25 research outputs found

    The public procurement of information systems: dialectics in requirements specification

    Get PDF
    When acquiring information systems, public entities face a dilemma. On the one hand, they want to procure the system that best suits their needs, which often requires lengthy dialogues with vendors. At the same time, they are restricted by government regulations that mandate limited dialogue in the interests of transparency and equal opportunities for all vendors. To examine how public entities deal with this, we followed three procurement projects in Norway. We show that this dilemmamanifests itself as a dialectic between the thesis of getting the systemrequirements right and the antithesis of strictly adhering to regulations. Public entities search for a resolution of this dialectic through two syntheses: selecting an appropriate tendering procedure, and learning how to specify requirements through networks of peer public entities. Our findings reveal that the syntheses are possible because the dialectic is actually complimentary, both the thesis and the antithesis are needed to create the joint outcome that satisfies both. The resolution of the dialectic unfolds differently over time. Our study contributes to the relatively neglected stream of IS research on dialectics that explicitly searches for a synthesis while revealing the complementarity of the dialectic. We show how time plays a nuanced role in the resolution of the dialectic situation

    Assessing the Viability of the 2005 Protocol to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation

    Get PDF
    The terrorist attack on the Achille Lauro prompted the international community to adopt the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation (SUA) 1988, which established a legal basis for prosecuting maritime violence that did not fall within the piracy framework of the United Nations Convention on the Law of the Sea 1982. To extend the range of offences covered by the Convention, it was amended by the 2005 Protocol. The Protocol, however, has been the subject of much criticism. One of the most serious criticisms of the Protocol is directed at its Article 8bis, which authorizes a state party to visit a ship flying the flag of another state party without prior authorization from the flag state on the ground of failure to respond within four hours. In fact, this provision is in conflict with the exclusive jurisdiction of a flag state over a ship flying its flag on the high seas. This is the reason why although the 2005 Protocol entered into force on 28 July 2010, until present, there are only 22 States parties, most of which are not major maritime countries. The main objective of this paper therefore is to identify shortcomings of the 2005 Protocol and assess its viability. It is suggested that the 2005 Protocol needs to be revised to cure its deficiencies in order to attract more states to become parties to it

    Fortifying horn of Africa with the Djibouti code of conduct in combating piracy and armed robbery against ships: myth or reality

    Get PDF
    obally, the Djibouti Code of Conduct is the second regional agreement in combating piracy and armed robbery against ships in the Western Indian Ocean and the Gulf of Aden after the ReCAAP. Although it has great potential to contribute in suppressing these maritime crimes in the region, it does not fully address the problem due to its non-binding nature, lack of serious cooperation among Participants, narrow definition of maritime crimes, limitations in information sharing system and poor capacity building. Thus, there is an urgent need to evaluate the efficacy of the Djibouti Code of Conduct. Accordingly, the author intents to analyse its shortcomings and proposes viable solutions. In this paper, Participants are suggested to render binding legal effect to the Djibouti Code of Conduct as soon as possible for the effective suppression of increasing maritime violence crimes. It is also proposed to widen the scope of maritime crimes and include maritime terrorism. It is preferable to remove the two ships requirement from the piracy definition and include the phrase “Exclusive Economic Zone of a State Party” into the definition of armed robbery against ships. All Participants are advised to allow the hot pursuit in their territorial waters in arresting or seizing culprits and cooperate with the requesting Participant. All ships passing through the waters in the region are recommended to notify the flag state, the nearest national focal point of a Participant and the information exchange centre when any incident takes place. All information exchange centres and national focal points should also be well equipped with advanced technologies

    Assessing the Viability of the 2005 Protocol to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation

    Get PDF
    Abstract: The terrorist attack on the Achille Lauro prompted the international community to adopt the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation (SUA) 1988, which established a legal basis for prosecuting maritime violence that did not fall within the piracy framework of the United Nations Convention on the Law of the Sea 1982. To extend the range of offences covered by the Convention, it was amended by the 2005 Protocol. The Protocol, however, has been the subject of much criticism. One of the most serious criticisms of the Protocol is directed at its Article 8bis, which authorizes a state party to visit a ship flying the flag of another state party without prior authorization from the flag state on the ground of failure to respond within four hours. In fact, this provision is in conflict with the exclusive jurisdiction of a flag state over a ship flying its flag on the high seas. This is the reason why although the 2005 Protocol entered into force on 28 July 2010, until present, there are only 22 States parties, most of which are not major maritime countries. The main objective of this paper therefore is to identify shortcomings of the 2005 Protocol and assess its viability. It is suggested that the 2005 Protocol needs to be revised to cure its deficiencies in order to attract more states to become parties to it

    Investigation of Japanese Encephalitis Virus Infection in Bogalay Township, Myanmar in 1999

    Get PDF
    An investigation was in Nyi-naung-wa village, Bogalay township for Japanese encephalitis (JE) virus infection and the possibility of a JE outbreak. JE virus antibody was determined among the pigs and the people living near the pig farms in that village and at an adjacent village as a control. The known JE virus vector Culex mosquito species were also identified in both villages. Haemagglutination inhibition (HAI) methods were used for the detectioon of JE and dengue antibodies. Homotypic or monotypic JE antibodies were detected in 33% of the pigs tested. No homotypic nor monotypic JE antibodis was detected among the villagers. Although there was no JE virus infection among the people, because of the presence of JE virus infection among the pigs and the presence of Culex mosquito vector in that area, the possibility of a JE outbreak in humans in that area, if the number of pig breeding per household increase and the mosquito density become higher is discussed

    Clinical importance of the Mandalay spitting cobra (Naja mandalayensis) in Upper Myanmar – Bites, envenoming and ophthalmia

    Get PDF
    This is an accepted manuscript of an article published by Elsevier in Toxicon on 03/06/2020, available online: https://doi.org/10.1016/j.toxicon.2020.05.023 The accepted version of the publication may differ from the final published version.© 2020 Elsevier Ltd Examination of 18 cobras brought to three hospitals in the Mandalay Region by patients bitten or spat at by them distinguished 3 monocled cobras (Naja kaouthia) and 15 Mandalay spitting cobras (N. mandalayensis), based on their morphological characteristics. We confirm and extend the known distributions and habitats of both N. mandalayensis and N. kaouthia in Upper Myanmar. Clinical symptoms of local and systemic envenoming by N. mandalayensis are described for the first time. These included local swelling, blistering and necrosis and life-threatening systemic neurotoxicity. More information is needed about the clinical phenotype and management of bites by N. mandalayensis, the commoner of the two cobras in Upper Myanmar. Since the current cobra antivenom manufactured in Myanmar has lower pre-clinical efficacy against N. mandalayensis than N. kaouthia, there is a need for more specific antivenom therapy.Published versio

    Co-occurrence of Point Mutations in the Voltage-Gated Sodium Channel of Pyrethroid-Resistant Aedes aegypti Populations in Myanmar

    Get PDF
    Background:Single amino acid substitutions in the voltage-gated sodium channel associated with pyrethroid resistance constitute one of the main causative factors of knockdown resistance in insects. The kdr gene has been observed in several mosquito species; however, point mutations in the para gene of Aedes aegypti populations in Myanmar have not been fully characterized. The aim of the present study was to determine the types and frequencies of mutations in the para gene of Aedes aegypti collected from used tires in Yangon City, Myanmar.Methodology/Principal Findings:We determined high pyrethroid resistance in Aedes aegypti larvae at all collection sites in Yangon City, by using a simplified knockdown bioassay. We showed that V1016G and S989P mutations were widely distributed, with high frequencies (84.4% and 78.8%, respectively). By contrast, we were unable to detect I1011M (or I1011V) or L1014F mutations. F1534C mutations were also widely distributed, but with a lower frequency than the V1016G mutation (21.2%). High percentage of co-occurrence of the homozygous V1016G/S989P mutations was detected (65.7%). Additionally, co-occurrence of homozygous V1016G/F1534C mutations (2.9%) and homozygous V1016G/F1534C/S989P mutations (0.98%) were detected in the present study.Conclusions/Significance:Pyrethroid insecticides were first used for malaria control in 1992, and have since been constantly used in Myanmar. This intensive use may explain the strong selection pressure toward Aedes aegypti, because this mosquito is generally a domestic and endophagic species with a preference for indoor breeding. Extensive use of DDT for malaria control before the use of this chemical was banned may also explain the development of pyrethroid resistance in Aedes aegypti

    Engineering properties of old alluvium for Changi extension line project in Singapore

    No full text
    Old Alluvium is one of the main geological formations in Singapore. Three types of soils strata: Fill, Kallang Formation and Old Alluvium were encountered along the Changi Extension Line (CEL) project in Singapore. The Old Alluvium Formation comprises a sequence of very weak to weak quartzo-feldspathic sandstones with conglometric and mudstone horizons in which the upper parts have been weathered to form a silty clay and geavelly sand. A site investigation programme was carried to characterize the geotechnical properties of the three types of soil strata, in particular the Old Alluvium. The laboratory and in-situ test results are presented in this project. The in-situ tests include the Standard Penetration Tests (SPT), Field Vane Shear Tests (FVT), Piezocone Penetration Tests (CPTU), Pressuremeter Tests (PMT) and Cone Pressuremeter (CPM) tests. The index properties, soil classification, compressibility, consolidation parameter and shear strength parameters for each type of strata are analyzed and presented in this report. Correlations between laboratory and in-situ data were made. The suitability of the some of existing interpretation methods and correlation relationships are examined.Master of Science (Geotechnical Engineering
    corecore