Abstract: As a by-product of its "cyberspace" status, electronic
commerce is global, encompassing a whole range of B2C
relationships which need to be approached with solutions provided at
a local level while remaining viable when applied to global issues.
Today, the European Union seems to be endowed with a reliable
legal framework for consumer protection. A question which remains,
however, is enforcement of this protection. This is probably a matter
of time and awareness from both parties in the B2C relationship.
Business should realize that enhancing trust in the minds of
consumers is more than a question of technology; it is a question of
best practice. Best practice starts with the online service of high
street banks as well as with the existence of a secure, user-friendly
and cost-effective payment system. It also includes the respect of
privacy and the use of smart cards as well as enhancing privacy
technologies and fair information practice. In sum, only by offering
this guarantee of privacy and security will the consumer be assured
that, in cyberspace, his/her interests will be protected in the same
manner as in a traditional commercial environment.
Abstract: The purposes of this research were to study the citizen
participation in preventing illegal drugs in one of a poor and small
community of Bangkok, Thailand and to compare the level of
participation and concern of illegal drugs problem by using
demographic variables. This paper drew upon data collected from a
local citizens survey conducted in Bangkok, Thailand during summer
of 2012. A total of 200 respondents were elicited as data input for,
and one way ANOVA test. The findings revealed that the overall
citizen participation was in the level of medium. The mean score
showed that benefit from the program was ranked as the highest and
the decision to participate was ranked as second while the follow-up
of the program was ranked as the lowest.
In terms of the difference in demographic such as gender, age,
level of education, income, and year of residency, the hypothesis
testing’s result disclosed that there were no difference in their level
of participation. However, difference in occupation showed a
difference in their level of participation and concern which was
significant at the 0.05 confidence level.
Abstract: Recently, the RFID (Radio Frequency
Identification) technology attracts the world market attention as
essential technology for ubiquitous environment. The RFID
market has focused on transponders and reader development.
But that concern has shifted to RFID software like as
high-valued e-business applications, RFID middleware and
related development tools. However, due to the high sensitivity
of data and service transaction within the RFID network,
security consideration must be addressed. In order to guarantee
trusted e-business based on RFID technology, we propose a
security enhanced RFID middleware system. Our proposal is
compliant with EPCglobal ALE (Application Level Events),
which is standard interface for middleware and its clients. We
show how to provide strengthened security and trust by
protecting transported data between middleware and its client,
and stored data in middleware. Moreover, we achieve the
identification and service access control against illegal service
abuse. Our system enables secure RFID middleware service
and trusted e-business service.
Abstract: The number of intrusions and attacks against critical
infrastructures and other information networks is increasing rapidly.
While there is no identified evidence that terrorist organizations are
currently planning a coordinated attack against the vulnerabilities of
computer systems and network connected to critical infrastructure,
and origins of the indiscriminate cyber attacks that infect computers
on network remain largely unknown. The growing trend toward the
use of more automated and menacing attack tools has also
overwhelmed some of the current methodologies used for tracking
cyber attacks. There is an ample possibility that this kind of cyber
attacks can be transform to cyberterrorism caused by illegal purposes.
Cyberterrorism is a matter of vital importance to national welfare.
Therefore, each countries and organizations have to take a proper
measure to meet the situation and consider effective legislation about
cyberterrorism.
Abstract: In this paper we discuss on the security module for the
car appliances to prevent stealing and illegal use on other cars. We
proposed an open structure including authentication and encryption by
embed a security module in each to protect car appliances. Illegal
moving and use a car appliance with the security module without
permission will lead the appliance to useless. This paper also presents
the component identification and deal with relevant procedures. It is at
low cost to recover from destroys by the burglar. Expect this paper to
offer the new business opportunity to the automotive and technology
industry.
Abstract: State tax revenues in most countries started to decrease during the recession. Government of Latvia decided to compensate the decline by increasing rates of several taxes including excise tax on strong alcohol. The total increase in 2009 constituted 42% and the rate increased from 896€ to 1 266€ for 100l of absolute alcohol. Since then this has had a negative impact on consumption volumes and the split between legal and illegal market. The legal alcohol sales decreased by almost 50% (by volume), consequentially having negative effect on the State revenues from VAT and excise tax. Estimated results for 2010 are indicating 54 million € decrease in VAT, excise tax and other taxes versus 2008 (excise tax -19 million €, VAT -30 million €, other taxes -5 million €). The paper aims to analyze impact of the increase in excise tax on consumption patterns, State revenues and competitiveness of the local companies to draw up proposals for the state authorities regarding more effective tax policies. The analysis reveals a relationship between excise tax rate, illegal alcohol market and State revenues. The results can be used to improve excise tax system and effectiveness in Latvia.
Abstract: As various mobile sensing technologies, remote
control and ubiquitous infrastructure are developing and expectations
on quality of life are increasing, a lot of researches and developments
on home network technologies and services are actively on going,
Until now, we have focused on how to provide users with high-level
home network services, while not many researches on home network
security for guaranteeing safety are progressing. So, in this paper, we
propose an access control model specific to home network that
provides various kinds of users with home network services up one-s
characteristics and features, and protects home network systems from
illegal/unnecessary accesses or intrusions.
Abstract: The 9/11 suicide attacks in New York, Washington, D.C., and Pennsylvania, triggered a number of security responses both in the United States of America and other Countries in the World. Kenya, which is an ally and a close partner to North America and Europe, was not left behind. While many states had been parties to numerous terrorism conventions, their response in implementing them had been slow and needed this catalyst. This special case offered a window of opportunity for many “security conscious" regimes in cementing their legal-criminological and political security apparatus. At the international level, the 9/11 case led to the hasty adoption of Security Council resolution 1373 in 2001, which called upon states to adopt wide-ranging and comprehensive steps and strategies to combat international terrorism and to become parties to the relevant international conventions and protocols relating to terrorism. Since then, Kenya has responded with speed in devising social-legal-criminological-political actions.
Abstract: India recognizes the personal laws of the various
religious communities that reside in the country. At the same time all
the institutions of the state in India are committed to the value of
secularism. This paper has been developed on the basis of a case
study that indicates the dynamics of religion in the working of the
lower judiciary in India. Majority of the commentary on religion and
the judiciary has focused on debates surrounding the existence and
application of personal laws. This paper, through a case study in the
lower judiciary, makes an attempt to examine whether the interface
between religion and the judiciary goes beyond personal laws.
The first part of this paper explains the history and application of
personal laws in social, political and legal contexts in India. The
second part examines the case study located in two courts of first
instance, following into the third part which provides an analysis of
the empirical evidence. The fourth part focuses on preliminary
observations about why there is a hesitancy to speak about religion in
relation to the working of the judicial system.
Abstract: Political transition of agricultural properties in Poland and the former German Democratic Republic (GDR) after 1989 had
to include not only Reprivatization but also the issue of returning the
properties in kind to their former owners. Restitution in kind applied
in GDR to all forms of ownership which were subject to
expropriation between 1933 and 1989 except for properties taken
over during Soviet occupation in 1945-49. This issue was one of the flashpoints during the process of ownership changes. Privatization,
limited as it was, took place in unequal legal environment where only
one group of owners was privileged. Executing restitution in kind
created a feeling of uncertainty among potential real estate buyers.
Abstract: This study aims to identify processes, current
situations, and issues of recycling systems for four home appliances,
namely, air conditioners, television receivers, refrigerators, and
washing machines, among e-wastes in China and Japan for
understanding and comparison of their characteristics. In accordance
with results of a literature search, review of information disclosed
online, and questionnaire survey conducted, conclusions of the study
boil down to:
(1)The results show that in Japan most of the home appliances
mentioned above have been collected through home appliance
recycling tickets, resulting in an issue of “requiring some effort" in
treatment and recycling stages, and most plants have contracted out
their e-waste recycling.
(2)It is found out that advantages of the recycling system in Japan
include easiness to monitor concrete data and thorough
environmental friendliness ensured while its disadvantages include
illegal dumping and export. It becomes apparent that advantages of
the recycling system in China include a high reuse rate, low
treatment cost, and fewer illegal dumping while its disadvantages
include less safe reused products, environmental pollution caused by
e-waste treatment, illegal import, and difficulty in obtaining data.
Abstract: The agriculture lignocellulosic by-products are receiving increased attention, namely in the search for filter materials that retain contaminants from water. These by-products, specifically almond and hazelnut shells are abundant in Portugal once almond and hazelnuts production is a local important activity. Hazelnut and almond shells have as main constituents lignin, cellulose and hemicelluloses, water soluble extractives and tannins. Along the adsorption of heavy metals from contaminated waters, water soluble compounds can leach from shells and have a negative impact in the environment. Usually, the chemical characterization of treated water by itself may not show environmental impact caused by the discharges when parameters obey to legal quality standards for water. Only biological systems can detect the toxic effects of the water constituents. Therefore, the evaluation of toxicity by biological tests is very important when deciding the suitability for safe water discharge or for irrigation applications.
The main purpose of the present work was to assess the potential impacts of waters after been treated for heavy metal removal by hazelnut and almond shells adsorption systems, with short term acute toxicity tests.
To conduct the study, water at pH 6 with 25 mg.L-1 of lead, was treated with 10 g of shell per litre of wastewater, for 24 hours. This procedure was followed for each bark. Afterwards the water was collected for toxicological assays; namely bacterial resistance, seed germination, Lemna minor L. test and plant grow. The effect in isolated bacteria strains was determined by disc diffusion method and the germination index of seed was evaluated using lettuce, with temperature and humidity germination control for 7 days. For aquatic higher organism, Lemnas were used with 4 days contact time with shell solutions, in controlled light and temperature. For terrestrial higher plants, biomass production was evaluated after 14 days of tomato germination had occurred in soil, with controlled humidity, light and temperature.
Toxicity tests of water treated with shells revealed in some extent effects in the tested organisms, with the test assays showing a close behaviour as the control, leading to the conclusion that its further utilization may not be considered to create a serious risk to the environment.
Abstract: In this article, by means of examination of Bolshevists
Turkistanskie Vedomosti" newspaper and “Erikti Oylar Organi" and
“Turkistanskyi Vestnik" newspapers which had been published
during 1917-1918, the fact that “Turkistan Governorship" established
in city of Kokand in November of 1917, within the framework of
former tsarist Russia Turkistan general-governorship, was the legal
government formed as a requisition of people of Turkistan was
proved. An examination of these two newspapers providing
information regarding history of “Turkistan Autonomy" but having
opposite to each other views makes it possible to obtain valuable data
concerning history of autonomy which was inappropriately
misrepresented during Soviet period.
Abstract: Formaldehyde is the illegal chemical substance used
for food preservation in fish and vegetable. It can promote
carcinogenesis. Superoxide dismutases are the important
antioxidative enzymes that catalyze the dismutation of superoxide
anion into oxygen and hydrogen peroxide. The resultant level of
oxidative stress in formaldehyde-treated lymphocytes was
investigated. The formaldehyde concentrations of 0, 20, 40, 60, 80
and 120μmol/L were treated in human lymphocytes for 12 hours.
After 12 treated hours, the superoxide dismutase activity change was
measured in formaldehyde-treated lymphocytes. The results showed
that the formaldehyde concentrations of 60, 80 and 120μmol/L
significantly decreased superoxide dismutase activities in
lymphocytes (P < 0.05). The change of superoxide dismutase
activity in formaldehyde-treated lymphocytes may be the biomarker
for detect cellular injury, such as damage to DNA, due to
formaldehyde exposure.
Abstract: Digital watermarking is the process of embedding
information into a digital signal which can be used in DRM (digital
rights managements) system. The visible watermark (often called logo)
can indicate the owner of the copyright which can often be seen in the
TV program and protects the copyright in an active way. However,
most of the schemes do not consider the visible watermark removing
process. To solve this problem, a visible watermarking scheme with
embedding and removing process is proposed under the control of a
secure template. The template generates different version of
watermarks which can be seen visually the same for different users.
Users with the right key can completely remove the watermark and
recover the original image while the unauthorized user is prevented to
remove the watermark. Experiment results show that our
watermarking algorithm obtains a good visual quality and is hard to be
removed by the illegally users. Additionally, the authorized users can
completely remove the visible watermark and recover the original
image with a good quality.
Abstract: In this work, we present for the first time in our
perception an efficient digital watermarking scheme for mpeg audio
layer 3 files that operates directly in the compressed data domain,
while manipulating the time and subband/channel domain. In
addition, it does not need the original signal to detect the watermark.
Our scheme was implemented taking special care for the efficient
usage of the two limited resources of computer systems: time and
space. It offers to the industrial user the capability of watermark
embedding and detection in time immediately comparable to the real
music time of the original audio file that depends on the mpeg
compression, while the end user/audience does not face any artifacts
or delays hearing the watermarked audio file. Furthermore, it
overcomes the disadvantage of algorithms operating in the PCMData
domain to be vulnerable to compression/recompression attacks,
as it places the watermark in the scale factors domain and not in the
digitized sound audio data. The strength of our scheme, that allows it
to be used with success in both authentication and copyright
protection, relies on the fact that it gives to the users the enhanced
capability their ownership of the audio file not to be accomplished
simply by detecting the bit pattern that comprises the watermark
itself, but by showing that the legal owner knows a hard to compute
property of the watermark.
Abstract: The aim of this research is to develop the
understanding of corporate social responsibility (CSR) from
consumers- perspective toward Thai mobile service providers.
Based on the survey from 400 mobile customers, the result
shows that four dimensions of CSR of Thai mobile service
providers consist of economic, legal, ethical and philanthropic
responsibility. These four CSR factors have positive impacts
on enhancing customer satisfaction except one item of
economic responsibility - profitability to shareholders. Ethical
dimension has the strongest impact on customer satisfaction.
Economic, legal, ethical, philanthropic responsibility and
customer satisfaction have major impact on loyalty, whilst
philanthropic component mostly affects loyalty.
Abstract: Human skull is shown to exhibit numerous sexually dimorphic traits. Estimation of sex is a challenging task especially when a part of skull is brought for medicolegal investigation. The present research was planned to evaluate the sexing potential of the dimensions of foramen magnum in forensic identification by craniometric analysis. Length and breadth of the foramen magnum was measured using Vernier calipers and the area of foramen magnum was calculated. The length, breadth, and area of foramen magnum were found to be larger in males than females. Sexual dimorphism index was calculated to estimate the sexing potential of each variable. The study observations are suggestive of the limited utility of the craniometric analysis of foramen magnum during the examination of skull and its parts in estimation of sex.
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.
Abstract: The advances in multimedia and networking technologies
have created opportunities for Internet pirates, who can easily
copy multimedia contents and illegally distribute them on the Internet,
thus violating the legal rights of content owners. This paper describes
how a simple and well-known watermarking procedure based on a
spread spectrum method and a watermark recovery by correlation can
be improved to effectively and adaptively protect MPEG-2 videos
distributed on the Internet. In fact, the procedure, in its simplest
form, is vulnerable to a variety of attacks. However, its security
and robustness have been increased, and its behavior has been
made adaptive with respect to the video terminals used to open
the videos and the network transactions carried out to deliver them
to buyers. In fact, such an adaptive behavior enables the proposed
procedure to efficiently embed watermarks, and this characteristic
makes the procedure well suited to be exploited in web contexts,
where watermarks usually generated from fingerprinting codes have
to be inserted into the distributed videos “on the fly", i.e. during the
purchase web transactions.