Search results for: border crimes
341 Limes Africanus: Tribes, Romans and Islamic Dynasties
Authors: Erika Mattio , Edoardo Casolo
Abstract:
This project studies in a complete and innovative way the lesser known southern roman border: the limes africanus. In this work, thanks to the comparison of archaeological, historical and epigraphic sources, the evolution and changes that occurred in the cities and areas around the limes were analysed. As of now, there are many studies relative to the roman imperial period, however there are not that many analysing the evolution of the limes from the Islamic conquest to the modern day, comparing the ancient, byzantine, islamic and contemporary periods, understanding the significance of the limes, it s role and the cities and commerce that were defined by it in north Africa. Using modern methods of remote sensing and landscape archaeology, a georeferencing of the area documented in the thirties of the last century by French military aviation colonel Jean Baradez was created, showing that the limes africanus had survived the fall of the roman empire and continued to be important also for the Islamic dynasties that came later, even until the italo-turkish war and the Italian conquest of Libya. With this research we wish to demonstrate the continuation through time of the limes africanus and whether today it exists still or not.Keywords: Limes Tripolitanus, Muslim, North Africa, Romans
Procedia PDF Downloads 202340 Victims Legal Representation before International Criminal Court: Freedom of Choice and Role of Victims Legal Representatives
Authors: Erinda Male
Abstract:
Participation of a lawyer in any criminal proceedings on behalf of an accused person or a victim is essential to a fair trial. Legal representation is particularly crucial in proceedings before international tribunals, especially in the International Criminal Court. The paper thus focuses on the importance of the legal representation of victims and defendants before the ICC, as well as on the role of the legal representative in the proceedings before the court and the principle of freedom of choice of legal representatives. Also, the paper presents a short overview of the significance of legal representatives for victims and the necessity to protect their primary role in the ICC system, and ensure that it is coherent and respectful of victims’ rights. Victim participation is an important part of the ICC Statute and it is designed to help ensure that those most affected by the crimes are able to engage with the Court. Proper and quality legal representation ensures meaningful participation of victims at stages of the proceedings before ICC. Finally, the paper acknowledges the role of legal representatives during the pre-trial, trial and post-trial phase, the different modalities in selecting the legal representatives as well as balancing victims’ participation with the right of the accused to a fair trial.Keywords: fair trial, freedom of choice principle, international criminal court, legal representatives, victims
Procedia PDF Downloads 394339 Maras and Public Security in Central America in XXI Century
Authors: Michal Stelmach
Abstract:
The aim of this paper is a critical analysis of the security policy in the field of the fight against transnational criminal groups in Central America in XXI century. We are analyzing all taken issues from several perspectives: political, anthropological, sociological and legal which allows me to confront behavior and the attitudes of the political elites against official legislative changes and declared actions, strategies and policies against practice. In the first part of paper we would like to present the genesis and characteristic of transnational gangs, called maras and next we would like to present their activities and roles within chosen sectors of organized crimes. In the second part we will analyze the government’s policy towards transnational criminal groups. The analysis will be concentrated on public safety policy implemented in specific Central American countries as well as regional international cooperation. The main intention of the author is to present the state of the security in Central America in XXI century by emphasizing failures and successes in the fight against transnational criminal organizations. Additionally we want to present and define the challenges currently facing the region now and to show the prediction of the situation’s development within next future and to define the recommendations on the design of public security policies in Central American countries.Keywords: maras, public security, human rights, Central America
Procedia PDF Downloads 333338 The Value of Online News: Addressing the Problem of Online Investment Fraud Crimes in Thailand
Authors: Thapthep Paprach, Benya Lertsuwan
Abstract:
Investment fraud is not a new criminal, but there are still more victims during the Internet of Things era. This kind of criminal has been classified as a national and transnational financial crime problem all over the world. In Thailand, the country has also been attacked by this kind of crime. This research concerns whether the mass media that is supposed to cover news about online investment scams realized and warned Thais about this crime. Thus, this study explores the value of news about investment fraud in terms of frequency. The methodology uses web crawling from the top 5 news agency websites that have the most access. We pull out all information reporting about investment fraud. The findings revealed that the ‘Khaosod’ news agency was the first rank in reporting on investment crime. On the other hand, ‘Matichon’ was the least reported. Thairat news agencies frequently reported such criminals from midnight to very early in the morning, while other news agencies reported during the daytime. The results between the frequency of news reporting about investment fraud and the monthly number of victim reports are not correlated. Although the most cases reported to Thai police were in February 2023, but the most news reported was in January 2023. In conclusion, there might be a negative correlation between the amount of investment fraud news reported and the number of victims.Keywords: investment fraud, news value, online news report, Ponzi schemes, Romance scam
Procedia PDF Downloads 77337 The Hague Abduction Convention and the Egyptian Position: Strategizing for a Law Reform
Authors: Abdalla Ahmed Abdrabou Emam Eldeib
Abstract:
For more than a century, the Hague Conference has tackled issues in the most challenging areas of private international law, including family law. Its actions in the realm of international child abduction have been remarkable in two ways during the last two decades. First, on October 25, 1980, the Hague Convention on the Civil Aspects of International Child Abduction (the Convention) was promulgated as an unusually inventive and powerful tool. Second, the Convention is rapidly becoming more prominent in the development of international child law. By that time, overseas travel had grown more convenient, and more couples were marrying or travelling across national lines. At the same time, parental separation and divorce have increased, leading to an increase in international child custody battles. The convention they drafted avoids legal quagmires and addresses extra-legal issues well. It literally restores the kid to its place of usual residence by establishing that the youngster was unlawfully abducted from that position or, alternatively, was wrongfully kept abroad after an allowed visit. Legal custody of a child of a contested parent is usually followed by the child's abduction or unlawful relocation to another country by the non-custodial parent or other persons. If a child's custodial parent lives outside of Egypt, the youngster may be kidnapped and brought to Egypt. It's natural to ask what laws should apply and what legal norms should be followed while hearing individual instances. This study comprehensively evaluates and estimates the relevant Hague Child Abduction Convention and the current situation in Egypt and which law is applicable for child custody. In addition, this research emphasis, detail, and focus on the position of Cross-border parental child abductions in Egypt. Moreover, examine the Islamic law compared to the Hague Convention on Child Custody in detail, as well as mentioning the treatment of Islamic countries in this matter in general and Egypt's treatment of this matter in particular, as well as the criticism directed at Egypt regarding the application and implementation of child custody issues. The present research backs up this method by using non-doctrinal techniques, including surveys, interviews, and dialogues. An important objective of this research is to examine the factors that contribute to parental child abduction. In this case, family court attorneys and other interested parties serve as the target audience from whom data is collected. A survey questionnaire was developed and sent to the target population in order to collect data for future empirical testing to validate the identified critical factors on Parental Child Abduction. The main finding in this study is breaking the reservations of many Muslim countries to join the Hague Convention with regard to child custody., Likewise, clarify the problems of implementation in practice in cases of kidnapping a child from one of the parents and traveling with him outside the borders of the country. Finally, this study is to provide suggestions for reforming the current Egyptian Family Law to make it an effective and efficient for all dispute's resolution mechanism and the possibility of joining The Hague Convention.Keywords: egyptian family law, Hague child abduction convention, child custody, cross-border parental child abductions in egypt
Procedia PDF Downloads 70336 Ethnic Conflict Dynamics in the Ethiopian Federation: Case of the Oromo-Somali Conflict
Authors: Takele Bekele Bayu
Abstract:
Though Ethiopia is an ancient country with ethnocultural and linguistic diversity, modern Ethiopia came into being in the second half of the 19th century under the military expansion of King Menelik II. Since then, the subsequent political system in the country failed to recognize and accommodate the country’s ethnolinguistic diversity. However, in 1991 the new government led by the Ethiopian People's Revolutionary Democratic Front (EPRDF) adopted federal-state structuring whereby constitutionally recognized and institutionally accommodated the country’s diversity. This investigation aimed to analyze drivers of ethnic conflict and its dynamism along the Eastern shared border of the Somali and Oromia regional administrations within the federal framework. The paper employed a comparative research design, adopted mixed research methods, and used survey questionnaires and focus group discussions (FGDs) for data collection. The study found that the Somali-Oromo conflict is complex and the dynamics and the sources of conflict in the study areas are similar.Keywords: Ethiopia, Oromo, Somali, ethnic conflict, federalism
Procedia PDF Downloads 73335 Glorification Trap in Combating Human Trafficking in Indonesia: An Application of Three-Dimensional Model of Anti-Trafficking Policy
Authors: M. Kosandi, V. Susanti, N. I. Subono, E. Kartini
Abstract:
This paper discusses the risk of glorification trap in combating human trafficking, as it is shown in the case of Indonesia. Based on a research on Indonesian combat against trafficking in 2017-2018, this paper shows the tendency of misinterpretation and misapplication of the Indonesian anti-trafficking law into misusing the law for glorification, to create an image of certain extent of achievement in combating human trafficking. The objective of this paper is to explain the persistent occurrence of human trafficking crimes despite the significant progress of anti-trafficking efforts of Indonesian government. The research was conducted in 2017-2018 by qualitative approach through observation, depth interviews, discourse analysis, and document study, applying the three-dimensional model for analyzing human trafficking in the source country. This paper argues that the drive for glorification of achievement in the combat against trafficking has trapped Indonesian government in the loop of misinterpretation, misapplication, and misuse of the anti-trafficking law. In return, the so-called crime against humanity remains high and tends to increase in Indonesia.Keywords: human trafficking, anti-trafficking policy, transnational crime, source country, glorification trap
Procedia PDF Downloads 167334 An International Comparison of Forensic Identification Evidence Legislation: Balancing Community Interests and Individual Rights
Authors: Marcus Smith
Abstract:
DNA profiling has made a valuable contribution to criminal investigations over the past thirty years. Direct matching DNA profiles from a crime scene and suspect, or between a suspect and a database remain of great importance to crimes such as murder, assault, and property theft. As scientific and technological advancement continues, a wide range of new DNA profiling applications has been developed. The application of new techniques involves an interesting balancing act between admitting probative evidence in a criminal trial, evaluating its degree of relevance and validity, and limiting its prejudicial impact. The impact of new DNA profiling applications that have significant implications for law enforcement and the legal system can be evaluated through a review of relevant case law, legislation and the latest empirical evidence from jurisdictions around the world including the United States, United Kingdom, and Australia. There are benefits in further examining the implications of these new developments, including how the criminal law can best be adapted to ensure that new technology is used to enhance criminal investigation and prosecution while ensuring it is applied in a measured way that respects individual rights and maintains principles of fairness enshrined in the legal system.Keywords: criminal procedure, forensic evidence, DNA profiling, familial searching, phenotyping
Procedia PDF Downloads 132333 Agent-Based Simulation for Supply Chain Transport Corridors
Authors: Kamalendu Pal
Abstract:
Supply chains are the spinal cord of trade and commerce. Their logistics use different transport corridors on regular basis for operational purpose. The international supply chain transport corridors include different infrastructure elements (e.g. weighbridge, package handling equipment, border clearance authorities, and so on) in supply chains. This paper presents the use of multi-agent systems (MAS) to model and simulate some aspects of transportation corridors, and in particular the area of weighbridge resource optimization for operational profit generation purpose. An underlying multi-agent model provides a means of modeling the relationships among stakeholders in order to enable coordination in a transport corridor environment. Simulations of the costs of container unloading, reloading, and waiting time for queuing up tracks have been carried out using data sets. Results of the simulation provide the potential guidance in making decisions about optimal service resource allocation in a trade corridor.Keywords: multi-agent systems, simulation, supply chain, transport corridor, weighbridge
Procedia PDF Downloads 353332 Development of Real Time System for Human Detection and Localization from Unmanned Aerial Vehicle Using Optical and Thermal Sensor and Visualization on Geographic Information Systems Platform
Authors: Nemi Bhattarai
Abstract:
In recent years, there has been a rapid increase in the use of Unmanned Aerial Vehicle (UAVs) in search and rescue (SAR) operations, disaster management, and many more areas where information about the location of human beings are important. This research will primarily focus on the use of optical and thermal camera via UAV platform in real-time detection, localization, and visualization of human beings on GIS. This research will be beneficial in disaster management search of lost humans in wilderness or difficult terrain, detecting abnormal human behaviors in border or security tight areas, studying distribution of people at night, counting people density in crowd, manage people flow during evacuation, planning provisions in areas with high human density and many more.Keywords: UAV, human detection, real-time, localization, visualization, haar-like, GIS, thermal sensor
Procedia PDF Downloads 465331 Acoustic Analysis for Comparison and Identification of Normal and Disguised Speech of Individuals
Authors: Surbhi Mathur, J. M. Vyas
Abstract:
Although the rapid development of forensic speaker recognition technology has been conducted, there are still many problems to be solved. The biggest problem arises when the cases involving disguised voice samples come across for the purpose of examination and identification. Such type of voice samples of anonymous callers is frequently encountered in crimes involving kidnapping, blackmailing, hoax extortion and many more, where the speaker makes a deliberate effort to manipulate their natural voice in order to conceal their identity due to the fear of being caught. Voice disguise causes serious damage to the natural vocal parameters of the speakers and thus complicates the process of identification. The sole objective of this doctoral project is to find out the possibility of rendering definite opinions in cases involving disguised speech by experimentally determining the effects of different disguise forms on personal identification and percentage rate of speaker recognition for various voice disguise techniques such as raised pitch, lower pitch, increased nasality, covering the mouth, constricting tract, obstacle in mouth etc by analyzing and comparing the amount of phonetic and acoustic variation in of artificial (disguised) and natural sample of an individual, by auditory as well as spectrographic analysis.Keywords: forensic, speaker recognition, voice, speech, disguise, identification
Procedia PDF Downloads 369330 Effect of Wetting Layer on the Energy Spectrum of One-Electron Non-Uniform Quantum Ring
Authors: F. A. Rodríguez-Prada, W Gutierrez, I. D. Mikhailov
Abstract:
We study the spectral properties of one-electron non-uniform crater-shaped quantum dot whose thickness is increased linearly with different slopes in different radial directions between the central hole and the outer border and which is deposited over thin wetting layer in the presence of the external vertically directed magnetic field. We show that in the adiabatic limit, when the crater thickness is much smaller than its lateral dimension, the one-particle wave functions of the electron confined in such structure in the zero magnetic field case can be found exactly in an analytical form and they can be used subsequently as the base functions in framework of the exact diagonalization method to study the effect of the wetting layer and an external magnetic field applied along of the grown axis on energy levels of one-electron non-uniform quantum dot. It is shown that both the structural non-uniformity and the increase of the thickness of the wetting layer provide a quenching of the Aharonov-Bohm oscillations of the lower energy levels.Keywords: electronic properties, quantum rings, volcano shaped, wetting layer
Procedia PDF Downloads 386329 Implementing Community Policing in Nigeria: Problems and Prospects
Authors: Mohammed Jamilu Haruna, Kawu Adamu Sule
Abstract:
This paper examines the evolution of modern policing in Nigeria to the present day, with a focus on the newly introduced community policing, which seeks to cement the operational vacuum created by the repressive and oppressive approach of the Nigeria Police Force (NPF), which renders the police incapable of addressing the twin problems of crime and disorder. Thus, the primary purpose for the implementation of community policing was to use it as a mechanism for building the lost trust between the police and the public, perhaps due to the long history of antagonistic and repressive relationships between them. If properly implemented, community policing has the prospect of empowering Nigerian citizens with the skills to protect themselves against invaders of their private security so that crimes can be prevented before anyone is victimized. Other prospects include, but are not limited to, (i) a favorable public view of the police, (ii) building of mutual trust, (iii) increased information flow through effective communication between the police and the public, and above all, (iv) increased police accountability. Unfortunately, problems such as aged suspicious and distrustful relationships, inadequate funding, poor training of officers, poor monitoring and evaluation of the community policing project, lack of public awareness of the benefits of the program, and sabotage by some of the personnel of the police who benefits from the status quo, were some of the reasons that troubled the implementation of community policing.Keywords: community, policing, problems, prospects, problem solving
Procedia PDF Downloads 76328 Effect of Model Dimension in Numerical Simulation on Assessment of Water Inflow to Tunnel in Discontinues Rock
Authors: Hadi Farhadian, Homayoon Katibeh
Abstract:
Groundwater inflow to the tunnels is one of the most important problems in tunneling operation. The objective of this study is the investigation of model dimension effects on tunnel inflow assessment in discontinuous rock masses using numerical modeling. In the numerical simulation, the model dimension has an important role in prediction of water inflow rate. When the model dimension is very small, due to low distance to the tunnel border, the model boundary conditions affect the estimated amount of groundwater flow into the tunnel and results show a very high inflow to tunnel. Hence, in this study, the two-dimensional universal distinct element code (UDEC) used and the impact of different model parameters, such as tunnel radius, joint spacing, horizontal and vertical model domain extent has been evaluated. Results show that the model domain extent is a function of the most significant parameters, which are tunnel radius and joint spacing.Keywords: water inflow, tunnel, discontinues rock, numerical simulation
Procedia PDF Downloads 524327 The Mediterranean Migration Crisis: The North East Hotspot Policy
Authors: Loizos A. Hadjivasiliou, May Chehab
Abstract:
Confronted with the human tragedy unfolding in the Mediterranean during the 2011-2016 period, the European Union introduced for the first time the “hotspot approach”, the establishment of facilities for initial reception, identification registration, and fingerprinting of asylum seekers and migrants arriving in the EU by sea, at the frontline Member States. However, the lack of a comprehensive collective policy on migration management and border security left the Mediterranean Member States, mainly Italy, Greece, and Cyprus, struggling to overcome these challenges. The current study sheds light on the implementation of the hotspot approach as the frontispiece of the European response to the migration challenges, which, limited to the operational and financial support of the hosting member states, leads to heterogeneous burden-sharing. Within this framework, it highlights the fact that the implementation of the hotspots as a panacea carries the risk of transforming the Mediterranean member states into giant hotspots with unpredictable consequences for the future of the Schengen area.Keywords: asylum, burden sharing, hotspots, migration management policy, Schengen area
Procedia PDF Downloads 178326 Children Protection in the Digital Space
Authors: Beverly Komen
Abstract:
Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse
Procedia PDF Downloads 187325 SEM Analysis of the Effectiveness of the Acid Etching on Cat Enamel
Authors: C. Gallottini, W. Di Mari, C. De Carolis, A. Dolci, G. Dolci, L. Gallottini, G. Barraco, S. Eramo
Abstract:
The aim of this paper is to summarize the literature on micromorphology and composition of the enamel of the cat and present an original experiment by SEM on how it responds to the etching with ortophosphoric acid for the time recommended in the veterinary literature (30", 45", 60"), derived from research and experience on human enamel; 21 teeth of cat were randomly divided into three groups of 7 (A, B, C): Group A was subjected to etching for 30 seconds by means of orthophosphoric acid to 40% on a circular area with diameter of about 2mm of the enamel coronal; the Groups B and C had the same treatment but, respectively, for 45 and 60 seconds. The samples obtained were observed by SEM to constant magnification of 1000x framing, in particular, the border area between enamel exposed and not exposed to etching to highlight differences. The images were subjected to the analysis of three blinded experienced operators in electron microscopy. In the enamel of the cat the etching for the times considered is not optimally effective for the purpose adhesives and the presence of a thick prismless layer could explain this situation. To improve this condition may clinically in the likeness of what is proposed for the enamel of human deciduous teeth: a bevel or a chamfer of 1 mm on the contour of the cavity to discover the prismatic enamel and increase the bonding surface.Keywords: cat enamel, SEM, veterinary dentistry, acid etching
Procedia PDF Downloads 307324 The Impact of Human Rights on Society and Legislations
Authors: Eid Nasr Saad Nasr
Abstract:
Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 59323 Security Practices of the European Union on Migration: An Analysis of the Frontex Within the Framework of Biopolitics
Authors: Gizem Ertürk, Nursena Dinç
Abstract:
The Aegean area has always been an important transit point for migration; however, the establishment of the European Union gave further impetus to the migration phenomenon and increased the significance of the area within this context. The migration waves have been more visible in the area in recent decades, and particularly after the “2015 Migration Crisis,” this issue has been subject to further securitization in the EU. In this conjuncture, the Frontex, which is an agency set up by the EU in 2005 for the purpose of managing and coordinating the border control efforts, has become more functional in the relevant area, but at the same time, have some questionable actions within the context of human rights. This paper problematizes the rationality behind the existence and practices of such a structure and attempts to make a political and legal analysis of the security practices of the European Union against migration within a framework based on the biopolitics approaches of Michel Foucault and Giorgio Agamben. The dataset of this paper, which focuses on the agency in question by taking it as a case, is formed by making use of the existing literature on the EU’s security policies, the relevant official texts of the Union and Frontex reports on migration practices in and around the Aegean Sea.Keywords: migration, biopolitics, Frontex, security, European union, securitization
Procedia PDF Downloads 138322 The Effect of Artificial Intelligence on Human Rights Regulations
Authors: Karam Aziz Hamdy Fahmy
Abstract:
Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 65321 Political Economy of Ungoverned Spaces and Rural Armed Banditry in Nigeria
Authors: Collins Ogbu, Godwin Johnny Akpan, James NDA Jacob
Abstract:
The debilitating outcomes of violent conflict, consummated by rural armed banditry have nonetheless, occasioned the need for the mapping of crime zones in Nigeria. As a step towards understanding the scourge of armed bandits, ungoverned spaces have been uncovered as the most dominant excuse for rural crimes and fierce confrontations. From the creeks of the Niger Delta to the forest of Sambisa, Small Arms and Light Weapons (SALW) have proliferated to the vagaries of national insecurity. While the trends present indications of State fragility, the paucity of governance in these so-called ungoverned spaces has persistently reflected a Hobbesian state of nature, where the fittest survives. This study, therefore, interrogates the demographic implications of these ungoverned spaces by specifically identifying the most immediate features of the characters in the areas under investigation. The Farmers-Herders Crises, Niger-Delta Militancy, Boko-Haram Insurgency, Armed Robbery, Kidnapping and Cattle Rustling all define the major focus. In undertaking this study, anecdotal sources will be relied on, while extant information on the concept of ungoverned spaces will be content-analyzed. It is hoped that the knowledge gathered, as a result, will ultimately aid in proffering a dependable panacea to the crises of rural armed banditry in Nigeria.Keywords: ungoverned spaces, rural armed banditry, state fragility, conflicts
Procedia PDF Downloads 184320 A Comparative Analysis of the Lexicostatics of Usen, Edo and Yoruba
Authors: Mercy Itohan Aruya
Abstract:
This paper focuses on Usen, a speech form enclaved by the Edo communities in Ovia South West Local Government Area of Edo State, Nigeria. Usen lies at the border between Edo and the Osun state in Nigeria and has a population size of about a hundred and eighty thousand native speakers (2006 population census of Nigeria). Usen, as it is spoken today is highly endangered and it is serious struggling for survival. The aim, therefore, is to ascertain the linguistics status of Usen using a lexicostatical approach. Lexicostatics is a linguistic technique employed in accessing the degree of linguistic divergence or relatedness between two or more languages based on the proportion of cognates. Data for this study were collected from competent native speakers whose ages fall within the range of 40-65. The instrument for this study is the Ibadan 400 word-list of basic items which are collected with of a digital voice recorder. Our major finding in this paper reveals and establishes the facts that Usen speech form is not a dialect but a language of its own. However, Usen is more related to Yoruba than Edo as the degree of relatedness between Usen and Yoruba is 56.14% while that between Usen and Edo is about 21.4% as shown in this research effort.Keywords: Usen, lexicostatistics, cognate words, language status
Procedia PDF Downloads 201319 Multiple Identity Construction among Multilingual Minorities: A Quantitative Sociolinguistic Case Study
Authors: Stefanie Siebenhütter
Abstract:
This paper aims to reveal criterions involved in the process of identity-forming among multilingual minority language speakers in Northeastern Thailand and in the capital Bangkok. Using sociolinguistic interviews and questionnaires, it is asked which factors are important for speakers and how they define their identity by their interactions socially as well as linguistically. One key question to answer is how sociolinguistic factors may force or diminish the process of forming social identity of multilingual minority speakers. However, the motivation for specific language use is rarely overt to the speaker’s themselves as well as to others. Therefore, identifying the intentions included in the process of identity construction is to approach by scrutinizing speaker’s behavior and attitudes. Combining methods used in sociolinguistics and social psychology allows uncovering the tools for identity construction that ethnic Kui uses to range themselves within a multilingual setting. By giving an overview of minority speaker’s language use in context of the specific border near multilingual situation and asking how speakers construe identity within this spatial context, the results exhibit some of the subtle and mostly unconscious criterions involved in the ongoing process of identity construction.Keywords: social identity, identity construction, minority language, multilingualism, social networks, social boundaries
Procedia PDF Downloads 267318 Technological Enhancements in Supply Chain Management Post COVID-19
Authors: Miran Ismail
Abstract:
COVID-19 has caused widespread disruption in all economical sectors and industries around the world. The COVID-19 lockdown measures have resulted in production halts, restrictions on persons and goods movement, border closures, logistical constraints, and a slowdown in trade and economic activity. The main subject of this paper is to leverage technology to manage the supply chain effectively and efficiently through the usage of artificial intelligence. The research methodology is based on empirical data collected through a questionnaire survey. One of the approaches utilized is a case study of industrial organizations that face obstacles such as high operational costs, large inventory levels, a lack of well-established supplier relationships, human behavior, and system issues. The main contribution of this research to the body of knowledge is the empirical insights and on supply chain sustainability performance measurement. The results provide guidelines for the selection of advanced technologies to support supply chain processes and for the design of sustainable performance measurement systems.Keywords: information technology, artificial intelligence, supply chain management, industrial organizations
Procedia PDF Downloads 124317 A Historical Overview of the General Implementation of the European Union Market Abuse Directive in the United Kingdom before the Brexit and Its Future Implications
Authors: Howard Chitimira
Abstract:
The European Union (EU) was probably the first body to establish multinational anti-market abuse laws aimed at enhancing the detection and curbing of cross-border market abuse activities in its member states. Put differently, the EU Insider Dealing Directive was adopted in 1989 and was the first law that harmonised the insider trading ban among the EU member states. Thereafter, the European Union Directive on Insider Dealing and Market Manipulation (EU Market Abuse Directive) was adopted in a bid to improve and effectively discourage all the forms of market abuse in the EU’s securities and financial markets. However, the EU Market Abuse Directive had its own gaps and flaws. In light of this, the Market Abuse Regulation and the Criminal Sanctions for Market Abuse Directive were enacted to repeal and replace the EU Market Abuse Directive in 2016. The article examines the adequacy of the EU Market Abuse Directive and its implementation in the United Kingdom (UK) prior to the British exit (Brexit). This is done to investigate the possible implications of the Brexit referendum outcome of 23 June 2016 on the future regulation of market abuse in the UK.Keywords: market abuse, insider trading, market manipulation, European Union, United Kingdom
Procedia PDF Downloads 251316 To Stay or to Go: The Death Penalty Phenomenon and the Dilemma of the Nigerian Government
Authors: James Etim Archibong
Abstract:
The death penalty, to be or not to be, is a topical and hugely divisive issue in several countries. The United Nations recommends its universal abolition. Europe has abolished it, while some countries limit the practice to heinous crimes. Nigeria is one of the countries that have retained the death penalty. In 2004, the federal government placed a moratorium on execution, which was breached in 2006, 2013 and 2016. Nigeria currently has about three thousand inmates on death row because governors are reluctant to sign execution warrants. Human rights groups have consistently called for its abolition in Nigeria, but this has been rebuffed by the government. Nigeria currently finds itself in a dilemma between the global campaign to end the practice and the local support for its retention. This paper, employing a doctrinal approach, examines the concept of capital punishment in Nigeria from the first execution in 1971 to date. It has also examined the debate to abolish or retain it against the backdrop of Nigeria’s present social, economic and multicultural circumstances. It finds that the death penalty is a human right issue and Nigeria should join the majority of states that have dispensed with the practice. While the government contemplates which way to go, amid the impasse, the paper recommends, in the interim, an official, legally backed a moratorium on execution; commuting of death sentences to life imprisonment, and eventually expunging it from the constitution in the ongoing constitutional review.Keywords: death penalty, capital punishment, human rights, deterrence, right to life
Procedia PDF Downloads 178315 Mathematical Model of Corporate Bond Portfolio and Effective Border Preview
Authors: Sergey Podluzhnyy
Abstract:
One of the most important tasks of investment and pension fund management is building decision support system which helps to make right decision on corporate bond portfolio formation. Today there are several basic methods of bond portfolio management. They are duration management, immunization and convexity management. Identified methods have serious disadvantage: they do not take into account credit risk or insolvency risk of issuer. So, identified methods can be applied only for management and evaluation of high-quality sovereign bonds. Applying article proposes mathematical model for building an optimal in case of risk and yield corporate bond portfolio. Proposed model takes into account the default probability in formula of assessment of bonds which results to more correct evaluation of bonds prices. Moreover, applied model provides tools for visualization of the efficient frontier of corporate bonds portfolio taking into account the exposure to credit risk, which will increase the quality of the investment decisions of portfolio managers.Keywords: corporate bond portfolio, default probability, effective boundary, portfolio optimization task
Procedia PDF Downloads 318314 Variation in the Morphology of Soft Palate
Authors: Hema Lattupalli
Abstract:
Introduction: The palate forms a partition between the oral cavity and nasal cavity. The palate is made up of two parts hard palate and soft palate. The Hard palate forms the anterior part of the palate, the soft palate forms a movable muscular fold covered by mucous membrane that is suspended from the posterior border of a hard palate. Aim and Objectives: Soft palate morphological variations have a great paucity in the literature. It’s also believed that the soft palate has no such important anatomical variations. There is a variable presentation of the soft palate morphology in the lateral cephalograms. The aim of this study is to identify the velar morphology. Materials and Methods: 100 normal subjects between the age group of 20 – 35 were taken for the study. Method: Lateral Cephalogram (radiologic study). Results: Different shapes of the soft palate were observed in the lateral cephalograms. The morphology of soft palate was classified into six types 1.Leaf like (50 cases) most common type, 2.Straight line (20 cases), 3.S shaped (4 cases) very rare, 4.Butt like (10 cases), 5. Rat tail (6 cases), 6. Hook shaped (10 cases). Conclusion: This classification helps us to understand the better diversity of the velar morphology in mid-sagittal plane. These findings help us to understand the etiology of OSAS.Keywords: soft palate, cephalometric radiographs, morphology, cleft palate, obstructive sleep apnoea syndrome
Procedia PDF Downloads 363313 The Promise of Nunca Más after Cambiemos: Representations of the 2x1 Decision of the Supreme Court and Santiago Maldonado's Disappearance in the Newspaper La Nación
Authors: Uluhan Berk Ondul
Abstract:
This article aims to shed light on the new stage of transitional justice in Argentina through examining the representations of the 2x1 decision of the Supreme Court and Santiago Maldonado’s Disappearance in the newspaper, La Nación. The two events hold the key to understanding Argentina’s journey since return to democracy as they are about the same crimes of the dictatorship, namely, the forced disappearance of civilians and the subsequent impunity that follows. In the case of a convicted torturer, The Supreme Court of Argentina ruled on 3rd of May 2017 that the days spent in preventive detention after two years should be counted double for the overall sentence. This court decision was met with severe resistance from the members of the parliament as well as the human rights movement. The second item on the list still continues and divides the country into two camps: (1) those who think that the police force has committed another act of forced disappearance in the case of activist Santiago Maldonado and (2) the others who blame the peronistas (the party and supporters of the ex-president Cristina Fernandez de Kirchner) of using this subject as a means to score political points. As a newspaper known for its proximity to the current administration, La Nación offers an insight to the direction of the country and also demonstrates how the neoliberal mindset works. The results of the study show that the transitional justice process in Argentina is far from being complete as the Promise of Nunca Más is still not a shared value but a political statement.Keywords: Argentina, Fallo 2x1, impunity, Santiago Maldonado, transitional justice
Procedia PDF Downloads 231312 SLAMF5 Regulates Myeloid Cells Activation in the Eae Model
Authors: Laura Bellassen, Idit Shachar
Abstract:
Multiple sclerosis (MS) is a chronic neurological disorder characterized by demyelination of the central nervous system (CNS), leading to a wide range of physical and cognitive impairments. Myeloid cells in the CNS, such microglia and border associated macrophage cells, participate in the neuroinflammation in MS. Activation of those cells in MS contributes to the inflammatory response in the CNS and recruitment of immune cells in the this compartment. SLAMF5 is a cell surface receptor that functions as a homophilic adhesion molecule, whose signaling can activate or inhibit leukocyte function. In the current study we followed the expression and function of SLAMF5 in myeloid cells in the CNS and in the periphery in the murine model for MS, the experimental autoimmune encephalomyelitis model (EAE). Our results show that SLAMF5 deficiency or blocking decreases the expression of activation molecules and costimulatory molecules such as MHCII and CD80, resulting in delayed onset and reduced progression of the disease. Moreover, blocking SLAMF5 in peripheral monocytes derived from MS patients and iPSC-derived microglia cells, controls the expression of HLA-DR and CD80. Thus, SLAMF5 is a regulator of myeloid cells function and can serve as a therapeutic target in autoimmune disorders as Multiple Sclerosis.Keywords: multiple sclerosis, EAE model, myeloid cells, new antibody, neuroimmunology
Procedia PDF Downloads 54