129 research outputs found

    Domain modelling and the co-design of business rules in the telecommunication business area.

    Get PDF
    This paper discusses the development of an enterprise domain model in an environment where part of the domain knowledge is vague and not yet formalised in company-wide business rules. The domain model was developed for a young company starting in the telecommunications sector. The company relied on a number of stand-alone business support systems and sought for a manner to integrate them. There was opted for the development of an enterprise-wide domain model that had to serve as an integration layer to coordinate the stand-alone applications. A specific feature of the company was that it could build up its information infrastructure form scratch, so that many aspects of its business were still in the process of being defined. The paper will highlight parts of the Enterprise Model where there was a need for co-designing business rules together with the domain model. A result of this whole effort was that the company got more insight into important domain knowledge and developed a common understanding across functional areas of the way of doing business.domain modelling; business rules; object-oriented analysis; business process modelling;

    Legal Protection of Film Copyright Holders Against the Distribution of Free Film in Telegram Media

    Get PDF
    Copyright is an exclusive right owned by someone who creates a product that can be realized in a tangible form without compromising the laws and regulations. The function of copyright is protection of the work inherent in the maker, but it is the best compared to the reality in the field. In Internet media, in this case, telegrams are widespread and accessible regarding film series, the legal phenomenon violates copyright in the film works made by someone even though the legal protection arrangements for copyright have been regulated in Law Number 28 of 2014 concerning Copyright and are also contained in Government Regulation Number 71 of 2019 concerning the Implementation of Electronic Systems and Transactions. Of course, law enforcement and legal efforts need to be carried out through various solutions which will be discussed later in this paper where the method used in this paper uses normative juridical research with literature and assesses several relevant laws and regulations using qualitative descriptive analysis techniques. The study results indicate that the regulation regarding Law Number 28 of 2014 and its joint ministerial regulation has not been effective and does not work for the legislation to protect copyrights for works owned by someone. Keywords: copyright, films, legal protection, telegra

    Scientific Criminal Investigation Legal Studies in the Police Investigation Process

    Get PDF
    Scientific Criminal Investigation can be a method in the investigation process carried out by investigators to prove evidence in proving criminal cases. Process of the Scientific Criminal Investigation method in proving it can minimize errors with fast, precise, and accurate examinations. The investigation process of scientific evidence by investigators also needs to be supported by technical assistance from several branches of forensic science. This study aims to obtain a description of the method of Scientific Criminal Investigation in the disclosure of criminal acts using quantitative methods. The application of the Scientific Criminal Investigation Method in the evidentiary process has a role in uncovering evidence and evidence in criminal cases following the Criminal Procedure Code, namely through letter evidence, instructions, and expert statements. Thus, proving a case using the Scientific Criminal Investigation method is a breakthrough in the evidentiary process of proving a criminal case. In this way, the Scientific Criminal Investigation Method becomes a reference for investigators in the process of proving criminal cases because scientific crime studies are also supported by increasing and sophisticated sciences, including the special tools created. Keywords: scientific criminal investigation, investigation, evidenc

    Smart Policing in Overcoming Sexting Emergency Among Adolescents

    Get PDF
    This research is motivated by the rampant cases of sexting among teenagers having a lot of negative impact on the victims. So protection and law enforcement are needed with the smart policing approach because sexting is a crime that utilizes technology. This study aims to determine legal protection for victims of sexting and law enforcement against sexting perpetrators through smart policing among adolescents. The type of research that the authors use is normative juridical. There are two forms of legal protection for victims of sexting among adolescents using Smart Policing, namely preventive and repressive legal protection. Preventive legal protection with Smart Policing, by providing information and appeals through social media owned by the Police. Meanwhile, repressive legal protection applies E-Policing, namely E-Dumas and online complaint websites. Law enforcement against sexting is talking about the sanctions contained in laws and regulations, namely the ITE Law and the Pornography Law. Apart from that it also pays attention to the provisions related to age, sanctions, and juvenile justice process limits, if the perpetrator of sexting is a child. Keywords: smart policing, sexting, adolescent

    Review of Legal Ethics in Applying Palliative Care to Improving the Quality of Life of Patients

    Get PDF
    Palliative care is a treatment for patients who have incurable diseases by optimizing the patient’s quality of life and reducing pain and other symptoms by paying attention to psychological and spiritual aspects. Previous studies have assessed the importance of implementing palliative care in Indonesia because of the high prevalence of incurable diseases such as cancer, heart failure, and other diseases such as HIV/AIDS. Palliative care is a form of medical care and patient comfort that controls the intensity of a disease or slows its progress, whether or not there is hope of recovery. Palliative care does not aim to provide a cure or reverse disease progression. It is an important part of caring for terminal patients, which can be done simply, although their main priority is quality of life and not recovery of the patient from the illness. Most patients come for treatment with a diagnosis of disease in an advanced stage. In such conditions, the patient tends to choose a short but happy life rather than a long life with many limitations. For patients, the only realistic treatment options are pain barriers and palliative care. So palliative care is an effective way to improve the quality of life of patients. Keywords: legal ethics, palliative care, patien

    Legal Protection for Victims of Artificial Intelligence-based Pornography in the Form of Deepfakes According to Indonesian Law

    Get PDF
    Deepfake is an artificial intelligence-based technique for synthesizing an image of a person, using a special method to combine images or videos to make the result look realistic (POLRI 2020). Deepfake is a relatively new type of technology that allows you to download deepfake apps for free. Anyone can access the Deepfake app to create freely edited videos and images. The original purpose of using deepfakes was entertainment on TV and social media. But over time, technology is used as a tool to mislead people and spread misinformation. Deepfakes can undermine public trust, especially when it comes to big and famous people. Not only fake videos but reputation is also easily damaged by this technique. Keywords: deepfake, artificial intelligence, information and transaction electroni

    The Urgency of Establishing Guidelines for Handling Cybercrime Cases in the Indonesian National Police Department

    Get PDF
    The Urgency of Establishing Guidelines for Handling Cybercrime Cases in the Indonesian National Police DepartmentTechnological development has a strong influence on the development of criminals. In the past, crimes were carried out in conventional ways and tools, but now crimes are carried out in modern ways. Cybercrime is a borderless crime and requires special treatment when collecting digital evidence. Evidence in cyber crime allows criminals to hide or remove their tracks. Until now, Indonesian National Police (POLRI) does not have any case management guidelines for storing digital evidence using digital forensic methods. This research aims to determine what steps investigators take in obtaining digital evidence, whether these steps have been effective in law enforcement, or whether they are still unclear. The method in this writing is normative legal research based on a statute approach and a conceptual approach. The author offers to establish guidelines for handling cyber crime cases in the Indonesian National Police by relying on digital forensic methods by strengthening and choosing the right tools for handling cases. Keywords: cybercrime, digital evidence, digital forensi

    The combined role of MRI prostate and prostate health index in improving detection of significant prostate cancer in a screening population of Chinese men

    Get PDF
    Using prostate-specific antigen (PSA) for prostate cancer (PCa) screening led to overinvestigation and overdiagnosis of indolent PCa. We aimed to investigate the value of prostate health index (PHI) and magnetic resonance imaging (MRI) prostate in an Asian PCa screening program. Men aged 50-75 years were prospectively recruited from a community-based PSA screening program. Men with PSA 4.0-10.0 ng ml -1 had PHI result analyzed. MRI prostate was offered to men with PSA 4.0-50.0 ng ml -1. A systematic prostate biopsy was offered to men with PSA 4.0-9.9 ng ml -1 and PHI ≥35, or PSA 10.0-50.0 ng ml -1. Additional targeted prostate biopsy was offered if they had PI-RADS score ≥3. Clinically significant PCa (csPCa) was defined as the International Society of Urological Pathology (ISUP) grade group (GG) ≥2 or ISUP GG 1 with involvement of ≥30% of total systematic cores. In total, 12.8% (196/1536) men had PSA ≥4.0 ng ml -1. Among 194 men with PSA 4.0-50.0 ng ml -1, 187 (96.4%) received MRI prostate. Among them, 28.3% (53/187) had PI-RADS ≥3 lesions. Moreover, 7.0% (107/1536) men were indicated for biopsy and 94.4% (101/107) men received biopsy. Among the men received biopsy, PCa, ISUP GG ≥2 PCa, and csPCa was diagnosed in 42 (41.6%), 24 (23.8%), and 34 (33.7%) men, respectively. Compared with PSA/PHI pathway in men with PSA 4.0-50.0 ng ml -1, additional MRI increased diagnoses of PCa, ISUP GG ≥2 PCa, and csPCa by 21.2% (from 33 to 40), 22.2% (from 18 to 22), and 18.5% (from 27 to 32), respectively. The benefit of additional MRI was only observed in PSA 4.0-10.0 ng ml -1, and the number of MRI needed to diagnose one additional ISUP GG ≥2 PCa was 20 in PHI ≥35 and 94 in PHI &lt;35. Among them, 45.4% (89/196) men with PSA ≥4.0 ng ml -1 avoided unnecessary biopsy with the use of PHI and MRI. A screening algorithm with PSA, PHI, and MRI could effectively diagnose csPCa while reducing unnecessary biopsies. The benefit of MRI prostate was mainly observed in PSA 4.0-9.9 ng ml -1 and PHI ≥35 group. PHI was an important risk stratification step for PCa screening.</p

    Wild and domestic animals variably display Neu5Ac and Neu5Gc sialic acids

    Get PDF
    Sialic acids are used as a receptor by several viruses and variations in the linkage type or C-5 modifications affect the binding properties. A species barrier for multiple viruses is present due to α2,3- or α2,6-linked sialic acids. The C-5 position of the sialic acid can be modified to form N-acetylneuraminic acid (Neu5Ac) or N-glycolylneuraminic acid (Neu5Gc), which acts as a determinant for host susceptibility for pathogens such as influenza A virus, rotavirus, and transmissible gastroenteritis coronavirus. Neu5Gc is present in most mammals such as pigs and horses but is absent in humans, ferrets, and dogs. However, little is known about C-5 content in wildlife species or how many C-5 modified sialic acids are present on N-linked glycans or glycolipids. Using our previously developed tissue microarray system, we investigated how 2 different lectins specific for Neu5Gc can result in varying detection levels of Neu5Gc glycans. We used these lectins to map Neu5Gc content in wild Suidae, Cervidae, tigers, and European hedgehogs. We show that Neu5Gc content is highly variable among different species. Furthermore, the removal of N-linked glycans reduces the binding of both Neu5Gc lectins while retention of glycolipids by omitting methanol treatment of tissues increases lectin binding. These findings highlight the importance of using multiple Neu5Gc lectins as the rich variety in which Neu5Gc is displayed can hardly be detected by a single lectin
    corecore