945 research outputs found

    The Scope of the Digital Classifications\u27 Criminal Protection A Comparative Study of Arab Laws to Protect Copyright

    Get PDF
    The research has revealed that the scope of the criminal protection of digital classifications include computer programs and databases; however, legislations agree with respect to the first type and differ with respect to the second. The scope of criminal protection of computer programs include all their forms and types. However, the scope of criminal protection of databases is limited to innovation. The study discusses this limited scope and recommends the necessity of legislation clarifying said protection

    The Difficulties Which Oppose the Application of Texts of Robbery Crime Upon Computer Programs- الصعوبات التي تعترض تطبيق نصوص جريمة السرقة على برامج الحاسب الآلي

    Get PDF
    We started this article by an introduction regarding the importance of Computer, its parts, and the meaning of program and its sorts. In Chapter One we talked about the firmness of the utility of (money) on Computer programs, this chapter consists of three sections, in sec. 1 we talked about the attitudes of legislations regarding the firmness of the utility of (money) on Computer programs, these legislations are quite differed in their definition to robbery and its applications on the concept of money and things, we also detailed that computer has its own material and semantic identity. In sec. 2, we studied that opinion which do not regard computer programs to be money, we also disproved it. In sec. 3, we gave evidences that computer programs have money attribute, we also discussed the nature of computer programs, and the results which depend on mental imagination of this nature. In Ch. 2, we discussed to what extant computer programs can be submitted to embezzlement doing, in sec.1, we presented the meaning of embezzlement and the opinions on it, particularly the traditional and modern opinions. In sec. 2, we discussed the computer programs under the concept of embezzlement: How non-material things can be submitted to embezzlement, the legislations’ attitude from stealing electricity, the attitude of Jurisprudence and judgment of this matter, and if we can use the same attitude of electricity to be applied to computer programs. In sec. 3, we discussed the problems of computer programs embezzlement.

    Criminal Protection of Credit Cards Towards Bearer’s Acts

    Get PDF
    Financial institutions found more advanced means of settlement than the common commercial papers in the commercial environment, and more advanced than prevailing monies in the economic environment, which strengthened the credit and settlement environment through non-traditional tools, the most important of which is the credit and settlement cards innovated by the commercial transactions with widely spread grand stores, as a substitute for money. This made people use it excessively, a case which resulted in wide spread and consequently more legal complications the most important of which is the forgery and distortion. This dictates a necessity to study the criminal liability emanating from such acts and to search for an effective mechanism for a criminal protection of the card. Accordingly, the study has been divided into three parts, the first part studies the use of expired or cancelled card, the second part studies the responsibility of not returning the card after expiry while the third studies the responsibility emanating from exceeding the allowed limit of monies which can be drawn with the car

    Criminal Protection for Personal Data and Information Stored in Computer

    Get PDF
    The first chapter includes the meaning of information and data, its kinds and mane points of resemblance, and difference between data and information, and the most important characteristics of information. The second chapter putting for ward the necessity of research about criminal protection for personal data and information stored in computer which are represented in the following :- 1- The logical justification to search for protection. 2- The risks which the life specially exposed to, in particular, after depending on computer to store the personal data and information. 3- The importance for criminal protection. But the third chapter which comprises the difficulties which face the research during the application provision of penal law. These difficulties can be defined specifically by the following:- 1- Nature of the aggression which personal data and information exposed to. 2- Extent of application or applying the condition which requisite at information crime. 3- The risk which face applying the provision of penal law. In the fourth chapter which includes showing the criminal protection to personal data and information through the provision of supporting or protecting special life in Egyptian legislation. Within this legislation we discuss the crime against special life, and we review eavesdropping crime, wire tapping crime, recording and transcription of personal conversation. Also, we review picking up by receiving set, taking photographs or pictures by any receiver from special place. And we discuss the provision of supporting special life in Libyan legislation, and Iraqi legislation, and we explain the weak points of this provision, and it s failure to protect personal data and information stored in computer. At last we show that the French legislation is the best in this respect or field. Finally within the fifth chapter we discuss the criminal protection for personal data and information stored in computer through secret revealing crime which we declare the mane basic element, and we declare that these elements can not be stratification at the personal data and information, and incapable of the its protectio

    Nurse’s Knowledge and Practice on the Care of Preterm Infants at Khartoum State Hospitals

    Get PDF
    Background: Premature infants can develop a range of problems because their immature organs. A proper nursing care for a premature baby should be established through good nursing performances. This study aimed to assess nurse's knowledge and practices regarding the care of a premature baby in a neonatal intensive care unit (NICU). Methods: This study is a descriptive cross-sectional study, with a systematic collection, analysis, and interpretation of data that reports a clear picture of a particular situation carried out by 72 eligible nurses who were a graduate in BSc., and had at least six months' experience at the time of the study. Result: The study showed that the percentage of nurse’s knowledge regarding care of premature; definition of preterm neonate 44.4%, nurses’ had poor knowledge, umbilical vessels: Two arteries &one vein 40.3 %, nurses’ had poor knowledge, and the percentage of nurses’ practices regarding care of premature baby; hand washing o 36.1 %, nurses’ have poor practice, so there were poor nurses’ knowledge and practices regarding care of premature baby

    Capturing Public Concerns about Coronavirus Using Arabic Tweets: An NLP-Driven Approach

    Get PDF
    This In order to analyze the people reactions and opinions about Coronavirus (COVID-19), there is a need for computational framework, which leverages machine learning (ML) and natural language processing (NLP) techniques to identify COVID tweets and further categorize these in to disease specific feelings to address societal concerns related to Safety, Worriedness, and Irony of COVID. This is an ongoing study, and the purpose of this paper is to demonstrate the initial results of determining the relevancy of the tweets and what Arabic speaking people were tweeting about the three disease related feelings/emotions about COVID: Safety, Worry, and Irony. A combination of ML and NLP techniques are used for determining what Arabic speaking people are tweeting about COVID. A two-stage classifier system was built to find relevant tweets about COVID, and then the tweets were categorized into three categories. Results indicated that the number of tweets by males and females were similar. The classification performance was high for relevancy (F=0.85), categorization (F=0.79). Our study has demonstrated how categories of discussion on Twitter about an epidemic can be discovered so that officials can understand specific societal concerns related to the emotions and feelings related to the epidemic

    Ownership and Authorship in Copyright Law (A Proposal to Re-Categorise Works and a Digital Implementation)

    Get PDF
    The thesis argues that there is a pressure on the authorship concept since the emergence of collections of facts, anthologies, and adaptations of pre-existing works. These works were the reason that Judges offered various interpretations to authorship and originality, as some Judges lessened the requirement of originality to obtain copyrightability for these works and some raised it. This led to make the protection granted by copyright law to intellectual works vague and uncertain. This became apparent in conflicts in courts decisions on copyright subsistence in works. This subsequently led to confusion around the criteria of interpretation that should be adopted and the theory or justification that copyright law is founded upon. The thesis argues that this vagueness and uncertainty is related not to the authorship concept but to the failure of law to adapt to two separate natures of works, one including authorial, mental and personal contribution and the other only including manually skilful contribution. Those two kinds cannot be subject to same principles or justifications of protection. The inexistence of such differentiation in doctrine, judiciary and legislation led to the distortion of authorship and originality concepts in the attempts to reduce their interpretation to suit those works that actually miss authorial contribution. Alternatively, whole attention was paid to granting ownership to right holders of these works, which led to the prevalence of the ownership concept as being a necessity for the marketability of cultural works over the authorship concept. The thesis finds that this difference in nature can be uncovered by settling on a differentiation between two kinds of skills that are used in creating works: the mental skills, which are authorial skills, on the one side, and manual skills, which are the collecting, combining, performing or executing skills, on the other. Accordingly, this thesis proposes a categorisation of works, that of ‘high, low and non-authorship’ works, which relies on the nature of the works and elements of authorship in the work. The thesis finds that every category of works needs a separate criterion that can suit its nature and constituent authorship elements; also, the protection needs to be graded depending on the level of authorship in the work. This thesis suggests that such a legal proposition be implemented digitally in what it calls the ‘Digital Cultural National Gate’, which decides the category the work should belong to and the correspondent protection, and that through some questionnaires on the work the authorship elements can be recognised.Egyptian Government, Ministry of Higher Education, represented by The Egyptian Cultural Office in London

    Spécification et Validation d'un Contrôleur de Performances Sportives

    No full text
    International audienceCe papier a pour objectif de montrer l'intérêt d'utiliser les méthodes formelles pour spécifier et valider un système médical, nous utilisons les automates hiérarchiques pour modéliser ces systèmes. La sémantique utilisée est celle d'une structure de Kripke où les états sont valués par des propositions atomiques. Cette structure peut être de grande taille en nombre d'états. Par nature, les systèmes hiérarchiques sont définis de manière hiérarchique par un ensemble de sous systèmes en éclatant à chaque fois un ou plusieurs états en un ensemble d'automates. Dans cet article, nous proposons de vérifier des proporiétés, seulement sur ces sous-systèmes. Pour pallier au problème de l'explosion combinatoire et la vérification de propriétés, nous considérons que les sous systèmes concernés par la propriété à vérifier et en déduire sa vérification sur le système global. Les résultats sont illustrés sur l'exemple d'un contrôleur de performances sportives

    eLEM: A novel e-Learner Experience Model

    Get PDF
    Many e-learning artefacts have been developed and promoted based on their ability to enhance learning and e-learner experience. However, there is a lack of precise definition of what the e-learner experience implies and associated models to inform this experience. This paper introduces a novel e-Learner Experience Model (eLEM) along with its roots in: (i) e-learning domain research, and (ii) user experience/usability. It also proposes a definition for the e-learner experience model based on the particularities of e-learning. eLEM has been derived based on a state of the art literature review and consists of a number of constructs along with measures of their effectiveness in evaluating the e-learner experience in an e-learning environment. eLEM has been comprehensively evaluated using a set of sufficient and representative case studies. It has also demonstrated modelling the e-learner’s experience in various contexts and identified four key challenges for further research. Finally, the eLEM has been integrated with the HeLPS e-learning framework and contributed to validating its process-centric models
    corecore