Search results for: evidence based policing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30148

Search results for: evidence based policing

29878 The Use of Artificial Intelligence in Digital Forensics and Incident Response in a Constrained Environment

Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane

Abstract:

Digital investigators often have a hard time spotting evidence in digital information. It has become hard to determine which source of proof relates to a specific investigation. A growing concern is that the various processes, technology, and specific procedures used in the digital investigation are not keeping up with criminal developments. Therefore, criminals are taking advantage of these weaknesses to commit further crimes. In digital forensics investigations, artificial intelligence is invaluable in identifying crime. It has been observed that an algorithm based on artificial intelligence (AI) is highly effective in detecting risks, preventing criminal activity, and forecasting illegal activity. Providing objective data and conducting an assessment is the goal of digital forensics and digital investigation, which will assist in developing a plausible theory that can be presented as evidence in court. Researchers and other authorities have used the available data as evidence in court to convict a person. This research paper aims at developing a multiagent framework for digital investigations using specific intelligent software agents (ISA). The agents communicate to address particular tasks jointly and keep the same objectives in mind during each task. The rules and knowledge contained within each agent are dependent on the investigation type. A criminal investigation is classified quickly and efficiently using the case-based reasoning (CBR) technique. The MADIK is implemented using the Java Agent Development Framework and implemented using Eclipse, Postgres repository, and a rule engine for agent reasoning. The proposed framework was tested using the Lone Wolf image files and datasets. Experiments were conducted using various sets of ISA and VMs. There was a significant reduction in the time taken for the Hash Set Agent to execute. As a result of loading the agents, 5 percent of the time was lost, as the File Path Agent prescribed deleting 1,510, while the Timeline Agent found multiple executable files. In comparison, the integrity check carried out on the Lone Wolf image file using a digital forensic tool kit took approximately 48 minutes (2,880 ms), whereas the MADIK framework accomplished this in 16 minutes (960 ms). The framework is integrated with Python, allowing for further integration of other digital forensic tools, such as AccessData Forensic Toolkit (FTK), Wireshark, Volatility, and Scapy.

Keywords: artificial intelligence, computer science, criminal investigation, digital forensics

Procedia PDF Downloads 204
29877 Exposing Latent Fingermarks on Problematic Metal Surfaces Using Time of Flight Secondary Ion Mass Spectroscopy

Authors: Tshaiya Devi Thandauthapani, Adam J. Reeve, Adam S. Long, Ian J. Turner, James S. Sharp

Abstract:

Fingermarks are a crucial form of evidence for identifying a person at a crime scene. However, visualising latent (hidden) fingermarks can be difficult, and the correct choice of techniques is essential to develop and preserve any fingermarks that might be present. Knives, firearms and other metal weapons have proven to be challenging substrates (stainless steel in particular) from which to reliably obtain fingermarks. In this study, time of flight secondary ion mass spectroscopy (ToF-SIMS) was used to image fingermarks on metal surfaces. This technique was compared to a conventional superglue based fuming technique that was accompanied by a series of contrast enhancing dyes (basic yellow 40 (BY40), crystal violet (CV) and Sudan black (SB)) on three different metal surfaces. The conventional techniques showed little to no evidence of fingermarks being present on the metal surfaces after a few days. However, ToF-SIMS images revealed fingermarks on the same and similar substrates with an exceptional level of detail demonstrating clear ridge definition as well as detail about sweat pore position and shape, that persist for over 26 days after deposition when the samples were stored under ambient conditions.

Keywords: conventional techniques, latent fingermarks, metal substrates, time of flight secondary ion mass spectroscopy

Procedia PDF Downloads 157
29876 Do European Hedge Fund Managers Time Market Liquidity?

Authors: Soumaya Ben Kheilifa, Dorra Mezzez Hmaied

Abstract:

We propose two approaches to examine whether European hedge fund managers can time market liquidity. Using a sample of 1616 European hedge funds, we find evidence of liquidity timing. More importantly, this ability adds economic value to investors. Thus, it represents valuable managerial skill and a major source of European hedge funds’ performance. Also we show that the majority of these funds demonstrate liquidity timing ability especially during liquidity crisis. Finally, it emerged that our main evidence of liquidity timing remains significant after controlling for market timing and volatility timing.

Keywords: european hedge funds, liquidity timing ability, market liquidity, crisis

Procedia PDF Downloads 386
29875 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10

Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin

Abstract:

The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.

Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10

Procedia PDF Downloads 164
29874 Forensic Science in Dr. Jekyll and Mr. Hyde: Trails of Utterson's Quest

Authors: Kyu-Jeoung Lee, Jae-Uk Choo

Abstract:

This paper focuses on investigating The Strange Case of Dr Jekyll and Mr Hyde from Utterson’s point of view, referring to: Gabriel John Utterson, a central character in the book. Utterson is no different from a forensic investigator, as he tries to collect evidence on the mysterious Mr. Hyde’s relationship to Dr. Jekyll. From Utterson's perspective, Jekyll is the 'victim' of a potential scandal and blackmail, and Hyde is the 'suspect' of a possible 'crime'. Utterson intends to figure out Hyde's identity, connect his motive with his actions, and gather witness accounts. During Utterson’s quest, the outside materials available to him along with the social backgrounds of Hyde and Jekyll will be analyzed. The archives left from Jekyll’s chamber will also play a part providing evidence. Utterson will investigate, based on what he already knows about Jekyll his whole life, and how Jekyll had acted in his eyes until he was gone, and finding out possible explanations for Jekyll's actions. The relationship between Jekyll and Hyde becomes the major question, as the social background offers clues pointing in the direction of illegitimacy and prostitution. There is still a possibility that Jekyll and Hyde were, in fact, completely different people. Utterson received a full statement and confession from Jekyll himself at the end of the story, which gives the reader the possible truth on what happened. Stevenson’s Dr. Jekyll and Mr. Hyde led readers, as it did Utterson, to find the connection between Hyde and Jekyll using methods of history, culture, and science. Utterson's quest to uncover Hyde shows an example of applying the various fields to in his act to see if Hyde's inheritance was legal. All of this taken together could technically be considered forensic investigation.

Keywords: Dr. Jekyll and Mr. Hyde, forensic investigation, illegitimacy, prostitution, Robert Louis Stevenson

Procedia PDF Downloads 204
29873 The Influence of Argumentation Strategy on Student’s Web-Based Argumentation in Different Scientific Concepts

Authors: Xinyue Jiao, Yu-Ren Lin

Abstract:

Argumentation is an essential aspect of scientific thinking which has been widely concerned in recent reform of science education. The purpose of the present studies was to explore the influences of two variables termed ‘the argumentation strategy’ and ‘the kind of science concept’ on student’s web-based argumentation. The first variable was divided into either monological (which refers to individual’s internal discourse and inner chain reasoning) or dialectical (which refers to dialogue interaction between/among people). The other one was also divided into either descriptive (i.e., macro-level concept, such as phenomenon can be observed and tested directly) or theoretical (i.e., micro-level concept which is abstract, and cannot be tested directly in nature). The present study applied the quasi-experimental design in which 138 7th grade students were invited and then assigned to either monological group (N=70) or dialectical group (N=68) randomly. An argumentation learning program called ‘the PWAL’ was developed to improve their scientific argumentation abilities, such as arguing from multiple perspectives and based on scientific evidence. There were two versions of PWAL created. For the individual version, students can propose argument only through knowledge recall and self-reflecting process. On the other hand, the students were allowed to construct arguments through peers’ communication in the collaborative version. The PWAL involved three descriptive science concept-based topics (unit 1, 3 and 5) and three theoretical concept-based topics (unit 2, 4 and 6). Three kinds of scaffoldings were embedded into the PWAL: a) argument template, which was used for constructing evidence-based argument; b) the model of the Toulmin’s TAP, which shows the structure and elements of a sound argument; c) the discussion block, which enabled the students to review what had been proposed during the argumentation. Both quantitative and qualitative data were collected and analyzed. An analytical framework for coding students’ arguments proposed in the PWAL was constructed. The results showed that the argumentation approach has a significant effect on argumentation only in theoretical topics (f(1, 136)=48.2, p < .001, η2=2.62). The post-hoc analysis showed the students in the collaborative group perform significantly better than the students in the individual group (mean difference=2.27). However, there is no significant difference between the two groups regarding their argumentation in descriptive topics. Secondly, the students made significant progress in the PWAL from the earlier descriptive or theoretical topic to the later one. The results enabled us to conclude that the PWAL was effective for students’ argumentation. And the students’ peers’ interaction was essential for students to argue scientifically especially for the theoretical topic. The follow-up qualitative analysis showed student tended to generate arguments through critical dialogue interactions in the theoretical topic which promoted them to use more critiques and to evaluate and co-construct each other’s arguments. More explanations regarding the students’ web-based argumentation and the suggestions for the development of web-based science learning were proposed in our discussions.

Keywords: argumentation, collaborative learning, scientific concepts, web-based learning

Procedia PDF Downloads 100
29872 The Study on the Relationship between Momentum Profits and Psychological Factors: Evidence from Taiwan

Authors: Chih-Hsiang Chang

Abstract:

This study provides insight into the effects of investor sentiment, excess optimism, overconfidence, the disposition effect, and herding formation on momentum profits. This study contributes to the field by providing a further examination of the relationship between psychological factors and momentum profits. The empirical results show that there is no evidence of significant momentum profits in Taiwan’s stock market. Additionally, investor sentiment in Taiwan’s stock market significantly influences its momentum profits.

Keywords: momentum profits, psychological factors, herding formation, investor sentiment

Procedia PDF Downloads 373
29871 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning

Authors: Angela Mathias Kavishe

Abstract:

Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.

Keywords: cyberstalking, embodiment, gender-based violence, internet

Procedia PDF Downloads 36
29870 Testing the Impact of Landmarks on Navigation through the Use of Mobile-Based Games

Authors: Demet Yesiltepe, Ruth Dalton, Ayse Ozbil

Abstract:

The aim of this paper is to understand the effect of landmarks on spatial navigation. For this study, a mobile-based virtual game, 'Sea Hero Quest' (SHQ), was used. At the beginning of the game, participants were asked to look at maps which included the specific locations of players and checkpoints. After the map disappeared, participants were asked to navigate a boat and find the checkpoints in a pre-given order. By analyzing this data, we aim to better understand an important component of cities, namely landmarks, on spatial navigation. Game levels were analyzed spatially and axial-based integration, choice and connectivity values of levels were calculated to make comparisons. To make this kind of a comparison, we focused on levels which include both local and global landmarks and levels which include only local landmarks. The most significant contribution of this study to urban design and planning fields is that it provides mounting evidence about the utility of landmarks and their roles in cities due to the fact that the game was played more than 2.5 million people. Moreover, by using these results, it can be possible to encourage cities with more global and local landmarks to have more identifiable/readable areas.

Keywords: landmarks, mobile-based games, spatial navigation, virtual environment

Procedia PDF Downloads 363
29869 The Marketing Mix in Small Sized Hotels: A Case of Pattaya, Thailand

Authors: Anyapak Prapannetivuth

Abstract:

The purpose of this research is to investigate the marketing mix that is perceived to be important for the small sized hotels in Pattaya. Unlike previous studies, this research provides insights through a review of the marketing activities performed by the small sized hotels. Nine owners and marketing manager of small sized hotels and resorts, all local Chonburi people, were selected for an in-depth interview. A snowball sampling process was employed. The research suggests that seven marketing mixes (e.g. Product, Price, Place, Promotion, People, Physical Evidence and Process) were commonly used by these hotels, however, three types – People, price and physical evidence were considered most important by the owners.

Keywords: marketing mix, marketing tools, small sized hotels, pattaya

Procedia PDF Downloads 278
29868 Groundwater Monitoring Using a Community: Science Approach

Authors: Shobha Kumari Yadav, Yubaraj Satyal, Ajaya Dixit

Abstract:

In addressing groundwater depletion, it is important to develop evidence base so to be used in assessing the state of its degradation. Groundwater data is limited compared to meteorological data, which impedes the groundwater use and management plan. Monitoring of groundwater levels provides information base to assess the condition of aquifers, their responses to water extraction, land-use change, and climatic variability. It is important to maintain a network of spatially distributed, long-term monitoring wells to support groundwater management plan. Monitoring involving local community is a cost effective approach that generates real time data to effectively manage groundwater use. This paper presents the relationship between rainfall and spring flow, which are the main source of freshwater for drinking, household consumptions and agriculture in hills of Nepal. The supply and withdrawal of water from springs depends upon local hydrology and the meteorological characteristics- such as rainfall, evapotranspiration and interflow. The study offers evidence of the use of scientific method and community based initiative for managing groundwater and springshed. The approach presents a method to replicate similar initiative in other parts of the country for maintaining integrity of springs.

Keywords: citizen science, groundwater, water resource management, Nepal

Procedia PDF Downloads 193
29867 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria

Authors: Adebisi A. Sunday, Babajide Adeokin

Abstract:

The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.

Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer

Procedia PDF Downloads 135
29866 Sea of Light: A Game 'Based Approach for Evidence-Centered Assessment of Collaborative Problem Solving

Authors: Svenja Pieritz, Jakab Pilaszanovich

Abstract:

Collaborative Problem Solving (CPS) is recognized as being one of the most important skills of the 21st century with having a potential impact on education, job selection, and collaborative systems design. Therefore, CPS has been adopted in several standardized tests, including the Programme for International Student Assessment (PISA) in 2015. A significant challenge of evaluating CPS is the underlying interplay of cognitive and social skills, which requires a more holistic assessment. However, the majority of the existing tests are using a questionnaire-based assessment, which oversimplifies this interplay and undermines ecological validity. Two major difficulties were identified: Firstly, the creation of a controllable, real-time environment allowing natural behaviors and communication between at least two people. Secondly, the development of an appropriate method to collect and synthesize both cognitive and social metrics of collaboration. This paper proposes a more holistic and automated approach to the assessment of CPS. To address these two difficulties, a multiplayer problem-solving game called Sea of Light was developed: An environment allowing students to deploy a variety of measurable collaborative strategies. This controlled environment enables researchers to monitor behavior through the analysis of game actions and chat. The according solution for the statistical model is a combined approach of Natural Language Processing (NLP) and Bayesian network analysis. Social exchanges via the in-game chat are analyzed through NLP and fed into the Bayesian network along with other game actions. This Bayesian network synthesizes evidence to track and update different subdimensions of CPS. Major findings focus on the correlations between the evidences collected through in- game actions, the participants’ chat features and the CPS self- evaluation metrics. These results give an indication of which game mechanics can best describe CPS evaluation. Overall, Sea of Light gives test administrators control over different problem-solving scenarios and difficulties while keeping the student engaged. It enables a more complete assessment based on complex, socio-cognitive information on actions and communication. This tool permits further investigations of the effects of group constellations and personality in collaborative problem-solving.

Keywords: bayesian network, collaborative problem solving, game-based assessment, natural language processing

Procedia PDF Downloads 125
29865 By-Line Analysis of Determinants Insurance Premiums : Evidence from Tunisian Market

Authors: Nadia Sghaier

Abstract:

In this paper, we aim to identify the determinants of the life and non-life insurance premiums of different lines for the case of the Tunisian insurance market over a recent period from 1997 to 2019. The empirical analysis is conducted using the linear cointegration techniques in the panel data framework, which allow both long and short-run relationships. The obtained results show evidence of long-run relationship between premiums, losses, and financial variables (stock market indices and interest rate). Furthermore, we find that the short-run effect of explanatory variables differs across lines. This finding has important implications for insurance tarification and regulation.

Keywords: insurance premiums, lines, Tunisian insurance market, cointegration approach in panel data

Procedia PDF Downloads 189
29864 Debating the Role of Patriarchy in the Incidence of Gender-Based Violence in Jordan: Systematic Review of the Literature

Authors: Nour Daoud

Abstract:

Patriarchy continues to thrive in Jordan where male-controlled values are still entrenched in a society that is suffering from upsetting percentages of Gender-based Violence (GBV). This paper is a systematic review of the literature with an attempt to evaluate and interpret all available research evidence relevant to determining the extent to which patriarchy contributes to the occurrence, re-occurrence, and continuation of GBV in Jordan. Twenty-one (21) full-text articles were selected for the in-depth review due to meeting the established criteria for inclusion. 81 percent of articles included primary data while 19 percent included secondary data. Analysis of data was based on a specific extraction form that was developed using the ‘Excel’ to respond to the main goal of the paper. Interpretation of data was in light of the theorization of different feminism schools on the relationship between patriarchy and gender-based violence. Findings show that 33 percent of the selected articles affirm that the patriarchal standpoint best explains the role of patriarchy in the incidence of gender-based violence in Jordan under its three main themes (Honor-based Violence, Intimate Partner Violence and Street Harassment). Apart from the limited number of articles that were found debating this argument and the low percentage of articles that acknowledged the role of patriarchy in the incidence of gender-based violence in Jordan, this paper breaks the ice to implement future empirical studies on this subject. Also, it is an invitation for all Jordanian women to unite their efforts in order to eradicate all forms of victimization against them.

Keywords: honor-based violence, intimate partner violence, middle-east, street harassment

Procedia PDF Downloads 218
29863 Simple Assessments to Demystify Complementary Feeding: Leveraging a Successful Literacy Initiative Assessment Approach in Gujarat, India

Authors: Smriti Pahwa, Karishma Vats, Aditi Macwan, Jija Dutt, Sumukhi Vaid

Abstract:

Age approporiate complementary feeding has been stressed upon for sound young child nutrition and appropriate growth. National Infant and Young Child Feeding guidelines, policies and programs indicate cognizance of the issue taken by the country’s government, policy makers and technical experts. However, it is important that ordinary people, the caregivers of young children too understand the importance of appropriate feeding. For this, an interface might be required where ordinary people could participate in assessing the gaps in IYCF as a first step to take subsequent action. In this context an attempt was made to extrapolate a citizen led learning level survey that has been involving around 25000 ordinary citizens to reach out to 600,000 children annually for over a decade in India. Based on this philosophy of involving ordinary people in simple assessments to produce understandable actionable evidence, a rapid diet assessment tool was developed and collected from caregivers of 90 < 3year children from two urban clusters in Ahmedabad and Baroda, Gujarat. Target sample for pilot was selected after cluster census. Around half the mothers reported that they had not yet introduced water or other fluids to their < 6 month babies. However, about a third were already feeding them food other than mother’s milk. Although complementary feeding was initiated in almost all (95%) children more than 6 months old, frequency was suboptimal in 60%; in 80% cases no measure was taken to either improve energy or nutrient density; only 33% were fed protective foods; Green Leafy Vegetables consumption was negligible (1.4%). Anganwadi food was not consumed. By engaging ordinary people to generate evidence and understand the gaps, such assessments have the potential to be used to generate useful evidence for action at scale as well as locally.

Keywords: citizen led, grass root engagement, IYCF (Infant and Young Child Feeding), rapid diet assessment, under nutrition

Procedia PDF Downloads 166
29862 The Gender Factor in Sustainable Development Goal Investing: Evidence from Applying Conjoint Analysis

Authors: Deniss Rozkov, Hendrik Idema

Abstract:

This paper researches the gender-based differences among US-American institutional investors regarding their preferences for sustainable development goals (SDGs) when investing. After employing a structured questionnaire as well as applying a choice-based conjoint analysis, it is found that female investors place significantly more emphasis on SDGs, especially in the social and ecological domain, exhibiting significantly stronger “other-regarding” characteristics compared to their male counterparts. Further, the results of the survey show that females show significantly higher risk aversion than males by selecting moderately conservative and moderate risk approaches.

Keywords: sustainable development goals, investing, socially responsible investor, gender, conjoint analysis

Procedia PDF Downloads 82
29861 The Reproducibility and Repeatability of Modified Likelihood Ratio for Forensics Handwriting Examination

Authors: O. Abiodun Adeyinka, B. Adeyemo Adesesan

Abstract:

The forensic use of handwriting depends on the analysis, comparison, and evaluation decisions made by forensic document examiners. When using biometric technology in forensic applications, it is necessary to compute Likelihood Ratio (LR) for quantifying strength of evidence under two competing hypotheses, namely the prosecution and the defense hypotheses wherein a set of assumptions and methods for a given data set will be made. It is therefore important to know how repeatable and reproducible our estimated LR is. This paper evaluated the accuracy and reproducibility of examiners' decisions. Confidence interval for the estimated LR were presented so as not get an incorrect estimate that will be used to deliver wrong judgment in the court of Law. The estimate of LR is fundamentally a Bayesian concept and we used two LR estimators, namely Logistic Regression (LoR) and Kernel Density Estimator (KDE) for this paper. The repeatability evaluation was carried out by retesting the initial experiment after an interval of six months to observe whether examiners would repeat their decisions for the estimated LR. The experimental results, which are based on handwriting dataset, show that LR has different confidence intervals which therefore implies that LR cannot be estimated with the same certainty everywhere. Though the LoR performed better than the KDE when tested using the same dataset, the two LR estimators investigated showed a consistent region in which LR value can be estimated confidently. These two findings advance our understanding of LR when used in computing the strength of evidence in handwriting using forensics.

Keywords: confidence interval, handwriting, kernel density estimator, KDE, logistic regression LoR, repeatability, reproducibility

Procedia PDF Downloads 119
29860 Promoting Psychosocial Intervention in Social Work to Manage Intersectional Stigma among Sexual Minorities during COVID-19 Pandemic in Uganda: Implications for Social Work Practice

Authors: Simon Mwima, Kasule Solomon Kibirige, Evans Jennifer Mann, Bosco Mukuba, Edson Chipalo, Agnes Nzomene, Eusebius Small, Moses Okumu

Abstract:

Introduction: Social workers must create, implement, and evaluate client-centered psychosocial interventions (CCPI) to reduce the impact of intersectional stigma on HIV service utilization among sexual minorities. We contribute to the scarcity of evidence about sexual minorities in Uganda by using social support theory to explore clients' perceptions that shape CCPI. Based on Focused Group Discussion (FGD) with 31 adolescents recruited from Kampala's HIV clinics in 2021, our findings reveal the positive influence of instrumental, informational, esteem, emotional, and social network support as intersectional stigma reduction interventions. Men who have sex with men, lesbians, and bisexual women used such strategies to navigate a heavily criminalized and stigmatizing setting during the COVID-19 pandemic in Uganda. Conclusion: This study provides evidence for the social work profession to develop and implement psychosocial interventions that reduce HIV stigma and discrimination among MSM, lesbians, and bisexual young people living with HIV in Uganda.

Keywords: pyschosocial interventions, social work, intersectional stigma, HIV/AIDS, adolescents, sexual minorities, Uganda

Procedia PDF Downloads 102
29859 Conceptualising Project Complexity in Ghana’s Construction Industry: A Qualitative Study

Authors: Kwasi Dartey-Baah, Mias De Klerk

Abstract:

Project complexity has been cited as one of the essential areas of project management. It can be observed from environmental, social, technological, and organisational viewpoints, and its handling is critical to project success. Conceptualised in varied industries, this paper seeks to ascertain the meaning and understanding of project complexity within the Ghanaian construction industry based on the three dimensions of complexities (faith, fact, and interaction) using experts' opinions. Taking the form of a focus group discussion, the paper sought to gain an in-depth understanding of project complexity issues in Ghana’s construction industry. The method use obtained data from experts (a purposely selected group) comprising project leaders and project management academics. The findings indicated that the experts broadly agreed with the complexity items but offered varied reasons for their agreement. In the composite assessment of the complexity dimensions of (faith, fact, and interaction), it emerged that there was some agreement with the complexity dimensions of fact and interaction within Ghana’s construction industry. On the other hand, with the dimension for complexity by faith, it was noted that the experts in Ghana’s construction construed complexity by faith, not as the absence of evidence but the evidence that hinges on at least a member of the project team. It is expected that other researches on project complexity will focus on other industries to enhance the knowledge of the same within the field of project management.

Keywords: project complexity, complexity by faith, complexity by fact, complexity by interaction, construction industry, Ghana

Procedia PDF Downloads 151
29858 Effectiveness of Technology Enhanced Learning in Orthodontic Teaching

Authors: Mohammed Shaath

Abstract:

Aims Technological advancements in teaching and learning have made significant improvements over the past decade and have been incorporated in institutions to aid the learner’s experience. This review aims to assess whether Technology Enhanced Learning (TEL) pedagogy is more effective at improving students’ attitude and knowledge retention in orthodontic training than traditional methods. Methodology The searches comprised Systematic Reviews (SRs) related to the comparison of TEL and traditional teaching methods from the following databases: PubMed, SCOPUS, Medline, and Embase. One researcher performed the screening, data extraction, and analysis and assessed the risk of bias and quality using A Measurement Tool to Assess Systematic Reviews 2 (AMSTAR-2). Kirkpatrick’s 4-level evaluation model was used to evaluate the educational values. Results A sum of 34 SRs was identified after the removal of duplications and irrelevant SRs; 4 fit the inclusion criteria. On Level 1, students showed positivity to TEL methods, although acknowledging that the harder the platforms to use, the less favourable. Nonetheless, the students still showed high levels of acceptability. Level 2 showed there is no significant overall advantage of increased knowledge when it comes to TEL methods. One SR showed that certain aspects of study within orthodontics deliver a statistical improvement with TEL. Level 3 was the least reported on. Results showed that if left without time restrictions, TEL methods may be advantageous. Level 4 shows that both methods are equally as effective, but TEL has the potential to overtake traditional methods in the future as a form of active, student-centered approach. Conclusion TEL has a high level of acceptability and potential to improve learning in orthodontics. Current reviews have potential to be improved, but the biggest aspect that needs to be addressed is the primary study, which shows a lower level of evidence and heterogeneity in their results. As it stands, the replacement of traditional methods with TEL cannot be fully supported in an evidence-based manner. The potential of TEL methods has been recognized and is already starting to show some evidence of the ability to be more effective in some aspects of learning to cater for a more technology savvy generation.

Keywords: TEL, orthodontic, teaching, traditional

Procedia PDF Downloads 40
29857 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method

Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López

Abstract:

The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.

Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people

Procedia PDF Downloads 120
29856 Vision-Based Daily Routine Recognition for Healthcare with Transfer Learning

Authors: Bruce X. B. Yu, Yan Liu, Keith C. C. Chan

Abstract:

We propose to record Activities of Daily Living (ADLs) of elderly people using a vision-based system so as to provide better assistive and personalization technologies. Current ADL-related research is based on data collected with help from non-elderly subjects in laboratory environments and the activities performed are predetermined for the sole purpose of data collection. To obtain more realistic datasets for the application, we recorded ADLs for the elderly with data collected from real-world environment involving real elderly subjects. Motivated by the need to collect data for more effective research related to elderly care, we chose to collect data in the room of an elderly person. Specifically, we installed Kinect, a vision-based sensor on the ceiling, to capture the activities that the elderly subject performs in the morning every day. Based on the data, we identified 12 morning activities that the elderly person performs daily. To recognize these activities, we created a HARELCARE framework to investigate into the effectiveness of existing Human Activity Recognition (HAR) algorithms and propose the use of a transfer learning algorithm for HAR. We compared the performance, in terms of accuracy, and training progress. Although the collected dataset is relatively small, the proposed algorithm has a good potential to be applied to all daily routine activities for healthcare purposes such as evidence-based diagnosis and treatment.

Keywords: daily activity recognition, healthcare, IoT sensors, transfer learning

Procedia PDF Downloads 126
29855 Effect of Perioperative Multimodal Analgesia on Postoperative Opioid Consumption and Complications in Elderly Traumatic Hip Fracture Patients: A Systematic Review of Randomised Controlled Trials

Authors: Raheel Shakoor Siddiqui, Shahbaz Malik, Manikandar Srinivas Cheruvu, Sanjay Narayana Murthy, Livio DiMascio

Abstract:

Background: elderly traumatic hip fracture patients frequently present to trauma services globally. Rising low energy falls amongst an osteoporotic aging population is the commonest cause for injury. Hip fractures in this population are a major cause for severe pain, morbidity and mortality. The term hip fracture is interchangeable with neck of femur fracture, fractured neck of femur or proximal femur fracture. Hip fracture pain management protocols and guidelines suggest conventional analgesia, nerve block and opioid based treatment as rescue analgesia. There is a current global opioid crisis with overuse, abuse and dependence. Adverse opioid related complications in vulnerable elderly patients further adds to morbidity and mortality. Systematic reviews in literature have evidenced superiority of multimodal analgesia in osteoarthritic primary joint replacements compared to opioids however, this has not yet been conducted for elderly traumatic hip fracture patients. Aims: The primary aim of this systematic review is to provide standardised evidence following Cochrane and PRISMA guidance in determining advantages of perioperative multimodal analgesia over conventional opioid based treatments in elderly traumatic hip fractures. Methods: 5 databases were searched from January 2000-2023 which identified 8 randomised controlled trials and 446 total participants. These trials met defined PICOS eligibility criteria of patient mean age ≥ 65 years presenting with a unilateral traumatic fractured neck of femur for operative intervention. Analgesic intervention with perioperative multimodal analgesia has been compared to conventional opioid based analgesia. Outcomes of interest include, primarily, the change in postoperative opioid consumption within a 0-30 postoperative period and secondarily, the change in postoperative adverse events and complications. A qualitative synthesis has been performed due to clinical heterogenicity and variance amongst trials. Results: GRADE evidence of moderate quality supports perioperative multimodal analgesia leads to a reduction in postoperative opioid consumption however, low quality evidence supports a reduction of adverse effects and complications. Conclusion: Perioperative multimodal analgesia whether used preoperative, intraoperative and/or postoperative leads to a reduction in postoperative opioid consumption for elderly traumatic hip fracture patients. This review recommends the use of perioperative multimodal analgesia as part of hip fracture pain protocols however, caution and clinical judgement should be used as the risk of adverse effects may not be lower.

Keywords: trauma, orthopaedics, hip, fracture, neck of femur fracture, analgesia, multimodal analgesia, opioid

Procedia PDF Downloads 89
29854 An Enhanced Digital Forensic Model for Internet of Things Forensic

Authors: Tina Wu, Andrew Martin

Abstract:

The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices.

Keywords: acquisition, Internet of Things, model, zoning

Procedia PDF Downloads 261
29853 In vitro Modulation of Cytokine Expression by an Aqueous Licorice Extract in Canine

Authors: A. Watson, G. Telford, D. I. Pritchard

Abstract:

Objective: We investigated the immunomodulatory ability of licorice (Glycyrrhiza glabra). Such activities could have value for the management of common immunological diseases in dogs, such as environmental allergy. This study investigated the potential of a Licorice root extract (LRE) to influence the relative expression of Th-1, Th-2, and Th-17 cytokines in canine peripheral blood mononuclear cells (PBMC). Methods: A LRE was prepared using an alcoholic-aqueous-based solvent method. The extract was tested in three in vitro assays using canine leukocytes to determine its toxicity and immunoregulatory profile. Extract toxicity was assessed using the human T-lymphocyte cell line, Jurkat E6.1. The impact of the extract on the proliferation of concanavalin-activated canine PBMC was also determined. Finally, the extract was assessed for its ability to influence cytokine release in activated PBMC, measuring culture medium concentrations of interleukin-17, interferon gamma, and interleukin-4. One-way ANOVA followed by Dunnett’s post-test was used for statistics using concanavalin positive control as reference (p ≤ 0.05). Results: There was evidence that the LRE had specific immunomodulatory properties, causing significant inhibition of IL4 expression over a non-toxic/non-cytostatic concentration range (p < 0.001). In the same cell incubations, there was no significant impact on IL17 nor IFNg over the same non-toxic/non-cytostatic concentration range. Conclusion: The study provides in vitro evidence that LRE preferentially reduces the expression of a Th-2-type cytokine, IL4. The dog population, as with humans, is prone to conditions associated with a Th-2 bias of the immune system, such as environmental allergy. Based on these results, licorice merits further evaluation as a useful immune modulator for such allergic diseases.

Keywords: cytokine, Glycyrrhiza glabra, peripheral blood mononuclear cells, T-cell activation

Procedia PDF Downloads 111
29852 Phillips Curve Estimation in an Emerging Economy: Evidence from Sub-National Data of Indonesia

Authors: Harry Aginta

Abstract:

Using Phillips curve framework, this paper seeks for new empirical evidence on the relationship between inflation and output in a major emerging economy. By exploiting sub-national data, the contribution of this paper is threefold. First, it resolves the issue of using on-target national inflation rates that potentially causes weakening inflation-output nexus. This is very relevant for Indonesia as its central bank has been adopting inflation targeting framework based on national consumer price index (CPI) inflation. Second, the study tests the relevance of mining sector in output gap estimation. The test for mining sector is important to control for the effects of mining regulation and nominal effects of coal prices on real economic activities. Third, the paper applies panel econometric method by incorporating regional variation that help to improve model estimation. The results from this paper confirm the strong presence of Phillips curve in Indonesia. Positive output gap that reflects excess demand condition gives rise to the inflation rates. In addition, the elasticity of output gap is higher if the mining sector is excluded from output gap estimation. In addition to inflation adaptation, the dynamics of exchange rate and international commodity price are also found to affect inflation significantly. The results are robust to the alternative measurement of output gap

Keywords: Phillips curve, inflation, Indonesia, panel data

Procedia PDF Downloads 116
29851 Predicting Root Cause of a Fire Incident through Transient Simulation

Authors: Mira Ezora Zainal Abidin, Siti Fauzuna Othman, Zalina Harun, M. Hafiz M. Pikri

Abstract:

In a fire incident involving a Nitrogen storage tank that over-pressured and exploded, resulting in a fire in one of the units in a refinery, lack of data and evidence hampered the investigation to determine the root cause. Instrumentation and fittings were destroyed in the fire. To make it worst, this incident occurred during the COVID-19 pandemic, making collecting and testing evidence delayed. In addition to that, the storage tank belonged to a third-party company which requires legal agreement prior to the refinery getting approval to test the remains. Despite all that, the investigation had to be carried out with stakeholders demanding answers. The investigation team had to devise alternative means to support whatever little evidence came out as the most probable root cause. International standards, practices, and previous incidents on similar tanks were referred. To narrow down to just one root cause from 8 possible causes, transient simulations were conducted to simulate the overpressure scenarios to prove and eliminate the other causes, leaving one root cause. This paper shares the methodology used and details how transient simulations were applied to help solve this. The experience and lessons learned gained from the event investigation and from numerous case studies via transient analysis in finding the root cause of the accident leads to the formulation of future mitigations and design modifications aiming at preventing such incidents or at least minimize the consequences from the fire incident.

Keywords: fire, transient, simulation, relief

Procedia PDF Downloads 86
29850 Reliability Evidence of the Child Behavior Checklist (CBCL) Based on a Chinese Sample

Authors: Zhidong Zhang, Zhi-Chao Zhang, Georgiana Duarte

Abstract:

The Chinese version of the Child Behavior Checklist (CBCL) is the one of the Achenbach systems of empirically based assessment (ASEBA) scales, by which behavioral and emotional problems of early adolescents were examined. In order to further understand the robustness of the scale, its reliability has been examined. CBCL consists of 8 problems to measure internalizing, externalizing and social problems. In internalizing problem, there are Anxious, Withdrawn and Somatic Complaints. In this study, as an example, we only examined the anxious aspect which consisted of 13 questions. Cronbach alpha and factor analysis methods were used to examine the reliability of the scale. The result indicated that Cronbach alpha value was above 0.80.

Keywords: anxious/depressed problems, ASEBA, CBCL, Cronbach Alpha, reliability

Procedia PDF Downloads 454
29849 Empirical Evidence to Beliefs and Perceptions About Mental Health Disorder and Substance Abuse: The Role of a Social Worker

Authors: Helena Baffoe

Abstract:

Context: In the United States, there have been significant advancements in programs aimed at improving the lives of individuals with mental health disorders and substance abuse problems. However, public attitudes and beliefs regarding these issues have not improved correspondingly. This study aims to explore the perceptions and beliefs surrounding mental health disorders and substance abuse in the context of data analytics in the field of social work. Research Aim: The aim of this research is to provide empirical evidence on the beliefs and perceptions regarding mental health disorders and substance abuse. Specifically, the study seeks to answer the question of whether being diagnosed with a mental disorder implies a diagnosis of substance abuse. Additionally, the research aims to analyze the specific roles that social workers can play in addressing individuals with mental disorders. Methodology: This research adopts a data-driven methodology, acquiring comprehensive data from the Substance Abuse and Mental Health Services Administration (SAMHSA). A noteworthy causal connection between mental disorders and substance abuse exists, a relationship that current literature tends to overlook critically. To address this gap, we applied logistic regression with an Instrumental Variable approach, effectively mitigating potential endogeneity issues in the analysis in order to ensure robust and unbiased results. This methodology allows for a rigorous examination of the relationship between mental disorders and substance abuse. Empirical Findings: The analysis of the data reveals that depressive, anxiety, and trauma/stressor mental disorders are the most common in the United States. However, the study does not find statistically significant evidence to support the notion that being diagnosed with these mental disorders necessarily implies a diagnosis of substance abuse. This suggests that there is a misconception among the public regarding the relationship between mental health disorders and substance abuse. Theoretical Importance: The research contributes to the existing body of literature by providing empirical evidence to challenge prevailing beliefs and perceptions regarding mental health disorders and substance abuse. By using a novel methodological approach and analyzing new US data, the study sheds light on the cultural and social factors that influence these attitudes.

Keywords: mental health disorder, substance abuse, empirical evidence, logistic regression with IV

Procedia PDF Downloads 59