Search results for: privacy protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2631

Search results for: privacy protection

2331 Ethics Can Enable Open Source Data Research

Authors: Dragana Calic

Abstract:

The openness, availability and the sheer volume of big data have provided, what some regard as, an invaluable and rich dataset. Researchers, businesses, advertising agencies, medical institutions, to name only a few, collect, share, and analyze this data to enable their processes and decision making. However, there are important ethical considerations associated with the use of big data. The rapidly evolving nature of online technologies has overtaken the many legislative, privacy, and ethical frameworks and principles that exist. For example, should we obtain consent to use people’s online data, and under what circumstances can privacy considerations be overridden? Current guidance on how to appropriately and ethically handle big data is inconsistent. Consequently, this paper focuses on two quite distinct but related ethical considerations that are at the core of the use of big data for research purposes. They include empowering the producers of data and empowering researchers who want to study big data. The first consideration focuses on informed consent which is at the core of empowering producers of data. In this paper, we discuss some of the complexities associated with informed consent and consider studies of producers’ perceptions to inform research ethics guidelines and practice. The second consideration focuses on the researcher. Similarly, we explore studies that focus on researchers’ perceptions and experiences.

Keywords: big data, ethics, producers’ perceptions, researchers’ perceptions

Procedia PDF Downloads 264
2330 Ontology-Driven Generation of Radiation Protection Procedures

Authors: Chamseddine Barki, Salam Labidi, Hanen Boussi Rahmouni

Abstract:

In this article, we present the principle and suitable methodology for the design of a medical ontology that highlights the radiological and dosimetric knowledge, applied in diagnostic radiology and radiation-therapy. Our ontology, which we named «Onto.Rap», is the subject of radiation protection in medical and radiology centers by providing a standardized regulatory oversight. Thanks to its added values of knowledge-sharing, reuse and the ease of maintenance, this ontology tends to solve many problems. Of which we name the confusion between radiological procedures a practitioner might face while performing a patient radiological exam. Adding to it, the difficulties they might have in interpreting applicable patient radioprotection standards. Here, the ontology, thanks to its concepts simplification and expressiveness capabilities, can ensure an efficient classification of radiological procedures. It also provides an explicit representation of the relations between the different components of the studied concept. In fact, an ontology based-radioprotection expert system, when used in radiological center, could implement systematic radioprotection best practices during patient exam and a regulatory compliance service auditing afterwards.

Keywords: knowledge, ontology, radiation protection, radiology

Procedia PDF Downloads 285
2329 Child Protection Decision Making in England and Finland: A Comparative Analysis

Authors: Rachel Falconer

Abstract:

Background: The United Nations Convention on the Rights of the Child sets out the duties placed on signatory nations to take measures to protect children from all forms of violence, abuse, neglect and maltreatment. The systems for ensuring this protection vary globally, shaped by national welfare policies. In England and Finland, past research has highlighted differences in how child protection issues are framed and how state agencies respond. However, less is known about how such differences impact processes of social work judgment and decision making in practice. Method: Data was collected as part of a wider PhD project in three stages. First, social workers in sites across England and Finland were asked to complete a short questionnaire. Participants were then asked to comment on two constructed case vignettes, and were interviewed about their experiences of child protection decision making at the point of referral. Interviews were analyzed using NVivo to draw out key themes. Findings: There were similarities in how the English and Finnish social workers responded to the case vignettes; for example, participants in both countries expressed concerns about similar risk factors and all felt further assessment was needed. Differences were observed, in particular, in regard to the sources of support and guidance participants referred to, with the English social workers appearing to rely more upon managerial input for their decisions than the Finnish social workers. These findings suggest evidence for two distinct decision making approaches: ‘supervised’ and ‘supported’ judgement. Implications for practice: The findings have relevance to the conference theme of research and evaluation of social work practice, and support the findings of previous studies that have emphasized the significance of organizational factors in child protection decision making. The comparative methodology has also helped to demonstrate how organizational factors can influence practice in different child protection system ‘orientations’. The presentation will discuss the potential practice implications of ‘supervised’, manager-led approaches to decision making as contrasted with ‘supported’, team-led approaches, inviting discussion about the relevance of these findings for social work in other countries.

Keywords: child protection, comparative research, decision making, social work, vignettes

Procedia PDF Downloads 235
2328 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives

Authors: Nawt Almutairi, Ramzi El-Haddadeh

Abstract:

With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.

Keywords: e-service, satisfaction, trust, loyalty

Procedia PDF Downloads 226
2327 Self-Disclosure of Location: Influences of Personality Traits, Intrinsic Motivations and Extrinsic Motivations

Authors: Chechen Liao, Sheng Yi Lin

Abstract:

With the popularity of smartphone usage and the flourish of social networks, many people began to use the 'check-in' functions to share their location information and days of live and self-disclosure. In order to increase exposure and awareness, some stores provide discounts and other benefits to attract consumers to 'check-in' in their stores. The purpose of this study was to investigate whether personality traits, intrinsic motivations, extrinsic motivations, and privacy concerns would affect self-disclosure of location for consumers. Research data were collected from 407 individuals that have used Facebook check-in in Taiwan. This study used SmartPLS 2.0 structural equation modeling to validate the model. The results show that information sharing, information storage, enjoyment, self-presentation, get a feedback, economic reward, and keep up with trends had significant positive effects on self-disclosure. While extroversion and openness to use have significant positive effects on self-disclosure, conscientiousness and privacy concerns have significant negative effects on self-disclosure. The results of the study provide academic and practical implications for the future growth of location-based self-disclosure.

Keywords: check-in, extrinsic motivation, intrinsic motivation, personality trait, self-disclosure

Procedia PDF Downloads 148
2326 Cross-Disciplinary Perspectives on Climate-Induced Migration in Brazil: Legislation, Policies and Practice

Authors: Heloisa H. Miura, Luiza M. Pallone

Abstract:

In Brazil, people forced to move due to environmental causes, called 'environmental migrants', have always been neglected by public policies and legislation. Meanwhile, the numbers of climate-induced migration within and to Brazil continues to increase. The operating Immigration Law, implemented in 1980 under the Brazilian military regime, is widely considered to be out of date, once it does not offer legal protection to migrants who do not fit the definition of a refugee and are not allowed to stay regularly in the country. Aiming to reformulate Brazil’s legislation and policies on the matter, a new Migration Bill (PL 2516/2015) is currently being discussed in the Senate and is expected to define a more humanized approach to migration. Although the present draft foresees an expansion of the legal protection to different types of migrants, it still hesitates to include climate-induced displacements in its premises and to establish a migration management strategy. By introducing a human rights-based approach, this paper aims to provide a new multidisciplinary perspective to the protection of environmental migrants in Brazil.

Keywords: environmental migrants, human mobility, climate change, migration policy

Procedia PDF Downloads 374
2325 Coastal Cliff Protection in Beit Yanai, Israel: Examination of Alternatives and Public Preference Analysis

Authors: Tzipi Eshet

Abstract:

The primary objectives of this work are the examination of public preferences and attributed importance to different characteristics of coastal cliff protection alternatives, and drawing conclusions about the applicable alternative in Beit-Yanai beach. Erosion of coastal cliffs is a natural phenomenon that occurs in many places in the world. This creates problems along the coastlines, which are densely populated areas with highly developed economic activity. In recent years, various aspects of the aeolianite cliffs along the Israeli coast have been studied extensively. There is a consensus among researchers regarding a general trend of cliff retreat. This affects civilian infrastructure, wildlife habitats and heritage values, as well as Increases the risk to human life. The Israeli government, committed to the integrated coastal zones management approach, decided on a policy and guidelines to deal with cliff erosion, which includes establishing physical protection on land and in the sea, sand nourishment and runoff drainage. Physical protection solutions to reduce the rate of retreat of the cliffs are considerably important both for planning authorities and visitors to the beach. Direct costs of different protection alternatives, as well as external costs and benefits, may vary, thus affecting consumer preferences. Planning and execution of sustainable coastal cliff protection alternatives must take into account the different characteristics and their impact on aspects of economics, environment and leisure. The rocky shore of Beit-Yanai Beach was chosen as a case study to examine the nature of the influence of various protective solutions on consumer preferences. This beach is located in the center of Israel's coastline, and acts as a focus of attraction for recreation, land and sea sports, and educational activities as well. If no action will be taken, cliff retreat will continue. A survey was conducted to reveal the importance of coastal protection alternatives characteristics and the visual preferences to visitors at beach Beit-Yanai and residents living on the cliff (N=287). Preferences and willingness-to-pay were explored using Contingent-Ranking and Choice-Experiments techniques. Results show that visitors’ and residents’ willingness-to-pay for coastal cliff protection alternatives is affected both by financial and environmental aspects, as well as leisure. They prefer coastal cliff protection alternatives that are not visible and do not need constant maintenance, do not affect the quality of seawater or the habitats of wildlife and do not lower the security level of the swimmers. No significant difference was found comparing willingness-to-pay among local and non-local users. Additionally, they mostly prefer a protection solution which is integrated in the coastal landscape and maintains the natural appearance of the beach. Of the possible protection alternatives proposed for the protection of the cliff in Beit Yanai beach are two techniques that meet public preferences: rock revetments and submerged detached breakwaters. Results indicate that the visiting public prefer the implementation of these protection alternatives and will be willing to pay for them. Future actions to reduce retreat rate in Beit-Yanai have to consider implications on the economic, environmental and social conditions, along with weighting public interest against the interest of the individual.

Keywords: contingent-ranking, choice-experiments, coastal cliff protection, erosion of coastal cliffs, environment

Procedia PDF Downloads 267
2324 Use of Corporate Social Responsibility in Environmental Protection: Modern Mechanisms of Environmental Self-Regulation

Authors: Jakub Stelina, Janina Ciechanowicz-McLean

Abstract:

Fifty years of existence and development of international environmental law brought a deep disappointment with efficiency and effectiveness of traditional command and control mechanisms of environmental regulation. Agenda 21 agreed during the first Earth Summit in Rio de Janeiro 1992 was one of the first international documents, which explicitly underlined the importance of public participation in environmental protection. This participation includes also the initiatives undertaken by business corporations in the form of private environmental standards setting. Twenty years later during the Rio 20+ Earth Summit the private sector obligations undertaken during the negotiations have proven to be at least as important as the ones undertaken by the governments. The private sector has taken the leading role in environmental standard setting. Among the research methods used in the article two are crucial in the analysis. The comparative analysis of law is the instrument used in the article to analyse the practice of states and private business companies in the field of sustainable development. The article uses economic analysis of law to estimate the costs and benefits of Corporate Social Responsibility Projects in the field of environmental protection. The study is based on the four premises. First is the role of social dialogue, which is crucial for both Corporate Social Responsibility and modern environmental protection regulation. The Aarhus Convention creates a procedural environmental human right to participate in administrative procedures of law setting and environmental decisions making. The public participation in environmental impact assessment is nowadays a universal standard. Second argument is about the role of precaution as a principle of modern environmental regulation. This principle can be observed both in governmental regulatory undertakings and also private initiatives within the Corporate Social Responsibility environmental projects. Even in the jurisdictions which are relatively reluctant to use the principle of preventive action in environmental regulation, the companies often use this standard in their own private business standard setting initiatives. This is often due to the fact that soft law standards are used as the basis for private Corporate Social Responsibility regulatory initiatives. Third premise is about the role of ecological education in environmental protection. Many soft law instruments underline the importance of environmental education. Governments use environmental education only to the limited extent due to the costs of such projects and problems with effects assessment. Corporate Social Responsibility uses various means of ecological education as the basis of their actions in the field of environmental protection. Last but not least Sustainable development is a goal of both legal protection of the environment, and economic instruments of companies development. Modern environmental protection law uses to the increasing extent the Corporate Social Responsibility. This may be the consequence of the limits of hard law regulation. Corporate Social Responsibility is nowadays not only adapting to soft law regulation of environmental protection but also creates such standards by itself, showing new direction for development of international environmental law. Corporate Social Responsibility in environmental protection can be good investment in future development of the company.

Keywords: corporate social responsibility, environmental CSR, environmental justice, stakeholders dialogue

Procedia PDF Downloads 272
2323 Designing Self-Healing Lubricant-Impregnated Surfaces for Corrosion Protection

Authors: Sami Khan, Kripa Varanasi

Abstract:

Corrosion is a widespread problem in several industries and developing surfaces that resist corrosion has been an area of interest since the last several decades. Superhydrophobic surfaces that combine hydrophobic coatings along with surface texture have been shown to improve corrosion resistance by creating voids filled with air that minimize the contact area between the corrosive liquid and the solid surface. However, these air voids can incorporate corrosive liquids over time, and any mechanical faults such as cracks can compromise the coating and provide pathways for corrosion. As such, there is a need for self-healing corrosion-resistance surfaces. In this work, the anti-corrosion properties of textured surfaces impregnated with a lubricant have been systematically studied. Since corrosion resistance depends on the area and physico-chemical properties of the material exposed to the corrosive medium, lubricant-impregnated surfaces (LIS) have been designed based on the surface tension, viscosity and chemistry of the lubricant and its spreading coefficient on the solid. All corrosion experiments were performed in a standard three-electrode cell using iron, which readily corrodes in a 3.5% sodium chloride solution. In order to obtain textured iron surfaces, thin films (~500 nm) of iron were sputter-coated on silicon wafers textured using photolithography, and subsequently impregnated with lubricants. Results show that the corrosion rate on LIS is greatly reduced, and offers an over hundred-fold improvement in corrosion protection. Furthermore, it is found that the spreading characteristics of the lubricant are significant in ensuring corrosion protection: a spreading lubricant (e.g., Krytox 1506) that covers both inside the texture, as well as the top of the texture, provides a two-fold improvement in corrosion protection as compared to a non-spreading lubricant (e.g., Silicone oil) that does not cover texture tops. To enhance corrosion protection of surfaces coated with a non-spreading lubricant, pyramid-shaped textures have been developed that minimize exposure to the corrosive solution, and a consequent twenty-fold increased in corrosion protection is observed. An increase in viscosity of the lubricant scales with greater corrosion protection. Finally, an equivalent cell-circuit model is developed for the lubricant-impregnated systems using electrochemical impedance spectroscopy. Lubricant-impregnated surfaces find attractive applications in harsh corrosive environments, especially where the ability to self-heal is advantageous.

Keywords: lubricant-impregnated surfaces, self-healing surfaces, wettability, nano-engineered surfaces

Procedia PDF Downloads 111
2322 Advanced Textiles for Soldier Clothes Based on Coordination Polymers

Authors: Hossam E. Emam

Abstract:

The functional textiles development history in the military field could be ascribed as a uniquely interesting research topic. Soldiers are like a high-performance athletes, where monitoring their physical and physiological capabilities is a vital requirement. Functional clothes represent a “second skin” that has a close, “intimate” relationship with the human body. For the application of textiles in military purposes, which is normally required in difficult weather and environmental conditions, several functions are required. The requirements for designing functional military textiles for soldier's protection can be categorized into three categories; i) battle field (protection from chemical warfare agents, flames, and thermal radiation), ii) environmental (water proof, air permeable, UV-protection, antibacterial), iii) physiological (minimize heat stress, low weight, insulative, durability). All of these requirements are important, but the means to fulfill these requirements are not simple and straight forward. Additionally, the combination of more than one function is reported to be very expensive and requires many complicated steps, and the final product is found to be low durability. Not only do all of these requirements are overlapping, but they are also contradicting each other at various levels. Thus, we plan to produce multi-functional textiles (e.g., anti-microbial, UV-protection, fire retardant, photoluminescent) to be applied in military clothes. The current project aims to use quite a simple and applicable technique through the modification of textiles with different coordination polymers and functionalized coordination polymers.

Keywords: functional textiles, military clothes, coordination polymers, antimicrobial, fire retardant, photolumenscent

Procedia PDF Downloads 159
2321 Comparative Study of Flood Plain Protection Zone Determination Methodologies in Colombia, Spain and Canada

Authors: P. Chang, C. Lopez, C. Burbano

Abstract:

Flood protection zones are riparian buffers that are formed to manage and mitigate the impact of flooding, and in turn, protect local populations. The purpose of this study was to evaluate the Guía Técnica de Criterios para el Acotamiento de las Rondas Hídricas in Colombia against international regulations in Canada and Spain, in order to determine its limitations and contribute to its improvement. The need to establish a specific corridor that allows for the dynamic development of a river is clear; however, limitations present in the Colombian Technical Guide are identified. The study shows that international regulations provide similar concepts as used in Colombia, but additionally integrate aspects such as regionalization that allows for a better characterization of the channel way, and incorporate the frequency of flooding and its probability of occurrence in the concept of risk when determining the protection zone. The case study analyzed in Dosquebradas - Risaralda aimed at comparing the application of the different standards through hydraulic modeling. It highlights that the current Colombian standard does not offer sufficient details in its implementation phase, which leads to a false sense of security related to inaccuracy and lack of data. Furthermore, the study demonstrates how the Colombian norm is ill-adapted to the conditions of Dosquebradas typical of the Andes region, both in the social and hydraulic aspects, and does not reduce the risk, nor does it improve the protection of the population. Our study considers it pertinent to include risk estimation as an integral part of the methodology when establishing protect flood zone, considering the particularity of water systems, as they are characterized by an heterogeneous natural dynamic behavior.

Keywords: environmental corridor, flood zone determination, hydraulic domain, legislation flood protection zone

Procedia PDF Downloads 89
2320 Cultural Identity in Environmental Protection Areas of Nova Friburgo: Heritage, Tourism, and Traditions

Authors: Camila Dazzi, Crisitiane Passos de Mattos, Thiago Leite

Abstract:

The paper discusses the cultural identity of the communities located in Environmental Protection Area (APAs), in the mountainous region of Rio de Janeiro, constituted almost entirely by descendants of Swiss immigrants who arrived in Brazil in the nineteenth century. The communication is the result of an extension project named "Cultural Identity in Environmental Protection Areas of Nova Friburgo." The objectives of this project were framed in the identification of local history, cultural demonstrations, crafts, religious events, festivals, the "know-how" and traditions. While an extension project, developed by students and teachers of a Bachelor of Tourism Management program, the work provided a more practical action: awareness the communities that inhabit the APAs on the possible implementation of the cultural community-based tourism, a sustainable alternative for economic development, involving local people as propagators of local culture, and tourism as a way of valuing and safeguarding of Intangible Heritage.

Keywords: tourism and cultural heritage, tourism and cultural impacts, tourism and cultural change, cultural identity

Procedia PDF Downloads 510
2319 Protection of Human Rights in Polish Centres for Foreigners – in the Context of the European Human Rights System

Authors: Oktawia Braniewicz

Abstract:

The phenomenon of emigration and migration increasingly affects Poland's borders as well. For this reason, it is necessary to examine the level of protection of Human Rights in Polish Centres for Foreigners. The field study covered 11 centers for Foreigners in the provinces Kujawsko-Pomorskie Region, Lubelskie Region, Lodzkie Region, Mazowieckie Region and Podlaskie Region. Photographic documentation of living and social conditions, conversations with center employees and refugees allow to show a comprehensive picture of the situation prevailing in Centres for Foreigners. The object of reflection will be, in particular, the standards resulting from art. 8 and 13 of the Convention for the Protection of Human Rights and Fundamental Freedoms and article 2 of Protocol No. 1 to the Convention for the Protection of Human Rights and Fundamental Freedoms. The degree of realization of the right to education and the right to respect for family and private life will be shown. Issues related to learning the Polish language, access to a professional translator and psychological help will also be approximated. Learning Polish is not obligatory, which causes problems with assimilation and integration with other members of the new community. In centers for foreigners, there are no translators - a translator from an external company is rented if necessary. The waiting time for an interpreter makes the refugees feel anxious, unable to communicate with the employees of the centers (this is a situation in which the refugees do not know either English, Polish or Russian). Psychologist's help is available on designated days of the week. There is no separate specialist in child psychology, which is a serious problem.

Keywords: human rights, Polish centres, foreigners, fundamental freedoms

Procedia PDF Downloads 108
2318 Protection of the Object of the Critical Infrastructure in the Czech Republic

Authors: Michaela Vašková

Abstract:

With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.

Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit

Procedia PDF Downloads 315
2317 Adapting Liability in the Era of Automated Decision-Making: A South African Labour Law Perspective

Authors: Aisha Adam

Abstract:

This study critically examines the transformative impact of automated decision-making (ADM) and artificial intelligence (AI) systems on South African labour law. As AI technologies increasingly infiltrate workplaces, existing liability frameworks face challenges in addressing the unique complexities presented by these innovations. This article explores the necessity of redefining liability to accommodate the nuanced landscape of ADM and AI within South African labour law. It emphasises the importance of ensuring responsible deployment and safeguarding the rights of workers amid evolving technological dynamics. This research investigates the central concern of fairness, bias, and discrimination in ADM and AI decision-making. Focusing on algorithmic bias and discriminatory outcomes, the paper advocates for the integration of mechanisms within the South African legal framework, particularly under the Promotion of Equality and Prevention of Unfair Discrimination Act (PEPUDA) and the Employment Equity Act (EEA). The study scrutinises the shifting dynamics of the employment relationship, calling for clear guidelines on the responsibilities and liabilities of employers, employees, and technology providers. Furthermore, the article analyses legal and policy responses to ADM and AI within South African labour law, exploring potential amendments to legislation, guidelines, and codes of practice. It assesses the role of regulatory bodies, specifically the Commission for Conciliation, Mediation, and Arbitration (CCMA), in overseeing and enforcing responsible practices in the workplace. Lastly, the research evaluates the impact of ADM and AI on human and social rights in the South African context. Emphasising the protection of constitutional rights, including fair labour practices, privacy, and equality, the study proposes remedies and safeguards. It advocates for a multidisciplinary approach involving legal, technological, and ethical considerations to redefine liability in South African labour law effectively. The article contends that a shift from accountability to responsibility is crucial for promoting fairness, antidiscrimination, and the protection of human and social rights in the age of automated decision-making. It calls for collaborative efforts among stakeholders to shape responsible practices and redefine liability in this evolving technological landscape.

Keywords: automated decision-making, artificial intelligence, labour law, vicarious liability

Procedia PDF Downloads 46
2316 Design and Optimization Fire Alarm System to Protect Gas Condensate Reservoirs With the Use of Nano-Technology

Authors: Hefzollah Mohammadian, Ensieh Hajeb, Mohamad Baqer Heidari

Abstract:

In this paper, for the protection and safety of tanks gases (flammable materials) and also due to the considerable economic value of the reservoir, the new system for the protection, the conservation and fire fighting has been cloned. The system consists of several parts: the Sensors to detect heat and fire with Nanotechnology (nano sensor), Barrier for isolation and protection from a range of two electronic zones, analyzer for detection and locating point of fire accurately, Main electronic board to announce fire, Fault diagnosis in different locations, such as relevant alarms and activate different devices for fire distinguish and announcement. An important feature of this system, high speed and capability of fire detection system in a way that is able to detect the value of the ambient temperature that can be adjusted. Another advantage of this system is autonomous and does not require human operator in place. Using nanotechnology, in addition to speeding up the work, reduces the cost of construction of the sensor and also the notification system and fire extinguish.

Keywords: analyser, barrier, heat resistance, general fault, general alarm, nano sensor

Procedia PDF Downloads 428
2315 Public-Private Partnership for Better Protection of Trafficked Victims in Thailand: Case Study on Public Protection and Welfare Center in Cooperation with Jim Thompson Foundation in Occupational Development on Silk Sewing and Tailoring

Authors: Aungkana Kmonpetch

Abstract:

Protection of trafficked victims and partnership among stakeholders are established as core principles in 5P’ strategies in international and national anti-human trafficking policies. In this article, it is of interest to discuss how the role of public-private partnerships in promoting the occupation development for employment in wage will enhance the better protection for victims of trafficking who affirmatively decide they want a criminal justice intervention, using Thailand as a case. Most of the victims who have accepted to be witness in the criminal justice system have lost income during their absence from work. The analysis of Thailand case is based on two methodological approaches: 1) interview with victims of trafficking, protection authorities, service providers, trainers and teachers, social workers, NGOs, police, prosecutors, business owners and enterprises, ILO, UNDP etc.; 2) create collaborative effort through workshops/consultation meetings in participation of all stakeholders – governmental agencies, private organizations, UN and international agencies. The linking of protection and partnership is anchored in international conventions and human trafficking directives. While this is actually framed as a responsive advantage for 5P strategies of anti-human trafficking – prevention, protection, persecution, punishment, and partnership, in reality, there might have more practical requirements of care and support. The article addresses how the partnership between governmental agencies and private organizations provide opportunities for trafficked victims to engage in high-skilled occupational development such as Silk-Sewing and Tailoring. The discussion is also focused how this approach of capacity building of the trainer for trainee, be enable the trafficked victims to cultivate the practices of high-skilled training to engage them into the business of social enterprise with employment in wage. The partnership coordination draws specifically to two aspects: firstly, to formulate appropriate assistance for promotion and protection of human rights of the trafficked victims in response to the 5P’ strategies of anti-human trafficking policy; secondly, to empower them to settle some economic stability for livelihood opportunity in the country of origin on their return and reintegration. Therefore, they can define how they want to move forward to prevent them at risk of vulnerable situations where they might being trafficked again or going on to work in exploitative conditions. It strengthens proper access to protection and assistance, depending on how the incentive of protection for cooperation is perceived to be and how useful the capacity building in occupation development for employment in wage will be implemented practically both in the host country and in the country of origin. This also brings into question how the victim of trafficking are able to access to the trade of market and are supported the employment opportunity according to the concept of decent work as they are constituted as witnesses. We discuss these issues in the area of a broader literature on social protection, economic security, gender, law, and victimhood.

Keywords: employment opportunity, occupation development, protection for victim of trafficking, public-private partnership

Procedia PDF Downloads 201
2314 Ethically Integrating Robots to Assist Elders and Patients with Dementia

Authors: Suresh Lokiah

Abstract:

The emerging trend of integrating robots into elderly care, particularly for assisting patients with dementia, holds the potential to greatly transform the sector. Assisted living facilities, which house a significant number of elderly individuals and dementia patients, constantly strive to engage their residents in stimulating activities. However, due to staffing shortages, they often rely on volunteers to introduce new activities. Despite the availability of social interaction, these residents, frequently overlooked in society, are in desperate need of additional support. Robots designed for elder care are categorized based on their design and functionality. These categories include companion robots, telepresence robots, health monitoring robots, and rehab robots. However, the integration of such robots raises significant ethical concerns, notably regarding privacy, autonomy, and the risk of dehumanization. Privacy issues arise as these robots may need to continually monitor patient activities. There is also a risk of patients becoming overly dependent on these robots, potentially undermining their autonomy. Furthermore, the replacement of human touch with robotic interaction may lead to the dehumanization of care. This paper delves into the ethical considerations of incorporating robotic assistance in eldercare. It proposes a series of guidelines and strategies to ensure the ethical deployment of these robots. These guidelines suggest involving patients in the design and development process of the robots and emphasize the critical need for human oversight to respect the dignity and rights of the elderly and dementia patients. The paper also recommends implementing robust privacy measures, including secure data transmission and data anonymization. In conclusion, this paper offers a thorough examination of the ethical implications of using robotic assistance in elder care. It provides a strategic roadmap to ensure this technology is utilized ethically, thereby maximizing its potential benefits and minimizing any potential harm.

Keywords: human-robot interaction, robots for eldercare, ethics, health, dementia

Procedia PDF Downloads 46
2313 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 127
2312 Ethical, Legal and Societal Aspects of Unmanned Aircraft in Defence

Authors: Henning Lahmann, Benjamyn I. Scott, Bart Custers

Abstract:

Suboptimal adoption of AI in defence organisations carries risks for the protection of the freedom, safety, and security of society. Despite the vast opportunities that defence AI-technology presents, there are also a variety of ethical, legal, and societal concerns. To ensure the successful use of AI technology by the military, ethical, legal, and societal aspects (ELSA) need to be considered, and their concerns continuously addressed at all levels. This includes ELSA considerations during the design, manufacturing and maintenance of AI-based systems, as well as its utilisation via appropriate military doctrine and training. This raises the question how defence organisations can remain strategically competitive and at the edge of military innovation, while respecting the values of its citizens. This paper will explain the set-up and share preliminary results of a 4-year research project commissioned by the National Research Council in the Netherlands on the ethical, legal, and societal aspects of AI in defence. The project plans to develop a future-proof, independent, and consultative ecosystem for the responsible use of AI in the defence domain. In order to achieve this, the lab shall devise a context-dependent methodology that focuses on the ‘analysis’, ‘design’ and ‘evaluation’ of ELSA of AI-based applications within the military context, which include inter alia unmanned aircraft. This is bolstered as the Lab also recognises and complements the existing methods in regards to human-machine teaming, explainable algorithms, and value-sensitive design. Such methods will be modified for the military context and applied to pertinent case-studies. These case-studies include, among others, the application of autonomous robots (incl. semi- autonomous) and AI-based methods against cognitive warfare. As the perception of the application of AI in the military context, by both society and defence personnel, is important, the Lab will study how these perceptions evolve and vary in different contexts. Furthermore, the Lab will monitor – as they may influence people’s perception – developments in the global technological, military and societal spheres. Although the emphasis of the research project is on different forms of AI in defence, it focuses on several case studies. One of these case studies is on unmanned aircraft, which will also be the focus of the paper. Hence, ethical, legal, and societal aspects of unmanned aircraft in the defence domain will be discussed in detail, including but not limited to privacy issues. Typical other issues concern security (for people, objects, data or other aircraft), privacy (sensitive data, hindrance, annoyance, data collection, function creep), chilling effects, PlayStation mentality, and PTSD.

Keywords: autonomous weapon systems, unmanned aircraft, human-machine teaming, meaningful human control, value-sensitive design

Procedia PDF Downloads 72
2311 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)

Authors: Tewelde Gebresslase Haile, S. P. Singh

Abstract:

To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.

Keywords: social protection, livelihood assets, social vulnerability, public policy SVI

Procedia PDF Downloads 49
2310 Integrating a Universal Forensic DNA Database: Anticipated Deterrent Effects

Authors: Karen Fang

Abstract:

Investigative genetic genealogy has attracted much interest in both the field of ethics and the public eye due to its global application in criminal cases. Arguments have been made regarding privacy and informed consent, especially with law enforcement using consumer genetic testing results to convict individuals. In the case of public interest, DNA databases have the strong potential to significantly reduce crime, which in turn leads to safer communities and better futures. With the advancement of genetic technologies, the integration of a universal forensic DNA database in violent crimes, crimes against children, and missing person cases is expected to deter crime while protecting one’s privacy. Rather than collecting whole genomes from the whole population, STR profiles can be used to identify unrelated individuals without compromising personal information such as physical appearance, disease risk, and geographical origin, and additionally, reduce cost and storage space. STR DNA profiling is already used in the forensic science field and going a step further benefits several areas, including the reduction in recidivism, improved criminal court case turnaround time, and just punishment. Furthermore, adding individuals to the database as early as possible prevents young offenders and first-time offenders from participating in criminal activity. It is important to highlight that DNA databases should be inclusive and tightly governed, and the misconception on the use of DNA based on crime television series and other media sources should be addressed. Nonetheless, deterrent effects have been observed in countries like the US and Denmark with DNA databases that consist of serious violent offenders. Fewer crimes were reported, and fewer people were convicted of those crimes- a favorable outcome, not even the death penalty could provide. Currently, there is no better alternative than a universal forensic DNA database made up of STR profiles. It can open doors for investigative genetic genealogy and fostering better communities. Expanding the appropriate use of DNA databases is ethically acceptable and positively impacts the public.

Keywords: bioethics, deterrent effects, DNA database, investigative genetic genealogy, privacy, public interest

Procedia PDF Downloads 129
2309 Public and Private Spaces Producing Social Connectedness in Traditional Environment: A Study on Old Medina District of Casablanca

Authors: Asmaa Sokrat, Aykut Karaman

Abstract:

Public and private spaces are major components of the morphology of the city. This research aims to study the interactions between public and private domains in terms of urban space in Casablanca. The research focuses on a general vision of a socio-spatial issue. It plans to identify the public, private, and transition (semi-public, semi-private) spaces as the constituent of the urban space. Moreover, the study investigates the link between public and private spaces with the social dimensions. Additionally, the research argues that the public space is a place of social interaction; as a reflection, this interaction is the intersection between urban space and social connectedness. Besides, social interaction can be the key to distinguishing between the public and private spheres. The methodological approach of the research is based on the literature review and field study. The article is targeting a case study on the old Medina of Casablanca, from daily use of the public and private spaces, the urban tissue, and the urban space types. In conclusion, the research exhibits that a public space could influence the privacy of the residents of a local urban area; thus, this privacy is inverted on the social interaction. This social interaction is the link between the urban space and social connectedness. Hence, this equation affects the typology of the private space.

Keywords: public sphere, private sphere, social connectedness, old Medina of Casablanca

Procedia PDF Downloads 107
2308 Qualitative Inquiry for Understanding Factors Associated to Intergenerational Transmission of Child Maltreatment

Authors: Marie-Claude Richard, Amelie Bolduc-Mokhtar, Mathieu Parent

Abstract:

People who have experienced maltreatment in childhood subsequently face many parenting issues of their own, in particular when it comes to distancing themselves from the abusive behaviors they were exposed and had access to positive role models. Few studies have explored the factors explaining the ability to break the generational cycle of child maltreatment. However, deeper knowledge of the factors associated with intergenerational discontinuity could facilitate the development of innovative interventions and increase the preventive potential of existing programs. This poster presentation will be about a better understanding of the intergenerational transmission of maltreatment (IGTM) from the perspective of both youth protection workers and parents receiving child protection services. The data used to meet this goal were collected from a group interview with eight youth protection workers whose caseloads involved IGTM situations and through semi-structured interviews with four parents with a history of child protection services and who were currently receiving such services for at least one of their children. In the view of the youth protection workers, the IGTM refers to everything that is transmitted and not transmitted from one generation to the next within a family. The study participants painted quite a bleak portrait of the families affected by IGTM. However, three main avenues of intervention were mentioned by the participants: working within the network, favoring long-term interventions and being empathic. The results also show that the mothers were in a trajectory of intergenerational discontinuity in child maltreatment. Support from their families and friends as well as from formal support services brought out some possible explanatory factors for intergenerational discontinuity in child maltreatment. From a prevention perspective, developing meaningful and trusting relationships seems a source of resilience for parents who were placed in the care of the child protection system as children. The small number of participants limits the generalizability of these results. The difficulty of recruiting parents is a substantial challenge regarding gaining knowledge on the intergenerational transmission of child maltreatment. Future studies should examine this question and seek to develop effective strategies to help recruit study participants.

Keywords: child maltreatment, intergenerational transmission, prevention, qualitative data

Procedia PDF Downloads 168
2307 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 15
2306 Optimal Protection Coordination in Distribution Systems with Distributed Generations

Authors: Abdorreza Rabiee, Shahla Mohammad Hoseini Mirzaei

Abstract:

The advantages of distributed generations (DGs) based on renewable energy sources (RESs) leads to high penetration level of DGs in distribution network. With incorporation of DGs in distribution systems, the system reliability and security, as well as voltage profile, is improved. However, the protection of such systems is still challenging. In this paper, at first, the related papers are reviewed and then a practical scheme is proposed for coordination of OCRs in distribution system with DGs. The coordination problem is formulated as a nonlinear programming (NLP) optimization problem with the object function of minimizing total operating time of OCRs. The proposed method is studied based on a simple test system. The optimization problem is solved by General Algebraic Modeling System (GAMS) to calculate the optimal time dial setting (TDS) and also pickup current setting of OCRs. The results show the effectiveness of the proposed method and its applicability.

Keywords: distributed generation, DG, distribution network, over current relay, OCR, protection coordination, pickup current, time dial setting, TDS

Procedia PDF Downloads 107
2305 Overtopping Protection Systems for Overflow Earth Dams

Authors: Omid Pourabdollah, Mohsen Misaghian

Abstract:

Overtopping is known as one the most important reasons for the failure of earth dams. In some cases, it has resulted in heavy damages and losses. Therefore, enhancing the safety of earth dams against overtopping has received much attention in the past four decades. In this paper, at first, the overtopping phenomena and its destructive consequences will be introduced. Then, overtopping failure mechanism of embankments will be described. Finally, different types of protection systems for stabilization of earth dams against overtopping will be presented. These include timber cribs, riprap and gabions, reinforced earth, roller compacted concrete, and the precast concrete blocks.

Keywords: embankment dam, overtopping, roller compacted concrete, wedge concrete block

Procedia PDF Downloads 128
2304 The Impact of Non State Actor’s to Protect Refugees in Kurdistan Region of Iraq

Authors: Rozh Abdulrahman Kareem

Abstract:

The displacement of individuals has become a common interest for international players. Mostly occurs in Islamic states, as religion is considered the most common cause of this form of displacement. Therefore, this thesis aims to depict the reality of the situations of the refugees, particularly in KRI, illustrating how they are treated and protected and if the treatment merits the protection clause as envisaged in the 1951 Refugee Convention. Overall, the aim is to touch on the issue of protection by non-governmental organizations and government towards the refugees here. In light of this, it focused on the adequate protection of refugees in relation to the refugee law. In the Middle East, including Iraq, there have been multiple reports on violations of these refugee laws and human rights. Protection involves providing physical security to the concerned parties, functional administration with legal structures, and infrastructural setup that could help citizens exercise rights. The KRI has provided the refugees with various benefits, including education, access to residency, and employment. It also provided transitionary in various social dimensions like gender-based violence. The Convention on Status of Refugees 1951 tried to resolve this problem, whereby the principle of ‘nonrefoulement’ under Article 33 was passed. The ‘nonrefoulement’, an exceptional reference, was enacted to protect refugees from forcible return to their countries of the original. However, the convention never addressed an unusual scenario regarding the application of this principle, ‘Extradition Treaties.’ Even though some scholarly article exists regarding the problems of refugees, the topic of interplay between Nonrefoulement and Extradition Treaties has never been explained in detail in the available books on refugee laws and practices. Each year, millions of refugees seek protection from foreign countries for fear of being tortured, victimized, or executed. People seeking international protection are susceptible and insecure. The main objective of the prevention is to provide security to citizens susceptible to inhuman treatment, distress, oppression, or other human rights defilements when they arrive back in their own countries. The refugee situation may get worse in the near future. Just like several nations within the Middle East, Iraq is not a signatory to the globally acknowledged legal structure for the protection of refugees. The first law of 1971 in Iraq was issued only for military or political causes. This law also establishes benefits such as the right to education and health services and the right to acquire employment just as the Iraqi nationals. The other legislative instrument is the 21st law from the ministry of migration of Iraq widened the description of an immigrant to incorporate the definition from the refugee resolution. Nonetheless, there is a lack of overall consistency in the protection provided under these legislations regarding rights and entitlement. A Memorandum of Understanding was signed in October 2016 by the UNHCR and the Iraq government to develop the protection of refugees. Under the term of this MoU, the Iraqi Government is obligated to provide identity documents to asylum seekers beside that UNHCR provides more guidance.

Keywords: law, refugee, protection, Kurdistan

Procedia PDF Downloads 48
2303 Delimitation of the Perimeters of PR Otection of the Wellfield in the City of Adrar, Sahara of Algeria through the Used Wyssling’s Method

Authors: Ferhati Ahmed, Fillali Ahmed, Oulhadj Younsi

Abstract:

delimitation of the perimeters of protection in the catchment area of the city of Adrar, which are established around the sites for the collection of water intended for human consumption of drinking water, with the objective of ensuring the preservation and reducing the risks of point and accidental pollution of the resource (Continental Intercalar groundwater of the Northern Sahara of Algeria). This wellfield is located in the northeast of the city of Adrar, it covers an area of 132.56 km2 with 21 Drinking Water Supply wells (DWS), pumping a total flow of approximately 13 Hm3/year. The choice of this wellfield is based on the favorable hydrodynamic characteristics and their location in relation to the agglomeration. The vulnerability to pollution of this slick is very high because the slick is free and suffers from the absence of a protective layer. In recent years, several factors have been introduced around the field that can affect the quality of this precious resource, including the presence of a strong centre for domestic waste and agricultural and industrial activities. Thus, its sustainability requires the implementation of protection perimeters. The objective of this study is to set up three protection perimeters: immediate, close and remote. The application of the Wyssling method makes it possible to calculate the transfer time (t) of a drop of groundwater located at any point in the aquifer up to the abstraction and thus to define isochrones which in turn delimit each type of perimeter, 40 days for the nearer and 100 days for the farther away. Special restrictions are imposed for all activities depending on the distance of the catchment. The application of this method to the Adrar city catchment field showed that the close and remote protection perimeters successively occupy areas of 51.14 km2 and 92.9 km2. Perimeters are delimited by geolocated markers, 40 and 46 markers successively. These results show that the areas defined as "near protection perimeter" are free from activities likely to present a risk to the quality of the water used. On the other hand, on the areas defined as "remote protection perimeter," there is some agricultural and industrial activities that may present an imminent risk. A rigorous control of these activities and the restriction of the type of products applied in industrial and agricultural is imperative.

Keywords: continental intercalaire, drinking water supply, groundwater, perimeter of protection, wyssling method

Procedia PDF Downloads 73
2302 Analyzing the Prospects and Challenges in Implementing the Legal Framework for Competition Regulation in Nigeria

Authors: Oluchukwu P. Obioma, Amarachi R. Dike

Abstract:

Competition law promotes market competition by regulating anti-competitive conduct by undertakings. There is a need for a third party to regulate the market for efficiency and supervision, since, if the market is left unchecked, it may be skewed against the consumers and the economy. Competition law is geared towards the protection of consumers from economic exploitation. It is the duty of every rational government to optimally manage its economic system by employing the best regulatory practices over the market to ensure it functions effectively and efficiently. The Nigerian government has done this by enacting the Federal Competition and Consumer Protection Act, 2018 (FCCPA). This is a comprehensive legal framework with the objective of governing competition issues in Nigeria. Prior to its enactment, the competition law regime in Nigeria was grossly inadequate despite Nigeria being the biggest economy in Africa. This latest legislation has become a bold step in the right direction. This study will use the doctrinal methodology in analyzing the FCCPA, 2018 in order to discover the extent to which the Act will guard against anti-competitive practices and promote competitive markets for the benefit of the Nigerian economy and consumers. The study finds that although the FCCPA, 2018 provides for the regulation of competition in Nigeria, there is a need to effectively tackle the challenges to the implementation of the Act and the development of anti-trust jurisprudence in Nigeria. This study concludes that incisive implementation of competition law in Nigeria will help protect consumers and create a conducive environment for economic growth, development, and protection of consumers from obnoxious competition practices.

Keywords: anti-competitive practices, competition law, competition regulation, consumer protection.

Procedia PDF Downloads 145