries ) with the definition of a given Polish term under analysis, 3) checking whether an English equivalent appears or not in, among others, the sources of the British law (legislation.gov.uk database) , 4) identifying the translation method that was applied while forming a given English equivalent.Keywords: translation, legal terms, equivalence, company law, incongruency
Procedia PDF Downloads 891038 Vulnerability Analysis for Risk Zones Boundary Definition to Support a Decision Making Process at CBRNE Operations
Authors: Aliaksei Patsekha, Michael Hohenberger, Harald Raupenstrauch
Abstract:
An effective emergency response to accidents with chemical, biological, radiological, nuclear, or explosive materials (CBRNE) that represent highly dynamic situations needs immediate actions within limited time, information and resources. The aim of the study is to provide the foundation for division of unsafe area into risk zones according to the impact of hazardous parameters (heat radiation, thermal dose, overpressure, chemical concentrations). A decision on the boundary values for three risk zones is based on the vulnerability analysis that covered a variety of accident scenarios containing the release of a toxic or flammable substance which either evaporates, ignites and/or explodes. Critical values are selected for the boundary definition of the Red, Orange and Yellow risk zones upon the examination of harmful effects that are likely to cause injuries of varying severity to people and different levels of damage to structures. The obtained results provide the basis for creating a comprehensive real-time risk map for a decision support at CBRNE operations.Keywords: boundary values, CBRNE threats, decision making process, hazardous effects, vulnerability analysis, risk zones
Procedia PDF Downloads 2091037 Reconstruction and Renewal of Traditional Houses and its Impact on Tourism Development in Rasht
Authors: Parvaneh Ziviyar, Simin Armaghan
Abstract:
Traditional house in Rasht contains monuments and heritage of ancestors who once lived in these houses. These houses represent the customs, culture and lifestyle of the people of Rasht and bridge the gap between modern people and their past that is being forgotten. Maintenance of the buildings and architectural heritage together with their unique architecture and climatic related construction has an important role in tourism attraction and sustainable development. The purpose of this study was to develop a new definition of vacation shacks that is different with the definition of Cultural Heritage Organization. The place to stay and visit that is rebuilt or renovated based on traditional architectural style of Rasht and yet provides modern amenities so that it would not undermine indigenous traditional sense of the house. Data collection for this study is based on review of literature and field study. Results and the statistics of this study will prove that the research hypothesis is supported and there is a correlation between traditional houses of Rasht, as tourism–accommodation place and tourist attraction. It also indicates the capability and potential of these ancient monuments in the introduction of the culture of this land, and calling people and many tourists come to visit and stay in such places.Keywords: architecture, traditional houses, vacation shacks, tourism
Procedia PDF Downloads 2721036 The Effects of Three Pre-Reading Activities (Text Summary, Vocabulary Definition, and Pre-Passage Questions) on the Reading Comprehension of Iranian EFL Learners
Authors: Leila Anjomshoa, Firooz Sadighi
Abstract:
This study investigated the effects of three types of pre-reading activities (vocabulary definitions, text summary and pre-passage questions) on EFL learners’ English reading comprehension. On the basis of the results of a placement test administered to two hundred and thirty English students at Kerman Azad University, 200 subjects (one hundred intermediate and one hundred advanced) were selected.Four texts, two of them at intermediate level and two of them at advanced level were chosen. The data gathered was subjected to the statistical procedures of ANOVA. A close examination of the results through Tukey’s HSD showed the fact that the experimental groups performed better than the control group, highlighting the effect of the treatment on them. Also, the experimental group C (text summary), performed remarkably better than the other three groups (both experimental & control). Group B subjects, vocabulary definitions, performed better than groups A and D. The pre-passage questions group’s (D) performance showed higher scores than the control condition.Keywords: pre-reading activities, text summary, vocabulary definition, and pre-passage questions, reading comprehension
Procedia PDF Downloads 3391035 EMS Providers' Ability and Willingness to Respond to Bioterrorism
Authors: Ryan Houser
Abstract:
Introduction: Previous studies have found that public health systems within the United States are inadequately prepared for an act of biological terrorism. As the COVID-19 pandemic continues, few studies have evaluated bioterrorism preparedness of Emergency Medical Services, even in the accelerating environment of biothreats. Methods: This study utilized an Internet-based survey to assess the level of preparedness and willingness to respond to a bioterrorism attack and identify factors that predict preparedness and willingness among Nebraska EMS (Emergency Medical Services ) providers. The survey was available for one month in 2021, during which 190 EMS providers responded to the survey. Results: Only 56.8% of providers were able to recognize an illness or injury as potentially resulting from exposure to a CBRN agent. The provider Clinical Competency levels range from a low of 13.6% (ability to initiate patient care within his/her professional scope of practice and arrange for prompt referral appropriate to the identified condition(s)) to a high of 74% (the ability to respond to an emergency within the emergency management system of his/her practice, institution and community). Only 10% of the respondents are both willing and able to effectively function in a bioterror environment. Discussion: In order to effectively prepare for and respond to a bioterrorist attack, all levels of the healthcare system need to have the clinical skills, knowledge, and abilities necessary to treat patients exposed. Policy changes and increased focus on training and drills are needed to ensure a prepared EMS system which is crucial to a resilient state. EMS entities need to be aware of the extent of their available workforce so that the country can be prepared for the increasing threat of bioterrorism or other novel emerging infectious disease outbreaks. A resilient nation relies on a prepared set of EMS providers who are willing to respond to biological terrorism events.Keywords: bioterrorism, prehospital, EMS, disaster, emergency, medicine, preparedness, policy
Procedia PDF Downloads 1561034 Designing Form, Meanings, and Relationships for Future Industrial Products. Case Study Observation of PAD
Authors: Elisabetta Cianfanelli, Margherita Tufarelli, Paolo Pupparo
Abstract:
The dialectical mediation between desires and objects or between mass production and consumption continues to evolve over time. This relationship is influenced both by variable geometries of contexts that are distant from the mere design of product form and by aspects rooted in the very definition of industrial design. In particular, the overcoming of macro-areas of innovation in the technological, social, cultural, formal, and morphological spheres, supported by recent theories in critical and speculative design, seems to be moving further and further away from the design of the formal dimension of advanced products. The articulated fabric of theories and practices that feed the definition of “hyperobjects”, and no longer objects describes a common tension in all areas of design and production of industrial products. The latter are increasingly detached from the design of the form and meaning of the same in mass productions, thus losing the quality of products capable of social transformation. For years we have been living in a transformative moment as regards the design process in the definition of the industrial product. We are faced with a dichotomy in which there is, on the one hand, a reactionary aversion to the new techniques of industrial production and, on the other hand, a sterile adoption of the techniques of mass production that we can now consider traditional. This ambiguity becomes even more evident when we talk about industrial products, and we realize that we are moving further and further away from the concepts of "form" as a synthesis of a design thought aimed at the aesthetic-emotional component as well as the functional one. The design of forms and their contents, as statutes of social acts, allows us to investigate the tension on mass production that crosses seasons, trends, technicalities, and sterile determinisms. The design culture has always determined the formal qualities of objects as a sum of aesthetic characteristics functional and structural relationships that define a product as a coherent unit. The contribution proposes a reflection and a series of practical experiences of research on the form of advanced products. This form is understood as a kaleidoscope of relationships through the search for an identity, the desire for democratization, and between these two, the exploration of the aesthetic factor. The study of form also corresponds to the study of production processes, technological innovations, the definition of standards, distribution, advertising, the vicissitudes of taste and lifestyles. Specifically, we will investigate how the genesis of new forms for new meanings introduces a change in the relative innovative production techniques. It becomes, therefore, fundamental to investigate, through the reflections and the case studies exposed inside the contribution, also the new techniques of production and elaboration of the forms of the products, as new immanent and determining element inside the planning process.Keywords: industrial design, product advanced design, mass productions, new meanings
Procedia PDF Downloads 1211033 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups
Authors: John Hardy
Abstract:
Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism
Procedia PDF Downloads 2911032 The Rendering of Sex-Related Expressions by Court Interpreters in Hong Kong: A Corpus-Based Approach
Authors: Yee Yan Crystal Kwong
Abstract:
The essence of rape is the absence of consent to sexual intercourse. Yet, the definition of consent is not absolute and allows for subjectivity. In this case, the accuracy of oral interpretation becomes very important as the narratives of events and situation, as well as the register and style of speakers would influence the juror decision making. This paper first adopts a corpus-based approach to investigate how court interpreters in Hong Kong handle expressions that refer to sexual activities. The data of this study will be based on online corpus :From legislation to translation, from translation to interpretation: The narrative of sexual offences. The corpus comprises the transcription of five separate rape trials and all of these trials were heard with the presence of an interpreter. Since there are plenty of sex-related expressions used by witnesses and defendants in the five cases, emphasis will be put on those which have an impact on the definition of rape. With an in-depth analysis of the interpreted utterances, different interpreting approaches will be identified to observe how interpreters retain the intended meanings. Interviews with experienced court interpreters will also be conducted to revisit the validity of the traditional verbatim standard. At the end of this research, various interpreting approaches will be compared and evaluated. A redefinition of interpreters' institutional role, as well as recommendations for interpreting learners will be provided.Keywords: court interpreting, interpreters, legal translation, slangs
Procedia PDF Downloads 2621031 The Re-Emergence of Russia Foreign Policy (Case Study: Middle East)
Authors: Maryam Azish
Abstract:
Russia, as an emerging global player in recent years, has projected a special place in the Middle East. Despite all the challenges it has faced over the years, it has always considered its presence in various fields with a strategy that has defined its maneuvering power as a level of competition and even confrontation with the United States. Therefore, its current approach is considered important as an influential actor in the Middle East. After the collapse of the Soviet Union, when the Russians withdrew completely from the Middle East, the American scene remained almost unrivaled by the Americans. With the start of the US-led war in Iraq and Afghanistan and the subsequent developments that led to the US military and political defeat, a new chapter in regional security was created in which ISIL and Taliban terrorism went along with the Arab Spring to destabilize the Middle East. Because of this, the Americans took every opportunity to strengthen their military presence. Iraq, Syria and Afghanistan have always been the three areas where terrorism was shaped, and the countries of the region have each reacted to this evil phenomenon accordingly. The West dealt with this phenomenon on a case-by-case basis in the general circumstances that created the fluid situation in the Arab countries and the region. Russian President Vladimir Putin accused the US of falling asleep in the face of ISIS and terrorism in Syria. In fact, this was an opportunity for the Russians to revive their presence in Syria. This article suggests that utilizing the recognition policy along with the constructivism theory will offer a better knowledge of Russia’s endeavors to endorse its international position. Accordingly, Russia’s distinctiveness and its ambitions for a situation of great power have played a vital role in shaping national interests and, subsequently, in foreign policy, in Putin's era in particular. The focal claim of the paper is that scrutinize Russia’s foreign policy with realistic methods cannot be attained. Consequently, with an aim to fill the prevailing vacuum, this study exploits the politics of acknowledgment in the context of constructivism to examine Russia’s foreign policy in the Middle East. The results of this paper show that the key aim of Russian foreign policy discourse, accompanied by increasing power and wealth, is to recognize and reinstate the position of great power in the universal system. The Syrian crisis has created an opportunity for Russia to unite its position in the developing global and regional order after ages of dynamic and prevalent existence in the Middle East as well as contradicting US unilateralism. In the meantime, the writer thinks that the question of identifying Russia’s position in the global system by the West has played a foremost role in serving its national interests.Keywords: constructivism, foreign Policy, middle East, Russia, regionalism
Procedia PDF Downloads 1491030 A Comparative Study on Software Patent: The Meaning of 'Use' in Direct Infringement
Authors: Tien Wei Daniel Hwang
Abstract:
The computer program inventors, particularly in Fintech, are unwilling to apply for patents in Taiwan after 2014. Passing the ‘statutory subject matter eligibility’ test and becoming the system patent are not the only cause to the reduction in the number of application. Taiwanese court needs to resolve whether the defendants had ‘used’ that software patent in patent direct infringement suit. Both 35 U.S.C. § 271(a) and article 58 paragraph 2 of Taiwan Patent Law don’t define the meaning of ‘use’ in the statutes. Centillion Data Sys., LLC v. Qwest Commc’ns Int’l, Inc. reconsidered the meaning of ‘use’ in system patent infringement, and held that ‘a party must put the invention into service, i.e., control the system as a whole and obtain benefit from it.’ In Taiwan, Intellectual Property Office, Ministry of Economic Affairs, has explained that ‘using’ the patent is ‘achieving the technical effect of the patent.’ Nonetheless, this definition is too broad to apply to not only the software patent but also the traditional patent. To supply the friendly environment for Fintech corporations, this article aims to let Taiwanese court realize why and how United States District Court, S.D. Indiana, Indianapolis Division and United States Court of Appeals, Federal Circuit defined the meaning of ‘use’ in 35 U.S.C. § 271(a). However, this definition is so lax and confuses many defendants in United States. Accordingly, this article indicates the elements in Taiwan Patent Law are different with 35 U.S.C. § 271(a), so Taiwanese court can follow the interpretation of ‘use’ in Centillion Data case without the same obstacle.Keywords: direct infringement, FinTech, software patent, use
Procedia PDF Downloads 3011029 Formulating a Definition of Hate Speech: From Divergence to Convergence
Authors: Avitus A. Agbor
Abstract:
Numerous incidents, ranging from trivial to catastrophic, do come to mind when one reflects on hate. The victims of these belong to specific identifiable groups within communities. These experiences evoke discussions on Islamophobia, xenophobia, homophobia, anti-Semitism, racism, ethnic hatred, atheism, and other brutal forms of bigotry. Common to all these is an invisible but portent force that drives all of them: hatred. Such hatred is usually fueled by a profound degree of intolerance (to diversity) and the zeal to impose on others their beliefs and practices which they consider to be the conventional norm. More importantly, the perpetuation of these hateful acts is the unfortunate outcome of an overplay of invectives and hate speech which, to a greater extent, cannot be divorced from hate. From a legal perspective, acknowledging the existence of an undeniable link between hate speech and hate is quite easy. However, both within and without legal scholarship, the notion of “hate speech” remains a conundrum: a phrase that is quite easily explained through experiences than propounding a watertight definition that captures the entire essence and nature of what it is. The problem is further compounded by a few factors: first, within the international human rights framework, the notion of hate speech is not used. In limiting the right to freedom of expression, the ICCPR simply excludes specific kinds of speeches (but does not refer to them as hate speech). Regional human rights instruments are not so different, except for the subsequent developments that took place in the European Union in which the notion has been carefully delineated, and now a much clearer picture of what constitutes hate speech is provided. The legal architecture in domestic legal systems clearly shows differences in approaches and regulation: making it more difficult. In short, what may be hate speech in one legal system may very well be acceptable legal speech in another legal system. Lastly, the cornucopia of academic voices on the issue of hate speech exude the divergence thereon. Yet, in the absence of a well-formulated and universally acceptable definition, it is important to consider how hate speech can be defined. Taking an evidence-based approach, this research looks into the issue of defining hate speech in legal scholarship and how and why such a formulation is of critical importance in the prohibition and prosecution of hate speech.Keywords: hate speech, international human rights law, international criminal law, freedom of expression
Procedia PDF Downloads 761028 Mathematical Competence as It Is Defined through Learners' Errors in Arithmetic and Algebra
Authors: Michael Lousis
Abstract:
Mathematical competence is the great aim of every mathematical teaching and learning endeavour. This can be defined as an idealised conceptualisation of the quality of cognition and the ability of implementation in practice of the mathematical subject matter, which is included in the curriculum, and is displayed only through performance of doing mathematics. The present study gives a clear definition of mathematical competence in the domains of Arithmetic and Algebra that stems from the explanation of the learners’ errors in these domains. The learners, whose errors are explained, were Greek and English participants of a large, international, longitudinal, comparative research program entitled the Kassel Project. The participants’ errors emerged as results of their work in dealing with mathematical questions and problems of the tests, which were presented to them. The construction of the tests was such as only the outcomes of the participants’ work was to be encompassed and not their course of thinking, which resulted in these outcomes. The intention was that the tests had to provide undeviating comparable results and simultaneously avoid any probable bias. Any bias could stem from obtaining results by involving so many markers from different countries and cultures, with so many different belief systems concerning the assessment of learners’ course of thinking. In this way the validity of the research was protected. This fact forced the implementation of specific research methods and theoretical prospects to take place in order the participants’ erroneous way of thinking to be disclosed. These were Methodological Pragmatism, Symbolic Interactionism, Philosophy of Mind and the ideas of Computationalism, which were used for deciding and establishing the grounds of the adequacy and legitimacy of the obtained kinds of knowledge through the explanations given by the error analysis. The employment of this methodology and of these theoretical prospects resulted in the definition of the learners’ mathematical competence, which is the thesis of the present study. Thus, learners’ mathematical competence is depending upon three key elements that should be developed in their minds: appropriate representations, appropriate meaning, and appropriate developed schemata. This definition then determined the development of appropriate teaching practices and interventions conducive to the achievement and finally the entailment of mathematical competence.Keywords: representations, meaning, appropriate developed schemata, computationalism, error analysis, explanations for the probable causes of the errors, Kassel Project, mathematical competence
Procedia PDF Downloads 2681027 Critical Appraisal, Smart City Initiative: China vs. India
Authors: Suneet Jagdev, Siddharth Singhal, Dhrubajyoti Bordoloi, Peesari Vamshidhar Reddy
Abstract:
There is no universally accepted definition of what constitutes a Smart City. It means different things to different people. The definition varies from place to place depending on the level of development and the willingness of people to change and reform. It tries to improve the quality of resource management and service provisions for the people living in the cities. Smart city is an urban development vision to integrate multiple information and communication technology (ICT) solutions in a secure fashion to manage the assets of a city. But most of these projects are misinterpreted as being technology projects only. Due to urbanization, a lot of informal as well government funded settlements have come up during the last few decades, thus increasing the consumption of the limited resources available. The people of each city have their own definition of Smart City. In the imagination of any city dweller in India is the picture of a Smart City which contains a wish list of infrastructure and services that describe his or her level of aspiration. The research involved a comparative study of the Smart City models in India and in China. Behavioral changes experienced by the people living in the pilot/first ever smart cities have been identified and compared. This paper discussed what is the target of the quality of life for the people in India and in China and how well could that be realized with the facilities being included in these Smart City projects. Logical and comparative analyses of important data have been done, collected from government sources, government papers and research papers by various experts on the topic. Existing cities with historically grown infrastructure and administration systems will require a more moderate step-by-step approach to modernization. The models were compared using many different motivators and the data is collected from past journals, interacting with the people involved, videos and past submissions. In conclusion, we have identified how these projects could be combined with the ongoing small scale initiatives by the local people/ small group of individuals and what might be the outcome if these existing practices were implemented on a bigger scale.Keywords: behavior change, mission monitoring, pilot smart cities, social capital
Procedia PDF Downloads 2891026 Women Education in Islam, Christianity, and Judaism
Authors: Nuzhat Fatima
Abstract:
This is very misleading conception that Islam is the religion of terrorists or terrorism. It is also another misconception that women are not given due important in Islamic. And women are forced to use veil. But if we closely look at the other two religions they also have the same commandments about the veil. Then comes education, women are given the equal right of education in Islam. But there are certain people creating the bad image of Islam and not giving permission to their females to get education. This paper will present the brief description of education and status of women in all three religions.Keywords: Islam, women, education, christianity, Judaism
Procedia PDF Downloads 5761025 The Media and Reportage of Boko Haram Insurgency in Nigeria
Authors: Priscilla Marcus
Abstract:
The mass media was a force to reckon with in the struggle and attainment of Nigeria’s independence in 1960 and since then, the Nigerian media has carved a niche for itself in performing its traditional role of education, information, entertainment, shaping of opinions and swinging of views of the society on knotty national issues. Boko Haram insurgency in Nigeria which emerged from an unnoticed, negligible and quiet beginning, has turned out daring, monstrous and unstoppable. This paper examines The Media and Reportage of Boko Haram Insurgency in Nigeria and to suggest strategies the mass media could adopt in combating this form of terrorism. Data for the study were collected from a variety of sources including the print and electronic media. The major observation of this study is that the mass media have an enormous role to play if Boko Haram’s activities are to be combated. It argued that even though the media houses are just doing their job – reporting the incident(s) as they occur, thus keeping the citizens abreast of facts; the rate at which news keeps coming regarding the activities of the sect has portrayed the media as information dissemination and terror campaign spread. It also argued that the ceaseless reporting has not translated to a decrease in the activities of the sect or increase in the level of government actions to check the insurgency. However, the information being disseminated is enlightening the populace and also creating an atmosphere of panic and insecurity. It further argued that the media should move beyond mere recitation of events to providing the public with knowledge needed to make things better. This is because the sect has been accorded too much undeserved and unnecessary publicity while the government on the other hand has been portrayed, albeit indirectly as a weak organization incapable of handling the ‘more organized’ Boko Haram. The study, concluded that, to effectively address the problem of this form of terrorism in Nigeria, the media have to brace up to the task of uncovering activities of the sect in appreciation of their watch-dog role.Keywords: Boko Haram, insurgency, mass media, Nigeria
Procedia PDF Downloads 3261024 Integrating Sustainable Development Goals in Teaching Mathematics Using Project Based Learning
Authors: S. Goel
Abstract:
In the current scenario, education should be realistic and nature-friendly. The earlier definition of education was restricted to the holistic development of the child which help them to increase their capacity and helps in social upliftment. But such definition gives a more individualistic aim of education. Due to that individualistic aim, we have become disconnected from nature. So, a school should be a place which provides students with an area to explore. They should get practical learning or learning from nature which is also propounded by Rousseau in the mid-eighteenth century. Integrating Sustainable development goals in the school curriculum will make it possible to connect the nature with the lives of the children in the classroom. Then, students will be more aware and sensitive towards their social and natural surroundings. The research attempts to examine the efficiency of project-based learning in mathematics to create awareness around sustainable development goals. The major finding of the research was that students are less aware of sustainable development goals, but when given time and an appropriate learning environment, students can be made aware of these goals. In this research, project-based learning was used to make students aware of sustainable development goals. Students were given pre test and post test which helped in analyzing their performance. After the intervention, post test result showed that mathematics projects can create an awareness of sustainable development goals.Keywords: holistic development, natural learning, project based learning, sustainable development goals
Procedia PDF Downloads 1801023 Estimation of Lungs Physiological Motion for Patient Undergoing External Lung Irradiation
Authors: Yousif Mohamed Y. Abdallah
Abstract:
This is an experimental study deals with detection, measurement and analysis of the periodic physiological organ motion during external beam radiotherapy; to improve the accuracy of the radiation field placement, and to reduce the exposure of healthy tissue during radiation treatments. The importance of this study is to detect the maximum path of the mobile structures during radiotherapy delivery, to define the planning target volume (PTV) and irradiated volume during both inspiration and expiration period and to verify the target volume. In addition to its role to highlight the importance of the application of Intense Guided Radiotherapy (IGRT) methods in the field of radiotherapy. The results showed (body contour was equally (3.17 + 0.23 mm), for left lung displacement reading (2.56 + 0.99 mm) and right lung is (2.42 + 0.77 mm) which the radiation oncologist to take suitable countermeasures in case of significant errors. In addition, the use of the image registration technique for automatic position control is predicted potential motion. The motion ranged between 2.13 mm and 12.2 mm (low and high). In conclusion, individualized assessment of tumor mobility can improve the accuracy of target areas definition in patients undergo Sterostatic RT for stage I, II and III lung cancer (NSCLC). Definition of the target volume based on a single CT scan with a margin of 10 mm is clearly inappropriate.Keywords: respiratory motion, external beam radiotherapy, image processing, lung
Procedia PDF Downloads 5351022 Pyramid of Deradicalization: Causes and Possible Solutions
Authors: Ashir Ahmed
Abstract:
Generally, radicalization happens when a person's thinking and behaviour become significantly different from how most of the members of their society and community view social issues and participate politically. Radicalization often leads to violent extremism that refers to the beliefs and actions of people who support or use violence to achieve ideological, religious or political goals. Studies on radicalization negate the common myths that someone must be in a group to be radicalised or anyone who experiences radical thoughts is a violent extremist. Moreover, it is erroneous to suggest that radicalisation is always linked to religion. Generally, the common motives of radicalization include ideological, issue-based, ethno-nationalist or separatist underpinning. Moreover, there are number of factors that further augments the chances of someone being radicalised and may choose the path of violent extremism and possibly terrorism. Since there are numbers of factors (and sometimes quite different) contributing in radicalization and violent extremism, it is highly unlikely to devise a single solution that could produce effective outcomes to deal with radicalization, violent extremism and terrorism. The pathway to deradicalization, like the pathway to radicalisation, is different for everyone. Considering the need of having customized deradicalization resolution, this study proposes a multi-tier framework, called ‘pyramid of deradicalization’ that first help identifying the stage at which an individual could be on the radicalization pathway and then propose a customize strategy to deal with the respective stage. The first tier (tier 1) addresses broader community and proposes a ‘universal approach’ aiming to offer community-based design and delivery of educational programs to raise awareness and provide general information on possible factors leading to radicalization and their remedies. The second tier focuses on the members of community who are more vulnerable and are disengaged from the rest of the community. This tier proposes a ‘targeted approach’ targeting the vulnerable members of the community through early intervention such as providing anonymous help lines where people feel confident and comfortable in seeking help without fearing the disclosure of their identity. The third tier aims to focus on people having clear evidence of moving toward extremism or getting radicalized. The people falls in this tier are believed to be supported through ‘interventionist approach’. The interventionist approach advocates the community engagement and community-policing, introducing deradicalization programmes to the targeted individuals and looking after their physical and mental health issues. The fourth and the last tier suggests the strategies to deal with people who are actively breaking the law. ‘Enforcement approach’ suggests various approaches such as strong law enforcement, fairness and accuracy in reporting radicalization events, unbiased treatment by law based on gender, race, nationality or religion and strengthen the family connections.It is anticipated that the operationalization of the proposed framework (‘pyramid of deradicalization’) would help in categorising people considering their tendency to become radicalized and then offer an appropriate strategy to make them valuable and peaceful members of the community.Keywords: deradicalization, framework, terrorism, violent extremism
Procedia PDF Downloads 2691021 Concept for Determining the Focus of Technology Monitoring Activities
Authors: Guenther Schuh, Christina Koenig, Nico Schoen, Markus Wellensiek
Abstract:
Identification and selection of appropriate product and manufacturing technologies are key factors for competitiveness and market success of technology-based companies. Therefore many companies perform technology intelligence (TI) activities to ensure the identification of evolving technologies at the right time. Technology monitoring is one of the three base activities of TI, besides scanning and scouting. As the technological progress is accelerating, more and more technologies are being developed. Against the background of limited resources it is therefore necessary to focus TI activities. In this paper, we propose a concept for defining appropriate search fields for technology monitoring. This limitation of search space leads to more concentrated monitoring activities. The concept will be introduced and demonstrated through an anonymized case study conducted within an industry project at the Fraunhofer Institute for Production Technology. The described concept provides a customized monitoring approach, which is suitable for use in technology-oriented companies especially those that have not yet defined an explicit technology strategy. It is shown in this paper that the definition of search fields and search tasks are suitable methods to define topics of interest and thus to direct monitoring activities. Current as well as planned product, production and material technologies as well as existing skills, capabilities and resources form the basis of the described derivation of relevant search areas. To further improve the concept of technology monitoring the proposed concept should be extended during future research e.g. by the definition of relevant monitoring parameters.Keywords: monitoring radar, search field, technology intelligence, technology monitoring
Procedia PDF Downloads 4741020 Good Faith and Accession in the New Civil Code
Authors: Adelina Vrancianu
Abstract:
The problem of artificial real accession will be analyzed in this study both in terms of old and current Civil Code provisions and in terms of comparative law, European legal and Canadian systems. The current Civil Code from 2009 has brought new changes about the application and solutions regarding artificial real accession. The hypothesis in which a person is making works with his own materials on the real estate belonging to another person is developed and analyzed in detail from national and international point of view in relation with the good faith. The scope of this analysis is to point out what are the changes issued from case-law and which ones are new, inspired from other law systems in regard to the good/bad faith. The new civil code has promoted a definition for this notion. Is this definition a new one inspired from the comparative law or is it inspired from the case-law? Is it explained for every case scenario of accession or is a general notion? The study tries to respond to these questions and to present the new aspects in the area. has reserved a special place for the situation of execution of works with own materials exceeding the border with violation of another’s right of property, where the variety of solutions brings into discussion the case of expropriation for private interest. The new Civil Code is greatly influenced by the Civil Code from Quebec in comparison with the old code of French influence. The civil reform was needed and has brought into attention new solutions inspired from the Canadian system which has mitigated the permanent conflict between the constructor and the immovable owner.Keywords: accession, good faith, new civil code, comparative law
Procedia PDF Downloads 4621019 Planning for Location and Distribution of Regional Facilities Using Central Place Theory and Location-Allocation Model
Authors: Danjuma Bawa
Abstract:
This paper aimed at exploring the capabilities of Location-Allocation model in complementing the strides of the existing physical planning models in the location and distribution of facilities for regional consumption. The paper was designed to provide a blueprint to the Nigerian government and other donor agencies especially the Fertilizer Distribution Initiative (FDI) by the federal government for the revitalization of the terrorism ravaged regions. Theoretical underpinnings of central place theory related to spatial distribution, interrelationships, and threshold prerequisites were reviewed. The study showcased how Location-Allocation Model (L-AM) alongside Central Place Theory (CPT) was applied in Geographic Information System (GIS) environment to; map and analyze the spatial distribution of settlements; exploit their physical and economic interrelationships, and to explore their hierarchical and opportunistic influences. The study was purely spatial qualitative research which largely used secondary data such as; spatial location and distribution of settlements, population figures of settlements, network of roads linking them and other landform features. These were sourced from government ministries and open source consortium. GIS was used as a tool for processing and analyzing such spatial features within the dictum of CPT and L-AM to produce a comprehensive spatial digital plan for equitable and judicious location and distribution of fertilizer deports in the study area in an optimal way. Population threshold was used as yardstick for selecting suitable settlements that could stand as service centers to other hinterlands; this was accomplished using the query syntax in ArcMapTM. ArcGISTM’ network analyst was used in conducting location-allocation analysis for apportioning of groups of settlements around such service centers within a given threshold distance. Most of the techniques and models ever used by utility planners have been centered on straight distance to settlements using Euclidean distances. Such models neglect impedance cutoffs and the routing capabilities of networks. CPT and L-AM take into consideration both the influential characteristics of settlements and their routing connectivity. The study was undertaken in two terrorism ravaged Local Government Areas of Adamawa state. Four (4) existing depots in the study area were identified. 20 more depots in 20 villages were proposed using suitability analysis. Out of the 300 settlements mapped in the study area about 280 of such settlements where optimally grouped and allocated to the selected service centers respectfully within 2km impedance cutoff. This study complements the giant strides by the federal government of Nigeria by providing a blueprint for ensuring proper distribution of these public goods in the spirit of bringing succor to these terrorism ravaged populace. This will ardently at the same time help in boosting agricultural activities thereby lowering food shortage and raising per capita income as espoused by the government.Keywords: central place theory, GIS, location-allocation, network analysis, urban and regional planning, welfare economics
Procedia PDF Downloads 1471018 Five Pitfalls in Defining a Health System and Implications for Research and Management
Authors: Macdonald Kanyangale, Sandram Naluso
Abstract:
Globally, researchers have struggled over time to adequately define the notion of health system to inform research. This study is significant because it proposes an integrative framework for a robust definition of the health system. The objective of this article is to examine major pitfalls in definitions of health system used in prior literature and implications of these for research and management. The study used methodological steps of a scoping review proposed by Arksey and O'Malley to identify and examine 24 definitions of a health system in articles selected from six databases and web search engines. Thematic analysis was used to delineate and categorise definitional pitfalls into broader themes. There are a plethora of five major pitfalls in the extant definitions of a health system which may easily scupper any unsuspecting researcher if not avoided or addressed in research. These definitional pitfalls are reductionist assumptions which ignore dynamic and complex connections, overly wide boundary and lack of specification of levels in a health system, and limited focus on process in a health system. In addition, there is the tendency of treating different components of the health system as equal and simplifying of the ontological complexity of the health system. Future scholars are advised to avoid or address the identified five major pitfalls if they are to develop robust definitions of an HS. The use of an integrative framework for a robust definition of a health system is recommended, while implications of the pitfalls are discussed as a basis and catalyst for complexity-informed research and managing interactively.Keywords: complexity management, health system, pitfalls, reductionism, research
Procedia PDF Downloads 1351017 Paying Less and Getting More: Evidence on the Effect of Corporate Purpose from Two Natural Field Experiments
Authors: Nikolai Brosch, Alwine Mohnen
Abstract:
Academics and business leaders increasingly call for a (re)definition of a corporate purpose beyond profit-maximization to contribute to the welfare of society. This study investigates the effect of communicating such a pro-social corporate purpose on three employee-level outcomes that constitute major cost components for most organizations: workers reservation wage, work quality, and work misbehavior. To provide causal evidence, two natural field experiments were conducted with almost 2,000 workers recruited from different online labor marketplaces. Workers were randomly assigned to treatments manipulating whether or not they received information about the employer’s corporate purpose and subsequently performed a short, real-effort task for payment. The main findings in both experiments show that receiving information about an employer’s pro-social corporate purpose causes workers to accept lower wages (9% lower in the first experiment and 28% lower in the second experiment) for the same job. Workers that personally assess high importance to organizations having a pro-social purpose are most responsive. At the same time, sacrificing wage for a corporate purpose comes at no cost of quality and even decreases the likelihood of engaging in work misbehavior. In a broader context, the results provide some evidence that the (re)definition of corporate purpose in commercial organizations is not ultimately at odds with creating profits.Keywords: corporate purpose, natural field experiment, reservation wage, work misbehavior, work quality
Procedia PDF Downloads 2381016 The Reasons behind Individuals to Join Terrorist Organizations: Recruitment from Outside
Authors: Murat Sözen
Abstract:
Today terrorism is gaining momentum again. Parallel to this, it hurts more than before because it has victims from not only its own locations but also remote places. As victims are from outside, militants are likewise from own location and outside. What made these individuals join the terrorist organizations and how these organizations recruit militants are still unanswered. The purpose of this work is to find reasons of joining and power of recruiting. In addition, the role of most popular tool of recruiting, ‘social media’ will be examined.Keywords: recruitment, social media, recruitment, militants
Procedia PDF Downloads 347