Refiguring the Real Picture and Modernity in Word and Image, 1400-1700.

1994 ◽  
Vol 25 (2) ◽  
pp. 459
Author(s):  
James Clifton ◽  
Christopher Braider
Keyword(s):  
The Real ◽  
2021 ◽  
Vol 3 (1) ◽  
pp. 139-154
Author(s):  
Edi Tuahta Putra Saragih ◽  
Muhammad Citra Ramadhan ◽  
Isnaini Isnaini

This research aimed to: (a) obtain the forms of copyright infringement of songs and/or music (with or without lyrics); (b) understand the role of the police, in this case the Police Precinct, in the law enforcement; (c) identify the factors that influenced the law enforcement. The research method used the normative-empirical legal research, with the initial stages of specifying norms in order to get the proper picture, and then specifying empirical events in order to get the real picture. The research results showed several matters: 1) The forms of copyright infringement of songs and/or music (with or without lyrics) found included: the distribution of the works or the copies, the performances of the works, and the announcements of the works; 2) Police Precinct did notultimately carry out their role as a law enforcer for the copyright infringement of songs and/or music (with or without lyrics); and 3) The factors that influenced the law enforcement on the copyright infringement of songs and/or music (with or without lyrics), namely: legislation factor, in the matter of complaint offenses; law enforcement factor, in terms of the capacity of members; less supportive factor of facilities and infrastructure; legal awareness factor, in the problem of the lack of legal counseling; and cultural factor, related to the differences in norms in the copyright law between those in society and those in regulations. 


2021 ◽  
Vol 597 (2) ◽  
pp. 33-42
Author(s):  
Ewa Jarosz

Intersectoral cooperation is widely recommended strategy in child protection. However despite many efforts to develop it, the real picture of intersectoral collaboration still is not enough satisfying. Researchers identify many factors that are obstacles to its development. Based on the analysis of the practice some models for constructing and improving intersectoral cooperation are suggested. The aim of the paper is to present main barriers of this collaboration as well as to present an example of a functional model that helps to construct intersectoral collaboration in a local environment.


Author(s):  
Geetika Sarna ◽  
M.P.S. Bhatia

Cyberbullying is a felonious act carried out against the victim by sending harassing/ embarrassing/ abusing information online. Normally offenders create fake profiles in order to hide their identity for unscrupulous activities. Assuming a fake identity is very harmful as the real picture of the offender is not visible, and also it can become difficult to entrap them. Sometimes, some trustworthy friends can also take advantage of the fake identity in order to harm the victim. Culprits can reveal victim's personal information like financial details, personal history, family, etc., and along with it, he can harass, threaten or blackmail the victim using fake profiles and permeates that information on the social network. So, it is necessary to resolve this issue. In this article, the authors used the concept of entropy and cross entropy to identify fake profiles as entropy works on the degree of uncertainty. Also, this article shows the comparison of proposed method with the existing classifiers.


1995 ◽  
Vol 77 (1) ◽  
pp. 134
Author(s):  
Celeste Brusati ◽  
Christopher Braider
Keyword(s):  
The Real ◽  

Author(s):  
Geetika Sarna ◽  
M.P.S. Bhatia

Cyberbullying is a felonious act carried out against the victim by sending harassing/ embarrassing/ abusing information online. Normally offenders create fake profiles in order to hide their identity for unscrupulous activities. Assuming a fake identity is very harmful as the real picture of the offender is not visible, and also it can become difficult to entrap them. Sometimes, some trustworthy friends can also take advantage of the fake identity in order to harm the victim. Culprits can reveal victim's personal information like financial details, personal history, family, etc., and along with it, he can harass, threaten or blackmail the victim using fake profiles and permeates that information on the social network. So, it is necessary to resolve this issue. In this article, the authors used the concept of entropy and cross entropy to identify fake profiles as entropy works on the degree of uncertainty. Also, this article shows the comparison of proposed method with the existing classifiers.


Sign in / Sign up

Export Citation Format

Share Document