CINXE.COM
Search results for: deterrence
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: deterrence</title> <meta name="description" content="Search results for: deterrence"> <meta name="keywords" content="deterrence"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="deterrence" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="deterrence"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 39</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: deterrence</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> From Linear to Nonlinear Deterrence: Deterrence for Rising Power</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farhad%20Ghasemi">Farhad Ghasemi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Along with transforming the international system into a complex and chaotic system, the fundamental question arises: how can deterrence be reconstructed conceptually and theoretically in this system model? The deterrence system is much more complex today than it was seven decades ago. This article suggests that the perception of deterrence as a linear system is a fundamental mistake because it does not consider the new dynamics of the international system, including network power dynamics. The author aims to improve this point by focusing on complexity and chaos theories, especially their nonlinearity and cascading failure principles. This article proposes that the perception of deterrence as a linear system is a fundamental mistake, as the new dynamics of the surrounding international system do not take into account. The author recognizes deterrence as a nonlinear system and introduces it as a concept in strategic studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=complexity" title="complexity">complexity</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20system" title=" international system"> international system</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=linear%20deterrence" title=" linear deterrence"> linear deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=nonlinear%20deterrence" title=" nonlinear deterrence"> nonlinear deterrence</a> </p> <a href="https://publications.waset.org/abstracts/148226/from-linear-to-nonlinear-deterrence-deterrence-for-rising-power" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148226.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> India’s Deterrence Program: Defense or Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aneri%20Mehta">Aneri Mehta</a>, <a href="https://publications.waset.org/abstracts/search?q=Krunal%20Mehta"> Krunal Mehta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=foreign%20policy" title="foreign policy">foreign policy</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20deterrence" title=" nuclear deterrence"> nuclear deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20policy" title=" nuclear policy"> nuclear policy</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a> </p> <a href="https://publications.waset.org/abstracts/14898/indias-deterrence-program-defense-or-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14898.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">521</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> Artificial Intelligence Impact on Strategic Stability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Darius%20Jakimavicius">Darius Jakimavicius</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Artificial intelligence is the subject of intense debate in the international arena, identified both as a technological breakthrough and as a component of the strategic stability effect. Both the kinetic and non-kinetic development of AI and its application in the national strategies of the great powers may trigger a change in the security situation. Artificial intelligence is generally faster, more capable and more efficient than humans, and there is a temptation to transfer decision-making and control responsibilities to artificial intelligence. Artificial intelligence, which, once activated, can select and act on targets without further intervention by a human operator, blurs the boundary between human or robot (machine) warfare, or perhaps human and robot together. Artificial intelligence acts as a force multiplier that speeds up decision-making and reaction times on the battlefield. The role of humans is increasingly moving away from direct decision-making and away from command and control processes involving the use of force. It is worth noting that the autonomy and precision of AI systems make the process of strategic stability more complex. Deterrence theory is currently in a phase of development in which deterrence is undergoing further strain and crisis due to the complexity of the evolving models enabled by artificial intelligence. Based on the concept of strategic stability and deterrence theory, it is appropriate to develop further research on the development and impact of AI in order to assess AI from both a scientific and technical perspective: to capture a new niche in the scientific literature and academic terminology, to clarify the conditions for deterrence, and to identify the potential uses, impacts and possibly quantities of AI. The research problem is the impact of artificial intelligence developed by great powers on strategic stability. This thesis seeks to assess the impact of AI on strategic stability and deterrence principles, with human exclusion from the decision-making and control loop as a key axis. The interaction between AI and human actions and interests can determine fundamental changes in great powers' defense and deterrence, and the development and application of AI-based great powers strategies can lead to a change in strategic stability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20inteligence" title="artificial inteligence">artificial inteligence</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20stability" title=" strategic stability"> strategic stability</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence%20theory" title=" deterrence theory"> deterrence theory</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20making%20loop" title=" decision making loop"> decision making loop</a> </p> <a href="https://publications.waset.org/abstracts/186282/artificial-intelligence-impact-on-strategic-stability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186282.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">42</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">36</span> Investigating a Deterrence Function for Work Trips for Perth Metropolitan Area</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Raouli">Ali Raouli</a>, <a href="https://publications.waset.org/abstracts/search?q=Amin%20Chegenizadeh"> Amin Chegenizadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamid%20Nikraz"> Hamid Nikraz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Perth metropolitan area and its surrounding regions have been expanding rapidly in recent decades and it is expected that this growth will continue in the years to come. With this rapid growth and the resulting increase in population, consideration should be given to strategic planning and modelling for the future expansion of Perth. The accurate estimation of projected traffic volumes has always been a major concern for the transport modelers and planners. Development of a reliable strategic transport model depends significantly on the inputs data into the model and the calibrated parameters of the model to reflect the existing situation. Trip distribution is the second step in four-step modelling (FSM) which is complex due to its behavioral nature. Gravity model is the most common method for trip distribution. The spatial separation between the Origin and Destination (OD) zones will be reflected in gravity model by applying deterrence functions which provide an opportunity to include people’s behavior in choosing their destinations based on distance, time and cost of their journeys. Deterrence functions play an important role for distribution of the trips within a study area and would simulate the trip distances and therefore should be calibrated for any particular strategic transport model to correctly reflect the trip behavior within the modelling area. This paper aims to review the most common deterrence functions and propose a calibrated deterrence function for work trips within the Perth Metropolitan Area based on the information obtained from the latest available Household data and Perth and Region Travel Survey (PARTS) data. As part of this study, a four-step transport model using EMME software has been developed for Perth Metropolitan Area to assist with the analysis and findings. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deterrence%20function" title="deterrence function">deterrence function</a>, <a href="https://publications.waset.org/abstracts/search?q=four-step%20modelling" title=" four-step modelling"> four-step modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=origin%20destination" title=" origin destination"> origin destination</a>, <a href="https://publications.waset.org/abstracts/search?q=transport%20model" title=" transport model"> transport model</a> </p> <a href="https://publications.waset.org/abstracts/82277/investigating-a-deterrence-function-for-work-trips-for-perth-metropolitan-area" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82277.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">168</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">35</span> Effect of Lactone Glycoside on Feeding Deterrence and Nutritive Physiology of Tobacco Caterpillar Spodoptera litura Fabricius (Noctuidae: Lepidoptera)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Selvamuthukumaran%20Thirunavukkarasu">Selvamuthukumaran Thirunavukkarasu</a>, <a href="https://publications.waset.org/abstracts/search?q=Arivudainambi%20Sundararajan"> Arivudainambi Sundararajan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The plant active molecules with their known mode of action are important leads to the development of newer insecticides. Lactone glycoside was identified earlier as the active principle in Cleistanthus collinus (Roxb.) Benth. (Fam: Euphorbiaceae). It possessed feeding deterrent, insecticidal and insect growth regulatory actions at varying concentrations. Deducing its mode of action opens a possibility of its further development. A no-choice leaf disc bioassay was carried out with lactone glycoside at different doses for different instars and Deterrence Indices were worked out. Using regression analysis concentrations imparting 10, 30 and 50 per cent deterrence (DI10, DI30 & DI50) were worked out. At these doses, effect on nutritional indices like Relative Consumption and Growth Rates (RCR & RGR), Efficiencies of Conversion of Ingested and Digested food (ECI & ECD) and Approximate Digestibility (AD) were worked out. The Relative Consumption and Growth Rate of control and lactone glycoside larva were compared by regression analysis. Regression analysis of deterrence indices revealed that the concentrations needed for imparting 50 per cent deterrence was 60.66, 68.47 and 71.10 ppm for third, fourth and fifth instars respectively. Relative consumption rate (RCR) and relative growth rate (RGR) were reduced. This confirmed the antifeedant action of the fraction. Approximate digestibility (AD) was found greater in treatments indicating reduced faeces because of poor digestibility and retention of food in the gut. Efficiency of conversion of both ingested and digested (ECI and ECD) food was also found to be greatly reduced. This indicated presence of toxic action. This was proved by comparing growth efficiencies of control and lactone glycoside treated larvae. Lactone glycoside was found to possess both feeding deterrent and toxic modes of action. Studies on molecular targets based on this preliminary site of action lead to new insecticide development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Spodoptera%20litura%20Fabricius" title="Spodoptera litura Fabricius">Spodoptera litura Fabricius</a>, <a href="https://publications.waset.org/abstracts/search?q=Cleistanthus%20collinus%20%28Roxb.%29%20Benth" title=" Cleistanthus collinus (Roxb.) Benth"> Cleistanthus collinus (Roxb.) Benth</a>, <a href="https://publications.waset.org/abstracts/search?q=feeding%20deterrence" title=" feeding deterrence"> feeding deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=mode%20of%20action" title=" mode of action"> mode of action</a> </p> <a href="https://publications.waset.org/abstracts/91129/effect-of-lactone-glycoside-on-feeding-deterrence-and-nutritive-physiology-of-tobacco-caterpillar-spodoptera-litura-fabricius-noctuidae-lepidoptera" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91129.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">34</span> Pakistan Nuclear Security: Threats from Non-State Actors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jennifer%20Wright">Jennifer Wright</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deterrence" title="deterrence">deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=non-proliferation" title=" non-proliferation"> non-proliferation</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20security" title=" nuclear security"> nuclear security</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20terrorism" title=" nuclear terrorism"> nuclear terrorism</a> </p> <a href="https://publications.waset.org/abstracts/89586/pakistan-nuclear-security-threats-from-non-state-actors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89586.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">226</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">33</span> The Analysis of Computer Crimes Act 1997 in the Circumvention and Prevention of Computer Crimes in Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nooraneda%20Mutalip%20Laidey">Nooraneda Mutalip Laidey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Computer Crimes Act 1997 (CCA 1997) was conceded by Malaysia’s legislative body in 1997 and the Act was enforced in June 2000. The purpose of CCA 1997 is to provide for offences related to misuse of computers such as hacking, cracking and phishing. CCA 1997 was modelled after United Kingdom’s Computer Misuses Act 1990 as a response to the emerging computer crimes. This legislation is divided into three parts and 12 Sections. The first part outlines preliminary matters that include short title and relevant definitions, second part provides for the offenses related to misuse of computers and specifies penalties for each offences, and the last part deals with ancillary provisions such as jurisdictional and investigational issues of cybercrime. The main objective of this paper is to discuss the development of computer crimes and its deterrence in Malaysia. Specific sections of CCA 1997 will be analysed in details and detail assessment on the prevention and prosecution of computer crimes in Malaysia will be accessed to determine whether CCA 1997 is so far adequate in preventing computer crimes in Malaysia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer" title="computer">computer</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20crimes" title=" computer crimes"> computer crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=CCA%201997" title=" CCA 1997"> CCA 1997</a>, <a href="https://publications.waset.org/abstracts/search?q=circumvention" title=" circumvention"> circumvention</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a> </p> <a href="https://publications.waset.org/abstracts/43608/the-analysis-of-computer-crimes-act-1997-in-the-circumvention-and-prevention-of-computer-crimes-in-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43608.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> Factors Influencing University Students' Online Disinhibition Behavior: The Moderating Effects of Deterrence and Social Identity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wang">Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Kuei-Ing"> Kuei-Ing</a>, <a href="https://publications.waset.org/abstracts/search?q=Jou-Fan%20Shih"> Jou-Fan Shih</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=seductive%20properties%20of%20internet" title="seductive properties of internet">seductive properties of internet</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20disinhibition" title=" online disinhibition"> online disinhibition</a>, <a href="https://publications.waset.org/abstracts/search?q=punishment%20certainty" title=" punishment certainty"> punishment certainty</a>, <a href="https://publications.waset.org/abstracts/search?q=punishment%20severity" title=" punishment severity"> punishment severity</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20identity" title=" social identity"> social identity</a> </p> <a href="https://publications.waset.org/abstracts/5066/factors-influencing-university-students-online-disinhibition-behavior-the-moderating-effects-of-deterrence-and-social-identity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5066.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">508</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mastoor%20Qubra">Mastoor Qubra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution" title="attribution">attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20terrorism" title=" cyber terrorism"> cyber terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20cooperation" title=" global cooperation"> global cooperation</a> </p> <a href="https://publications.waset.org/abstracts/79819/cyber-warfare-and-cyber-terrorism-an-analysis-of-global-cooperation-and-cyber-security-counter-measures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79819.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> “Japan’s New Security Outlook: Implications for the US-Japan Alliance”</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Agustin%20Maciel-Padilla">Agustin Maciel-Padilla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper explores the most significant change to Japan’s security strategy since the end of World War II, in particular Prime Minister Fumio Kishida’s government publication, in late 2022, of 3 policy documents (the National Security Strategy [NSS], the National Defense Strategy and the Defense Buildup Program) that basically propose to expand the country’s military capabilities and to increase military spending over a 5-year period. These policies represent a remarkable transformation of Japan’s defense-oriented policy followed since 1946. These proposals have been under analysis and debate since they were announced, as it was also Japan’s historic ambition to strengthening its deterrence capabilities in the context of a more complex regional security environment. Even though this new defense posture has attracted significant international attention, it is far from representing a done deal because of the fact that there is still a long way to go to implement this vision because of a wide variety of political and economic issues. Japan is currently experiencing the most dangerous security environment since the end of World War II, and this situation led Japan to intensify its dialogue with the United States to reflect a re-evaluation of deterrence in the face of a rapidly worsening security environment, a changing balance of power in East Asia, and the arrival of a new era of “great power competition”. Japan’s new documents, for instance, identify China and North Korea’s as posing, respectively, a strategic challenge and an imminent threat. Japan has also noted that Russia’s invasion of Ukraine has contributed to erode the foundation of the international order. It is considered that Russia’s aggression was possible because Ukraine’s defense capability was not enough for effective deterrence. Moreover, Japan’s call for “counterstrike capabilities” results from a recognition that China and North Korea’s ballistic and cruise missiles could overwhelm Japan’s air and missile defense systems, and therefore there is an urgent need to strengthen deterrence and resilience. In this context, this paper will focus on the impact of these changes on the US-Japan alliance. Adapting this alliance to Tokyo’s new ambitions and capabilities could be critical in terms of updating their traditional protection/access to bases arrangement, interoperability and joint command and control issues, as well as regarding the security–economy nexus. While China is Japan’s largest trading partner, and trade between the two has been growing, US-Japan economic relationship has been slower, notwithstanding the fact that US-Japan security cooperation has strengthened significantly in recent years. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=us-japan%20alliance" title="us-japan alliance">us-japan alliance</a>, <a href="https://publications.waset.org/abstracts/search?q=japan%20security" title=" japan security"> japan security</a>, <a href="https://publications.waset.org/abstracts/search?q=great%20power%20competition" title=" great power competition"> great power competition</a>, <a href="https://publications.waset.org/abstracts/search?q=interoperability" title=" interoperability"> interoperability</a> </p> <a href="https://publications.waset.org/abstracts/167307/japans-new-security-outlook-implications-for-the-us-japan-alliance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167307.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">29</span> Combating Supplier-Copycatting With Intellectual Property Agreements</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hubert%20Pun">Hubert Pun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When a manufacturer outsources the production of a product, it distributes its intellectual property (IP) into a supply chain that it may not be able to fully control. An IP agreement between a manufacturer and its suppliers is a popular solution to address the challenge of supplier-copycatting. The goal of this paper is to examine the impact of copycatting, from both the supplier and third-party firms, and the effectiveness of an IP agreement. Specifically, we use a game-theoretic approach to examine a system where a manufacturer outsources to a supplier. The supplier and a third-party firm decide whether or not to enter the market with copycat products while the manufacturer selects the level of marketing investment. The manufacturer can reduce the threat of supplier-copycatting by signing an IP agreement. We find that the manufacturer can be worse off from signing an IP agreement with its supplier, even if the IP agreement is costless and perfectly enforceable. We show that a manufacturer can deter copycat products through vertical integration and IP agreements and we outline the instances where each method is preferred. Furthermore, we find that the manufacturer may choose not to invest in quality improvements as a copycat deterrence strategy. We show that the supplier can benefit from the manufacturer’s decision to sign an IP agreement and that the supplier and the consumers can benefit from government regulations against copycat products. Our paper demonstrates the strengths and limitations of various copycat deterrence strategies when a supplier and third-party may produce copycat products. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=coopetitive%20supply%20chain" title="coopetitive supply chain">coopetitive supply chain</a>, <a href="https://publications.waset.org/abstracts/search?q=copycat" title=" copycat"> copycat</a>, <a href="https://publications.waset.org/abstracts/search?q=government%20regulation" title=" government regulation"> government regulation</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property" title=" intellectual property"> intellectual property</a> </p> <a href="https://publications.waset.org/abstracts/123127/combating-supplier-copycatting-with-intellectual-property-agreements" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123127.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">183</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> Efficiency of Lavandula angustifolia Mill and Zataria multiflora Boiss essential oils on nutritional indices of Tribolium confusum Jacquelin du Val (Col.: Tenebrionidae)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Karim%20Saeidi">Karim Saeidi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the most important pests in the warehouses is the flour beetle, Tribolium confusum Jacquelin du Val (Col.: Tenebrionidae). Regarding the high degree of damage of stored product pests and dangerous effects of the chemical control using plant extracts and their components are some of the best approaches to control these pests. Antifeedant activity of plant extracts from Lavandula angustifolia Mill and Zataria multiflora Boiss using hydro-distillation were tested against the flour beetle, Tribolium confusum Jacquelin du Val. The nutritional indices: relative growth rate (RGR), relative consumption rate (RCR), the efficiency of conversion of ingested food (ECI), and feeding deterrence index (FDI) were measured for adult insects. Treatments were evaluated using a flour disk bioassay in the dark; at 25±1ᵒC and 60±5% R. H. Concentrations of 0, 0.1, 0.5, 0.75, 1, 1.5, and 2 μl/disk were prepared from each essential oil. After 72 h, nutritional indices were calculated. L. angustifolia oils were more effective than Z. multiflora oils by significantly decreasing the RGR, RCR, and ECI. Feeding deterrence index (FDI) of L. angustifolia essential oil was increased significantly as essential oil concentration increased. The essential oil of L. angustifolia was more effective on FDI than Z. multiflora in some concentration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=essential%20oil" title="essential oil">essential oil</a>, <a href="https://publications.waset.org/abstracts/search?q=nutritional%20indices" title=" nutritional indices"> nutritional indices</a>, <a href="https://publications.waset.org/abstracts/search?q=Tribolium%20confusum" title=" Tribolium confusum "> Tribolium confusum </a> </p> <a href="https://publications.waset.org/abstracts/21479/efficiency-of-lavandula-angustifolia-mill-and-zataria-multiflora-boiss-essential-oils-on-nutritional-indices-of-tribolium-confusum-jacquelin-du-val-col-tenebrionidae" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21479.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">399</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> Decreasing Non-Compliance with the Garbage Collection Fee Payment: A Case Study from the Intervention in a Municipality in the Slovak Republic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anetta%20Caplanova">Anetta Caplanova</a>, <a href="https://publications.waset.org/abstracts/search?q=Eva%20Sirakovova"> Eva Sirakovova</a>, <a href="https://publications.waset.org/abstracts/search?q=Estera%20Szakadatova"> Estera Szakadatova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Non-payment of taxes and fees represents a problem, which occurs at national and local government levels in many countries. An effective tax collection is key for generating government and local government budget revenues to finance public services and infrastructure; thus, there is the need to address this problem. The standard approach considers as a solution raising taxes/fees to boost public revenues, which may be politically challenging and time-consuming to implement. An alternative approach is related to using behavioral interventions. These can be usually implemented relatively quickly, and in most cases, they are associated with low cost. In the paper, we present the results of the behavioral experiment focused on raising the level of compliance with the payment of garbage collection fees in a selected municipality in the Slovak Republic. The experiment was implemented using the leaflets sent to residential households together with the invoice for the garbage collection in the municipality Hlohovec, Western Slovakia, in Spring 2021. The sample of about 10000 households was divided into three random groups, a control group and two intervention groups. Households in intervention group 1 were sent a leaflet using the social norm nudge, while households in intervention group 2 were sent a leaflet using the deterrence nudge. The social norm framing leaflet pointed out that in the municipality, the prevailing majority of people paid the garbage collection fee and encouraged recipients to join this majority. The deterrent leaflet reminded the recipients that if they did not pay the fee on time, enforcement proceedings would follow. This was aimed to increase the subjective perception of citizens of the enforcement proceedings in case of noncompliance. In the paper, we present and discuss the results from the experiment and formulate relevant generalizations for other municipalities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=municipal%20governments" title="municipal governments">municipal governments</a>, <a href="https://publications.waset.org/abstracts/search?q=garbage%20fee%20collection" title=" garbage fee collection"> garbage fee collection</a>, <a href="https://publications.waset.org/abstracts/search?q=behavioural%20intervention" title=" behavioural intervention"> behavioural intervention</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20norm" title=" social norm"> social norm</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence%20nudge" title=" deterrence nudge"> deterrence nudge</a> </p> <a href="https://publications.waset.org/abstracts/141017/decreasing-non-compliance-with-the-garbage-collection-fee-payment-a-case-study-from-the-intervention-in-a-municipality-in-the-slovak-republic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141017.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">191</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> Challenging the Constitutionality of Mandatory Sentences: A South African Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alphonso%20Goliath">Alphonso Goliath</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With mandatory minimum sentences, even with its qualification of “substantial and compelling circumstances”, the sentence severity for violent crimes has increased substantially to combat crime. Considering the upsurge in violent crime, the paper argues that minimum sentences failed to prevent or curb violent crime. These sentences deprive offenders more than what is reasonably necessary of their freedom to curb the offense and punish the offender. Minimum sentences amount to cruel, inhuman, and degrading punishment unjustified and vulnerable to constitutional challenge. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constitutionality" title="constitutionality">constitutionality</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=incapacitation" title=" incapacitation"> incapacitation</a>, <a href="https://publications.waset.org/abstracts/search?q=minimum%20sentencing%20legislation" title=" minimum sentencing legislation"> minimum sentencing legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=prison%20overcrowding" title=" prison overcrowding"> prison overcrowding</a>, <a href="https://publications.waset.org/abstracts/search?q=rehabilitation" title=" rehabilitation"> rehabilitation</a>, <a href="https://publications.waset.org/abstracts/search?q=recidivism" title=" recidivism"> recidivism</a>, <a href="https://publications.waset.org/abstracts/search?q=retribution" title=" retribution"> retribution</a>, <a href="https://publications.waset.org/abstracts/search?q=violent%20crime" title=" violent crime"> violent crime</a> </p> <a href="https://publications.waset.org/abstracts/154211/challenging-the-constitutionality-of-mandatory-sentences-a-south-african-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154211.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">83</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> South African Mandatory Minimum Sentencing: Causes and Consequences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alphonso%20Augustine%20Goliath">Alphonso Augustine Goliath</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In 1997 South Africa adopted legislation introducing severe mandatory minimum sentences. This was a political response to counter the escalating violent crime the country experienced when it transitioned to democracy. Despite minimum sentences being fully operational for more than two decades, violent crimes like murder and rape have not abated. This paper provides a critique of the efficacy of minimums sentences with a primary focus on the legislation’s main aim of preventing or curbing crime, its relationship with prison overcrowding, and its continued constitutionality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constitutionality" title="constitutionality">constitutionality</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=incapacitation" title=" incapacitation"> incapacitation</a>, <a href="https://publications.waset.org/abstracts/search?q=minimum%20sentencing%20legislation" title=" minimum sentencing legislation"> minimum sentencing legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=prison%20overcrowding" title=" prison overcrowding"> prison overcrowding</a>, <a href="https://publications.waset.org/abstracts/search?q=rehabilitation" title=" rehabilitation"> rehabilitation</a>, <a href="https://publications.waset.org/abstracts/search?q=recidivism" title=" recidivism"> recidivism</a>, <a href="https://publications.waset.org/abstracts/search?q=retribution" title=" retribution"> retribution</a>, <a href="https://publications.waset.org/abstracts/search?q=violent%20crime" title=" violent crime"> violent crime</a> </p> <a href="https://publications.waset.org/abstracts/154173/south-african-mandatory-minimum-sentencing-causes-and-consequences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154173.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">24</span> Prison Reforms: An Overview of the Nigerian Prisons as a Key Component of an Efficient Criminal Justice Delivery System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Foluke%20Dada">Foluke Dada</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Prisons all over the world are set up by law to provide restraint and custody for individuals accused or convicted of crimes by the state. The Nigerian prison dates back to the colonial era and is modelled after the British system. It is a system that lays emphasis on punishment and deterrence. It emphasises retribution rather than reformation. These, it can be argued, results in the inhuman conditions of Nigerian prisons and the conscienceless treatment of convicts and awaiting trial inmates in Nigerian prisons. This paper attempts an examination of the challenges currently beguiling Nigerian prisons, the need for reforms in the prison systems and the imperative of these reforms to an efficient criminal justice delivery system in the country. This paper further postulates that rehabilitation should be favoured as against retribution f the development of the Nigerian criminal justice system in line with the shift towards reform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminal%20justice" title="criminal justice">criminal justice</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=prison%20reforms" title=" prison reforms"> prison reforms</a>, <a href="https://publications.waset.org/abstracts/search?q=rehabilitation%20and%20retribution" title=" rehabilitation and retribution"> rehabilitation and retribution</a> </p> <a href="https://publications.waset.org/abstracts/30000/prison-reforms-an-overview-of-the-nigerian-prisons-as-a-key-component-of-an-efficient-criminal-justice-delivery-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30000.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">669</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> Unified Theory of the Security Dilemma: Geography, MAD and Democracy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arash%20Heydarian%20Pashakhanlou">Arash Heydarian Pashakhanlou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security%20dilemma" title="security dilemma">security dilemma</a>, <a href="https://publications.waset.org/abstracts/search?q=revisionism" title=" revisionism"> revisionism</a>, <a href="https://publications.waset.org/abstracts/search?q=status%20quo" title=" status quo"> status quo</a>, <a href="https://publications.waset.org/abstracts/search?q=anarchy" title=" anarchy"> anarchy</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertainty" title=" uncertainty"> uncertainty</a>, <a href="https://publications.waset.org/abstracts/search?q=tragedy" title=" tragedy"> tragedy</a>, <a href="https://publications.waset.org/abstracts/search?q=spiral" title=" spiral"> spiral</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a> </p> <a href="https://publications.waset.org/abstracts/141491/unified-theory-of-the-security-dilemma-geography-mad-and-democracy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141491.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">238</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">22</span> The Impact of the EU Competition Law on the Asian Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maria%20Casoria">Maria Casoria</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Throughout the last decade developing countries have been undergoing substantial reforms to promote the establishment of competition regimes, as consequence of the trade liberalization and the spread of a ‘competition awareness movement’ across the globe. The legislative trend affected the whole Asia. Notwithstanding the existence of extensive joint ventures, cartels and other collusive business relationships in this geographical area, almost all the countries have already passed or are committed to enforce specific laws in the field. The study dwells into legal solutions adopted in the five sub-regions in which the continent is commonly divided –i.e. Central, East, South, Southeast, and Western Asia- and, using a comparative methodology, shed lights on the main differences and similarities in place. The final outcome of the analysis is that, despite the undeniable divergences of approach, what links together the legislation in force in the region is the unveiled influence exercised by the European Union competition regulation. Consequently, in order to properly evaluate the deterrence of the rule of law in the sector concerned, it is fundamental to scrutinize the major role played by the EU and its policy for the evolution of pro-competitive practices in the continent. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asia" title="Asia">Asia</a>, <a href="https://publications.waset.org/abstracts/search?q=competition%20law" title=" competition law"> competition law</a>, <a href="https://publications.waset.org/abstracts/search?q=differences%20and%20similarities" title=" differences and similarities"> differences and similarities</a>, <a href="https://publications.waset.org/abstracts/search?q=European%20union" title=" European union"> European union</a>, <a href="https://publications.waset.org/abstracts/search?q=influences" title=" influences"> influences</a> </p> <a href="https://publications.waset.org/abstracts/64763/the-impact-of-the-eu-competition-law-on-the-asian-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64763.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">274</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">21</span> Supporting Densification through the Planning and Implementation of Road Infrastructure in the South African Context</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Govender">K. Govender</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Sinclair"> M. Sinclair</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper demonstrates a proof of concept whereby shorter trips and land use densification can be promoted through an alternative approach to planning and implementation of road infrastructure in the South African context. It briefly discusses how the development of the Compact City concept relies on a combination of promoting shorter trips and densification through a change in focus in road infrastructure provision. The methodology developed in this paper uses a traffic model to test the impact of synthesized deterrence functions on congestion locations in the road network through the assignment of traffic on the study network. The results from this study demonstrate that intelligent planning of road infrastructure can indeed promote reduced urban sprawl, increased residential density and mixed-use areas which are supported by an efficient public transport system; and reduced dependence on the freeway network with a fixed road infrastructure budget. The study has resonance for all cities where urban sprawl is seemingly unstoppable. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=compact%20cities" title="compact cities">compact cities</a>, <a href="https://publications.waset.org/abstracts/search?q=densification" title=" densification"> densification</a>, <a href="https://publications.waset.org/abstracts/search?q=road%20infrastructure%20planning" title=" road infrastructure planning"> road infrastructure planning</a>, <a href="https://publications.waset.org/abstracts/search?q=transportation%20modelling" title=" transportation modelling"> transportation modelling</a> </p> <a href="https://publications.waset.org/abstracts/114424/supporting-densification-through-the-planning-and-implementation-of-road-infrastructure-in-the-south-african-context" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114424.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">178</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">20</span> The Role of Flowering Pesticidal Plants for Sustainable Pest Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Baltazar%20Ndakidemi">Baltazar Ndakidemi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The resource-constrained farmers, especially those in sub-Saharan Africa, encounter significant challenges related to agriculture, notably diseases and pests. The sustainable means of pest management are not well known to farmers. As a result, some farmers use synthetic pesticides whose environmental impacts, ill health, and other negative impacts of synthetic pesticides on natural enemies have posed a great need for more sustainable means of pest management. Pesticidal plant resources can replace synthetic pesticides because their secondary metabolites can exhibit insecticidal activities such as deterrence, repellence, and pests' mortality. Additionally, the volatiles from these plants can have positive effects of attracting populations of natural enemies. Pesticidal plants can be grown as field margin plants or in strips for supporting natural enemies' populations. However, this is practically undetermined. Hence, there is a need to investigate the roles played by pesticidal plants in supporting natural enemies of pests and their applications in different cropping systems such as legumes. This study investigates different pesticidal plants with a high potential for pest control in agricultural fields. The information sheds light on potential plants that can be used for different crop pests. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=natural%20enemies" title="natural enemies">natural enemies</a>, <a href="https://publications.waset.org/abstracts/search?q=biological%20control" title=" biological control"> biological control</a>, <a href="https://publications.waset.org/abstracts/search?q=synthetic%20pesticides" title=" synthetic pesticides"> synthetic pesticides</a>, <a href="https://publications.waset.org/abstracts/search?q=pesticidal%20plants" title=" pesticidal plants"> pesticidal plants</a>, <a href="https://publications.waset.org/abstracts/search?q=predators" title=" predators"> predators</a>, <a href="https://publications.waset.org/abstracts/search?q=parasitoids" title=" parasitoids"> parasitoids</a> </p> <a href="https://publications.waset.org/abstracts/175842/the-role-of-flowering-pesticidal-plants-for-sustainable-pest-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175842.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">68</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">19</span> Challenge of the Credibility of Witnesses in the International Criminal Court and the Precondition to Establish the Truth</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Romina%20Beqiri">Romina Beqiri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the context of the prosecution of those responsible for the commission of the most hideous crimes and the fight against impunity, a fundamental role is played by witnesses of the crimes who contribute to ascertaining the ‘procedural truth’. This article examines recent decisions and legislation of the Hague-based International Criminal Court in terms of the endangerment of the integrity of the criminal proceedings in consequence of witness tampering. The analysis focuses on the new developments in the courtroom and the academia, in particular, on the first-ever sentence confirming the charges of corruptly influencing witnesses, interpretation of presenting false evidence and giving false testimony when under an obligation to tell the truth. Confronted with recent tampering with witnesses and their credibility at stake in the ongoing cases, the research explores different Court’s decisions and scholars’ legal disputes concerning the deterrence approach to punish the authors of offences against the administration of justice when committed intentionally. Therefore, the analysis concludes that the Court cannot tolerate any witness false testimony and should enhance consistency and severity of sanctions for the sake of fair trial and end impunity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=International%20Criminal%20Court" title="International Criminal Court">International Criminal Court</a>, <a href="https://publications.waset.org/abstracts/search?q=administration%20of%20justice" title=" administration of justice"> administration of justice</a>, <a href="https://publications.waset.org/abstracts/search?q=credibility%20of%20witness" title=" credibility of witness"> credibility of witness</a>, <a href="https://publications.waset.org/abstracts/search?q=fair%20trial" title=" fair trial"> fair trial</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20testimony" title=" false testimony"> false testimony</a>, <a href="https://publications.waset.org/abstracts/search?q=witness%20tampering" title=" witness tampering"> witness tampering</a> </p> <a href="https://publications.waset.org/abstracts/95054/challenge-of-the-credibility-of-witnesses-in-the-international-criminal-court-and-the-precondition-to-establish-the-truth" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95054.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18</span> Insider Fraud and its Risks to FinTechs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Claire%20Maillet">Claire Maillet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Insider fraud, including its various forms such as employee fraud or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective or past employer. ‘Employee’ covers anyone employed by the company, including contractors, agency workers, directors and part time staff. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic and the cost-of-living crisis, which have generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime; Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud. Given that the number of FinTechs is on the rise and there is a significant lack of empirically based solutions for reducing insider fraud, these are gaps in the research space that this thesis aims to fill. Finally, Kassem (2022) notes that “academic research plays a crucial role in raising awareness about fraud and researching effective methods for countering it”. Thus, this thesis may be used as an opportune tool to provide an extensive list of controls spanning detection, deterrence and prevention, that are recommended to be implemented to help combat the insider threat. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=insider%20fraud" title="insider fraud">insider fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20fraud" title=" internal fraud"> internal fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=Covid-19" title=" Covid-19"> Covid-19</a> </p> <a href="https://publications.waset.org/abstracts/190043/insider-fraud-and-its-risks-to-fintechs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190043.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">22</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17</span> An Analysis of the Efficacy of Criminal Sanctions in Combating Cartel Conduct: The Case of South Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Tavuyanago">S. Tavuyanago</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cartels within the international competition law framework have been dubbed the most egregious of competition law violations; this is because they entail a concerted effort by two or more competitor firms to knowingly ‘rob’ consumers of their welfare through their cooperation instead of competition. The net effect of cartel conduct is that the market is distorted as the colluding firms gain enough market power to constrain the supply of goods or services, ultimately driving up prices. As a result, consumers end up paying inflated prices for goods and services, which eventually affects their welfare. It is against this backdrop that competition authorities worldwide have mounted a robust fight against the proliferation of cartels. In South Africa, the fight against cartels saw an amendment to the Competition Act to allow for criminal prosecution of individuals who cause their firms to take part in cartels. The Competition Amendment Act 1 of 2009 introduced section 73A into the principal Competition Act, making it a criminal offence to engage in cartel conduct. This paper assesses the rationale for criminalisation of cartel conduct, discusses the challenges or potential challenges associated with criminalisation, and provides an evaluation of the efficacy of criminalisation of cartel conduct. It questions whether criminal sanctions for cartel conduct as a competition enforcement tool aimed at deterring such conduct are generally effective and whether they have been effective in South Africa specifically. It concludes by offering recommendations on how to effectively root out cartels. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cartels" title="cartels">cartels</a>, <a href="https://publications.waset.org/abstracts/search?q=criminalisation" title=" criminalisation"> criminalisation</a>, <a href="https://publications.waset.org/abstracts/search?q=competition" title=" competition"> competition</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=South%20Africa" title=" South Africa"> South Africa</a> </p> <a href="https://publications.waset.org/abstracts/156959/an-analysis-of-the-efficacy-of-criminal-sanctions-in-combating-cartel-conduct-the-case-of-south-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156959.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">99</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> To Stay or to Go: The Death Penalty Phenomenon and the Dilemma of the Nigerian Government</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=James%20Etim%20Archibong">James Etim Archibong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The death penalty, to be or not to be, is a topical and hugely divisive issue in several countries. The United Nations recommends its universal abolition. Europe has abolished it, while some countries limit the practice to heinous crimes. Nigeria is one of the countries that have retained the death penalty. In 2004, the federal government placed a moratorium on execution, which was breached in 2006, 2013 and 2016. Nigeria currently has about three thousand inmates on death row because governors are reluctant to sign execution warrants. Human rights groups have consistently called for its abolition in Nigeria, but this has been rebuffed by the government. Nigeria currently finds itself in a dilemma between the global campaign to end the practice and the local support for its retention. This paper, employing a doctrinal approach, examines the concept of capital punishment in Nigeria from the first execution in 1971 to date. It has also examined the debate to abolish or retain it against the backdrop of Nigeria’s present social, economic and multicultural circumstances. It finds that the death penalty is a human right issue and Nigeria should join the majority of states that have dispensed with the practice. While the government contemplates which way to go, amid the impasse, the paper recommends, in the interim, an official, legally backed a moratorium on execution; commuting of death sentences to life imprisonment, and eventually expunging it from the constitution in the ongoing constitutional review. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=death%20penalty" title="death penalty">death penalty</a>, <a href="https://publications.waset.org/abstracts/search?q=capital%20punishment" title=" capital punishment"> capital punishment</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=right%20to%20life" title=" right to life"> right to life</a> </p> <a href="https://publications.waset.org/abstracts/140585/to-stay-or-to-go-the-death-penalty-phenomenon-and-the-dilemma-of-the-nigerian-government" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140585.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">178</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> Does Citizens’ Involvement Always Improve Outcomes: Procedures, Incentives and Comparative Advantages of Public and Private Law Enforcement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Avdasheva%20Svetlanaa">Avdasheva Svetlanaa</a>, <a href="https://publications.waset.org/abstracts/search?q=Kryuchkova%20Polinab"> Kryuchkova Polinab </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Comparative social efficiency of private and public enforcement of law is debated. This question is not of academic interest only, it is also important for the development of the legal system and regulations. Generally, involvement of ‘common citizens’ in public law enforcement is considered to be beneficial, while involvement of interest groups representatives is not. Institutional economics as well as law and economics consider the difference between public and private enforcement to be rather mechanical. Actions of bureaucrats in government agencies are assumed to be driven by the incentives linked to social welfare (or other indicator of public interest) and their own benefits. In contrast, actions of participants in private enforcement are driven by their private benefits. However administrative law enforcement may be designed in such a way that it would become driven mainly by individual incentives of alleged victims. We refer to this system as reactive public enforcement. Citizens may prefer using reactive public enforcement even if private enforcement is available. However replacement of public enforcement by reactive version of public enforcement negatively affects deterrence and reduces social welfare. We illustrate the problem of private vs pure public and private vs reactive public enforcement models with the examples of three legislation subsystems in Russia – labor law, consumer protection law and competition law. While development of private enforcement instead of public (especially in reactive public model) is desirable, replacement of both public and private enforcement by reactive model is definitely not. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=public%20enforcement" title="public enforcement">public enforcement</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20complaints" title=" private complaints"> private complaints</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20errors" title=" legal errors"> legal errors</a>, <a href="https://publications.waset.org/abstracts/search?q=competition%20protection" title=" competition protection"> competition protection</a>, <a href="https://publications.waset.org/abstracts/search?q=labor%20law" title=" labor law"> labor law</a>, <a href="https://publications.waset.org/abstracts/search?q=competition%20law" title=" competition law"> competition law</a>, <a href="https://publications.waset.org/abstracts/search?q=russia" title=" russia"> russia</a> </p> <a href="https://publications.waset.org/abstracts/20957/does-citizens-involvement-always-improve-outcomes-procedures-incentives-and-comparative-advantages-of-public-and-private-law-enforcement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20957.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">494</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> Immunity Boosting and Balanced Diet Prevents Viral Infections with Special Emphasis on COVID-19</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20R.%20Padma">K. R. Padma</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20R.%20Don"> K. R. Don</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background and aims: A balanced nutritional diet is essential in maintaining immunity and for deterrence as well as desisting of viral infections. Nevertheless, currently, very less information is available online regarding nutrition consumption during the period of coronavirus infection, i.e. (COVID-19). In our systematic review article, we portrayed and aimed to evaluate evidence from various previous clinical trials, which was based on nutritional interventions for viral diseases and given a concise overview. Methods: A systematic search was carried out employing 3 key medical databases: PubMed®, Web of Science®, and SciVerse Scopus®. Studies were performed and evaluated suitable if clinical trials in humans, appropriate immunological parameters on viral and respiratory infections, need to perform. Basic Clinical trials on nutritional vitamins, minerals, nutraceuticals as well as probiotics were included. Results: We have explored 10 review articles and extracted data for our study. A total of > 2000 participants were included and excluded several other trace elements as well as various vitamins, but in inclusion criteria mainly concentrated on those who have shown propitious immune-modulatory effects against viral respiratory infections. Conclusions: We have encapsulated the potential health benefits of some minerals, vitamins, as well as certain designer foods, nutraceuticals, and probiotics in viral infections. Based on this nutritional interventional strategy available from our present data, it could be promising to abstain and reduce the COVID-19 infection replication and boost our immunity to fight against the virus. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title="COVID-19">COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=immunity" title=" immunity"> immunity</a>, <a href="https://publications.waset.org/abstracts/search?q=vitamins" title=" vitamins"> vitamins</a>, <a href="https://publications.waset.org/abstracts/search?q=nutritional%20intervention%20strategy" title=" nutritional intervention strategy"> nutritional intervention strategy</a> </p> <a href="https://publications.waset.org/abstracts/128859/immunity-boosting-and-balanced-diet-prevents-viral-infections-with-special-emphasis-on-covid-19" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128859.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Impact of America's Anti-Ballistic Missile System (ABMS) on Power Dynamics of the World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fehmeen%20Anwar">Fehmeen Anwar</a>, <a href="https://publications.waset.org/abstracts/search?q=Ujala%20Liaqat"> Ujala Liaqat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For over half a century, U.S. and the Soviet Union have been at daggers drawn with each other. Both leading powers of the world have been struggling hard to surpass each other in military and other technological fields. This neck-to-neck competition turned in favour of U.S. in the early 1990s when USSR had to face economic stagnation and later dismemberment of several of its states. The predominance of U.S. is still evident to date, rather it continues to grow. With this proposed defence program i.e. Anti-Ballistic Missile System, the U.S. will have a considerable chance of intercepting any nuclear strike by Russia, which re-asserts U.S. dominance in the region and creating a security dilemma for Russia and other states. The question is whether America’s recent nuclear deterrence project is merely to counter nuclear threats from Iran and North Korea or is it purely directed towards Russia, thus ensuring complete military supremacy in the world. Although U.S professes to direct its Anti-Ballistic Missile System (ABMS) against the axis of evil (Iran and North Korea), yet the deployment of this system in the East European territory undermines the Russian nuclear strategic capability, as this enables U.S. to initiate an attack and guard itself from retaliatory strike, thus disturbing the security equilibrium in Europe. The implications of this program can lead to power imbalance which can lead to the emergence of fundamentally different paradigm of international politics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anti-Ballistic%20Missile%20System%20%28ABMS%29" title="Anti-Ballistic Missile System (ABMS)">Anti-Ballistic Missile System (ABMS)</a>, <a href="https://publications.waset.org/abstracts/search?q=cold-war" title=" cold-war"> cold-war</a>, <a href="https://publications.waset.org/abstracts/search?q=axis%20of%20evil" title=" axis of evil"> axis of evil</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20dynamics" title=" power dynamics"> power dynamics</a> </p> <a href="https://publications.waset.org/abstracts/10134/impact-of-americas-anti-ballistic-missile-system-abms-on-power-dynamics-of-the-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10134.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> Unveiling Irregular Migration: An Evaluation of Airport Interventions and Geographic Trends in Sri Lanka</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abewardhana%20Arachchi%20Bandula%20Dimuthu%20Priyadarshana%20Abewardhana">Abewardhana Arachchi Bandula Dimuthu Priyadarshana Abewardhana</a>, <a href="https://publications.waset.org/abstracts/search?q=Rasika%20Nirosh%20Gonapinuwala%20Vithanage"> Rasika Nirosh Gonapinuwala Vithanage</a>, <a href="https://publications.waset.org/abstracts/search?q=Karawe%20Thanthreege%20Amila%20Madusanka%20Perera"> Karawe Thanthreege Amila Madusanka Perera</a>, <a href="https://publications.waset.org/abstracts/search?q=Asanka%20Sanjeewa%20Karunarathne"> Asanka Sanjeewa Karunarathne</a>, <a href="https://publications.waset.org/abstracts/search?q=Navullage%20Mayuri%20Radhika%20Perera"> Navullage Mayuri Radhika Perera</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The phenomenon of irregular migration and human trafficking presents multifaceted challenges to Sri Lanka, with specific focus on the migration routes to the United Arab Emirates (UAE), the Sultanate of Oman, and Malaysia. This research critically assesses the efficacy of a pilot project instituted at Bandaranaike International Airport aimed at the identification and deterrence of potential irregular migrants. Additionally, the study conducts a nuanced analysis of the geographical tendencies pertaining to passengers who revise their migration intentions at the airport. Pertinently, the findings indicate that Colombo and Gampaha Districts emerge as the most susceptible to human trafficking, with Galle, Nuwaraeliya, Rathnapura, and Polonnaruwa Districts following as areas of elevated concern, particularly within the framework of the 'visit visa' scenario. These insights emanate from an extensive data collection period spanning 50 days of the pilot project, encompassing 1,479 passengers, of which 46 returnees reported to the Safe Migration Promotion Unit. The research is founded on the twin objectives of comprehending the motivations of passengers and evaluating the effectiveness of interventions, with a view to devising precision-targeted prevention strategies. Through this endeavor, the study actively contributes to the safeguarding of the rights and welfare of migrants, significantly advancing the ongoing battle against irregular migration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=irregular%20migration" title="irregular migration">irregular migration</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20trafficking" title=" human trafficking"> human trafficking</a>, <a href="https://publications.waset.org/abstracts/search?q=airport%20interventions" title=" airport interventions"> airport interventions</a>, <a href="https://publications.waset.org/abstracts/search?q=geographic%20trends" title=" geographic trends"> geographic trends</a> </p> <a href="https://publications.waset.org/abstracts/175606/unveiling-irregular-migration-an-evaluation-of-airport-interventions-and-geographic-trends-in-sri-lanka" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175606.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Institutional Capacity of Health Care Institutes for Diagnosis and Management of Common Genetic Diseases-a Study from a North Coastal District of Andhra Pradesh, India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Koteswara%20Rao%20Pagolu">Koteswara Rao Pagolu</a>, <a href="https://publications.waset.org/abstracts/search?q=Raghava%20Rao%20Tamanam"> Raghava Rao Tamanam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In India, genetic disease is a disregarded service element in the community health- protection system. This study aims to gauge the accessibility of services for treating genetic disorders and also to evaluate the practices on deterrence and management services in the district health system. A cross-sectional survey of selected health amenities in the government health sector was conducted from 15 primary health centers (PHC’s), 4 community health centers (CHC’s), 1 district government hospital (DGH) and 3 referral hospitals (RH’s). From these, the existing manpower like 130 medical officers (MO’s), 254 supporting staff, 409 nursing staff (NS) and 45 lab technicians (LT’s) was examined. From the side of private health institutions, 25 corporate hospitals (CH’s), 3 medical colleges (MC’s) and 25 diagnostic laboratories (DL’s) were selected for the survey and from these, 316 MO’s, 995 NS and 254 LT’s were also reviewed. The findings show that adequate staff was in place at more than 70% of health centers, but none of the staff have obtained any operative training on genetic disease management. The largest part of the DH’s had rudimentary infrastructural and diagnostic facilities. However, the greater part of the CHC’s and PHC’s had inadequate diagnostic facilities related to genetic disease management. Biochemical, molecular, and cytogenetic services were not available at PHC’s and CHC’s. DH’s, RH’s, and all selected medical colleges were found to have offered the basic Biochemical genetics units during the survey. The district health care infrastructure in India has a shortage of basic services to be provided for the genetic disorder. With some policy resolutions and facility strengthening, it is possible to provide advanced services for a genetic disorder in the district health system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=district%20health%20system" title="district health system">district health system</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20disorder" title=" genetic disorder"> genetic disorder</a>, <a href="https://publications.waset.org/abstracts/search?q=infrastructural%20amenities" title=" infrastructural amenities"> infrastructural amenities</a>, <a href="https://publications.waset.org/abstracts/search?q=management%20practices" title=" management practices"> management practices</a> </p> <a href="https://publications.waset.org/abstracts/139234/institutional-capacity-of-health-care-institutes-for-diagnosis-and-management-of-common-genetic-diseases-a-study-from-a-north-coastal-district-of-andhra-pradesh-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139234.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">179</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> Justice and the Juvenile: Changing Trends and Developments</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shikhar%20Shrivastava">Shikhar Shrivastava</a>, <a href="https://publications.waset.org/abstracts/search?q=Varun%20Khare"> Varun Khare</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: We are confronted by a society that is becoming more complex, more mobile, and more dysfunctional. Teen pregnancy, suicide, elopement, and the perusal of dangerous drugs have become commonplace. In addition, children do not settle their disputes as they once did. Guns and knives are quotidian. Therefore, it has been an exigent to have a "Juvenile Code" that would provide specific substantive and procedural rules for juveniles in the justice system. However, until the twentieth century, there was little difference between how the justice system treated adults and children. Age was considered only in terms of appropriate punishment and juveniles were eligible for the same punishment as adults. Findings: The increased prevalence and legislative support for specialized courts, Juvenile Justice Boards, including juvenile drug, mental health and truancy court programs, as well as diversion programs and evidence-based approaches into the fabric of juvenile justice are just a few examples of recent advances. In India, various measures were taken to prosecute young offenders who committed violent crimes as adults. But it was argued that equating juveniles with adult criminals was neither scientifically correct nor normatively defensible. It would defeat the very purpose of the justice system. Methodology and Conclusion: This paper attempts to bring forth the results of analytical and descriptive research that examined changing trends in juvenile justice legislation. It covers the investigative and inspective practices of police, the various administrative agencies who have roles in implementing the legislation, the courts, and the detention centers. In this paper we shall discuss about how the juvenile justice system is the dumping ground for many of a youths’ problem. The changing notions of justice, from retributive to restorative and rehabilitative shall be discussed. A comparative study of the Juvenile act in India and that of the U.S has been discussed. Specific social institutions and forces that explain juvenile delinquency are identified. In addition, various influences on juvenile delinquency are noted, such as families, schools, peer groups and communities. The text concludes by addressing socialization, deterrence, imprisonments, alternatives, restitution and preventions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=juvenile" title="juvenile">juvenile</a>, <a href="https://publications.waset.org/abstracts/search?q=justice%20system" title=" justice system"> justice system</a>, <a href="https://publications.waset.org/abstracts/search?q=retributive" title=" retributive"> retributive</a>, <a href="https://publications.waset.org/abstracts/search?q=rehabilitative" title=" rehabilitative"> rehabilitative</a>, <a href="https://publications.waset.org/abstracts/search?q=delinquency" title=" delinquency "> delinquency </a> </p> <a href="https://publications.waset.org/abstracts/22518/justice-and-the-juvenile-changing-trends-and-developments" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22518.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">457</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=deterrence&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=deterrence&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>