With the increasing climate change crisis, the ongoing global energy security challenges, and the prerequisites for the development of sustainable and affordable energy for all, the need for renewable energy resources has been highlighted as a global aim of mankind. However, the worldwide deployment of renewable energy calls for large-scale financial and technological contributions which many States cannot afford. This exacerbates the need for the promotion of foreign investments in this sector, and protecting them against various threats. International Investment Agreements (IIAs) offer several substantive protections that equally serve foreign investments in this sector. Fair and Equitable Treatment (FET) clauses are among these. This is a flexible standard of treatment whose boundaries are not clearly defined so far. Investment tribunals have diverse views of this standard. Against this background, this article asks: What are the prominent international renewable energy investment threats, and how can FET clauses better contribute to alleviating these concerns? Employing a qualitative method, it analyses the legal aspects and properties of FET and concludes that the growing security and regulatory threats have formed a sort of modern legitimate expectations on the part of renewable energy investors who expect host states to protect them against such threats. Hence, IIAs and tribunals need to uphold a definite and broadly applicable FET approach to bring more consistency and predictability to arbitral awards. This would help deter many unfavourable practices against investments in this sector.
Fujian Tubao, a defensive residential structure predominantly found in central Fujian, represents a significant cultural heritage of the region. However, with the rapid urbanization underway, Fujian Tubao faces the threat of extinction, presenting severe challenges to its survival and development. Identifying a sustainable development path for Fujian Tubao is crucial for preserving regional culture. This study uses Fuxing Bao, a quintessential example of Fujian Tubao, as a case study to explore conservation methods based on adaptive reuse. Through field surveys, questionnaires, in-depth interviews, and case studies, we analyze the historical background of the building, focusing on the current physical and social environment of Fuxing Bao. Our findings indicate that the current state of preservation of Fuxing Bao can meet the requirements for adaptive reuse. By integrating results from surveys and interviews with local villagers, we propose sustainable development strategies and conservation methods. This research offers a sustainable development model for Fujian Tubao and other traditional regional dwellings. By adopting an adaptive reuse perspective, it aims to better address the conflict between modern living and traditional architectural preservation, ensuring that these architectural spaces are properly protected and continue to play a unique role in contemporary society.
The explosion of information technology, besides its positive aspects, has raised many issues related to personal information and personal data in the network environment. Because children are vulnerable to abuse, fraud and exploitation, protecting children’s personal information and personal data is always of concern to many countries. From the concept and characteristics of personal information and personal data of children in Europe, the United States and Vietnam, it can be seen that children’s personal information and personal data protection is very necessary in every country today. This research focuses on the age considered a child, the child’s consent and his or her parental consent when providing and processing personal information or personal data of children under the laws of the EU, US and Vietnam. Therefore, the article proposes some recommendations related to the child’s consent and his or her parental consent in protecting children’s personal data in Vietnam.
The privacy of personal information is aimed at protecting human rights both under the international human rights regime and the Saudi Arabian constitution and other statutes and regulations, subject only to some exceptions that include the protection of public health. The coronavirus disease 2019 (COVID-19) pandemic has brought about certain challenges that necessitate strategies to augment the conventional surveillance of infectious diseases, contact tracing, isolation, reporting and vaccination. Several governments institutions, and agencies presently adopt mobile applications for collecting, analyzing, managing, and sharing critical personal data of individuals infected with or exposed to COVID-19. While the benefits of sharing private information for achieving public health needs may not be disputed, the risk of breach of personal privacy is enormous. This had forced the national governments into a dilemma of either succumbing to public health needs, strictly respecting and protecting the privacy of individuals, or alternatively, balancing the two conflicting demands. There is a massive body of literature on the security and privacy of such mobile applications, but none has adequately explored and discussed public interest justifications under Saudi Arabian laws for alleged privacy breaches. We examined the health surveillance mobile app technologies currently in use in Saudi Arabia with the aim of determining the potential risks of data breaches under extant data protection laws. The paper recommends, among others, that any potential risk of breach to right to privacy of personal information under the law must be (justified by) the public health needs to protect society during the COVID-19 pandemic.
Nowadays, urban ecosystems require major transformations aimed at addressing the current challenges of urbanization. In recent decades, policy makers have increasingly turned their attention to the smart city paradigm, recognizing its potential to promote positive changes. The smart city, through the conscious use of technologies and sustainability principles, allows for urban development. The scientific literature on smart cities as catalysts of public value continues to develop rapidly and there is a need to systematize its knowledge structure. Through a three-phase methodological approach, combining bibliometric, network and content analyses, this study provides a systematic review of the scientific literature in this field. The bibliometric results showed that public value is experiencing an evolutionary trend in smart cities, representing a challenging research topic for scholars. Network analysis of keyword co-occurrences identified five different clusters of related topics in the analyzed field. Content analysis revealed a strong focus on stakeholder engagement as a lever to co-create public value and a greater emphasis on social equity over technological innovation and environmental protection. Furthermore, it was observed that although environmental concerns were prioritized during the policy planning phase, their importance steadily decreased as the operational phases progressed.
Personal information is a vital productive commodity in the digital economy, and its processing has seen unparalleled transformations in both breadth and depth. This article proposes to enhance the legal remedies for personal information rights in contemporary China. Research has revealed multiple practical challenges in China’s judicial practices, such as hesitance to prosecute owing to an absence of substantial legal foundation, improper distribution of the burden of proof, and inadequate integration of criminal-civil judicial safeguards for personal information. This paper advocates for China to elucidate the definition of personal information rights via legislation, enable the litigation of personal information infringement cases, and establish explicit criteria for their acceptance into judicial proceedings. Furthermore, China must develop an appropriate structure for distributing the burden of evidence. It must also use discretionary judgment to properly tackle the problems related to evaluating damages in instances of personal information violations.
Copyright © by EnPress Publisher. All rights reserved.