CINXE.COM

Search results for: whistleblower protection

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: whistleblower protection</title> <meta name="description" content="Search results for: whistleblower protection"> <meta name="keywords" content="whistleblower protection"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="whistleblower protection" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="whistleblower protection"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2370</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: whistleblower protection</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2370</span> Employee Whistleblower Protection: An Analysis of Malaysian Law and Islamic Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashgar%20Ali%20Ali%20Mohamed">Ashgar Ali Ali Mohamed</a>, <a href="https://publications.waset.org/abstracts/search?q=Farheen%20Baig%20Sardar%20Baig"> Farheen Baig Sardar Baig </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Malaysia, the Whistle-blower Protection Act 2010 provides protection to a person in an organization who exposes misconduct, alleged dishonest or illegal activity that violates the existing laws, among others. For example, alleged fraud, health and safety violations, and corruption, to name but a few. Undeniable, most whistle-blowers are internal to an organisation who report misconduct of a fellow employee or superior within their company and they frequently face reprisal at the hands of the organisation which they have accused. In fact, many people do not consider blowing the whistle because of fear of retaliation and losing their relationships at workplace. Although whistle-blowers are protected under law from employer retaliation, there have been many cases where punishment for whistleblowing has occurred, such as suspension, demotion, termination, or harsh mistreatment by other employees. Hence, this paper will analyse the adequacy of the legal protection available to employees who whistle-blow on their employers with reference to the Whistle-blower Protection Act 2010. Reference will also be made to the approach taken in other selected jurisdiction with a view of highlighting the adequacy of the Malaysian legislation on this subject besides strengthen employee whistle-blower protection. Further, reference is also made to the Islamic approach on this subject with particular reference to the concept of amr-bil-Ma’roof (ordering for acknowledged virtues) and nahi anil munkar (forbidding from sin). Allah (SWT) says: “And there should be a group amongst you who invite towards good, order for acknowledged virtues, forbid from sin and these it is that are the successful ones” (Al Imran(Chp 3), verse 104). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection" title="whistleblower protection">whistleblower protection</a>, <a href="https://publications.waset.org/abstracts/search?q=employee%20whistleblower" title=" employee whistleblower"> employee whistleblower</a>, <a href="https://publications.waset.org/abstracts/search?q=detrimental%20and%20reprisal" title=" detrimental and reprisal"> detrimental and reprisal</a>, <a href="https://publications.waset.org/abstracts/search?q=Malaysian%20law" title=" Malaysian law "> Malaysian law </a> </p> <a href="https://publications.waset.org/abstracts/21044/employee-whistleblower-protection-an-analysis-of-malaysian-law-and-islamic-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21044.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">551</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2369</span> Whistleblowing a Contemporary Topic Concerning Businesses</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andreas%20Kapardis">Andreas Kapardis</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20Krambia-Kapardis"> Maria Krambia-Kapardis</a>, <a href="https://publications.waset.org/abstracts/search?q=Sofia%20Michaelides-Mateou"> Sofia Michaelides-Mateou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Corruption and economic crime is a serious problem affecting the sustainability of businesses in the 21st century. Nowadays, many corruption or fraud cases come to light thanks to whistleblowers. This article will first discuss the concept of whistleblowing as well as some relevant legislation enacted around the world. Secondly, it will discuss the findings of a survey of whistleblowers or could-have-been whistleblowers. Finally, suggestions for the development of a comprehensive whistleblowing framework will be considered. Whistleblowing can be described as expressing a concern about a wrongdoing within an organization, such as a corporation, an association, an institution or a union. Such concern must be in the public interest and in good faith and should relate to the cover up of matters that could potentially result in a miscarriage of justice, a crime, criminal offence and threats to health and safety. Whistleblowing has proven to be an effective anti-corruption mechanism and a powerful tool that helps deterring fraud, violations, and malpractices within organizations, corporations and the public sector. Research in the field of whistleblowing has concentrated on the reasons for whistleblowing and financial bounties; the effectiveness of whistleblowing; whistleblowing being a prosocial behavior with a psychological perspective and consequences; as a tool in protecting shareholders, saving lives and billions of dollars of public funds. Whilst, no other study of whistleblowing has been carried out on whistleblowers or intended whistleblowers. The study reported in the current paper analyses the findings of 74 whistleblowers or intended whistleblowers, the reasons behind their decision to blow the whistle, or not to proceed to blow the whistle and any regrets they may have had. In addition a profile of a whistleblower is developed concerning their age, gender, marital and family status and position in an organization. Lessons learned from the intended whistleblowers and in response to the questions if they would be willing to blow the whistle again show that enacting legislation to protect the whistleblower is not enough. Similarly, rewarding the whistleblower does not appear to provide the whistleblower with an incentive since the majority noted that “work ethics is more important than financial rewards”. We recommend the development of a comprehensive and holistic framework for the protection of the whistleblower and to ensure that remedial actions are immediately taken once a whistleblower comes forward. The suggested framework comprises (a) hard legislation in ensuring the whistleblowers follow certain principles when blowing the whistle and, in return, are protected for a period of 5 years from being fired, dismissed, bullied, harassed; (b) soft legislation in establishing an agency to firstly ensure psychological and legal advice is provided to the whistleblowers and secondly any required remedial action is immediately taken to avert the undesirable events reported by a whistleblower from occurring and, finally; (c) mechanisms to ensure the coordination of actions taken. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=whistleblowing" title="whistleblowing">whistleblowing</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20ethics" title=" business ethics"> business ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=legislation" title=" legislation"> legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=business" title=" business"> business</a> </p> <a href="https://publications.waset.org/abstracts/40720/whistleblowing-a-contemporary-topic-concerning-businesses" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40720.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">309</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2368</span> The Confiscation of Ill-Gotten Gains in Pollution: The Taiwan Experience and the Interaction between Economic Analysis of Law and Environmental Economics Perspectives</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chiang-Lead%20Woo">Chiang-Lead Woo </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In reply to serious environmental problems, the Taiwan government quickly adjusted some articles to suit the needs of environmental protection recently, such as the amendment to article 190-1 of the Taiwan Criminal Code. The transfer of legislation comes as an improvement which canceled the limitation of ‘endangering public safety’. At the same time, the article 190-1 goes from accumulative concrete offense to abstract crime of danger. Thus, the public looks forward to whether environmental crime following the imposition of fines or penalties works efficiently in anti-pollution by the deterrent effects. However, according to the addition to article 38-2 of the Taiwan Criminal Code, the confiscation system seems controversial legislation to restrain ill-gotten gains. Most prior studies focused on comparisons with the Administrative Penalty Law and the Criminal Code in environmental issue in Taiwan; recently, more and more studies emphasize calculations on ill-gotten gains. Hence, this paper try to examine the deterrent effect in environmental crime by economic analysis of law and environmental economics perspective. This analysis shows that only if there is an extremely high probability (equal to 100 percent) of an environmental crime case being prosecuted criminally by Taiwan Environmental Protection Agency, the deterrent effects will work. Therefore, this paper suggests deliberating the confiscation system from supplementing the System of Environmental and Economic Accounting, reasonable deterrent fines, input management, real-time system for detection of pollution, and whistleblower system, environmental education, and modernization of law. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=confiscation" title="confiscation">confiscation</a>, <a href="https://publications.waset.org/abstracts/search?q=ecosystem%20services" title=" ecosystem services"> ecosystem services</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20crime" title=" environmental crime"> environmental crime</a>, <a href="https://publications.waset.org/abstracts/search?q=ill-gotten%20gains" title=" ill-gotten gains"> ill-gotten gains</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20deterrent%20effect" title=" the deterrent effect"> the deterrent effect</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20system%20of%20environmental%20and%20economic%20accounting" title=" the system of environmental and economic accounting"> the system of environmental and economic accounting</a> </p> <a href="https://publications.waset.org/abstracts/98335/the-confiscation-of-ill-gotten-gains-in-pollution-the-taiwan-experience-and-the-interaction-between-economic-analysis-of-law-and-environmental-economics-perspectives" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98335.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2367</span> Food Consumer Protection in Moroccan Legal System: A Systematic Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bouchaib%20Gazzaz">Bouchaib Gazzaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Mounir%20Mehdi"> Mounir Mehdi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to ensure consumer food protection, the food industry has a legal obligation to provide food products that comply with the requirements of the legislation in force. National regulations in this area occupy an important place in the food control system in terms of consumer protection. This article discusses the legal and regulatory framework of food safety and consumer protection in Moroccan law. We used the doctrinal research approach by analyzing the judicial normative and bibliographic legal research. As a result, we were able to present the basic principles of consumer food protection by showing to what extent the food safety law provides effective consumer protection in Morocco. We have concluded that there is an impact -in terms of consumer legal protection- of food law reform on the concept of food safety. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20safety" title="food safety">food safety</a>, <a href="https://publications.waset.org/abstracts/search?q=Morocco" title=" Morocco"> Morocco</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20protection" title=" consumer protection"> consumer protection</a>, <a href="https://publications.waset.org/abstracts/search?q=framework" title=" framework"> framework</a>, <a href="https://publications.waset.org/abstracts/search?q=food%20law" title=" food law"> food law</a> </p> <a href="https://publications.waset.org/abstracts/146727/food-consumer-protection-in-moroccan-legal-system-a-systematic-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146727.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">240</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2366</span> Analysis of SCR-Based ESD Protection Circuit on Holding Voltage Characteristics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yong%20Seo%20Koo">Yong Seo Koo</a>, <a href="https://publications.waset.org/abstracts/search?q=Jong%20Ho%20Nam"> Jong Ho Nam</a>, <a href="https://publications.waset.org/abstracts/search?q=Yong%20Nam%20Choi"> Yong Nam Choi</a>, <a href="https://publications.waset.org/abstracts/search?q=Dae%20Yeol%20Yoo"> Dae Yeol Yoo</a>, <a href="https://publications.waset.org/abstracts/search?q=Jung%20Woo%20Han"> Jung Woo Han</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a silicon controller rectifier (SCR) based ESD protection circuit for IC. The proposed ESD protection circuit has low trigger voltage and high holding voltage compared with conventional SCR ESD protection circuit. Electrical characteristics of the proposed ESD protection circuit are simulated and analyzed using TCAD simulator. The proposed ESD protection circuit verified effective low voltage ESD characteristics with low trigger voltage and high holding voltage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electro-static%20discharge%20%28ESD%29" title="electro-static discharge (ESD)">electro-static discharge (ESD)</a>, <a href="https://publications.waset.org/abstracts/search?q=silicon%20controlled%20rectifier%20%28SCR%29" title=" silicon controlled rectifier (SCR)"> silicon controlled rectifier (SCR)</a>, <a href="https://publications.waset.org/abstracts/search?q=holding%20voltage" title=" holding voltage"> holding voltage</a>, <a href="https://publications.waset.org/abstracts/search?q=protection%20circuit" title=" protection circuit"> protection circuit</a> </p> <a href="https://publications.waset.org/abstracts/9524/analysis-of-scr-based-esd-protection-circuit-on-holding-voltage-characteristics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9524.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">379</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2365</span> Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tomy%20Prihananto">Tomy Prihananto</a>, <a href="https://publications.waset.org/abstracts/search?q=Damar%20Apri%20Sudarmadi"> Damar Apri Sudarmadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights. This paper aims to describe the arrangement of data management and data management in Indonesia. This paper is a descriptive research with qualitative approach and collecting data from literature study. Results of this paper are comprehensive arrangement of data that have been set up as a technical requirement of data protection by encryption methods. Arrangements on encryption and protection of personal data are mutually reinforcing arrangements in the protection of personal data. Indonesia has two important and immediately enacted laws that provide protection for the privacy of information that is part of human rights. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title="Indonesia">Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a> </p> <a href="https://publications.waset.org/abstracts/93122/strengthening-legal-protection-of-personal-data-through-technical-protection-regulation-in-line-with-human-rights" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">182</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2364</span> Efficient Backup Protection for Hybrid WDM/TDM GPON System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Elmahdi%20Mohammadine">Elmahdi Mohammadine</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahouzi%20Esmail"> Ahouzi Esmail</a>, <a href="https://publications.waset.org/abstracts/search?q=Najid%20Abdellah"> Najid Abdellah </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This contribution aims to present a new protected hybrid WDM/TDM PON architecture using Wavelength Selective Switches and Optical Line Protection devices. The objective from using these technologies is to improve flexibility and enhance the protection of GPON networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wavlenght%20Division%20Multiplexed%20Passive%20Optical%20Network%20%28WDM-PON%29" title="Wavlenght Division Multiplexed Passive Optical Network (WDM-PON)">Wavlenght Division Multiplexed Passive Optical Network (WDM-PON)</a>, <a href="https://publications.waset.org/abstracts/search?q=Time%20Division%20Multiplexed%20%20PON%20%28TDM-PON%29" title=" Time Division Multiplexed PON (TDM-PON)"> Time Division Multiplexed PON (TDM-PON)</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture" title=" architecture"> architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=Protection" title=" Protection"> Protection</a>, <a href="https://publications.waset.org/abstracts/search?q=Wavelength%20Selective%20Switches%20%28WSS%29" title=" Wavelength Selective Switches (WSS)"> Wavelength Selective Switches (WSS)</a>, <a href="https://publications.waset.org/abstracts/search?q=Optical%20Line%20Protection%20%28OLP%29" title=" Optical Line Protection (OLP)"> Optical Line Protection (OLP)</a> </p> <a href="https://publications.waset.org/abstracts/18804/efficient-backup-protection-for-hybrid-wdmtdm-gpon-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18804.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">542</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2363</span> Distance Protection Performance Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelsalam%20Omar">Abdelsalam Omar </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents simulation-based case study that indicate the need for accurate dynamic modeling of distance protection relay. In many cases, a static analysis based on current and voltage phasors may be sufficient to assess the performance of distance protection. There are several circumstances under which such a simplified study does not provide the depth of analysis necessary to obtain accurate results, however. This letter present study of the influences of magnetizing inrush and power swing on the performance of distance protection relay. One type of numerical distance protection relay has been investigated: 7SA511. The study has been performed in order to demonstrate the relay response when dynamic model of distance relay is utilized. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distance%20protection" title="distance protection">distance protection</a>, <a href="https://publications.waset.org/abstracts/search?q=magnitizing%20inrush" title=" magnitizing inrush"> magnitizing inrush</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20swing" title=" power swing"> power swing</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20model%20of%20protection%20relays" title=" dynamic model of protection relays"> dynamic model of protection relays</a>, <a href="https://publications.waset.org/abstracts/search?q=simulatio" title=" simulatio"> simulatio</a> </p> <a href="https://publications.waset.org/abstracts/21116/distance-protection-performance-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21116.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">488</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2362</span> Lightning Protection Design Applied to Sustainable Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sylvain%20Fauveaux">Sylvain Fauveaux</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Nowicki"> T. Nowicki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Lightning protection is nowadays applied worldwide since the advent of international standards. Lightning protection is widely justified by the casualties and damages involved. As a matter of fact, the lightning business is constantly growing as more and more sensible areas need to be protected. However, the worldwide demand of copper materiel is increasing as well, its price too. Furthermore, the most frequently used method of protection is consuming a lot of copper. The copper production is also consuming a large amount of natural and power resources, not to mention the ecologic balance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ESEAT" title="ESEAT">ESEAT</a>, <a href="https://publications.waset.org/abstracts/search?q=Lightning%20protection" title=" Lightning protection "> Lightning protection </a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20resources%20management" title=" natural resources management"> natural resources management</a>, <a href="https://publications.waset.org/abstracts/search?q=NF%20C%2017-102" title=" NF C 17-102"> NF C 17-102</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20development" title=" sustainable development"> sustainable development</a> </p> <a href="https://publications.waset.org/abstracts/123819/lightning-protection-design-applied-to-sustainable-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123819.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2361</span> Pilot Directional Protection Scheme Using Wireless Communication </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nitish%20Sharma">Nitish Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20G.%20Karady"> G. G. Karady</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a scheme for the protection of loop system from all type of faults using the direction of fault current. The presence of distributed generation in today&rsquo;s system increases the complexity of fault detection as the power flow is bidirectional. Hence, protection scheme specific to this purpose needs to be developed. This paper shows a fast protection scheme using communication which can be fiber optic or wireless. In this paper, the possibility of wireless communication for protection is studied to exchange the information between the relays. The negative sequence and positive sequence directional elements are used to determine the direction of fault current. A PSCAD simulation is presented and validated using commercial SEL relays. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20grid%20protection" title="smart grid protection">smart grid protection</a>, <a href="https://publications.waset.org/abstracts/search?q=pilot%20protection" title=" pilot protection"> pilot protection</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20system%20simulation" title=" power system simulation"> power system simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20communication" title=" wireless communication"> wireless communication</a> </p> <a href="https://publications.waset.org/abstracts/27773/pilot-directional-protection-scheme-using-wireless-communication" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27773.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">636</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2360</span> The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jiri%20Barta">Jiri Barta</a>, <a href="https://publications.waset.org/abstracts/search?q=Ji%C5%99%C3%AD%20F.%20Urbanek"> Jiří F. Urbanek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interoperability" title="interoperability">interoperability</a>, <a href="https://publications.waset.org/abstracts/search?q=communication%20systems" title=" communication systems"> communication systems</a>, <a href="https://publications.waset.org/abstracts/search?q=controlling%20proces" title=" controlling proces"> controlling proces</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=crisis%20workplaces" title=" crisis workplaces"> crisis workplaces</a>, <a href="https://publications.waset.org/abstracts/search?q=continuity" title=" continuity"> continuity</a> </p> <a href="https://publications.waset.org/abstracts/17844/the-use-of-crisis-workplace-technology-to-protect-communication-processes-of-critical-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17844.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2359</span> Production Structures of Energy Based on Water Force, Its Infrastructure Protection, and Possible Causes of Failure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gabriela-Andreea%20Despescu">Gabriela-Andreea Despescu</a>, <a href="https://publications.waset.org/abstracts/search?q=M%C4%83d%C4%83lina-Elena%20Mavrodin"> Mădălina-Elena Mavrodin</a>, <a href="https://publications.waset.org/abstracts/search?q=Gheorghe%20L%C4%83z%C4%83roiu"> Gheorghe Lăzăroiu</a>, <a href="https://publications.waset.org/abstracts/search?q=Florin%20Adrian%20Gr%C4%83dinaru"> Florin Adrian Grădinaru</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to contribute to the enhancement of a hydroelectric plant protection by coordinating protection measures and existing security and introducing new measures under a risk management process. Also, the plan identifies key critical elements of a hydroelectric plant, from its level vulnerabilities and threats it is subjected to in order to achieve the necessary protection measures to reduce the level of risk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20analysis" title=" risk analysis"> risk analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20protection" title=" critical infrastructure protection"> critical infrastructure protection</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20management" title=" risk management"> risk management</a>, <a href="https://publications.waset.org/abstracts/search?q=turbine" title=" turbine"> turbine</a>, <a href="https://publications.waset.org/abstracts/search?q=impact%20analysis" title=" impact analysis"> impact analysis</a> </p> <a href="https://publications.waset.org/abstracts/37627/production-structures-of-energy-based-on-water-force-its-infrastructure-protection-and-possible-causes-of-failure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37627.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">547</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2358</span> SCR-Based Advanced ESD Protection Device for Low Voltage Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bo%20Bae%20Song">Bo Bae Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Byung%20Seok%20Lee"> Byung Seok Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyun%20young%20Kim"> Hyun young Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Chung%20Kwang%20Lee"> Chung Kwang Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Yong%20Seo%20Koo"> Yong Seo Koo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposed a silicon controller rectifier (SCR) based ESD protection device to protect low voltage ESD for integrated circuit. The proposed ESD protection device has low trigger voltage and high holding voltage compared with conventional SCR-based ESD protection devices. The proposed ESD protection circuit is verified and compared by TCAD simulation. This paper verified effective low voltage ESD characteristics with low trigger voltage of 5.79V and high holding voltage of 3.5V through optimization depending on design variables (D1, D2, D3, and D4). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ESD" title="ESD">ESD</a>, <a href="https://publications.waset.org/abstracts/search?q=SCR" title=" SCR"> SCR</a>, <a href="https://publications.waset.org/abstracts/search?q=holding%20voltage" title=" holding voltage"> holding voltage</a>, <a href="https://publications.waset.org/abstracts/search?q=latch-up" title=" latch-up"> latch-up</a> </p> <a href="https://publications.waset.org/abstracts/21774/scr-based-advanced-esd-protection-device-for-low-voltage-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21774.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">575</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2357</span> Negative Sequence-Based Protection Techniques for Microgrid Connected Power Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Isabelle%20Snyder">Isabelle Snyder</a>, <a href="https://publications.waset.org/abstracts/search?q=Travis%20Smith"> Travis Smith</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Microgrid protection presents challenges to conventional protection techniques due to the low-induced fault current. Protection relays present in microgrid applications require a combination of settings groups to adjust based on the architecture of the microgrid in islanded and grid-connected modes. In a radial system where the microgrid is at the other end of the feeder, directional elements can be used to identify the direction of the fault current and switch settings groups accordingly (grid-connected or microgrid-connected). However, with multiple microgrid connections, this concept becomes more challenging, and the direction of the current alone is not sufficient to identify the source of the fault current contribution. ORNL has previously developed adaptive relaying schemes through other DOE-funded research projects that will be evaluated and used as a baseline for this research. The four protection techniques in this study are labeled as follows: (1) Adaptive Current only Protection System (ACPS), Intentional (2) Unbalanced Control for Protection Control (IUCPC), (3) Adaptive Protection System with Communication Controller (APSCC) (4) Adaptive Model-Driven Protective Relay (AMDPR). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adaptive%20relaying" title="adaptive relaying">adaptive relaying</a>, <a href="https://publications.waset.org/abstracts/search?q=microgrid%20protection" title=" microgrid protection"> microgrid protection</a>, <a href="https://publications.waset.org/abstracts/search?q=sequence%20components" title=" sequence components"> sequence components</a>, <a href="https://publications.waset.org/abstracts/search?q=islanding%20detection" title=" islanding detection"> islanding detection</a> </p> <a href="https://publications.waset.org/abstracts/171820/negative-sequence-based-protection-techniques-for-microgrid-connected-power-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171820.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2356</span> International Protection Mechanisms for Refugees</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Djehich%20Mohamed%20Yousri">Djehich Mohamed Yousri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, the world has witnessed a phenomenon of displacement that is unprecedented in history. The number of refugees has reached record levels, due to wars, persecution, many conflicts and repression in a number of countries. The interest of United Nations bodies and international and regional organizations in the issue of refugees has increased, as they have defined a refugee and thus Determining who is entitled to this legal protection, and the 1951 Convention for the Protection of Refugees defines rights for refugee protection and sets obligations that they must perform. The institutional mechanisms for refugee protection are represented in the various agencies that take care of refugee affairs. At the forefront of these agencies is the United Nations High Commissioner for Refugees, as well as the various efforts provided by the International Committee of the Red Cross and the United Nations Relief and Works Agency for Palestine Refugees in the Middle East (UNRWA). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=protection" title="protection">protection</a>, <a href="https://publications.waset.org/abstracts/search?q=refugees" title=" refugees"> refugees</a>, <a href="https://publications.waset.org/abstracts/search?q=international" title=" international"> international</a>, <a href="https://publications.waset.org/abstracts/search?q=persecution" title=" persecution"> persecution</a>, <a href="https://publications.waset.org/abstracts/search?q=legal" title=" legal"> legal</a> </p> <a href="https://publications.waset.org/abstracts/162667/international-protection-mechanisms-for-refugees" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162667.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2355</span> Protection Plan of Medium Voltage Distribution Network in Tunisia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Chebbi">S. Chebbi</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Meddeb"> A. Meddeb</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The distribution networks are often exposed to harmful incidents which can halt the electricity supply of the customer. In this context, we studied a real case of a critical zone of the Tunisian network which is currently characterized by the dysfunction of its plan of protection. In this paper, we were interested in the harmonization of the protection plan settings in order to ensure a perfect selectivity and a better continuity of service on the whole of the network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distribution%20network%20Gabes-Tunisia" title="distribution network Gabes-Tunisia">distribution network Gabes-Tunisia</a>, <a href="https://publications.waset.org/abstracts/search?q=continuity%20of%20service" title=" continuity of service"> continuity of service</a>, <a href="https://publications.waset.org/abstracts/search?q=protection%20plan%20settings" title=" protection plan settings"> protection plan settings</a>, <a href="https://publications.waset.org/abstracts/search?q=selectivity" title=" selectivity"> selectivity</a> </p> <a href="https://publications.waset.org/abstracts/15428/protection-plan-of-medium-voltage-distribution-network-in-tunisia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15428.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">510</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2354</span> Automatic Approach for Estimating the Protection Elements of Electric Power Plants</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20Mohammad%20Salem%20Al-Suod">Mahmoud Mohammad Salem Al-Suod</a>, <a href="https://publications.waset.org/abstracts/search?q=Ushkarenko%20O.%20Alexander"> Ushkarenko O. Alexander</a>, <a href="https://publications.waset.org/abstracts/search?q=Dorogan%20I.%20Olga"> Dorogan I. Olga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> New algorithms using microprocessor systems have been proposed for protection the diesel-generator unit in autonomous power systems. The software structure is designed to enhance the control automata of the system, in which every protection module of diesel-generator encapsulates the finite state machine. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=diesel-generator%20unit" title="diesel-generator unit">diesel-generator unit</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=state%20diagram" title=" state diagram"> state diagram</a>, <a href="https://publications.waset.org/abstracts/search?q=control%20system" title=" control system"> control system</a>, <a href="https://publications.waset.org/abstracts/search?q=algorithm" title=" algorithm"> algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20components" title=" software components"> software components</a> </p> <a href="https://publications.waset.org/abstracts/41588/automatic-approach-for-estimating-the-protection-elements-of-electric-power-plants" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41588.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2353</span> Protection System Mis-operations: Fundamental Concepts and Learning from Indian Power Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pankaj%20Kumar%20Jha">Pankaj Kumar Jha</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahendra%20Singh%20Hada"> Mahendra Singh Hada</a>, <a href="https://publications.waset.org/abstracts/search?q=Brijendra%20Singh"> Brijendra Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Protection system is an essential feature of the electrical system which helps in detection and removal of faults. Protection system consists of many subsystems like relays, circuit breakers, instrument transformers, auxiliary DC system, auxiliary relays etc. Although the fundamental protective and relay operating concepts are similar throughout the world, there are very significant differences in their implementation. These differences arise through different traditions, operating philosophies, experiences and national standards. Protection system mis-operation due to problem in one or more of its subsystem or inadequate knowledge of numerical relay settings and configuration are very common throughout the world. Protection system mis-operation leads to unstable and unreliable grid operation. In this paper we will discuss about the fundamental concepts of protective relaying and the reasons for protection system mis-operation due to one or more of its subsystems. Many real-world case studies of protection system mis-operation from Indian power sector are discussed in detail in this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=auxiliary%20trip%20relays" title="auxiliary trip relays">auxiliary trip relays</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20zone" title=" bus zone"> bus zone</a>, <a href="https://publications.waset.org/abstracts/search?q=check%20zone" title=" check zone"> check zone</a>, <a href="https://publications.waset.org/abstracts/search?q=CT%20saturation" title=" CT saturation"> CT saturation</a>, <a href="https://publications.waset.org/abstracts/search?q=dead%20zone%20protection" title=" dead zone protection"> dead zone protection</a>, <a href="https://publications.waset.org/abstracts/search?q=DC%20ground%20faults" title=" DC ground faults"> DC ground faults</a>, <a href="https://publications.waset.org/abstracts/search?q=DMT" title=" DMT"> DMT</a>, <a href="https://publications.waset.org/abstracts/search?q=DR" title=" DR"> DR</a>, <a href="https://publications.waset.org/abstracts/search?q=end%20fault%20protection" title=" end fault protection"> end fault protection</a>, <a href="https://publications.waset.org/abstracts/search?q=instrument%20transformer" title=" instrument transformer"> instrument transformer</a>, <a href="https://publications.waset.org/abstracts/search?q=SOTF" title=" SOTF"> SOTF</a>, <a href="https://publications.waset.org/abstracts/search?q=STUB" title=" STUB"> STUB</a> </p> <a href="https://publications.waset.org/abstracts/171178/protection-system-mis-operations-fundamental-concepts-and-learning-from-indian-power-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171178.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2352</span> Hot-Dip Galvanizing as a Corrosion Protection System for Steel Hydraulic Structures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farrokh%20Taherkhani">Farrokh Taherkhani</a>, <a href="https://publications.waset.org/abstracts/search?q=Thomas%20Pinger"> Thomas Pinger</a>, <a href="https://publications.waset.org/abstracts/search?q=Max%20G%C3%BCndel"> Max Gündel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Corrosion and suitable corrosion protection systems are a significant factor in the consideration of life cycle costs for steel hydraulic structures. In addition to classic coating systems (for example, epoxy resin or polyurethane), zinc and its alloys offer effective and very durable corrosion protection for steels. As a protective layer, hot-dip galvanizing prevents the corrosive media from penetrating into the steel matrix and acts as a sacrificial anode, which corrodes in preference to steel. However, hot-dip galvanizing as a corrosion protection system has not yet been approved by the relevant authority, the Federal Waterways Engineering and Research Institute (BAW) in Germany. In order to make hot-dip galvanizing usable as a corrosion protection system for steel hydraulic structures in the future, different factors must be considered. These factors are (i) corrosion protection type, (ii) resistance to mechanical stress (i.e., abrasion resistance), (iii) combinability with cathodic corrosion protection, (iv) environmental effects, and (v) the crack formation and propagation during hot-dip galvanizing. In this work, hot-dip galvanizing as a corrosion protection system for steel hydraulic steel structures, as well as open questions, are discussed. This paper is based on initial long-term exposure tests with corrosion protection systems consisting of hot-dip galvanizing and duplex systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=steel%20hydraulic%20structure" title="steel hydraulic structure">steel hydraulic structure</a>, <a href="https://publications.waset.org/abstracts/search?q=hot-dip%20galvanizing" title=" hot-dip galvanizing"> hot-dip galvanizing</a>, <a href="https://publications.waset.org/abstracts/search?q=corrosion%20resistance" title=" corrosion resistance"> corrosion resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=zinc%20coating" title=" zinc coating"> zinc coating</a>, <a href="https://publications.waset.org/abstracts/search?q=organic%20coating%20and%20duplex%20systems" title=" organic coating and duplex systems"> organic coating and duplex systems</a> </p> <a href="https://publications.waset.org/abstracts/187712/hot-dip-galvanizing-as-a-corrosion-protection-system-for-steel-hydraulic-structures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187712.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">44</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2351</span> Design Considerations on Cathodic Protection for X65 Steel Tank Containing Fresh Water</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20M.%20Al-Sabagh">A. M. Al-Sabagh</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Deyab"> M. A. Deyab</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20N.%20Kroush"> M. N. Kroush</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present study focused on critical and detailed approach for using aluminum electrode as impressed current anode for cathodic protection of X65 steel tank containing fresh water. The impressed current design calculation showed 0.6 A of current demand and voltage of 0.33 V required to adequately protect the X65 steel tank with internal surface area of 421 m². We used here one transformer rectifier with current and voltage output of 25 A and 25 V, respectively. The data showed that the potentials ranged from -0.474 to -0.509 V (vs. Cu/CuSO₄), prior to the application of cathodic protection. When the potential was measured 1 h after the application of cathodic protection, the potential values showed considerable shift within protection range (-0.950 V vs. Cu/CuSO₄). The results confirmed that aluminum anode can be used in freshwater applications with high efficiency (current capacity) and low consumption rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cathodic%20protection" title="cathodic protection">cathodic protection</a>, <a href="https://publications.waset.org/abstracts/search?q=aluminum" title=" aluminum"> aluminum</a>, <a href="https://publications.waset.org/abstracts/search?q=steel" title=" steel"> steel</a>, <a href="https://publications.waset.org/abstracts/search?q=fresh%20water" title=" fresh water"> fresh water</a> </p> <a href="https://publications.waset.org/abstracts/91429/design-considerations-on-cathodic-protection-for-x65-steel-tank-containing-fresh-water" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91429.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2350</span> The Importance of Fire Safety in Egypt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omar%20Shakra">Omar Shakra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fire" title="fire">fire</a>, <a href="https://publications.waset.org/abstracts/search?q=system" title=" system"> system</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=fire%20hydrants" title=" fire hydrants"> fire hydrants</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=alarms" title=" alarms"> alarms</a> </p> <a href="https://publications.waset.org/abstracts/171993/the-importance-of-fire-safety-in-egypt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171993.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">109</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2349</span> Regulating User Experience Design, in the European Union, as a Way to Narrow Down the Gap Between Consumers’ Protection and Algorithms Employment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prisecaru%20Diana-Sorina">Prisecaru Diana-Sorina</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper will show that, while the EU legislator tackled a series of UX patterns used in e-commerce to induce the consumers take actions that they would not normally undertake, it leaves out many other aspects related to misuse or poor UX design that adversely affect EU consumers. Further, the paper proposes a reevaluation of the regulatory addressability of the issue and hand and focuses on explaining why a joint strategy, based on the interplay between provisions aiming consumer protection and personal data protection is the key approach to this matter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algorithms" title="algorithms">algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20protection" title=" consumer protection"> consumer protection</a>, <a href="https://publications.waset.org/abstracts/search?q=European%20Union" title=" European Union"> European Union</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20experience%20design" title=" user experience design"> user experience design</a> </p> <a href="https://publications.waset.org/abstracts/147243/regulating-user-experience-design-in-the-european-union-as-a-way-to-narrow-down-the-gap-between-consumers-protection-and-algorithms-employment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147243.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2348</span> Challenges in Anti-Counterfeiting of Cyber-Physical Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Kliewe">Daniel Kliewe</a>, <a href="https://publications.waset.org/abstracts/search?q=Arno%20K%C3%BChn"> Arno Kühn</a>, <a href="https://publications.waset.org/abstracts/search?q=Roman%20Dumitrescu"> Roman Dumitrescu</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%BCrgen%20Gausemeier"> Jürgen Gausemeier</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-counterfeiting" title="anti-counterfeiting">anti-counterfeiting</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems" title=" cyber physical systems"> cyber physical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property%20%28IP%29" title=" intellectual property (IP)"> intellectual property (IP)</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20protection" title=" system protection"> system protection</a> </p> <a href="https://publications.waset.org/abstracts/29278/challenges-in-anti-counterfeiting-of-cyber-physical-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29278.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">498</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2347</span> Rural Tourism Planning from the Perspective of Water Resource Protection and Regional Integration: Taking Villages along Tongji Lake as an Example</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pianpian%20Zhang">Pianpian Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Qingping%20Luo"> Qingping Luo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Currently, there is a great tendency that more and more villages in China are trying to increase income by development of tourism. Especially in Zhejiang Province, &#39;Beautiful Rural Construction&#39; provides an excellent opportunity for the development of tourism. In this context, development orientation, transportation routes and tourism service facilities are analyzed under the perspective of water resources protection and regional integration based on the development tourism industry of the six villages in Pujiang County, Zhejiang Province as a research object. In the program, the biggest issue is the contradiction between the ecological protection of the water and the development of economy. How to deal with the relationship between protection and development is the key to the design of this case. Furthermore, the six villages are regarded as a whole, connecting to each other by the system of five-path and the landscape along the lake. Every village has its own features, but cannot develop without one another. The article is actively exploring for suggestions and countermeasures to promote the development premised on protection and based on a regional view. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=development" title="development">development</a>, <a href="https://publications.waset.org/abstracts/search?q=integration" title=" integration"> integration</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=rural%20tourism" title=" rural tourism"> rural tourism</a> </p> <a href="https://publications.waset.org/abstracts/67148/rural-tourism-planning-from-the-perspective-of-water-resource-protection-and-regional-integration-taking-villages-along-tongji-lake-as-an-example" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67148.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">362</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2346</span> Recognition and Protection of Indigenous Society in Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Triyanto">Triyanto</a>, <a href="https://publications.waset.org/abstracts/search?q=Rima%20Vien%20Permata%20Hartanto"> Rima Vien Permata Hartanto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Indonesia is a legal state. The consequence of this status is the recognition and protection of the existence of indigenous peoples. This paper aims to describe the dynamics of legal recognition and protection for indigenous peoples within the framework of Indonesian law. This paper is library research based on literature. The result states that although the constitution has normatively recognized the existence of indigenous peoples and their traditional rights, in reality, not all rights were recognized and protected. The protection and recognition for indigenous people need to be strengthened. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=indigenous%20peoples" title="indigenous peoples">indigenous peoples</a>, <a href="https://publications.waset.org/abstracts/search?q=customary%20law" title=" customary law"> customary law</a>, <a href="https://publications.waset.org/abstracts/search?q=state%20law" title=" state law"> state law</a>, <a href="https://publications.waset.org/abstracts/search?q=state%20of%20law" title=" state of law"> state of law</a> </p> <a href="https://publications.waset.org/abstracts/74295/recognition-and-protection-of-indigenous-society-in-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74295.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">330</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2345</span> Challenges in Providing Protection to the Conflict-Affected Refugee Children in Pakistan: A Critical Analysis of the 1951 Refugee Convention </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faiz%20Bakhsh">Faiz Bakhsh</a>, <a href="https://publications.waset.org/abstracts/search?q=Tahira%20Yasmeen"> Tahira Yasmeen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Afghan refugee children in Pakistan are considered as the most vulnerable persons in danger of being abused and treated badly as compared to the minimum criteria of the protection of refugee children under 1951 refugee convention. This paper explores the impact of the 1951 refugee convention on the protection of refugee children, affected by the armed conflict in Afghanistan, residing in refugee camps in Pakistan. Despite, protection available under Refugee Convention, there exist millions of refugees in the world, including a huge portion of women and children, that remain unprotected, and their protection remains a challenging task for the world community. This study investigates the status and number of refugees in Pakistan, especially children; protection and assistance of refugees under Refugee Convention; protection of the rights of refugee children in Pakistan; and implementation of the rules of Refugee Convention relating refugee children in Pakistan and measures for the protection of refugee children in Pakistan. This socio-legal study utilizes a qualitative research approach and applies mixed methods of data collection. The primary data is collected through the interpretation of the legal framework available for the protection of refugees as well as domestic laws of Pakistan. The secondary data is collected through previous studies available on the same topic. The result of this study indicates that lack of proper implementation of the rules, of the Refugee Convention, relating protection of refugee children cause sufferings to refugee children including the provision of basic health, nutrition, family life, education and protection from child abuse. Pakistan needs a comprehensive domestic legal framework for the protection of refugees, especially refugee children. Moreover, the government of Pakistan with the help of the United Nations High Commissioner for Refugees (UNHCR) must prioritize the protection of Afghan refugee children as per standard criteria provided by the refugee convention 1951. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=refugee%20children" title="refugee children">refugee children</a>, <a href="https://publications.waset.org/abstracts/search?q=refugee%20convention" title=" refugee convention"> refugee convention</a>, <a href="https://publications.waset.org/abstracts/search?q=armed%20conflict" title=" armed conflict"> armed conflict</a>, <a href="https://publications.waset.org/abstracts/search?q=Pakistan" title=" Pakistan"> Pakistan</a> </p> <a href="https://publications.waset.org/abstracts/101975/challenges-in-providing-protection-to-the-conflict-affected-refugee-children-in-pakistan-a-critical-analysis-of-the-1951-refugee-convention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101975.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2344</span> Analysis on the Copyright Protection Dilemma of Webcast in &#039;Internet Plus&#039; Era</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yi%20Yang">Yi Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the era of 'Internet plus', the rapid development of webcast has posed new challenges to the intellectual property law. Meanwhile, traditional copyright protection has also exposed the existing theoretical imbalance in webcast. Through the analysis of the outstanding problems in the copyright protection of the network live broadcast, this paper points out that the main causes of the problems are the unclear nature of the copyright of the network live broadcast, the copyright protection system of the game network live broadcast has not yet been constructed, and the copyright infringement of the pan entertainment live broadcast is mostly, and so on. Based on the current practice, this paper puts forward the specific thinking of the protection path of online live broadcast copyright. First of all, to provide a reasonable judicial solution for a large number of online live copyright cases, we need to integrate the right scope and regulatory behavior of broadcasting right and information network communication right. Secondly, in order to protect the rights of network anchors, the webcast should be regarded as works. Thirdly, in order to protect the copyright of webcast and prevent the infringement of copyright by webcast, the webcast platform will be used as an intermediary to provide solutions for solving the judicial dilemma. In the era of 'Internet plus', it is a theoretical attempt to explore the protection and method of copyright protection on webcast, which has positive guiding significance for judicial practice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=%27Internet%20Plus%27%20era" title="&#039;Internet Plus&#039; era">&#039;Internet Plus&#039; era</a>, <a href="https://publications.waset.org/abstracts/search?q=webcast" title=" webcast"> webcast</a>, <a href="https://publications.waset.org/abstracts/search?q=copyright" title=" copyright"> copyright</a>, <a href="https://publications.waset.org/abstracts/search?q=protection%20dilemma" title=" protection dilemma"> protection dilemma</a> </p> <a href="https://publications.waset.org/abstracts/124731/analysis-on-the-copyright-protection-dilemma-of-webcast-in-internet-plus-era" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/124731.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2343</span> Infringement of Patent Rights with Doctrine of Equivalent for Turkey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Duru%20Helin%20Ozaner">Duru Helin Ozaner</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the doctrine of equivalent, the words in the claims' sentences are insufficient for the protection area provided by the patent registration. While this situation widens the boundaries of the protection area, it also obscures the boundaries of the protected area of patents. In addition, it creates distrust for third parties. Therefore, the doctrine of equivalent aims to establish a balance between the rights of patent owners and the legal security of third parties. The current legal system of Turkey has been tried to be created as a parallel judicial system to the widely applied regulations. Therefore, the regulations regarding the protection provided by patents in the current Turkish legal system are similar to many countries. However, infringement through equivalent is common by third parties. This study, it is aimed to explain that the protection provided by the patent is not only limited to the words of the claims but also the wide-ranging protection provided by the claims for the doctrine of equivalence. This study is important to determine the limits of the protection provided by the patent right holder and to indicate the importance of the equivalent elements of the protection granted to the patent right holder. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=patent" title="patent">patent</a>, <a href="https://publications.waset.org/abstracts/search?q=infringement" title=" infringement"> infringement</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property" title=" intellectual property"> intellectual property</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20doctrine%20of%20equivalent" title=" the doctrine of equivalent"> the doctrine of equivalent</a> </p> <a href="https://publications.waset.org/abstracts/141450/infringement-of-patent-rights-with-doctrine-of-equivalent-for-turkey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141450.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">214</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2342</span> The Role of Data Protection Officer in Managing Individual Data: Issues and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nazura%20Abdul%20Manap">Nazura Abdul Manap</a>, <a href="https://publications.waset.org/abstracts/search?q=Siti%20Nur%20Farah%20Atiqah%20Salleh"> Siti Nur Farah Atiqah Salleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For decades, the misuse of personal data has been a critical issue. Malaysia has accepted responsibility by implementing the Malaysian Personal Data Protection Act 2010 to secure personal data (PDPA 2010). After more than a decade, this legislation is set to be revised by the current PDPA 2023 Amendment Bill to align with the world's key personal data protection regulations, such as the European Union General Data Protection Regulations (GDPR). Among the other suggested adjustments is the Data User's appointment of a Data Protection Officer (DPO) to ensure the commercial entity's compliance with the PDPA 2010 criteria. The change is expected to be enacted in parliament fairly soon; nevertheless, based on the experience of the Personal Data Protection Department (PDPD) in implementing the Act, it is projected that there will be a slew of additional concerns associated with the DPO mandate. Consequently, the goal of this article is to highlight the issues that the DPO will encounter and how the Personal Data Protection Department should respond to this subject. The study result was produced using a qualitative technique based on an examination of the current literature. This research reveals that there are probable obstacles experienced by the DPO, and thus, there should be a definite, clear guideline in place to aid DPO in executing their tasks. It is argued that appointing a DPO is a wise measure in ensuring that the legal data security requirements are met. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=guideline" title="guideline">guideline</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20protection%20officer" title=" data protection officer"> data protection officer</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a> </p> <a href="https://publications.waset.org/abstracts/164137/the-role-of-data-protection-officer-in-managing-individual-data-issues-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164137.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2341</span> Stuck Down in the Mess of Aisles: Need of a Practical Consumer Welfare Policy Framework in Sri Lanka with Special Reference to Japan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20N.%20R.%20de%20Silva">E. N. R. de Silva</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main purpose of this research is to set a policy framework for establishing a legal, institutional and social infrastructure that enhances the welfare, health, safety and economic interest of the consumers in Sri Lanka. It will help to develop an approach to continuously and successfully advocate for a consumer protection legal reform agenda and also it is significant as it gives directions to create national consumer protection associations in Sri Lanka. The methodology adopted for this research is purely a qualitative approach and it is generally and specifically categorized. Generally, part of this research looked at the existing laws, regulations and how effective they are in order to protect consumers. It will analyze the consumer protection framework and specially, consumer protection enhanced by the public organizations in Japan. This research offers a model with methods and legal instruments to enforce advocacy group to enhance consumer welfare, also brings out reforms to be made in the national legal framework on consumer welfare. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=consumer%20protection%20association" title="consumer protection association">consumer protection association</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20protection%20law" title=" consumer protection law"> consumer protection law</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20welfare" title=" consumer welfare"> consumer welfare</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20framework" title=" legal framework"> legal framework</a> </p> <a href="https://publications.waset.org/abstracts/63357/stuck-down-in-the-mess-of-aisles-need-of-a-practical-consumer-welfare-policy-framework-in-sri-lanka-with-special-reference-to-japan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63357.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=78">78</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=79">79</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=whistleblower%20protection&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10