Personal data privacy regulation and mitigation are critical in implementing financial technology (fintech). Problems with fintech users’ data might result from data breaches, improper usage, and trade. Issues with personal data will result in financial losses, crimes, and violations of personal information. This legal research used three approaches: conceptual, comparative, and statute-based. In order to implement the statutory method, all laws and regulations pertaining to the legal concerns of information technology, fintech, personal data security, and protection are reviewed. Due to the nature of the sources of data, this study mainly used literature study and document observation to collect the data. Then, legal interpretation, legal reasoning, and legal argumentation are all included in the qualitative juridical analysis. This article recommends two strategies that Indonesia should take to provide personal data protection, including: 1) establishing the Personal Data Protection Commission (PDPC); and 2) improving the financial literacy of consumers.
The ability to take advantage of new digital solutions and technology will give companies a competitive edge, and operational optimization remains a major concern. A significant area of risk is cyber security because software-based technologies are integral to ship operations. Particular emphasis has been placed on the vulnerabilities of the Global Navigation Satellite System (GNSS), since it is an essential part of many maritime facilities and hence a target for hackers. Presently, research has shown that increased integration of new enabling technologies, like the Internet of Things (IoT) and big data, is driving the dramatic proliferation of cybercrimes. However, most of the attacks are related to ransomware attacks and/or with direct attack to the information technology (IT) and infrastructure. Nevertheless, there is a strong trend toward increased systems integration, which will produce substantial business value by making it easier to operate autonomous vessels, utilizing smart ports more, reducing the need for labour, and improving economic stability and service efficiency. Cybersecurity is becoming more and more important as a result of the quick digital transformation of the offshore and maritime sectors, which has also brought new dangers and laws. The marine sector has started to take cybersecurity seriously in light of the multiple documented instances of cyberattacks that have exposed business or personal data, caused large financial losses, and caused other problems. However, the body of existing research on emerging threats in maritime cyberspace is either inadequate or ignores important variables. Based on the most recent developments in the maritime sector, the article presents a classification of the most serious cyberthreats as well as the risks to cybersecurity in maritime operations and possible mitigation strategies from an educational research perspective.
The privacy of personal information is aimed at protecting human rights both under the international human rights regime and the Saudi Arabian constitution and other statutes and regulations, subject only to some exceptions that include the protection of public health. The coronavirus disease 2019 (COVID-19) pandemic has brought about certain challenges that necessitate strategies to augment the conventional surveillance of infectious diseases, contact tracing, isolation, reporting and vaccination. Several governments institutions, and agencies presently adopt mobile applications for collecting, analyzing, managing, and sharing critical personal data of individuals infected with or exposed to COVID-19. While the benefits of sharing private information for achieving public health needs may not be disputed, the risk of breach of personal privacy is enormous. This had forced the national governments into a dilemma of either succumbing to public health needs, strictly respecting and protecting the privacy of individuals, or alternatively, balancing the two conflicting demands. There is a massive body of literature on the security and privacy of such mobile applications, but none has adequately explored and discussed public interest justifications under Saudi Arabian laws for alleged privacy breaches. We examined the health surveillance mobile app technologies currently in use in Saudi Arabia with the aim of determining the potential risks of data breaches under extant data protection laws. The paper recommends, among others, that any potential risk of breach to right to privacy of personal information under the law must be (justified by) the public health needs to protect society during the COVID-19 pandemic.
More and more scholars are paying attention to the economic and environmental responsibilities undertaken by firms. Firm sustainability has become a hot topic in current research. This article aims to analyze the impact of various dimensions of digital green technology innovation on firm sustainability. The “digital green technology innovation” in this research is a new variable explored based on previous research, and the five dimensions of the variable are created based on the POLE theory. This research uses authoritative Chinese databases to collect data on various dimensions of digital green technology innovation and sustainable development of companies, and uses a fixed effects model for regression analysis. The results indicate that the implementation of various dimensions of digital green technology innovation will promote the firm sustainability. Moreover, in firms with strong profitability, this performance is significantly better than in those with weak profitability.
The aim of the present study was to determine the effects of single and mixed infections of nematode (Meloidogyne javanica), fungus (Fusarium oxysporum) and bacterium (Xanthomonas axonopodis) on nodulation and pathological parameters of Bambara groundnut (Vigna subterrenea (L.) Verdc.) in field condition. Nematode infested field was used while other pathogens were obtained from diseased plants. The Randomized Complete Block Design (RCBD) was adopted in a 5 × 9 × 5 factorial design (5 blocks, 9 treatments and 5 replicates per treatments) resulting in 225 experimental units. In each experimental unit, three seeds were sown to a depth of 5cm and thinned to one plant per planting hole after germination at day 7. Treatments were inoculated into test plant following standard methods. As a result, the control treatment recorded the highest number of nodules (64.0 ± 6.91), followed by bacterium (45.2 ± 5.11) while N + F + B had the lowest number of root nodules (23.4 ± 2.42). Simultaneous treatment (N + F + B) gave the highest percentage reduction in nodulation (63.44%), followed by treatment N + F7 (56.25%). Fungus treatment recorded the highest mean wilted plants (3.8 + 0.20) followed by N + F7 treatment (3.40 + 0.40). Gall formation in the nematode treatment increased proportionately by 56.33% as the highest recorded, followed by treatment N + F7 with 50.0%. Treatment N + F7 had the highest reproduction factor (Rf) value of 9.30 followed by nematode (8.30), N + B7 (7.40), N + F + B (6.80) and N + F14 (6.50). Zero (0) Rf value was recorded in fungus, bacterium and control treatments. The observed differences in nodulation and pathological parameters among the treatments are significant (P < 0.05). The data provided in this work is important in the control of the three pathogens affecting the productivity of Bambara nut. Formulation of a single protectant should be designed to have potent effects on the three pathogens to achieve effective protection and good production of Bambara nut.
Personal information is a vital productive commodity in the digital economy, and its processing has seen unparalleled transformations in both breadth and depth. This article proposes to enhance the legal remedies for personal information rights in contemporary China. Research has revealed multiple practical challenges in China’s judicial practices, such as hesitance to prosecute owing to an absence of substantial legal foundation, improper distribution of the burden of proof, and inadequate integration of criminal-civil judicial safeguards for personal information. This paper advocates for China to elucidate the definition of personal information rights via legislation, enable the litigation of personal information infringement cases, and establish explicit criteria for their acceptance into judicial proceedings. Furthermore, China must develop an appropriate structure for distributing the burden of evidence. It must also use discretionary judgment to properly tackle the problems related to evaluating damages in instances of personal information violations.
Copyright © by EnPress Publisher. All rights reserved.