r

Big Brother is Watching But He Doesn’t Understand: Why Forced Filtering Technology on the Internet Isn’t the Solution to the Modern Copyright Dilemma

by Mitchell Longan[1] Introduction The European Parliament is currently considering a proposal to address problems of piracy and other forms of copyright infringement associated with the digital world.[2] Article 13 of the proposed Directive on Copyright in the Digital Single




r

SCRIPTed is turning 15!

“Fifteen Years of Evolution of Law, Technology and Society” To celebrate SCRIPTed’s 15th birthday, we are hosting a conference on Monday 28 January (3pm-7pm) at Evolution House here in Edinburgh. For more details, the programme, and (free) registration, see our




r

Online harms and Caroline’s Law – what’s the direction for the law reform?

by Dr Kim Barker (University of Stirling) & Dr Olga Jurasz (Open University) The UK Government has recently published an Online Harms White Paper: initial consultation response. It is the cornerstone of the Government’s ongoing reform package which aims to




r

Georgia vs. Public.Resource.org: The Morning After

by Bashar H. Malkawi Copyright is an engine for knowledge. Although copyright creates monopoly, it should not be considered as a good in itself, but as a tool which can be used to achieve desirable objectives in society. Against the




r

Predicting Innovation: Why Facebook/WhatsApp Merger Flunked

By Hasan Basri Cifci[1] In the world of 2014, the Commission of Facebook/WhatsApp merger case[2] concluded that integration and interoperation of Facebook and WhatsApp were unfeasible. However, Facebook integrated its three subsidiaries (WhatsApp, Instagram, and Facebook) under its brand in




r

Timed influence: The future of Modern (Family) life and the law

By Lucas Miotto Lopes and Jiahong Chen The future of real-time appeal Knowing when to say or do something is often just as important as knowing what to say or do. The right advice at the wrong time is not




r

En pleine crise du covid-19, l'Assemblᅵe change les rᅵgles des CDD et prᅵcarise un peu plus les salariᅵs

L'information est ᅵ lire sur le site de Mediapart : le 15 mai, alors que l'Assemblᅵe est en train de voter la poursuite de l'ᅵtat d'urgence sanitaire, les dᅵputᅵs de la Rᅵpublique en...




r

En renonᅵant aux dividendes, l'Etat va perdre 2,4 milliards d'euros

Pas de dividendes en pᅵriode de crise. En annonᅵant qu'il n'accorderait aucune aide (comme des reports de cotisation) aux entreprises qui verseraient des dividendes ᅵ leurs actionnaires, le gouvernement a tentᅵ...




r

La France a dᅵtruit des stocks de masques pendant l'ᅵpidᅵmie du coronavirus

C'est surrᅵaliste. Les services de Matignon ont dᅵcouvert fin mars que des stocks de masques pᅵrimᅵs continuaient ᅵ ᅵtre brᅵlᅵs pendant l'ᅵpidᅵmie alors que certains...




r

La Semaine politique : la France a dᅵtruit ses masques, un ex-collaborateur de Vᅵran a cherchᅵ ᅵ en vendre (et quelques autres infos)

Vous n'avez pas eu le temps de lire Le Canard enchaᅵnᅵ, Mediapart, Le Monde, Arrᅵt sur images et tous les autres titres de presse ? On s'en charge pour vous.




r

Le maire d'extrᅵme-droite de Perpignan s'est augmentᅵ de 17% juste aprᅵs son ᅵlection

C'est un classique. Juste aprᅵs leur victoire, certains ᅵlus locaux font voter une augmentation de leur salaire. Une dᅵcision qui intervient au dᅵbut de leur mandat, histoire que les ᅵlecteurs aient le temps...




r

Journᅵes parlementaires, campus rᅵgionaux : La Rᅵpublique en marche va dᅵpenser prᅵs d'un million d'euros pour sa rentrᅵe

C'est la rentrᅵe politique. Et qui dit rentrᅵe, dit universitᅵ d'ᅵtᅵ. Cette annᅵe, la Rᅵpublique en marche a vu les choses en grand en organisant ᅵ la fois des journᅵes...




r

La justice stoppe une enquᅵte potentiellement gᅵnante sur Jean Castex, trois jours aprᅵs sa nomination comme Premier ministre

Hasard du calendrier ou volontᅵ de prᅵserver le nouveau Premier ministre ? Selon Mediapart, une enquᅵte judiciaire ouverte par le parquet de Perpignan, potentiellement gᅵnante pour Jean Castex, a ᅵtᅵ...




r

Titres de sᅵjour : pour ᅵviter les files d'attente, les prᅵfectures ont inventᅵ l'inscription en ligne (qui ne fonctionne quasiment jamais)

Des files d'attente, la nuit, devant les prᅵfectures, pour tenter d'obtenir un rendez-vous afin de demander ou de renouveler un titre de sᅵjour. C'ᅵtait la rᅵalitᅵ au dᅵbut des annᅵes...




r

0 800 : le numᅵro vert sur le covid rapporte gros et informe peu (certains tᅵlᅵopᅵrateurs sont des intᅵrimaires formᅵs en 30 minutes)

Inquiet par le coronavirus ? Vous pouvez appeler le numᅵro vert 0 800 130 000. C'est Emmanuel Macron lui-mᅵme qui en a fait la promotion dans un tweet en avril 2020, en plein confinement. Ce 0 800 fait partie de la longue liste...




r

Selon Le Canard enchaᅵnᅵ, le gouvernement Castex est le plus coᅵteux de l'histoire de la Ve Rᅵpublique (185 millions d'euros par an)

L'information est passᅵe inaperᅵue mais elle ne manque pas de sel. Alors que la gestion de la crise du covid-19 par le gouvernement est trᅵs contestᅵe (au retard dans la livraison de masques s'ajoute...




r

Le ministre de la justice, Eric Dupont-Moretti, a oubliᅵ de dᅵclarer 300 000 euros de revenus au fisc

Voilᅵ un "petit oubli" bien embᅵtant. Selon Mediapart, "le garde des Sceaux, Eric Dupont-Moretti, a oubliᅵ de dᅵclarer au fisc et ᅵ la Haute Autoritᅵ pour la transparence de la vie publique...




r

Pᅵle emploi a organisᅵ un sᅵminaire au Stade de France pour 300 000 euros

Le retour de Politique.net mᅵritait bien de commencer par une fᅵte. Selon Le Canard enchaᅵnᅵ, "le 17 juin, Pᅵle emploi Il-de-France s'est offert un sᅵminaire managers au Stade de France pour communier...




r

Pour dᅵsengorger les urgences des hᅵpitaux, le ministre de la Santᅵ a saturᅵ le Samu

C'est malin. A peine nommᅵ ministre de la Santᅵ, Franᅵois Braun croyait avoir trouvᅵ une astuce pour dᅵsengorger les services d'urgences des hᅵpitaux : demander aux patients d'appeler le 15,...




r

Crᅵation de 3000 postes de "gendarmes verts" : la fausse promesse de Darmanin

A chaque jour, une nouvelle annonce. Cet ᅵtᅵ, le ministre de l'Intᅵrieur, Gᅵrald Darmanin, a multipliᅵ les dᅵplacements sur le terrain et les annonces. Pour lutter contre les pyromanes ᅵ...




r

Banques, assurances et entreprises du CAC 40 : leurs bᅵnᅵfices explosent

La crise ? Quelle crise ? Alors que le gouvernement prᅵpare l'opinion ᅵ une longue pᅵriode d'inflation et de hausse des prix de l'ᅵnergie en raison de la guerre en Ukraine, tout ne va pas si mal sur le plan...




r

Ascendancy of SNS information and age difference on intention to buy eco-friendly offerings: meaningful insights for e-tailers

Through the unparalleled espousal of theory of planned behaviour, this study intends to significantly add to the current knowledge on social networking sites (SNS) in <i>eWOM</i> information and its role in defining intentions to buy green products. In specie, this study seeks to first investigate the part played by <i>attitude towards SNS information</i> in influencing the <i>acceptance of SNS information</i> and then by <i>acceptance of SNS information</i> in effecting the <i>green purchase intention</i>. Besides this, it also aims to analyse the influence exerted by first <i>credibility of SNS information</i> on <i>acceptance of SNS information</i> and then by <i>acceptance of SNS information</i> on <i>green purchase intention</i>. In doing so, it also examines how well the age of the SNS users moderates all these four associations.




r

Risk evaluation method of electronic bank investment based on random forest

Aiming at the problems of high error rate, low evaluation accuracy and low investment return in traditional methods, a random forest-based e-bank investment risk evaluation method is proposed. First, establish a scientific e-bank investment risk evaluation index system. Then, G1-COWA combined weighting method is used to calculate the weights of each index. Finally, the e-bank investment risk evaluation index data is taken as the input vector, and the e-bank investment risk evaluation result is taken as the output vector. The random forest model is established and the result of e-banking investment risk evaluation is obtained. The experimental results show that the maximum relative error rate of this method is 4.32%, the evaluation accuracy range is 94.5~98.1%, and the maximum return rate of e-banking investment is 8.32%. It shows that this method can accurately evaluate the investment risk of electronic banking.




r

Study on operational risks and preventive measures of supply chain finance

The operation of supply chain finance faces various risks, therefore, studying the operational risks of supply chain finance and corresponding preventive measures is of great significance. Firstly, classify the types of operational risks in supply chain finance. Secondly, based on the risk classification results, the decision tree method is used to evaluate the operational risks of supply chain finance. Finally, based on the risk assessment results, targeted risk prevention measures for supply chain finance operations are proposed, such as strengthening supplier management, optimising logistics and warehouse management, risk analysis and monitoring, and strengthening information security and data protection. The case analysis results show that the accuracy of the evaluation results of this method is higher, and the risk coefficient has been significantly reduced after applying this method, indicating that it can effectively reduce supply chain risk.




r

Research on Weibo marketing advertising push method based on social network data mining

The current advertising push methods have low accuracy and poor advertising conversion effects. Therefore, a Weibo marketing advertising push method based on social network data mining is studied. Firstly, establish a social network graph and use graph clustering algorithm to mine the association relationships of users in the network. Secondly, through sparsisation processing, the association between nodes in the social network graph is excavated. Then, evaluate the tightness between user preferences and other nodes in the social network, and use the TF-IDF algorithm to extract user interest features. Finally, an attention mechanism is introduced to improve the deep learning model, which matches user interests with advertising domain features and outputs push results. The experimental results show that the push accuracy of this method is higher than 95%, with a maximum advertising click through rate of 82.7% and a maximum advertising conversion rate of 60.7%.




r

An effectiveness analysis of enterprise financial risk management for cost control

This paper aims to analyse the effectiveness of cost control oriented enterprise financial risk management. Firstly, it analyses the importance of enterprise financial risk management. Secondly, the position of cost control in enterprise financial risk management was analysed. Cost control can be used to reduce the operating costs of enterprises, improve their profitability, and thus reduce the financial risks they face. Finally, a corporate financial risk management strategy is constructed from several aspects: establishing a sound risk management system, predicting and responding to various risks, optimising fund operation management, strengthening internal control, and enhancing employee risk awareness. The results show that after applying the proposed management strategy, the enterprise performs well in cost control oriented enterprise financial risk management, with a cost accounting accuracy of 95% and an audit system completeness of 90%. It can also help the enterprise develop emergency plans and provide comprehensive risk management strategy coverage.




r

E-commerce growth prediction model based on grey Markov chain

In order to solve the problems of long prediction consumption time and many prediction iterations existing in traditional prediction models, an e-commerce growth prediction model based on grey Markov chain is proposed. The Scrapy crawler framework is used to collect a variety of e-commerce data from e-commerce websites, and the feedforward neural network model is used to clean the collected data. With the cleaned e-commerce data as the input vector and the e-commerce growth prediction results as the output vector, an e-commerce growth prediction model based on the grey Markov chain is built. The prediction model is improved by using the background value optimisation method. After training the model through the improved particle swarm optimisation algorithm, accurate e-commerce growth prediction results are obtained. The experimental results show that the maximum time consumption of e-commerce growth prediction of this model is only 0.032, and the number of iterations is small.




r

A method for selecting multiple logistics sites in cross-border e-commerce based on return uncertainty

To reduce the location cost of cross-border e-commerce logistics sites, this article proposes a multi-logistics site location method based on return uncertainty. Firstly, a site selection model is established with the objective function of minimising site construction costs, transportation costs, return costs, and operating costs, and the constraint conditions of return recovery costs and delayed pick-up time; Then, using the Monte Carlo method to simulate the number of returned items, and using an improved chicken swarm algorithm based on simulated annealing, the cross-border e-commerce multi-logistics site location model is solved to complete the location selection. Experimental results show that this method can effectively reduce the related costs of cross-border e-commerce multi-logistics site selection. After applying this method, the total cost of multi-logistics site selection is 19.4 million yuan, while the total cost of the five comparative methods exceeds 20 million yuan.




r

International Journal of Electronic Business




r

Students’ Perceptions of Using Massive Open Online Courses (MOOCs) in Higher Learning Institutions




r

Exploring the impact of TPACK on Education 5.0 during the times of COVID-19: a case of Zimbabwean universities




r

The Impact of Physics Open Educational Resources (OER) on the Professional Development of Bhutanese Secondary School Physics Teachers




r

Où le brouillard, la lumière

Départager LFI et le RN. Nous sommes tombés bien bas. N'y a-t-il que des raisons politiques ? N'est-ce pas aussi une culture qui le permet ? Culture marquée par une déroute de la raison, supplantée par le relativisme, le subjectivisme et l'émotivisme. Comment changer ?




r

A vin nouveau, outres neuves ?

(Chronique d'avant-plage) Emmanuel Macron a écrit aux Français pour louer le parlementarisme et la stabilité institutionnelle. Il a pourtant contourné le Parlement pendant 7 ans et méprisé les Présidents des deux chambres en se contentant de les informer de la dissolution. Alors, avec un tel garant, que fait-on ?




r

Juste une trêve

Plus de débats législatifs. Presque plus de gouvernement. Plus de projet de loi sur l’euthanasie. Plus d’invectives. Plus de bruit. Plus de métro. Plus de Twitter. Même plus de chronique (à bientôt). Silence. Le calme, olympien. La trêve, olympique. On voudrait y croire, on veut en rêver.




r

Des morts, et des indignes

De nouveau, des personnes meurent aux urgences dans des conditions déplorables, après de longues heures d'attente sans soins, malgré les promesses gouvernementales. Où est l'indignité, sinon dans le fait de donner l'illusion de l'action publique et de n'être capable que d'agiter des hochets sociétaux ?




r

Quitter l’Eglise ?

Alors qu'une fois encore des révélations aussi pénibles qu'indignes sont faites, cela pourrait-il ne pas nous toucher ? Pour certains, tout cela ne change rien. L'important, ce sont les fins dernières et la sanctification personnelle. Pour d'autres, cela change tout, ce qui est le cas du Fr. Philippe Lefebvre, qui a développé un propos qui peut être aussi perturbant que (re)fondateur.




r

Héros malgré eux

Les Jeux Paralympiques illuminent les contradictions de notre société, qui célèbre la résilience des athlètes tout en maintenant les obstacles qu'ils affrontent. Si le handicap reste marginalisé, il n’apparaît souvent que par la performance. Ces athlètes refusent d'être des "super-héros" mais rappellent la valeur de chaque vie. Il est temps de lever les barrières quotidiennes.




r

Totems migratoires

La politique est souvent guidée par des marqueurs idéologiques qui manquent de nuances. L'immigration illustre cette polarisation : la gauche prône une générosité aveugle, la droite une sévérité rigide. Le meurtre de Philippine de Carlan relance ce débat. La gestion de l'immigration doit équilibrer humanité et acceptabilité, mais sans sacrifier vérité ni lucidité.




r

La revanche des darons

La nomination de Gabriel Attal était l’apothéose macroniste, l’acmé juvénile. La consécration des jeunes executives en costumes slim. Las, nos virtuoses de la finance laissent le pays dans un sale état et, pour tenter de réparer les dégâts, c'est au panache blanc du vieux Barnier qu'il a fallu faire appel... Dans le marasme actuel, le renversement est au moins savoureux.




r

L’épreuve de vérités

On ne peut se contenter de soutenir Israël ou la Palestine : le Proche-Orient exige une lecture nuancée, où coexistent des vérités concurrentes et conflictuelles. Même la singularité locale qu'est démocratie israélienne ne l’absout pas de ses choix politiques extrêmes. Taire les souffrances civiles palestiniennes décrédibilise les Droits de l'Homme, trahissant les valeurs occidentales essentielles à notre propre sécurité.




r

Feature-aware task offloading and scheduling mechanism in vehicle edge computing environment

With the rapid development and application of driverless technology, the number and location of vehicles, the channel and bandwidth of wireless network are time-varying, which leads to the increase of offloading delay and energy consumption of existing algorithms. To solve this problem, the vehicle terminal task offloading decision problem is modelled as a Markov decision process, and a task offloading algorithm based on DDQN is proposed. In order to guide agents to quickly select optimal strategies, this paper proposes an offloading mechanism based on task feature. In order to solve the problem that the processing delay of some edge server tasks exceeds the upper limit of their delay, a task scheduling mechanism based on buffer delay is proposed. Simulation results show that the proposed method has greater performance advantages in reducing delay and energy consumption compared with existing algorithms.




r

Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method

To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case.




r

Research on multi-objective optimisation for shared bicycle dispatching

The problem of dispatching is key to management of shared bicycles. Considering the number of borrowing and returning events during the dispatching period, optimisation plans of shared bicycles dispatching are studied in this paper. Firstly, the dispatching model of shared bicycles is built, which regards the dispatching cost and lost demand as optimised objectives. Secondly, the solution algorithm is designed based on non-dominated Genetic Algorithm. Finally, a case is given to illustrate the application of the method. The research results show that the method proposed in the paper can get optimised dispatching plans, and the model considering borrowing and returning during dispatching period has better effects with a 39.3% decrease in lost demand.




r

Enabling smart city technologies: impact of smart city-ICTs on e-Govt. services and society welfare using UTAUT model

Smart cities research is growing all over the world seeking to understand the effect of smart cities from different angles, domains and countries. The aim of this study is to analyse how the smart city ICTs (e.g., big data analytics, AI, IoT, cloud computing, smart grids, wireless communication, intelligent transportation system, smart building, e-governance, smart health, smart education and cyber security) are related to government. services and society welfare from the perspective of China. This research confirmed a positive correlation of smart city ICTs to e-Govt. Services (e-GS). On the other hand, the research showed a positive influence of smart city ICTs on society's welfare. These findings about smart cities and ICTs inform us how the thought paradigm to smart technologies can cause the improvement of e-GS through economic development, job creation and social welfare. The study offers different applications of the theoretical perspectives and the management perspective which are significant to building a society during recent technologised era.




r

Adaptive terminal sliding mode control of a non-holonomic wheeled mobile robot

In this paper, a second-order sliding mode adaptive controller with finite time stability is proposed for trajectory tracking of robotic systems. In order to reduce the chattering phenomenon in the response of the variable structure resistant controller, two dependent sliding surfaces are used. In the outer loop, a kinematic controller is used to compensate the geometric uncertainty of the robot, and in the inner loop, the proposed resistive control is used as the main loop. On the other hand, considering the dynamic uncertainty and disturbance of the robot, an adaptive strategy has been used to estimate the uncertainty limit during the control process in order to eliminate the need for basic knowledge to determine the uncertainty limit in the resistant structure. The proposed control method demonstrates significant enhancements in performance, with the linear velocity error improving by approximately 80%, leading to a more accurate and responsive system.




r

International Journal of Vehicle Information and Communication Systems




r

Data dissemination and policy enforcement in multi-level secure multi-domain environments

Several challenges exist in disseminating multi-level secure (MLS) data in multi-domain environments. First, the security domains participating in data dissemination generally use different MLS labels and lattice structures. Second, when MLS data objects are transferred across multiple domains, there is a need for an agreed security policy that must be properly applied, and correctly enforced for the data objects. Moreover, the data sender may not be able to predetermine the data recipients located beyond its trust boundary. To address these challenges, we propose a new framework that enables secure dissemination and access of the data as intended by the owner. Our novel framework leverages simple public key infrastructure and active bundle, and allows domains to securely disseminate data without the need to repackage it for each domain.




r

An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning

Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images.




r

Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review

The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation.