Volume II, Issue 2(4), 2023
-
This research examines the possibility of food and beverage (F&B)-processing multinational corporations serving as a viable conduit for the international diffusion of technology. It utilises existing literature to analyse three potential avenues through which technology transfer occurs from these corporations to host sectors: contract farming, domestic collaboration for innovation, and spillover effects of Foreign Direct Investment (FDI). In specific instances, these firms might provide support to local innovators through financial assistance or complementary resources. Additionally, they may actively facilitate technology transfers to particular types of local partners and they may generate demonstration effects. Nevertheless, the prevailing evidence consistently indicates that the impact of FDI on the host sector is generally limited or selective.
The findings of this study cast doubt on the overly optimistic views held by international organizations and host governments regarding FDI in the food sector as a major source of cutting-edge technology for host countries. The incentives offered to food and beverage multinationals should be carefully calibrated to strike a balance between acknowledging potential benefits to the sector's innovation system and maintaining a realistic perspective on the actual outcomes. This study combines and analyses three separate empirical lines of research in parallel to offer factual elements for a policy debate. By integrating these different research approaches, the study aims to contribute to a well-informed discussion on relevant policy matters.
© 2023 The Author(s). Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.
-
The space economy, which refers to the diverse economic activities and industries that are related to outer space and space exploration, has been steadily growing over the years and has become a significant driver of technological innovation and economic growth. The growth of the space economy has been facilitated by technological advancements, reduced launch costs, and increased participation from private companies.
This paper explores a new geographic space called “Mearth”, representing the Moon and Earth as a unified space. Specifically, the paper focuses on the innovations developed within the Mearth ecosystem that can contribute to an improved future. It is a conceptual-theoretical paper aiming to identify viable solutions to attract investments, generate technologies, and establish a new ecosystem within the novel geographic space of Mearth. This contribution supports the view that the coopetition strategy - essentially entailing cooperation among competitors - could represent the most suitable approach to join efforts to implement Mearth's economic system and its ecosystem. The primary reason lies in this strategy's ability to align the divergent interests of the ecosystem stakeholders. In terms of outcomes, the paper shows that a coopetition strategy leads to win-win solutions and will benefit all stakeholders in the Mearth ecosystem.
© 2023 The Author(s). Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.
-
The Societal Patterns Evolution Model (SPEM) has been developed to apply to socio-technical systems. It contains patterns representing stages of societal development. Mapping of these patterns to the development of Information and Communication Technologies (ICTs) and Information Systems was presented at FedCSIS 2022 Conference. This paper discusses the application of SPEM to model the development of three pillars of sustainability: economic, social, and environmental. An Artificial Intelligence model has been developing to evaluate scholarly papers according to the SPEM model including economic, social, and environmental indicators.
© 2023 The Author(s). Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.
-
Financial technologies (FinTechs) have been rapidly advancing in recent years, enabling transactions in financial markets to become faster, more efficient, and more secure. The use of advanced technologies such as artificial intelligence (AI) and machine learning (ML) provides significant advantages to the financial services sector. The complexity of financial markets and the need for swift action increase the demand for financial technologies.
FinTech plays an important role in offering more services at lower costs, helping traditional financial institutions remain competitive, and creating new market opportunities. Additionally, it supports financial inclusion by increasing access to financial services and plays a vital role in achieving sustainable development goals. In this section, we discuss the importance of FinTech, the conveniences and advantages it brings to transactions in financial markets, and the opportunities it provides to market participants.
© 2023 The Author(s). Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.
-
In today's digital age, organizations have harnessed unprecedented connectivity and technological advancements, leading to enhanced efficiency and productivity. However, this progress has also exposed businesses to a multitude of cyber threats, including data breaches, ransomware attacks, and social engineering exploits. This research explores the relationship between organizational culture and cybersecurity practices, emphasizing the importance of fostering a security-first culture within organizations. While technical measures are crucial, neglecting the role of organizational culture can hinder effective cybersecurity.
The study is grounded in the theory of planned behaviour and the cultural dimensions theory, providing a solid theoretical foundation. Moreover, the investigation delves into the Denison organizational culture model, particularly focusing on the role of participation in nurturing a security-first culture. This becomes particularly relevant when assembling collaborative, inclusive, and communication-driven multi-disciplinary teams. Leadership emerges as a pivotal aspect in establishing a security-first culture. The onus lies with executive leadership at the highest echelons of the organization. However, it is concerning that in certain well-established companies, some senior executives continue to perceive cybersecurity as the sole responsibility of the IT department, overlooking its leadership significance.
© 2023 The Author(s). Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.
-
This survey aims to offer a thorough and organized overview of research on anomaly detection, which is a significant problem that has been studied in various fields and application areas. Some anomaly detection techniques have been tailored for specific domains, while others are more general. Anomaly detection involves identifying unusual patterns or events in a dataset, which is important for a wide range of applications including fraud detection and medical diagnosis. Not much research on anomaly detection techniques has been conducted in the field of economic and international trade. Therefore, this study attempts to analyse the time-series data of United Nations exports and imports for the period 1992 – 2022 using LSTM based anomaly detection algorithm. Deep learning, particularly LSTM networks, are becoming increasingly popular in anomaly detection tasks due to their ability to learn complex patterns in sequential data.
This paper presents a detailed explanation of LSTM architecture, including the role of input, forget, and output gates in processing input vectors and hidden states at each timestep. The LSTM based anomaly detection approach yields promising results by modelling small-term as well as long-term temporal dependencies.
© 2023 The Author(s). Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.
-
Traditional tests for parallel trends in the context of differences-in-differences are based on the observation of the mean values of the dependent variable in the treatment and control groups over time. However, given the new discussions brought by the development of the event study designs, controlling for observable factors may intervene in the fulfilment of the parallel trend assumption. This article presents a simple test based on the statistical significance of pre-treatment periods which can be extended from the classic Differences-in-Differences up to event study designs in universal absorbing treatments. The test requires at least two pre-treatment periods and can done by constructing appropriate dummy variables.
© 2023 The Author(s). Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.
-
The ambiguous theme of cyberspace and its broad widespread inflict a major effect on the legal procedures of litigations. Since litigation might include several nationalities, because of the cosmopolitan nature of cyberspace, determining the competent court is not as direct as traditional litigations. Cyber litigations complicate this procedural threshold as the traditional application of jurisdiction determinants might not suit cyber disputes. Furthermore, jurisdiction conflicts in cyberspace frustrate settling the dispute as courts avoid giving their judgments due to invalidity.
Therefore, these conflicts introduce a modern issue to private international law theorists. It is indisputable that drafting obvious jurisdictional rules enhances the rule of law in cyberspace. Thus, the research analyses this issue and establishes a comparison to determine the state of the art regarding it. The article reviews the relevant academic contributions and legislation to point out how they crystallize the aspects of the research question. Besides, it studies relevant case laws from the UK and US judiciaries to conclude the legal principle they adopt to settle these conflicts and to enhance the validity of their judgments. Eventually, it introduces a comprehensive theory on settling jurisdiction conflicts regarding cyber litigation, which enhances the rule of law in cyberspace.
© 2023 The Author(s). Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.
-
The basic constitutional freedoms and rights of a person and citizen are in principle unlimited: the full scope of their exercise is the rule, and the restriction determined by law can only be an exception based on explicit constitutional authority and the legitimate aim of the restriction determined by the Constitution. That being so, the restrictions - in addition to being based on constitutional authority and pursuing constitutional objectives - should be commensurate with the needs to achieve these objectives. This means that restrictive legal rules must be suitable for achieving the legitimate aim pursued, must not be stricter than necessary and must be balanced between the constitutionally guaranteed subjective right of the individual and the interests of society.
In this paper, the authors point out the economic and legal consequences of the violation of individual privacy and data protection rights caused by the public disclosure of personal data of people who, at a certain time, were obliged to self-isolate due to suspicion of Covid-19 virus infection.
© 2023 The Author(s). Published by RITHA Publishing. This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.