Search results for: cybercrime against children
3289 Journey to Cybercrime and Crime Opportunity: Quantitative Analysis of Cyber Offender Spatial Decision Making
Authors: Sinchul Back, Sun Ho Kim, Jennifer LaPrade, Ilju Seong
Abstract:
Due to the advantage of using the Internet, cybercriminals can reach target(s) without border controls. Prior research on criminology and crime science has largely been void of empirical studies on journey-to-cybercrime and crime opportunity. Thus, the purpose of this study is to understand more about cyber offender spatial decision making associated with crime opportunity factors (i.e., co-offending, offender-stranger). Data utilized in this study were derived from 306 U.S. Federal court cases of cybercrime. The findings of this study indicated that there was a positive relationship between co-offending and journey-to-cybercrime, whereas there was no link between offender-stranger and journey-to-cybercrime. Also, the results showed that there was no relationship between cybercriminal sex, age, and journey-to-cybercrime. The policy implications and limitations of this study are discussed.Keywords: co-offending, crime opportunity, journey-to-cybercrime, offender-stranger
Procedia PDF Downloads 1793288 Cybercrime: International Police Cooperation with Europol
Authors: Daniel Suarez Alonso
Abstract:
Cybercrime is a growing international threat and a challenge for law enforcement agencies and judicial systems worldwide. International cooperation is necessary to solve this problem because cybercrime knows no borders and often involves multiple jurisdictions, being related to organised crime. The purpose of this article is to analyse international cooperation in the investigation and prosecution of cybercrime, focusing on the framework of the Regulation of the European Union Agency for Law Enforcement Cooperation (EUROPOL), cooperation that takes place between police authorities from different countries. It examines the legal and operational mechanisms in place to facilitate international cooperation in Europe in this area and assesses their effectiveness in the fight against cybercrime. In addition, the study of a Spanish investigation where cooperation with EUROPOL took place will be examined, analyzing how international cooperation was carried out to investigate and track down criminals. Lessons learned from this case will be discussed and recommendations for improving international cooperation in the fight against cybercrime will be proposed.Keywords: Europol, international cooperation, cybercrime, computer crime, law
Procedia PDF Downloads 673287 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime
Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim
Abstract:
Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.Keywords: construction industry, cybercrime, information and communication technology adoption, risk
Procedia PDF Downloads 5113286 Perceived Seriousness of Cybercrime Types: A Comparison across Gender
Authors: Suleman Ibrahim
Abstract:
Purpose: The research is seeking people's perceptions on cybercrime issues, rather than their knowledge of the facts. Unlike the Tripartite Cybercrime Framework (TCF), the binary models are ill-equipped to differentiate between cyber fraud (a socioeconomic crime) and cyber bullying or cyber stalking (psychosocial cybercrimes). Whilst the binary categories suggested that digital crimes are dichotomized: (i.e. cyber-enabled and cyber-dependent), the TCF, recently proposed, argued that cybercrimes can be conceptualized into three groups: socioeconomic, psychosocial and geopolitical. Concomitantly, as regards to the experience/perceptions of cybercrime, the TCF’s claim requires substantiation beyond its theoretical realm. Approach/Methodology: This scholar endeavor framed with the TCF, deploys a survey method to explore the experience of cybercrime across gender. Drawing from over 400 participants in the UK, this study aimed to contrast the differential perceptions/experiences of socioeconomic cybercrime (e.g. cyber fraud) and psychological cybercrime (e.g. cyber bullying and cyber stalking) across gender. Findings: The results revealed that cyber stalking was rated as least serious of the different digital crime categories. Further revealed that female participants judged all types of cybercrimes as more serious than male participants, with the exception of socioeconomic cybercrime – cyber fraud. This distinction helps to emphasize that gender cultures and nuances not only apply both online and offline, it emphasized the utilitarian value of the TCF. Originality: Unlike existing data, this study has contrasted the differential perceptions and experience of socioeconomic and psychosocial cybercrimes with more refined variables.Keywords: gender variations, psychosocial cybercrime, socioeconomic cybercrime, tripartite cybercrime framework
Procedia PDF Downloads 3903285 The Impact of Cybercrime on Youth Development in Nigeria
Authors: Christiana Ebobo
Abstract:
Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.Keywords: armed robber, cybercrime, integrity, youth
Procedia PDF Downloads 5283284 Pattern of Cybercrime Among Adolescents: An Exploratory Study
Authors: Mohamamd Shahjahan
Abstract:
Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.Keywords: cybercrime, adolescents, pattern, internet
Procedia PDF Downloads 813283 Youth Involvement in Cybercrime in Nigeria: A Case Study of Ikeja Local Government Area
Authors: Niyi Adegoke, Saanumi Jimmy Omolou
Abstract:
The prevalence rate of youth involving in cybercrime is alarming, which calls for concern among the government, parents, NGO and religious bodies, hence this paper aims at examining youth involvement in cybercrime in Nigeria. Achievement motivation theory was used to explain the activities of cyber-criminals in Nigerian society. A descriptive survey method was adopted for the study. The sample for the study was one hundred and fifty (150) respondents randomly selected from the population of the study. A questionnaire was used to gather information and data from the respondents. Data collected through the questionnaire were analyzed using percentage tool for the respondents’ bio-data while chi-square was employed to test the hypotheses. Findings from the study have revealed that parental negligence, unemployment, peer influence, and quest for materialism were responsible for cyber-crimes in Nigeria. The study concludes with the following recommendations among which are: creating employment opportunities for the youths and ensure good governance and accountability among other things will go a long way to solve the problem of cybercrime in our society.Keywords: cybercrime, youth, Nigeria, unemployment, information communication technology
Procedia PDF Downloads 2303282 Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor
Authors: Jonathan W. Z. Lim, Vrizlynn L. L. Thing
Abstract:
Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.Keywords: crime motivations, crime prevention, cybercrime, ex-cyber criminals
Procedia PDF Downloads 1403281 Cyber Security in Nigeria: A Collaboration between Communities and Professionals
Authors: Alese Boniface K., Adu Michael K., Owa Victor K.
Abstract:
Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.Keywords: security, cybercrime, internet, government, stakeholders, partnerships
Procedia PDF Downloads 5403280 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria
Authors: K. Alese Boniface, K. Adu Michael
Abstract:
Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)
Procedia PDF Downloads 2793279 Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types
Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke
Abstract:
The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age.Keywords: cybercrime legislation, cyber attacks, consumer privacy and protection law, detection, electronic transaction law, prevention, privacy and data protection law, prohibition, prosecution
Procedia PDF Downloads 453278 Authorship Profiling of Unidentified Corpora in Saudi Social Media
Authors: Abdulaziz Fageeh
Abstract:
In the bustling digital landscape of Saudi Arabia, a chilling wave of cybercrime has swept across the nation. Among the most nefarious acts are financial blackmail schemes, perpetrated by anonymous actors lurking within the shadows of social media platforms. This chilling reality necessitates the utilization of forensic linguistic techniques to unravel the identities of these virtual villains. This research delves into the complex world of authorship profiling, investigating the effectiveness of various linguistic features in identifying the perpetrators of malicious messages within the Saudi social media environment. By meticulously analyzing patterns of language, vocabulary choice, and stylistic nuances, the study endeavors to uncover the hidden characteristics of the individuals responsible for these heinous acts. Through this linguistic detective work, the research aims to provide valuable insights to investigators and policymakers in the ongoing battle against cybercrime and to shed light on the evolution of malicious online behavior within the Saudi context.Keywords: authorship profiling, arabic linguistics, saudi social media, cybercrime, financial blackmail, linguistic features, forensic linguistics, online threats
Procedia PDF Downloads 163277 A Machine Learning-Assisted Crime and Threat Intelligence Hunter
Authors: Mohammad Shameel, Peter K. K. Loh, James H. Ng
Abstract:
Cybercrime is a new category of crime which poses a different challenge for crime investigators and incident responders. Attackers can mask their identities using a suite of tools and with the help of the deep web, which makes them difficult to track down. Scouring the deep web manually takes time and is inefficient. There is a growing need for a tool to scour the deep web to obtain useful evidence or intel automatically. In this paper, we will explain the background and motivation behind the research, present a survey of existing research on related tools, describe the design of our own crime/threat intelligence hunting tool prototype, demonstrate its capability with some test cases and lastly, conclude with proposals for future enhancements.Keywords: cybercrime, deep web, threat intelligence, web crawler
Procedia PDF Downloads 1753276 Measurement of Susceptibility Users Using Email Phishing Attack
Authors: Cindy Sahera, Sarwono Sutikno
Abstract:
Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.Keywords: cybercrime, email phishing, susceptibility, vulnerability
Procedia PDF Downloads 2913275 Learning Difficulties of Children with Disabilities
Authors: Chalise Kiran
Abstract:
The learning difficulties of children with disabilities are always a matter of concern when we talk about educational needs and quality education of children with disabilities. This paper is the outcome of the review of the literatures based on the literatures on the educational needs and learning difficulties of children with disabilities. For the paper, different studies written on children with disabilities and their education were collected through search engines. The literature put together was analyzed from the angle of learning difficulties faced by children with disabilities and the same were used as a precursor to arrive at the findings on the learning of the children. The analysis showed that children with disabilities face learning difficulties. The reasons for these difficulties could be attributed to factors in terms of authority, structure, school environment, and behaviors of teachers and parents, and the society as a whole.Keywords: children with disabilities, learning difficulties, education, disabled children
Procedia PDF Downloads 1153274 Resilience in Children: A Comparative Analysis between Children with and without Parental Supervision Bandar Abbas
Authors: N. Taghinejad, F. Dortaj, N. Khodabandeh
Abstract:
This research aimed at comparing resilience among male and female children with and without parental supervision in Bandar Abbas. The sample consists of 200 subjects selected through cluster sampling. The research method was comparative causal and Conner and Davidson’s questionnaire form resilience was used for data collection. Results indicated that there is no difference between children with and without parental supervision regarding their resilience capacity. These findings may be challenging and useful for psychologists, officials of children’s affairs and legislators.Keywords: resilience, children , children with parental supervision, children without parental supervision
Procedia PDF Downloads 4563273 A Dream to Bicycle: A Curriculum Practice of Thematic Teaching Constructed by Scaffolding Theory
Authors: Gu Chun-Mei, Kung Mei-Juan
Abstract:
The aim of this research is to examine (1) how a kindergarten teacher followed the scaffolding theory to inspire children’s interest in bicycling and (2) how these children had learned the skill of bicycling. Results revealed that: first of all, the teacher (1) used questions during the teaching process to stimulate the levels of children’s abilities; (2) provided follow-up thematic clues and hints which are based on children’s abilities (e.g., would not provide instructions and demonstrations except children continued failing to solve the current problems); (3) assisted only when children needed it. Furthermore, when children continued failing the task and being frustrated, instead of providing more concrete guidance, the teacher would utilize the following strategies: (1) postulating children’s thoughts; (2) encouraging children to feel the difficulties; (3) giving children opportunities to reflect on how to solve the problems. In sum, by raising questions, allowing children to implement by themselves for the first attempt, then inducing children to correct their actions, the teacher built a scaffold with thematic teaching to develop children’s potential on bicycling.Keywords: thematic teaching, scaffold, zone of proximal development, children
Procedia PDF Downloads 1953272 A Comparative Research on the Development Level of Left-Behind and Non-Left-Behind Children in Rural Areas of Henan Province
Authors: Yuying Zhu
Abstract:
Left-behind children in rural areas are vulnerable groups with the course of our country’s urbanization. Left-behind young children in rural area separate from their parents in their early childhood, vicegerent guardian’s care are less sensitive and careful than children’s parents; they give less concern to children’s verbal development, this makes the verbal problem of the left-behind children to be ubiquitous problem. This study chooses four kindergartens from the east the middle and the west of the Henan Province, explore the verbal development differences between the left-behind young children and the non-left-behind young rural children through the McCarthy Scales of Children's Abilities (MSCA) and self-made questionnaires. The study shows that there is no significant difference between the left-behind young children and the non-left-behind young rural children in the verbal development, though the marks in primary class and middle class the non-left-behind young rural children is higher, but, the top class in the kindergarten is not. What’s more, the emergent reading and the economy have significant influence on young children’s verbal ability.Keywords: left-behind children, non-left-behind children, regional difference, verbal development
Procedia PDF Downloads 2663271 Educating Children with the Child-Friendly Smartphone Operation System
Authors: Wildan Maulana Wildan, Siti Annisa Rahmayani Icha
Abstract:
Nowadays advances in information technology are needed by all the inhabitants of the earth for the sake of ease all their work, but it is worth to introduced the technological advances in the world of children. Before the technology is growing rapidly, children busy with various of traditional games and have high socialization. Moreover, after it presence, almost all of children spend more their time for playing gadget, It can affect the education of children and will change the character and personality children. However, children also can not be separated with the technology. Because the technology insight knowledge of children will be more extensive. Because the world can not be separated with advances in technology as well as with children, there should be developed a smartphone operating system that is child-friendly. The operating system is able to filter contents that do not deserve children, even in this system there is a reminder of a time study, prayer time and play time for children and there are interactive contents that will help the development of education and children's character. Children need technology, and there are some ways to introduce it to children. We must look at the characteristics of children in different environments. Thus advances in technology can be beneficial to the world children and their parents, and educators do not have to worry about advances in technology. We should be able to take advantage of advances in technology best possible.Keywords: information technology, smartphone operating system, education, character
Procedia PDF Downloads 5153270 Evaluating and Examining Pictures of Children of Five Years Old
Authors: Emine Yılmaz Bolat
Abstract:
Early childhood is a very important period in terms of identifying and developing early skills and abilities. It is likely that the child's development will be in the same direction in the future. This study was conducted with 26 children for the purpose of examining pictures of children of five years old. In the survey, children were asked to draw a picture with pastel dyes. The drawings were collected and evaluated by the researcher. At the end of the research, it was found that the children used the yellow color (N = 17, 16,34%) and the least gray color (N = 1, 0,96%). When the features of children's pictures are examined, the children's paintings have been found to have hierarchy, transparency, completion, the use of vivid colors, and the presence of vertical and horizontal painting lines.Keywords: early childhood, kindergarten, pictures of children, features of pictures
Procedia PDF Downloads 3093269 A General Overview on Izadis Children's Right Situation in Iraqi Kurdistan
Authors: Shabnam Dadparvar, Laijin Shen
Abstract:
Undoubtedly, children are one of the biggest assets of any society and it is the duty of all officials to have a systematic plan to educate the next generation and make a better life for children so that they can progress and be effective for their communities. In an effort, Kurdistan Regional Government (KRG) has adopted standards to improve the condition for Izadis children; however, there are challenges that remain; such as: Izadis child abuse, Izadis child labor, Izadis children right’s law, orphans, Izadis street children and etc. In this paper, by a descriptive-analytical method the authors try to discuss the general situation of Izadis children in today s Iraqi Kurdistan and the issues such as drug abuse, Izadis child labor, orphans and Izadis street children. The questions are: How is the situation of Izadis children in Iraqi Kurdistan and what are their challenges? Also, what is the KRG’s strategy and through which ways, they can make a better life for minority children and change their current status? The authors believe that nowadays, the KRG is trying to crack down on problems against Izadis children; however, their effort is not adequate and some other activities should be performed; one of which is passing the Izadis children s law against violence.Keywords: children right, Iraqi Kurdistan, Izadis children, Kurdistan Regional Government
Procedia PDF Downloads 2583268 Young Children’s Use of Representations in Problem Solving
Authors: Kamariah Abu Bakar, Jennifer Way
Abstract:
This study investigated how young children (six years old) constructed and used representations in mathematics classroom; particularly in problem solving. The purpose of this study is to explore the ways children used representations in solving addition problems and to determine whether their representations can play a supportive role in understanding the problem situation and solving them correctly. Data collection includes observations, children’s artifact, photographs and conversation with children during task completion. The results revealed that children were able to construct and use various representations in solving problems. However, they have certain preferences in generating representations to support their problem solving.Keywords: young children, representations, addition, problem solving
Procedia PDF Downloads 4623267 Barriers and Strategies for Effective Communication between Parents and Children in the Family
Authors: Sadhana Ghnayiem
Abstract:
This article deals with the issue of effective communication between parents and children and its impact on the family in general and on the child in particular. The aim of this article is to provide information to parents, students, anyone interested in family communication between parents and children, and to provide them with tools to deal with barriers to communication in the family unit. The article presented a literature review of the importance of effective communication in the family, the definition of the concept of communication, and was a reference to factors and barriers in communication between parents and children leading to conflict destructive to the extent that barriers to effective communication in the family unit. At the end of the article, strategies were introduced to motivate children to behave appropriately, and to equip parents best to foster the healthy development of their children when they can create an atmosphere of effective communication. From the literature review, it's found that effective communication between parents and children prevents problematic behavior and helps children understand how to communicate effectively with others. Communication between parents and children is the cornerstone of a happy family life and is the basis for positive interactions between parents and children and increases self-esteem in children.Keywords: children, communication, conflict, family
Procedia PDF Downloads 1973266 Ethical Issues around Online Marketing to Children
Authors: Chris Preston
Abstract:
As we devise ever more sophisticated methods of on-line marketing, devising systems that are able to reach into the everyday lives of consumers, we are confronted by a generation of children who face unprecedented intervention by commercial organisations into young minds, via electronic devices, and whether by computer, tablet or phone, such children have been somehow reduced to the status of their devices, with little regard for their well being as individuals. This discussion paper seeks to draw attention to such practice and questions the ethics of digital marketing methods.Keywords: online marketing to children, online research of children, online targeting of children, consumer rights, ethics
Procedia PDF Downloads 3933265 Translanguaging In Preschools: New Evidence from Polish-English Bilingual Children
Authors: Judyta Pawliszko
Abstract:
The study draws on the theoretical framework of translanguaging. It investigates translanguaging patterns and how meaning-making processes among bilingual children in preschool are affected by using two different languages, 8 months of observation and 200 hours of vocal recordings of children (3-6 years old) provide data on bilingual children’s linguistic repertoire why children translanguage, and how they achieve understanding with the strategic use of the two languages. The data gathered point to translanguaging as a practice that maximizes meaning-making processes among preschool bilingual children.Keywords: translanguaging, bilingualism, preschool, polish-english bilingual children
Procedia PDF Downloads 1113264 Velma-ARC’s Rehabilitation of Repentant Cybercriminals in Nigeria
Authors: Umukoro Omonigho Simon, Ashaolu David ‘Diya, Aroyewun-Olaleye Temitope Folashade
Abstract:
The VELMA Action to Reduce Cybercrime (ARC) is an initiative, the first of its kind in Nigeria, designed to identify, rehabilitate and empower repentant cybercrime offenders popularly known as ‘yahoo boys’ in Nigerian parlance. Velma ARC provides social inclusion boot camps with the goal of rehabilitating cybercriminals via psychotherapeutic interventions, improving their IT skills, and empowering them to make constructive contributions to society. This report highlights the psychological interventions provided for participants of the maiden edition of the Velma ARC boot camp and presents the outcomes of these interventions. The boot camp was set up in a hotel premises which was booked solely for the 1 month event. The participants were selected and invited via the Velma online recruitment portal based on an objective double-blind selection process from a pool of potential participants who signified interest via the registration portal. The participants were first taken through psychological profiling (personality, symptomology and psychopathology) before the individual and group sessions began. They were profiled using the Minnesota Multiphasic Personality Inventory -2- Restructured Form (MMPI-2-RF), the latest version of its series. Individual psychotherapy sessions were conducted for all participants based on what was interpreted on their profiles. Focus group discussion was held later to discuss a movie titled ‘catch me if you can’ directed by Steven Spielberg, featuring Leonardo De Caprio and Tom Hanks. The movie was based on the true life story of Frank Abagnale, who was a notorious scammer and con artist in his youthful years. Emergent themes from the movie were discussed as psycho-educative parameters for the participants. The overall evaluation of outcomes from the VELMA ARC rehabilitation boot camp stemmed from a disaggregated assessment of observed changes which are summarized in the final report of the clinical psychologist and was detailed enough to infer genuine repentance and positive change in attitude towards cybercrime among the participants. Follow up services were incorporated to validate initial observations. This gives credence to the potency of the psycho-educative intervention provided during the Velma ARC boot camp. It was recommended that support and collaborations from the government and other agencies/individuals would assist the VELMA foundation in expanding the scope and quality of the Velma ARC initiative as an additional requirement for cybercrime offenders following incarceration.Keywords: Velma-ARC, cybercrime offenders, rehabilitation, Nigeria
Procedia PDF Downloads 1563263 A Study on Children's Literature for Multiracial Asian American Children
Authors: Kaori Mori Want
Abstract:
American society is a racially diverse society and there are children books that tell the importance of respecting racial differences. Through reading books, children understand the world around them little by little along with their direct interaction with the world in reality. They find role models in books, strive to be like role models, and grow confidence in who they are. Books thus nurture the mind of children. On the other hand, because of their small presence, children books for multiracial Asian American children are scarce. Multiracial Asian American population is increasing but they are still minority in number. The lack of children’s books for these children may deprive the opportunities of them to embrace their multiraciality positively because they cannot find someone like them in any books. Children books for multiracial Asian American are still not that many, but a few have been being published recently. This paper introduces children books for multiracial Asian American children, and examines how they address issues pertaining to these children, and how they could nurture their self-esteem. Many states of the US used to ban interracial marriages and interracial families and their children once were discriminated against in American society. There was even a theory called the hybrid degeneracy theory which claimed that mixed race children were inferior mentally and physically. In this negative social environment, some multiracial Asian American people report that they had trouble embracing their multiracial identity positively. Yet, children books for these children are full of positive messages. This paper will argue the importance of children books for the mental growth of multiracial Asian American children, and how these books can contribute to the development of multiculturalism in the US in general.Keywords: critical mixed race studies in the US, hapa children literature, interracial marriage, multiraciality
Procedia PDF Downloads 3613262 Intervention Programs for Children of Divorced Parents: Presentation of the Children’s Support Group Developed in Belgium
Authors: Therese Scali
Abstract:
Couple separations and divorces seem to be commonplace events. However, their frequency does not reduce their impact. Indeed, the adverse effects of parental divorce on children have been well documented. Thus, supporting the children from divorced families is a key concern. Several preventive interventions have been developed for children of divorced parents, such as Children’s Support Group. The present paper aims at presenting the program that has been created in Liege (Belgium). The setting and the tools will be presented. This Children’s Support Group is based on psychoeducational and systemic principles, art-therapy, and aims at acquiring coping skills and seeking social support. Also, the effectiveness of the program will be discussed. Results show that after parental divorce, a group intervention for children can be efficacious in promoting children’s well-being and parent-child communication. This paper contributes to enrich the understanding of children’s needs and to highlight the existence and efficacy of a program that helps them overcome the difficulties of divorce.Keywords: art-therapy, children’s support group, divorce, efficacy, separation
Procedia PDF Downloads 1543261 Deceptive Behaviors of Young Children in a Guessing Game
Authors: Desiderio S. Camitan IV
Abstract:
The standard view of lay people in the Philippine society is that young children do not lie and that if they do, their lies are easily detectable. The present study investigated the deceptive behaviors of 373 children aged 2-8 using the temptation resistance paradigm. Children were instructed that they will participate in a game where they are to guess the color of a candy placed inside a downward facing cup. After the instruction was given to them, they are left alone in a room with the cup on top of a table for 15 minutes. The researcher observed the number of children who peeked at the card as well as number of those who confessed to the said act. Age, gender, IQ, and having autism seem to influence the frequency of peeking and confession of the participants.Keywords: cheating, lying, dishonesty, young children, guessing game, autism
Procedia PDF Downloads 5573260 Animated Movies and Violence: A Participant Observatory Research on Nigerian Children
Authors: Uchenna Bella Onu
Abstract:
Violence has become a deadly plague in Nigeria and is spreading at an alarming rate. There is every indication that in a normal person, violence is not inborn but learned. Animated movies, which are designed to amuse and entertain children may contain a level of violence. These violent animated movies may affect the susceptible minds of children. This paper examines the effect of selected animated movies on Nigerian children. Sample is on Nigerian children aged seven and below. Method explored is participant observation with visual arts and visual technologies in a natural and familiar environment. Visual arts are used to draw out the innermost feelings of the young children. Findings show that animated movies have strong effect on Nigerian children. Whether the effect will be negative or positive depends largely on the content of the animated movies.Keywords: animated movies, drawings, Nigerian children, videos, violence
Procedia PDF Downloads 292