scholarly journals Digitizing The Land of Genghis Khan: Reforming Mongolia’s Internet Law to Achieve Growth in E-Commerce

Author(s):  
Stephen Errol Blythe

In the digital age, the E-signature has replaced the handwritten signature. Since 1995, there have been three generations of E-signature law: the first mandated use of the digital signature, the second recognized the legal validity of all types of E-signatures, and the third recognizes all types of E-signatures, but gives preferred status to the digital signature. Mongolia’s Electronic Signature Law (ESL) is third-generation; it recognizes all types of E-signatures but favors the use of the digital signature. Accreditation requirements are specified for Certification Service Providers (CSP), the issuers of certificates and verifiers to third parties that a digital signature is that of a specific subscriber. The CSP is responsible for maintaining the security of information that it receives from its subscribers. The CSP must inform the subscriber of any limitations on the use of the certificate. If a CSP issues a certificate, it must meet stringent security requirements which can only be achieved with a digital signature. CSPs must maintain a publicly accessible repository of certificates and the public keys which relying third parties can use to decrypt a subscriber’s message. A CSP may incur legal liability for publishing a certificate with inaccurate information or for not issuing a private key to the subscriber corresponding to the public key in the repository. The ESL recognizes the legal validity of certificates issued by CSPs in foreign countries. The author recommends reformation of Mongolia’s E-commerce law by adding: (1) consumer protections for E-commerce participants; (2) several new computer crimes; (3) information technology courts; (4) mandatory E-government; and (5) explicit long-arm jurisdiction.

2021 ◽  
Vol 38 (1) ◽  
pp. 244-265
Author(s):  
Emily C. Skarbek

AbstractFiscal equivalence in the public administration of justice requires local police and courts to be financed exclusively by the populations that benefit from their services. Within a polycentric framework, broad based taxation to achieve fiscal equivalence is a desirable principle of public finance because it conceptually allows for the provision of justice to be determined by constituent’s preferences, and increases the political accountability of service providers to constituents. However, the overproduction of justice services can readily occur when the benefits of the justice system are not enjoyed equally. Paradoxically, the same properties that make fiscal equivalence desirable by imposing restraint and control between constituents and local government also create internal pressures for agents of the state to engage in predatory, revenue-generating behavior.


Author(s):  
Nikolay A. Moldovyan ◽  
◽  
Alexandr A. Moldovyan ◽  

The article considers the structure of the 2x2 matrix algebra set over a ground finite field GF(p). It is shown that this algebra contains three types of commutative subalgebras of order p2, which differ in the value of the order of their multiplicative group. Formulas describing the number of subalgebras of every type are derived. A new post-quantum digital signature scheme is introduced based on a novel form of the hidden discrete logarithm problem. The scheme is characterized in using scalar multiplication as an additional operation masking the hidden cyclic group in which the basic exponentiation operation is performed when generating the public key. The advantage of the developed signature scheme is the comparatively high performance of the signature generation and verification algorithms as well as the possibility to implement a blind signature protocol on its base.


2022 ◽  
Vol 4 (4) ◽  
Author(s):  
Darpin Darpin ◽  
Astrid Yunita ◽  
Ninik Endang Purwati

This study aims to determine and analyze the application of the principle of transparency and the implementation of excellent service at the Kendari City Investment and One Stop Integrated Service Office. This study uses a descriptive qualitative approach, data analysis uses interactive model analysis techniques consisting of data collection, data reduction, data presentation and conclusion drawing/verification. The results showed that the application of the principle of transparency at the Kendari City Investment Office and PTSP from the informative (informative) aspect of the agency was good enough in providing convenience to the public to obtain information either directly or indirectly about services in the field of investment and licensing, in terms of openness has been good enough in conveying information to the public openly, and is easily accessible through several channels of information delivery, on the other hand, the agency still needs to be more intense in explaining all service requirements both technical and administrative in a clear and easy to understand manner using the system. and simple language to the public, from the aspect of disclosure, it is still not optimal in informing the public of financial details and annual reports regarding revenue, financial management and assets of the organization. In terms of the implementation of excellent service in terms of the dimensions of service procedures, service costs, completion time, service products, infrastructure, the overall competence of service providers is good, with the Public Service Standards  that have been standardized in 2018.


2021 ◽  
Vol 28 (3) ◽  
pp. 18-45
Author(s):  
Norsyamlina Che Abdul Rahim ◽  
Jayvikramjit Singh Manjit Singh ◽  
Munawara Pardi ◽  
Ahmad Ali Zainuddin ◽  
Ruhaya Salleh

The current COVID-19 pandemic remains severe. There is no doubt that the COVID-19 pandemic is affecting every aspect of our lives. Currently, the spread of inaccurate information or fake news on the internet to the public is causing the community to panic. Thus, this study aims to obtain available information on food and nutrition related to the prevention and treatment of COVID-19 from various sources. A scoping review framework was used to chart the evidence on nutritional recommendations to prevent COVID-19 based on the preferred method in reporting systematic review and meta-analysis extension for scoping reviews (PRISMA-ScR). The articles were categorised into three main groups: i) general dietary recommendations; ii) supplementation with specific micronutrients and iii) their mixtures and supplementation with traditional herbs and miscellaneous foods. A total of 60 articles met the inclusion criteria and were used in the review. This scoping review demonstrates that there is no miracle cure, food or supplement that can cure or prevent COVID-19. Currently, there is no confirmed treatment or vaccine for the disease. Practicing healthy eating habits is the best nutritional recommendation during the pandemic. Hence, this review hopefully will provide evidence-based nutrition recommendations that are available for current COVID-19 treatment. We hope that the authorities can inform the public and media to stop the spread of nutrition pseudoscience in the wake of the COVID-19 pandemic.


2020 ◽  
Vol 2 (2) ◽  
pp. 201-208
Author(s):  
Kartika Dewanty Sitepu ◽  
Marlina Marlina ◽  
Jelly Leviza

This article discusses the Implementation of Forced Tax Collection and Confiscation in an Effort to Optimize Tax Receipts at the Binjai Pratama Tax Office. Answering these problems used normative and empirical juridical research methods. The data used are primary data and secondary data. Field studies by conducting interviews with informants namely Bailiffs and Taxpayers. Data analysis was carried out qualitatively. From the results of the study showed that the implementation of tax collection with forced letters and seizures carried out by the Bailiff at the Binjai Primary Tax Service Office had been carried out in optimizing tax revenue. In reality, there are still some obstacles, namely the low compliance of taxpayers paying taxes, the address of registered taxpayers is difficult to find, the lack of supporting data, the number of bailiffs, and legislation. To overcome these obstacles, socialization and outreach activities to the public are carried out intensively and continuously, improving the address of registered taxpayers, adding bailiffs and human resources, increasing cooperation with third parties and clarifying the laws and regulations on active billing actions in order to achieve targets and realize tax revenues.


2014 ◽  
Vol 14 (3) ◽  
Author(s):  
Elfrida R Gultom

The objective of Busway development is to provide transportation services faster, safer, comfortable, and affordable for people in Jakarta. Ticket prices are subsidized by the local government busway. Busway given special line, however could not be separated from the accident. In a carriage, in the event of an accident then apply provisions of Law No. 22 of 2009 on Traffic and Transportation. If there is a loss that hit the third party then setting responsibilities Public Service Agency TransJakarta Busway to third parties refer to the provisions of Article 194 paragraph (1) which determines that the public transport companies are not responsible for any losses suffered by third parties, unless the third party may prove that the loss is caused by the fault of public transport company. Under these provisions, if the third party wants to sue for damages, ketigalah party must prove the fault of the carrier, the claim is based on the basis of tort or on the basis of error set forth in Article 1365 of the Civil Code which stipulates that any action unlawfully harming others, require the person who carries the loss offset. Keywords: transport, the responsibility of the carrier, a third party, transport law


Author(s):  
Anna Rohunen ◽  
Jouni Markkula

Personal data is increasingly collected with the support of rapidly advancing information and communication technology, which raises privacy concerns among data subjects. In order to address these concerns and offer the full benefits of personal data intensive services to the public, service providers need to understand how to evaluate privacy concerns in evolving service contexts. By analyzing the earlier used privacy concerns evaluation instruments, we can learn how to adapt them to new contexts. In this article, the historical development of the most widely used privacy concerns evaluation instruments is presented and analyzed regarding privacy concerns' dimensions. Privacy concerns' core dimensions, and the types of context dependent dimensions, to be incorporated into evaluation instruments are identified. Following this, recommendations on how to utilize the existing evaluation instruments are given, as well as suggestions for future research dealing with validation and standardization of the instruments.


2020 ◽  
Vol 2 (3) ◽  
pp. 174-180
Author(s):  
Adriyansah Efendi Noor ◽  
Pahrul Irfan

Vocational High School or in Indonesian abbreviated as SMK, is a government program that was built with the aim that students can have expertise in certain fields and can be the initial capital for them in looking for work. An accredited educational curriculum and the many practical activities provided to students can also ensure that SMK graduates are ready to enter the workforce. However, in today's world of work, it requires workers who, in addition to having skills, must also have work experience. There are events held by the government regarding Job Vacancy info which are held only a few times a year so that more participants are participating and the unemployment rate in the regions is getting higher. Based on the above problems, the authors provide a solution by creating a "Freelance Service Provider Application" which is expected to bring together workers and job seekers. The application is made web-based so that it can be easily accessed through various types of devices. The author also implements Progressive Web Apps technology or also known as PWA so that it can be more easily accessed on mobile devices. Based on the results of the discussion on the implementation of PWA technology for making applications for freelance service providers, this can be a means for the public and prospective workers to meet and conduct transactions. So based on the questionnaire data obtained from the respondents, it can be concluded that the research carried out was successful and it is felt that it can help the graduates of SMK 3 Mataram to get jobs and also work experience


Author(s):  
Alireza Jabbari ◽  
Nasrin Shaarbafchi Zadeh ◽  
Behrooz Maddahian

Introduction: Performance-based payment is a payment model that attempts to reward the measured dimensions of performance and encourages health service providers to achieve predetermined goals by financial incentives. This study aimed to identify executive challenges of performance-based payment from medical and educational hospitals managers’ perspective and offering solutions in Isfahan 2018. Methods: This study was a qualitative study. Semi structured interviews were used to collect data. The research population was 11 people (the managers of educational and medical hospitals in Isfahan) who were selected purposefully. All interviews were recorded and then written on a paper. The duration of the interviews varied between 45 to 60 minutes. The data were analyzed using MAXQDA120 software and based on thematic analysis. Results: In this study, , regarding executive challenges, seven themes and fifteen sub-themes were obtained, including the weakness of the performance-based payment project, weakness in education and educational support, low employee participation, weakness of information and communication technology, weakness of laws and regulations, unfavorable economic conditions of the public sector, and special conditions governing public hospitals.   Conclusion: performance-based payment, if implemented correctly, can lead to the improvement of quantitative and qualitative indicators related to employees’ performance. Correct implementation requires identifying challenges and obstacles and then corrective actions. This study was able to identify and present some of the operational challenges of the performance-based payment from the viewpoint of hospital managers.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


Sign in / Sign up

Export Citation Format

Share Document