Search results for: protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2268

Search results for: protection

2148 Study on the Protection and Transformation of Stone House Building in Shitang Town, Wenling, Zhejiang

Authors: Zhang Jiafeng

Abstract:

Stone houses, represented by Shitang town, Wenling town, Taizhou city, are very precious cultural relics in Zhejiang province and even in the whole country. The coastal residences in eastern Zhejiang with distinctive regional characteristics are completely different from the traditional residential styles in the inland areas of Zhejiang. However, with the aggravation of the conflict between the use function of traditional stone houses and the modern lifestyle, and the lack of effective protection, stone houses are disappearing in large numbers. Therefore, it is very important to protect and inherit the stone house building, and make effective and feasible development strategies. This paper will analyze the formation background, location selection, plane layout, architectural form, spatial organization, material application, and construction technology of the stone houses through literature research and field investigation. In addition, a series of feasibility studies are carried out on the protection and renovation of stone houses. The ultimate purpose is to attract people's attention and provide some reference for the protection, inheritance, development, and utilization of traditional houses in coastal areas.

Keywords: regional, stone house building, traditional houses, Wenling Shitang

Procedia PDF Downloads 114
2147 The Implications of Instrumental Animal Protection for the Legal and Moral Status of Animals

Authors: Ankita Shanker, Angus Nurse

Abstract:

The notion of animal rights is an emerging trend in various spaces, including judicial and societal discourse. But one of the key purposes of recognizing the fundamental rights of anyone is their de-objectification. Animals are a prime example of a group that has rights that are neither recognized nor protected in any meaningful way, and anything that purports differently fails to ameliorate this because it still objectifies animals. Animals are currently treated by law and society as commodities with primarily (though not exclusively) instrumental value to some other rights-holder, such as humans or nature. So most protections that are afforded to them are done so in furtherance of the interests that they allegedly further, be it social morality or environmental protection. Animal rights are thus often seen as an application or extension of the rights of humans or, more commonly, the rights of nature. What this means is that animal rights are not always protected or even recognized in their own regard, but as stemming from some other reason, or worse, instrumentally as means to some other ends. This has two identifiable effects from a legal perspective: animal rights are not seen as inherently justified and are not seen as inherently valuable. Which in turn means that there can be no fundamental protection of animal rights. In other words, judicial protection does not always entail protection of animal ‘rights’ qua animal rights, which is needed for any meaningful protections to be afforded to animals. But the effects of this legal paradigm do not end at the legal status of animals. Because this status, in turn, affects how persons and the societies of which they form part see animals as a part of the rights of others, such as humans or nature, or as valuable only insofar as they further these rights, as opposed to as individuals with inherent worth and value deserving of protection regardless of their instrumental usefulness to these other objectives. This does nothing to truly de-objectify animals. Because even though most people would agree that animals are not objects, they continue to treat them as such wherever it serves them. For individuals and society to resolve, this inconsistency between stance and actions is for them to believe that animals are more than objects on a psychological and societal level. In this paper, we examine the implications of this perception of animals and their rights on the legal protections afforded to them and on the minds of individuals and civil society. We also argue that a change in the legal and societal status of animals can be brought about only through judicial, psychological, and sociological acknowledgment that animals have inherent value and deserve protection on this basis. Animal rights derived in such a way would not need to place reliance on other justifications and would not be subject to subjugation to other rights should a conflict arise.

Keywords: animal rights law, animal protection laws, psycho-socio-legal studies, animal rights, human rights, rights of nature

Procedia PDF Downloads 55
2146 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda

Authors: Seember Susan Aondoakura

Abstract:

This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.

Keywords: conflict, protection, security, SGBV

Procedia PDF Downloads 59
2145 A Light in the Road of Protection of Civilians: Responsibility to Protect

Authors: Zeynep Selin Acar

Abstract:

In the world of wars, it is aimed to find ways to protect civilians propound by political elites. Current threats may come from edges of the security concerns, meaning uncontrollable terrorist groups, unanticipated government-supported armed groups or separatists, and unimaginable merge of the previous with foreign supports or oppositions of which could flow into all groups– flaws of international state system. These threats resulted in transformation of inter-state system into a world system with distinctive actors and brought along the changes in strategic plans of political and military bodies, as well as adaptations of principles framing the strategies in terms of may-be-applicable international law constrained by ethical considerations. This paper aims to analyse the Responsibility to Protect (RtoP), being one of those, with its criteria aiming to regulate military interventions taking the protection of civilians both as the reason for intervention, jus ad bellum or right to war, and as the duties during the intervention, jus in bello or how to conduct the war. In addition it will discuss the rise of its bindingness in terms of Responsibility Not to Veto (RNtoV), Franco/Mexican Political Declaration opened in signature for UN member states on September 2015.

Keywords: civilian protection, protection as responsibility, responsibility to protect, responsibility not to veto

Procedia PDF Downloads 229
2144 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 225
2143 Acetalization of Carbonyl Compounds by Using Al2 (HPO4)3 under Green Condition Mg HPO4

Authors: Fariba Jafari, Samaneh Heydarian

Abstract:

Al2(HPO4)3 was easily prepared and used as a solid acid in acetalization of carbonyl compounds at room temperature and under solvent-free conditions. The protection was done in short reaction times and in good to high isolated yields. The cheapness and availability of this reagent with easy procedure and work-up make this method attractive for the organic synthesis.

Keywords: acetalization, acid catalysis, carbonylcompounds, green condition, protection

Procedia PDF Downloads 287
2142 The Implementation of Anti-Circumvention Legislations in Thai Copyright System

Authors: Chuencheewin Yimfuang

Abstract:

The WIPO copyright treaty (WCT) was established by the World Intellectual Property Organisation (WIPO). This agreement required the contracting nations to provide adequate protection to technological measures to prevent massive copyright infringement in the internet system. Thailand had to implement the anti-circumvention rules into domestic legislation to comply with this international obligation. The purpose of this paper is to critically discuss the legislative standard under the WCT. It also aims to examine the legal development of technological protection measures in Thailand and demonstrate that the scope of prohibitions under the copyright Act 2022 (NO.5) is similar to the Digital Millennium Copyright Act 1998 (DMCA) of the United States (US). It could be found that the anti-circumvention laws of Thailand prohibit the circumvention of access-control technologies, and the regulation on trafficking circumvention devices has been added to the latest version of the Thai Copyright Act. These legislative evolutions have revealed the attempt to reinforce the legal protection of technological measures and copyright holders in order to be in line with global practices. However, the amendment has problems concerning the legal definitions of effective technological measure and the prohibited act of circumvention. The vagueness might affect the scope of protection and the boundary of prohibition. With this aspect, the DMCA will be evaluated and compared to gain guidelines for interpretation and enforcement in Thailand. The lessons and experiences learned from this study might be useful to correct the flaws or at least clarify the ambiguities embodied in Thai copyright legislation.

Keywords: legal development, technological protection measure, circumvention, Thailand

Procedia PDF Downloads 57
2141 Corrosion Protection of Steel 316 by Electrochemically Synthesized Conductive Poly (O-Toluidine)

Authors: H. Acar, M. Karakışla, L. Aksu, M. Saçak

Abstract:

The corrosion protection effect of poly(o-toluidine) (POT) coated on steel 316 electrode was determined in corrosive media such as NaCl, H2SO4 and HCl with the use of Tafel curves and electrochemical impedance spectroscopy techniques. The POT coatings were prepared with cyclic voltammetry technique in aqueous solution of oxalic acid and they were characterized by FTIR and UV-Visible absorption spectroscopy. The Tafel curves revealed that the POT coating provides the most effective protection compared to the bare steel 316 electrode in NaCl as corrosive medium. The results were evaluated based upon data decrease of corrosion current and shift to positive potentials with the increase of number of scans. Electrochemical impedance spectroscopy measurements were found to support Tafel data of POT coating.

Keywords: corrosion, impedance spectroscopy, steel 316, poly(o-toluidine)

Procedia PDF Downloads 275
2140 Privacy Protection Principles of Omnichannel Approach

Authors: Renata Mekovec, Dijana Peras, Ruben Picek

Abstract:

The advent of the Internet, mobile devices and social media is revolutionizing the experience of retail customers by linking multiple sources through various channels. Omnichannel retailing is a retailing that combines multiple channels to allow customers to seamlessly leverage all the distribution information online and offline while shopping. Therefore, today data are an asset more critical than ever for all organizations. Nonetheless, because of its heterogeneity through platforms, developers are currently facing difficulties in dealing with personal data. Considering the possibilities of omnichannel communication, this paper presents channel categorization that could enhance the customer experience of omnichannel center called hyper center. The purpose of this paper is fundamentally to describe the connection between the omnichannel hyper center and the customer, with particular attention to privacy protection. The first phase was finding the most appropriate channels of communication for hyper center. Consequently, a selection of widely used communication channels has been identified and analyzed with regard to the effect requirements for optimizing user experience. The evaluation criteria are divided into 3 groups: general, user profile and channel options. For each criterion the weight of importance for omnichannel communication was defined. The most important thing was to consider how the hyper center can make user identification while respecting the privacy protection requirements. The study carried out also shows what customer experience across digital networks would look like, based on an omnichannel approach owing to privacy protection principles.

Keywords: personal data, privacy protection, omnichannel communication, retail

Procedia PDF Downloads 106
2139 Broad Protection against Avian Influenza Virus by Using a Modified Vaccinia Ankara Virus Expressing a Mosaic Hemagglutinin

Authors: Attapon Kamlangdee, Brock Kingstad-Bakke, Tavis K. Anderson, Tony L. Goldberg, Jorge E. Osorio

Abstract:

A critical failure in our preparedness for an influenza pandemic is the lack of a universal vaccine. Influenza virus strains diverge by 1 to 2% per year, and commercially available vaccines often do not elicit protection from one year to the next, necessitating frequent formulation changes. This represents a major challenge to the development of a cross-protective vaccine that can protect against circulating viral antigenic diversity. We have constructed a recombinant modified vaccinia virus Ankara (MVA) that expresses an H5N1 mosaic hemagglutinin (H5M) (MVA-H5M). This mosaic was generated in silico using 2,145 field-sourced H5N1 isolates. A single dose of MVA-H5M provided 100% protection in mice against clade 0, 1, and 2 avian influenza viruses and also protected against seasonal H1N1 virus (A/Puerto Rico/8/34). It also provided short-term (10 days) and long-term (6 months) protection post vaccination. Both neutralizing antibodies and antigen-specific CD4+and CD8+ T cells were still detected at 5 months post vaccination, suggesting that MVA-H5M provides long-lasting immunity.

Keywords: modified vaccinia Ankara, MVA, H5N1, hemagglutinin, influenza vaccine

Procedia PDF Downloads 249
2138 Migration-Related Challenges during the Covid-19 Pandemic in South Africa. A Case of Alexandra Township

Authors: Edwin Mwasakidzeni Mutyenyoka

Abstract:

Without ignoring migration-related challenges in transit zones and places of origin, this inquiry focuses on arrived international immigrants’ exacerbated vulnerability during crises. The aim is to underline longstanding inequalities and demonstrate that crises merely amplify and exacerbate challenges that low-income migrants already face during ‘non-crises’ periods. Social protection, as an agenda for reducing vulnerability, poverty, and risk for low-income households, with regard to basic consumption and services, has been foregrounded in the post-apartheid development discourse in South Africa. Evidently, however, the state, through the South African Social Security Agency (SASSA), systemically excludes the majority of non-citizens from state-sponsored social assistance programs - often leaving them heavily dependent on sporadic non-state options and erosive coping mechanisms. In this paper, migration itself should not only be understood as a social protection strategy against poverty and risk but also as a source of vulnerability that often requires social protection. For quasi-ethnographic, it use one migrant destination, Alex Park Township, as a “contact zone” and space of negotiation during the pandemic.

Keywords: south-south migration, crises, social protection, Covid-19 pandemic

Procedia PDF Downloads 64
2137 Juridical Protection to Consumers in Electronic Contracts: Need of a Uniform International Law

Authors: Parul Sinha

Abstract:

Electronic commerce facilitates increased choice and information on goods or services for consumers but at the same time it compounds the inequality of bargaining power many consumers face when contracting with sellers. Due to the ‘inequality of bargaining power’ experienced by consumers when contracting by electronic means with business sellers in different jurisdictions, it may be difficult to determine where either the consumer is domiciled or the place where the seller is situated or conducts its business. The question arises in such situation that if one party wants to sue the other, then where can one sue? Which court has jurisdiction to try international conflicts arising from electronic contracts concluded through the internet? Will the same rules applicable to conventional contracts apply? Or should other considerations be taken into account? In all these situations the degree of consumer protection in electronic contracts comes into picture. In the light of the above, the paper discusses the jurisdiction and choice of law rules applied in EU and United States. Further, the paper considers the current uncertainty plaguing questions of jurisdiction in India. Therefore, the jurisdiction and choice of law rules for electronic contracts must be applied consistently and provide an automatic, harmonised rule in favour of the consumer’s jurisdiction and law. Lastly, the paper suggests the need for a uniform law in order to achieve effective juridical protection.

Keywords: electronic commerce, electronic contracts, jurisdiction, consumer protection

Procedia PDF Downloads 207
2136 Simulation of Hamming Coding and Decoding for Microcontroller Radiation Hardening

Authors: Rehab I. Abdul Rahman, Mazhar B. Tayel

Abstract:

This paper presents a method of hardening the 8051 microcontroller, that able to assure reliable operation in the presence of bit flips caused by radiation. Aiming at avoiding such faults in the 8051 microcontroller, Hamming code protection was used in its SRAM memory and registers. A VHDL code and its simulation have been used for this hamming code protection.

Keywords: radiation, hardening, bitflip, hamming

Procedia PDF Downloads 469
2135 Acid-Responsive Polymer Conjugates as a New Generation of Corrosion Protecting Materials

Authors: Naruphorn Dararatana, Farzad Seidi, Daniel Crespy

Abstract:

Protection of metals is a critical issue in industry. The annual cost of corrosion in the world is estimated to be about 2.5 trillion dollars and continuously increases. Therefore, there is a need for developing novel protection approaches to improve corrosion protection. We designed and synthesized smart polymer/corrosion inhibitor conjugates as new generations of corrosion protecting materials. Firstly, a polymerizable acrylate derivative of 8-hydroxyquinoline (8HQ), an effective corrosion inhibitor, containing acid-labile β-thiopropionate linkage was prepared in three steps. Then, it was copolymerized with ethyl acrylate in the presence of 1,1′-azobis(cyclohexanecarbonitrile) (ABCN) by radical polymerization. Nanoparticles with an average diameter of 140 nm were prepared from the polymer conjugate by the miniemulsion-solvent evaporation process. The release behavior of 8HQ from the the nanoparticles was studied in acidic (pH 3.5) and neutral media (pH 7.0). The release profile showed a faster release of 8HQ in acidic medium in comparison with neutral medium. Indeed 100% of 8HQ was released after 14 days in acidic medium whereas only around 15% of 8HQ was released during the same period at neutral pH. Therefore, the polymer conjugate nanoparticles are suitable materials as additives or to form coatings on metal substrates for corrosion protection.

Keywords: Corrosion inhibitor, 8-Hydroxyquinoline, Polymer conjugated, β-Thiopropionate

Procedia PDF Downloads 160
2134 Green Economy and Environmental Protection Economic Policy Challenges in Georgia

Authors: Gulnaz Erkomaishvili

Abstract:

Introduction. One of the most important issues of state economic policy in the 21st century is the problem of environmental protection. The Georgian government considers the green economy as one of the most important means of sustainable economic development and takes the initiative to implement voluntary measures to promote sustainable development. In this context, it is important to promote the development of ecosystem services, clean production, environmental education and green jobs.The development of the green economy significantly reduces the inefficient use of natural resources, waste generation, emissions into the atmosphere and the discharge of untreated water into bodies of water.It is, therefore, an important instrument in the environmental orientation of sustainable development. Objectives.The aim of the paper is to analyze the current status of the green economy in Georgia and identify effective ways to improve the environmental, economic policy of sustainable development. Methodologies: This paper uses general and specific methods, in particular, analysis, synthesis, induction, deduction, scientific abstraction, comparative and statistical methods, as well as experts’ evaluation. bibliographic research of scientific works and reports of organizations was conducted; Publications of the National Statistics Office of Georgia are used to determine the regularity between analytical and statistical estimations. Also, theoretical and applied research of international organizations and scientist-economists are used. Contributions: The country should implement such an economic policy that ensures the transition to a green economy, in particular, revising water, air and waste laws, strengthening existing environmental management tools and introcing new tools (including economic tools). Perfecting the regulatory legal framework of the environmental impact assessment system, which includes the harmonization of Georgian legislation with the requirements of the European Union. To ensure the protection and rational use of Georgia's forests, emphasis should be placed on sustainable forestry, protection and restoration of forests.

Keywords: green economy, environmental protection, environmental protection economic policy, environmental protection policy challanges

Procedia PDF Downloads 25
2133 Adaptive Envelope Protection Control for the below and above Rated Regions of Wind Turbines

Authors: Mustafa Sahin, İlkay Yavrucuk

Abstract:

This paper presents a wind turbine envelope protection control algorithm that protects Variable Speed Variable Pitch (VSVP) wind turbines from damage during operation throughout their below and above rated regions, i.e. from cut-in to cut-out wind speed. The proposed approach uses a neural network that can adapt to turbines and their operating points. An algorithm monitors instantaneous wind and turbine states, predicts a wind speed that would push the turbine to a pre-defined envelope limit and, when necessary, realizes an avoidance action. Simulations are realized using the MS Bladed Wind Turbine Simulation Model for the NREL 5 MW wind turbine equipped with baseline controllers. In all simulations, through the proposed algorithm, it is observed that the turbine operates safely within the allowable limit throughout the below and above rated regions. Two example cases, adaptations to turbine operating points for the below and above rated regions and protections are investigated in simulations to show the capability of the proposed envelope protection system (EPS) algorithm, which reduces excessive wind turbine loads and expectedly increases the turbine service life.

Keywords: adaptive envelope protection control, limit detection and avoidance, neural networks, ultimate load reduction, wind turbine power control

Procedia PDF Downloads 99
2132 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, S. Pradhan

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and also on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and also the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics

Procedia PDF Downloads 387
2131 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 134
2130 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation

Authors: Natalia Kalinowska

Abstract:

The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.

Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach

Procedia PDF Downloads 217
2129 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries

Authors: Karolin Bauer, Anna Brinkmann

Abstract:

Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.

Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster

Procedia PDF Downloads 307
2128 Protective Custody in Child Protection: Reflection of Residential Care Workers in the Philippines

Authors: Hazel S. Cometa-Lamberte

Abstract:

This paper presents the residential care workers reflections in working with children who were under protective custody and placed in a residential care facility for children. Key informant interviews and focus group discussion were employed in this study to analyze the views of residential care workers on the programs and services and case management system in residential care for children. Results suggest that working in a residential care facility for children needs the interplay of both the worker’s personal and professional values, knowledge and skills in working with children. Analyzing the residential care workers experiences in handling children in residential care facilities is vital for the improvement of the policies, programs and services, the repertoire of techniques and facilitate the creation of a new social work practice framework/model in child protection specifically in residential care facilities.

Keywords: child protection, residential care, residential care workers, social workers

Procedia PDF Downloads 133
2127 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities

Authors: Eugenio Ferrer Santiago

Abstract:

The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.

Keywords: data privacy, data protection, urban planning, research ethics

Procedia PDF Downloads 21
2126 The Judiciary as Pacemaker? Considering the Role of Courts in an Expansion of Protection for War Refugees and People Fleeing Natural Disasters

Authors: Charlotte Lülf

Abstract:

Migration flows, resulting from war, climate change or economic crisis cannot be tackled by single states but need to be addressed as a transnational and international responsibility. The traditional architecture surrounding the work of the UNHCR and the 1951 Convention, however, is not equipped to deal with these challenges. Widely excluded from legal protection are people not individually persecuted for the statutory criteria, people that flee from the indiscriminate effects of an armed conflict as well as people fleeing natural disasters. With the lack of explicit legal protection and the political reluctance of nation states worldwide to extend their commitment in new asylum laws, the judiciary must be put in focus: it plays a unique role in interpreting and potentially expanding the application of existing regulations. This paper as part of an ongoing Ph.D. Project deals with the current and partly contradicting approaches to the protection of war- and climate refugees. Changing jurisprudential practice of national and regional courts will be assessed, as will be their dialogue to interpret the international obligations of human rights law, migration laws, and asylum laws in an interacting world. In recent judgments refoulment to an armed conflict as well as countries without adequate disaster relief or health care was argued as violating fundamental human and asylum law rights and therefore prohibited – even for applicants without refugee status: The first step towards access to subsidiary protection could herewith be established. Can one observe similar developments in other parts of the world? This paper will evaluate the role of the judiciary to define, redefine and potentially expand protection for people seeking refuge from armed conflicts and natural disasters.

Keywords: human rights law, asylum-seekers, displacement, migration

Procedia PDF Downloads 246
2125 Cybervetting and Online Privacy in Job Recruitment – Perspectives on the Current and Future Legislative Framework Within the EU

Authors: Nicole Christiansen, Hanne Marie Motzfeldt

Abstract:

In recent years, more and more HR professionals have been using cyber-vetting in job recruitment in an effort to find the perfect match for the company. These practices are growing rapidly, accessing a vast amount of data from social networks, some of which is privileged and protected information. Thus, there is a risk that the right to privacy is becoming a duty to manage your private data. This paper investigates to which degree a job applicant's fundamental rights are protected adequately in current and future legislation in the EU. This paper argues that current data protection regulations and forthcoming regulations on the use of AI ensure sufficient protection. However, even though the regulation on paper protects employees within the EU, the recruitment sector may not pay sufficient attention to the regulation as it not specifically targeting this area. Therefore, the lack of specific labor and employment regulation is a concern that the social partners should attend to.

Keywords: AI, cyber vetting, data protection, job recruitment, online privacy

Procedia PDF Downloads 41
2124 Analysis of Silicon Controlled Rectifier-Based Electrostatic Discharge Protection Circuits with Electrical Characteristics for the 5V Power Clamp

Authors: Jun-Geol Park, Kyoung-Il Do, Min-Ju Kwon, Kyung-Hyun Park, Yong-Seo Koo

Abstract:

This paper analyzed the SCR (Silicon Controlled Rectifier)-based ESD (Electrostatic Discharge) protection circuits with the turn-on time characteristics. The structures are the LVTSCR (Low Voltage Triggered SCR), the ZTSCR (Zener Triggered SCR) and the PTSCR (P-Substrate Triggered SCR). The three structures are for the 5V power clamp. In general, the structures with the low trigger voltage structure can have the fast turn-on characteristics than other structures. All the ESD protection circuits have the low trigger voltage by using the N+ bridge region of LVTSCR, by using the zener diode structure of ZTSCR, by increasing the trigger current of PTSCR. The simulation for the comparison with the turn-on time was conducted by the Synopsys TCAD simulator. As the simulation results, the LVTSCR has the turn-on time of 2.8 ns, ZTSCR of 2.1 ns and the PTSCR of 2.4 ns. The HBM simulation results, however, show that the PTSCR is the more robust structure of 430K in HBM 8kV standard than 450K of LVTSCR and 495K of ZTSCR. Therefore the PTSCR is the most effective ESD protection circuit for the 5V power clamp.

Keywords: ESD, SCR, turn-on time, trigger voltage, power clamp

Procedia PDF Downloads 314
2123 Research on the Protection and Development of Ancient Town Cultural Landscape Based on “Four State” Elements: Illustrated by the Example of Qikou

Authors: Bian ChengXiang, Wang Qian

Abstract:

With the deepening of the research on the connotation of cultural heritage and human geography, the cultural landscape takes landscape as a cultural product, integrates and blends cultural and natural heritage to explore the cultural value behind its material landscape. Qikou ancient town is a typical traditional settlement with a homomorphism of mountain and water veins. Its cultural accumulation and natural landscape play an important role in its development. Therefore, this paper will combine the material and cultural elements of Qikou ancient town to analyze the composition of the cultural landscape of the ancient town and explore the protection and utilization of the cultural landscape of Qikou ancient town from the four aspects of ecology, form, cultural form, and business form, so as to provide effective strategies for the development of the ancient town.

Keywords: four state, cultural landscape, ancient town, protection, development

Procedia PDF Downloads 95
2122 Just Child Protection Practice for Immigrant and Racialized Families in Multicultural Western Settings: Considerations for Context and Culture

Authors: Sarah Maiter

Abstract:

Heightened globalization, migration, displacement of citizens, and refugee needs is putting increasing demand for approaches to social services for diverse populations that responds to families to ensure the safety and protection of vulnerable members while providing supports and services. Along with this social works re-focus on socially just approaches to practice increasingly asks social workers to consider the challenging circumstances of families when providing services rather than a focus on individual shortcomings alone. Child protection workers then struggle to ensure safety of children while assessing the needs of families. This assessment can prove to be difficult when providing services to immigrant, refugee, and racially diverse families as understanding of and familiarity with these families is often limited. Furthermore, child protection intervention in western countries is state mandated having legal authority when intervening in the lives of families where child protection concerns have been identified. Within this context, racialized immigrant and refugee families are at risk of misunderstandings that can result in interventions that are overly intrusive, unhelpful, and harsh. Research shows disproportionality and overrepresentation of racial and ethnic minorities, and immigrant families in the child protection system. Reasons noted include: a) possibilities of racial bias in reporting and substantiating abuse, b) struggles on the part of workers when working with families from diverse ethno-racial backgrounds and who are immigrants and may have limited proficiency in the national language of the country, c) interventions during crisis and differential ongoing services for these families, d) diverse contexts of these families that poses additional challenges for families and children, and e) possible differential definitions of child maltreatment. While cultural and ethnic diversity in child rearing approaches have been cited as contributors to child protection concerns, this approach should be viewed cautiously as it can result in stereotyping and generalizing that then results in inappropriate assessment and intervention. However, poverty and the lack of social supports, both well-known contributors to child protection concerns, also impact these families disproportionately. Child protection systems, therefore, need to continue to examine policy and practice approaches with these families that ensures safety of children while balancing the needs of families. This presentation provides data from several research studies that examined definitions of child maltreatment among a sample of racialized immigrant families, experiences of a sample of immigrant families with the child protection system, concerns of a sample of child protection workers in the provision of services to these families, and struggles of families in the transitions to their new country. These studies, along with others provide insights into areas of consideration for practice that can contribute to safety for children while ensuring just and equitable responses that have greater potential for keeping families together rather than premature apprehension and removal of children to state care.

Keywords: child protection, child welfare services, immigrant families, racial and ethnic diversity

Procedia PDF Downloads 257
2121 Protection of Floating Roof Petroleum Storage Tanks against Lightning Strokes

Authors: F. M. Mohamed, A. Y. Abdelaziz

Abstract:

The subject of petroleum storage tank fires has gained a great deal of attention due to the high cost of petroleum, and the consequent disruption of petroleum production; therefore, much of the current research has focused on petroleum storage tank fires. Also, the number of petroleum tank fires is oscillating between 15 and 20 fires per year. About 33% of all tank fires are attributed to lightning. Floating roof tanks (FRT’s) are especially vulnerable to lightning. To minimize the likelihood of a fire, the API RP 545 recommends three major modifications to floating roof tanks. This paper was inspired by a stroke of lightning that ignited a fire in a crude oil storage tank belonging to an Egyptian oil company, and is aimed at providing an efficient lightning protection system to the tank under study, in order to avoid the occurrence of such phenomena in the future and also, to give valuable recommendations to be applied to floating roof tank projects.

Keywords: crude oil, fire, floating roof tank, lightning protection system

Procedia PDF Downloads 250
2120 Measuring Flood Risk concerning with the Flood Protection Embankment in Big Flooding Events of Dhaka Metropolitan Zone

Authors: Marju Ben Sayed, Shigeko Haruyama

Abstract:

Among all kinds of natural disaster, the flood is a common feature in rapidly urbanizing Dhaka city. In this research, assessment of flood risk of Dhaka metropolitan area has been investigated by using an integrated approach of GIS, remote sensing and socio-economic data. The purpose of the study is to measure the flooding risk concerning with the flood protection embankment in big flooding events (1988, 1998 and 2004) and urbanization of Dhaka metropolitan zone. In this research, we considered the Dhaka city into two parts; East Dhaka (outside the flood protection embankment) and West Dhaka (inside the flood protection embankment). Using statistical data, we explored the socio-economic status of the study area population by comparing the density of population, land price and income level. We have drawn the cross section profile of the flood protection embankment into three different points for realizing the flooding risk in the study area, especially in the big flooding year (1988, 1998 and 2004). According to the physical condition of the study area, the land use/land cover map has been classified into five classes. Comparing with each land cover unit, historical weather station data and the socio-economic data, the flooding risk has been evaluated. Moreover, we compared between DEM data and each land cover units to find out the relationship with flood. It is expected that, this study could contribute to effective flood forecasting, relief and emergency management for a future flood event in Dhaka city.

Keywords: land use, land cover change, socio-economic, Dhaka city, GIS, flood

Procedia PDF Downloads 257
2119 From Restraint to Obligation: The Protection of the Environment in Times of Armed Conflict

Authors: Aaron Walayat

Abstract:

Protection of the environment in international law has been one of the most developed in the context of international humanitarian law. This paper examines the history of the protection of the environment in times of armed conflict, beginning with the traditional notion of restraint observed in antiquity towards the obligation to protect the environment, examining the treaties and agreements, both binding and non-binding which have contributed to environmental protection in war. The paper begins with a discussion of the ancient concept of restraint. This section examines the social norms in favor of protection of the environment as observed in the Bible, Greco-Roman mythology, and even more contemporary literature. The study of the traditional rejection of total war establishes the social foundation on which the current legal regime has stemmed. The paper then studies the principle of restraint as codified in international humanitarian law. It mainly examines Additional Protocol I of the Geneva Convention of 1949 and existing international law concerning civilian objects and the principles of international humanitarian law in the classification between civilian objects and military objectives. The paper then explores the environment’s classification as both a military objective and as a civilian object as well as explores arguments in favor of the classification of the whole environment as a civilian object. The paper will then discuss the current legal regime surrounding the protection of the environment, discussing some declarations and conventions including the 1868 Declaration of St. Petersburg, the 1907 Hague Convention No. IV, the Geneva Conventions, and the 1976 Environmental Modification Convention. The paper concludes with the outline noting the movement from codification of the principles of restraint into the various treaties, agreements, and declarations of the current regime of international humanitarian law. This paper provides an analysis of the history and significance of the relationship between international humanitarian law as a major contributor to the growing field of international environmental law.

Keywords: armed conflict, environment, legal regime, restraint

Procedia PDF Downloads 153