digital identification
Recently Published Documents


TOTAL DOCUMENTS

98
(FIVE YEARS 48)

H-INDEX

4
(FIVE YEARS 2)

Lex Russica ◽  
2021 ◽  
pp. 92-101
Author(s):  
I. M. Rassolov ◽  
S. G. Chubukova

The increased scale of genetic research in the world determines the relevance of legal regulation of relations on the turnover of genetic information. The purpose of this study is to define a new legal institution for the circulation of genetic information and the main directions of development of future legislation. The methodological basis of the study comprises empirical methods of comparison, description, interpretation; theoretical methods of formal and dialectical logic; private scientific methods: the method of comparative jurisprudence and the method of interpretation of legal norms. The results of the study allow the authors to state that there is a process of separation of the still few legal norms on the turnover of genetic information into a separate institution in the system of the information law branch.The developing institute should include norms (principles) of turnover and processing of genetic information. These are norms that consolidate the rights and obligations of subjects of information legal relations regarding the turnover of genetic information; norms that establish the legal regime of biological banks and national databases of genetic information; protective norms for state supervision of the activities of subjects in the field of turnover of genetic information; special norms on liability for violations of the requirements of the law.The most effective solution to the problem of legal regulation of relations on the turnover of genetic information in the Russian Federation is the adoption of a special law.The information activities of various entities in this area are often international in nature and are based on the norms established in treaties and national legislation. In this regard, it seems appropriate to launch a broad discussion of the problems of genetic information turnover at the level of the international scientific community. These should include identification of threats; identification of possible risks of using information technologies in medicine; unification of digital identification mechanisms; development of ethical codes of conduct for the scientific community; use of foresight methodology in order to develop common positions.


2021 ◽  
Vol 13 (23) ◽  
pp. 13071
Author(s):  
Radenka Mitova ◽  
Bilyana Borisova ◽  
Boian Koulov

The need for a closer and enhanced connection with nature, as the basis for human wellbeing, reinforces the importance of natural heritage governance, including wider and much improved access to information about nature-based tourism and recreation. This research seeks to reveal how Internet content can support the digital identification of nature sites and their branding as tourist destinations. To this end, it analyzes 20 exemplary websites, each known around the world, and highlights important current trends in the structuring and attractiveness of the information provided. Based on the devised benchmarking criteria, the study develops a benchmarking approach that improves digital “packaging” and marketing of natural heritage for the purposes of tourism, recreation, leisure, and sports, and then tests it in Bulgaria. The procedure includes the selection of 57 natural heritage sites and rating the content of their official websites. The results show an unsatisfactory level of representation of the heritage value of the Bulgarian NH and a severe depreciation of the provision of the necessary tourism and recreation information, in comparison to the selected global benchmark. Besides the outline of the most frequent gaps and shortcomings, the results provide managers with suggestions about the development of a “natural heritage” brand for tourism and recreation, which features amplification of site identity and messaging, plus enhancement of its visibility. The conclusions are applicable to a wide variety of geographical contexts and audiences in nature-based destination governance.


InterConf ◽  
2021 ◽  
pp. 218-224
Author(s):  
Ravza Mamedova

The article discusses non-contact thermal imaging methods for determining diseases of biological objects: video digital identification and thermography. When studying inflammatory processes in the body of a biological object using thermograms, one should refuse to register only the native thermal picture, which is static, and it is imperative to assess its dynamics. If a series of thermograms shows local changes in the thermal picture in the form of an increase or decrease in infrared radiation in those areas and at the time that were supposed, only in this case it is possible to speak unambiguously about the objectivity of thermal imaging information. Creation of a methodology for the application of digital analysis of video profiles of the shape and ratio of the dimensions of an object, and comparison of the results with the thermographic picture of a thermal imaging image of a functional thermal imaging of thermograms in normal conditions and with inflammation in a biological object.


Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 910-930
Author(s):  
Elena Anatolyevna Kirillova ◽  
Vladimir Nikolaevich Koval ◽  
Sergey Zenin ◽  
Nikolay M. Parshin ◽  
Olga V. Shlyapnikova

The article deals with the main principles of protecting digital rights – a new legal category – in the digital environment. In the context of the rapid development of information and communication technologies when cyberspace becomes the platform for interaction between citizens, society, and the state, there is a need to re-evaluate traditional approaches to rights exercised through digital communications on the Internet. The purpose of the study is to examine the legal features and properties of digital rights and identify the principles for protecting digital rights online. The authors employ the general scientific dialectical method as well as the formal legal, systemic structural, and formal logical cognition methods. The synergetic method is used to identify the features and properties of digital rights, this method helps to highlight new rules and new realities in the creative potential of chaos. The authors conclude that the scope of digital legal relations has the characteristics of cross-border and virtuality, thus ensuring the protection of digital rights should be carried out considering the special properties of this environment in which subjects cannot always be identified, and objects are characterized as simulations. Digital rights are obligations and other rights, the content and the exercise of which are determined by their specific features according to the rules and functioning principles of the information and telecommunication system. The holder of a digital right can be a person who can exercise the right. The authors identify the basic principles of protecting digital rights: the digital equality principle; the digital self-determination principle; the anonymous communication principle; the principle of confidentiality of private communications; the principle of privacy in the digital environment; the principle of secrecy of digital identification; the principle of security of data obtained through facial recognition technologies; the principle of erasure of digitalized personal information.


2021 ◽  
Vol 39 (9) ◽  
Author(s):  
Sofiia Ya. Lykhova ◽  
Andrii V. Svintsytskyi ◽  
Andrii M. Padalka ◽  
Yuriy Yu. Nizovtsev ◽  
Andrii M. Lyseiuk

The purpose of this article is to analyze the theoretical and practical aspects of the use of digital face recognition technology in Ukraine and on the basis of a study proposal on the optimal legal regime for the use of such technology in criminal proceedings. A complex analysis of the responsibility for the violation of privacy under the Ukrainian law, in the context of the use of technologies of digital identification of the person and, was proposed the list of reasonable changes of legislation for improving the level of such protection, are presented in this article.


2021 ◽  
pp. 73-83
Author(s):  
Alphanso Murray ◽  
Ronald Brown ◽  
Sean Thorpe ◽  
Maurice Edwards ◽  
Everton Walker ◽  
...  

2021 ◽  
Vol 13 (19) ◽  
pp. 10496
Author(s):  
Wafaa A. H. Ahmed ◽  
Bart L. MacCarthy

Supply chain traceability is a dominant concern for many industries, regulators, and policymakers. In the textile and apparel industries, social, environmental, and sustainability issues are frequent causes for concern, highlighting the need for effective traceability solutions. Blockchain technology has characteristics that make it attractive for supply chain traceability applications. However, the literature lacks discussion of empirical cases. We discuss current blockchain applications in the textile and apparel industries and analyze an exemplar of a prominent blockchain traceability solution adopted by a world-leading fiber producer, the Lenzing group. In this study, we identify two related objectives for traceability-product authentication and supply chain sustainability. The case study analysis has stimulated a rich discussion about the different levels of traceability achievable across the supply chain, the digital identification of products, and the extension of blockchain solutions across the whole supply network. Significant technical and business challenges exist in extending traceability to the upstream raw material supply chain and to the dispersed garment manufacturing networks downstream. More broadly, the study highlights the need to (1) clarify the objectives of a traceability initiative, and (2) scope a traceability solution appropriately, both horizontally across the supply chain and vertically with respect to the granularity of the items traced.


Author(s):  
Martha Gertruida Van Niekerk ◽  
Nkgolodishe Hermit Phaladi

Digital financial services (DFSs), being financial services accessed and delivered through digital channels, have grown rapidly in South Africa as well as globally. The adoption of the technology for DFSs has led to an increase in financial inclusion, enabling more individuals and businesses to have access to useful and affordable financial products and services, where payments, savings, credit, investment and insurance are included. Through the Financial Sector Regulation Act 9 of 2017 financial inclusion was statutorily enacted for the first time. The regulators are now empowered to insist that financial institutions take proactive steps to expand financial inclusion and can take the necessary steps to enforce these powers. One of the factors that have an influence on whether consumers will adopt DFSs is consumers' perspectives of DFSs. Lack of information and knowledge combined with the cost of data negatively influences the adoption of DFSs. The transfer of information to unbanked people in South Africa with regards to DFSs should be enhanced by the state as it strives to improve financial literacy. DFSs are susceptible to financial crimes like fraud, money laundering, terrorist financing, bribery, corruption and market abuse. The challenges that threaten the interests of customers should be addressed by stricter information verification methods when transacting with clients online. Technological detectors and digital identification should be used more effectively to verify customers and to alert authorities to suspicious transactions. Financial institutions might consider authenticating online transactions by thumb-print or a voice recognition system. This paper emphasises that because of the prospects of greater and deeper financial inclusion in South Africa, the use of DFSs has to be improved and developed and the challenges have to be constructively addressed to unleash the true potential thereof.


2021 ◽  
Vol 13 (3) ◽  
pp. 12-29
Author(s):  
Tzung-Han Jeng ◽  
Wen-Yang Luo ◽  
Chuan-Chiang Huang ◽  
Chien-Chih Chen ◽  
Kuang-Hung Chang ◽  
...  

As the application of network encryption technology expands, malicious attacks will also be protected by encryption mechanism, increasing the difficulty of detection. This paper focuses on the analysis of encrypted traffic in the network by hosting long-day encrypted traffic, coupled with a weighted algorithm commonly used in information retrieval and SSL/TLS fingerprint to detect malicious encrypted links. The experimental results show that the system proposed in this paper can identify potential malicious SSL/TLS fingerprints and malicious IP which cannot be recognized by other external threat information providers. The network packet decryption is not required to help clarify the full picture of the security incident and provide the basis of digital identification. Finally, the new threat intelligence obtained from the correlation analysis of this paper can be applied to regional joint defense or intelligence exchange between organizations. In addition, the framework adopts Google cloud platform and microservice technology to form an integrated serverless computing architecture.


Sign in / Sign up

Export Citation Format

Share Document