Search results for: criminal tribunals
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 434

Search results for: criminal tribunals

134 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks

Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla

Abstract:

A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.

Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional

Procedia PDF Downloads 382
133 Games behind Bars: A Longitudinal Study of Inmates Pro-Social Preferences

Authors: Mario A. Maggioni, Domenico Rossignoli, Simona Beretta, Sara Balestri

Abstract:

The paper presents the results of a Longitudinal Randomized Control Trial implemented in 2016 two State Prisons in California (USA). The subjects were randomly assigned to a 10-months program (GRIP, Guiding Rage Into Power) aiming at undoing the destructive behavioral patterns that lead to criminal actions by raising the individual’s 'mindfulness'. This study tests whether the participation to this program (treatment), based on strong relationships and mutual help, affects pro-social behavior of participants, in particular with reference to trust and inequality aversion. The research protocol entails the administration of two questionnaires including a set of behavioral situations ('games') - widely used in the relevant literature in the field - to 80 inmates, 42 treated (enrolled in the program) and 38 controls. The first questionnaire has been administered before treatment and randomization took place; the second questionnaire at the end of the program. The results of a Difference-in-Differences estimation procedure, show that trust significantly increases GRIP participants to compared to the control group. The result is robust to alternative estimation techniques and to the inclusion of a set of covariates to further control for idiosyncratic characteristics of the prisoners.

Keywords: behavioral economics, difference in differences, longitudinal study, pro-social preferences

Procedia PDF Downloads 362
132 Minors and Terrorism: A Discussion about the Recruitment and Resilience

Authors: Marta Maria Aguilar Carceles

Abstract:

This theoretical study argues how terrorism is rising around the world and which are the factors and situations that contribute to this process. Linked to aspects of human development, minors are one of the most vulnerable collectives to be engaged for this purpose. Its special weakness and lower possibility of self-defense makes them more likely to become victims as a result of a brainwashing process. Terrorism is an illicit way to achieve political and social changes and new technologies and available resources make it easier to spread. In this sense, throughout a theoretical revision of different recent and scientific articles, it is evaluated which risk factors can provoke its affiliation and later develop of antisocial and illicit behavior. An example of this group of factors could be the inter-generational continuity between parents and their children, as well as the sociodemographic aspects joined to cultural experiences (i.e. sense of dishonor, frustration, etc.). The assess of this kind of variables must be accompanied by the evaluation of protective factors, because the reasons through one person decides to join to terrorism are inherently idiosyncratic and we can only install mechanisms of prevention knowing those personal characteristics. To sum, both aspects underline the relevance of the internalizing and externalizing personal factors, each of them in one specific direction: a) to increase the possibility of being recruited or follow this type of criminal group by himself, and b) to be able of avoiding the effects and consequences of terrorism thanks to personal and resilient characteristics (resilience).

Keywords: criminality, minors, recruitment, resilience, terrorism

Procedia PDF Downloads 111
131 Characteristics Features and Action Mechanism of Some Country Made Pistols

Authors: Ajitesh Pal, Arpan Datta Roy, H. K. Pratihari

Abstract:

The different illegal firearms crudely made by skilled gunsmith from scrap materials are popularly known as country made firearms. Such firearms along with improvised ammunition are clandestinely marketed at the cheaper price without any license to the extremist group, criminal, poachers and firearm lovers. As per National Crime Records Bureau (NCRB), MHA, Govt of India about 80% firearm cases are committed by country made/improvised firearms. The ballistic division of the laboratory has examined a good number of cases. The analysis of firearm cases received for forensic examination revealed that 7.65mm calibre pistols mostly improvised firearm are commonly used in firearm related crime cases. In the present communication, physical parameters and other characteristics features of some 7.65mm calibre pistols have been discussed in detail. The detailed study on country made (CM) firearm will help to prepare a database related to type of material used, origin of the raw material and tools used for inscription. The study also includes to establish the chemistry of propellants & head stamp pattern. The database will be helpful to the firearm examiners, researchers, students pursuing study on forensic science as reference material.

Keywords: improvised pistol, stringent gun law, working mechanism, parameters, database

Procedia PDF Downloads 46
130 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility

Authors: Alejandro Villegas, Cihan Varol

Abstract:

Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.

Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise

Procedia PDF Downloads 272
129 Detection of Latent Fingerprints Recovered from Arson Simulation by a Novel Fluorescent Method

Authors: Somayeh Khanjani, Samaneh Nabavi, Shirin Jalili, Afshin Khara

Abstract:

Fingerprints are area source of ubiquitous evidence and consequential for establishing identity. The detection and subsequent development of fingerprints are thus inevitable in criminal investigations. This becomes a difficult task in the case of certain extreme conditions like fire. A fire scene may be accidental or arson. The evidence subjected to fire is generally overlooked as there is a misconception that they are damaged. There are several scientific approaches to determine whether the fire was deliberate or not. In such as scenario, fingerprints may be most critical to link the perpetrator to the crime. The reason for this may be the destructive nature of fire. Fingerprints subjected to fire are exposed to high temperatures, soot deposition, electromagnetic radiation, and subsequent water force. It is believed that these phenomena damage the fingerprint. A novel fluorescent and a pre existing small particle reagent were investigated for the same. Zinc carbonates based fluorescent small particle reagent was capable of developing latent fingerprints exposed to a maximum temperature of 800 ̊C. Fluorescent SPR may prove very useful in such cases. Fluorescent SPR reagent based on zinc carbonate is a potential method for developing fingerprints from arson sites. The method is cost effective and non hazardous. This formulation is suitable for developing fingerprints exposed to fire/ arson.

Keywords: fingerprint, small particle reagent (SPR), arson, novel fluorescent

Procedia PDF Downloads 446
128 Rethinking Nigeria's Foreign Policy in the Age of Global Terrorism

Authors: Shuaibu Umar Abdul

Abstract:

This paper examines Nigeria’s foreign policy in the age of global terrorism. It worth saying that the threat of ‘terrorism’ is not peculiar to Western and Middle Eastern countries alone, its tentacles are now spreading all over, Africa inclusive. The issue of domestic terrorism in Nigeria has become pervasive since the return of democratic rule in 1999. This development has never been a witness in any form throughout the year of statehood in Nigeria, the issues of banditry, armed robbery, ritual killing, and criminal activities like kidnapping and pipeline vandalization, the breakdown of law and order, poorly managed infrastructural facilities and corruption remain synonymous to Nigeria. These acts of terrorism no doubt have constituted a challenge that necessitates the paradigm shift in Nigeria’s foreign policy. The study employed the conceptual framework of analysis to lead interrogation; secondary sources were used to generate data while descriptive and content analysis were considered for data presentation and interpretation. In view of the interrogation and discussion on the subject matter, the paper revealed that Nigerian government underrated and underestimated the strength of terrorism within and outside her policy hence, it becomes difficult to address. As a response to the findings and conclusion of the study, the paper recommends among others that Nigeria’s foreign policy has to be rethought, reshaped and remodeled in cognizance to the rising global terrorism for peace, growth and development in the country.

Keywords: foreign policy, globe, Nigeria, rethinking, terrorism

Procedia PDF Downloads 339
127 World on the Edge: Migration and Cross Border Crimes in West Africa

Authors: Adeyemi Kamil Hamzah

Abstract:

The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.

Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation

Procedia PDF Downloads 197
126 The Influence of Students’ Race and Socioeconomic Status on Teachers’ Assessment of ADHD: Implications for Educational Inequalities

Authors: Justine McKay

Abstract:

Implicit Bias and its impact on the schooling experience of racial minorities with ADHD is significant. ADHD has become a globally diagnosed disorder. The lack of an objective diagnostic tool for ADHD has created controversy over the disease and its validity. ADHD is referred to as a social construct or a suburban problem related to active white boys who disrupt classrooms. The subjectivity of an ADHD diagnosis and the diagnostic process is based on norm-referenced checklists of behaviours completed by the student, caregiver, teachers, clinicians, and other community members. Teachers' perceptions of classroom behaviours are influenced by implicit bias related to race and socioeconomic status. The same behaviours displayed by white and marginalized or low-income students are perceived differently. The white student is perceived to be struggling academically and needing support, while the marginalized or lower-income student's behaviour is seen as disruptive or criminal. The presence of teacher implicit bias results in the inequity of diagnosis, and academic support, which has long-term implications for these students. The subjectivity of the diagnostic process socially reproduces the systemic injustice of opportunity for marginalized youth within the education system.

Keywords: ADHD, education, equity, implicit bias, subjectivity

Procedia PDF Downloads 51
125 Analysis of Brain Specific Creatine Kinase of Postmortem Cerebrospinal Fluid and Serum in Blunt Head Trauma Cases

Authors: Rika Susanti, Eryati Darwin, Dedi Afandi, Yanwirasti, Syahruddin Said, Noverika Windasari, Zelly Dia Rofinda

Abstract:

Introduction: Blunt head trauma is one of the leading causes of death associated with murders and other deaths involved in criminal acts. Creatine kinase (CKBB) levels have been used as a biomarker for blunt head trauma. Therefore, it is now used as an alternative to an autopsy. The aim of this study is to investigate CKBB levels in cerebrospinal fluid (CSF) and post-mortem serum in order to deduce the cause and time of death. Method: This investigation was conducted through post-test–only group design involving deaths caused by blunt head trauma, which was compared to deaths caused by ketamine poisoning. Results: There were eight treatment groups, each consisting of six adult rats (Rattus norvegicus) Sprague-Dawley strain. Examinations were done at 0 hours, 1 hour, 2 hours, and 3 hours post-mortem, which followed by brain tissue observation. Data were then analyzed statistically with a repeated-measures general linear model. Conclusion: There were increases in the level of CKBB in CSF and postmortem serum in both blunt head trauma and ketamine poisoning treatment groups. However, there were no significant differences between these two groups.

Keywords: blunt head trauma, CKBB, the cause of death, estimated time of death

Procedia PDF Downloads 172
124 Cognition and Communication Disorders Effect on Death Penalty Cases

Authors: Shameka Stanford

Abstract:

This presentation will discuss how cognitive and communication disorders in the areas of executive functioning, receptive and expressive language can impact the problem-solving and decision making of individuals with such impairments. More specifically, this presentation will discuss approaches the legal defense team of capital case lawyers can add to their experience when servicing individuals who have a history of educational decline, special education, and limited intervention and treatment. The objective of the research is to explore and identify the correlations between impaired executive function skills and decision making and competency for individuals facing death penalty charges. To conduct this research, experimental design, randomized sampling, qualitative analysis was employed. This research contributes to the legal and criminal justice system related to how they view, defend, and characterize, and judge individuals with documented cognitive and communication disorders who are eligible for capital case charges. More importantly, this research contributes to the increased ability of death penalty lawyers to successfully defend clients with a history of academic difficulty, special education, and documented disorders that impact educational progress and academic success.

Keywords: cognitive impairments, communication disorders, death penalty, executive function

Procedia PDF Downloads 136
123 Identification Strategies for Unknown Victims from Mass Disasters and Unknown Perpetrators from Violent Crime or Terrorist Attacks

Authors: Michael Josef Schwerer

Abstract:

Background: The identification of unknown victims from mass disasters, violent crimes, or terrorist attacks is frequently facilitated through information from missing persons lists, portrait photos, old or recent pictures showing unique characteristics of a person such as scars or tattoos, or simply reference samples from blood relatives for DNA analysis. In contrast, the identification or at least the characterization of an unknown perpetrator from criminal or terrorist actions remains challenging, particularly in the absence of material or data for comparison, such as fingerprints, which had been previously stored in criminal records. In scenarios that result in high levels of destruction of the perpetrator’s corpse, for instance, blast or fire events, the chance for a positive identification using standard techniques is further impaired. Objectives: This study shows the forensic genetic procedures in the Legal Medicine Service of the German Air Force for the identification of unknown individuals, including such cases in which reference samples are not available. Scenarios requiring such efforts predominantly involve aircraft crash investigations, which are routinely carried out by the German Air Force Centre of Aerospace Medicine as one of the Institution’s essential missions. Further, casework by military police or military intelligence is supported based on administrative cooperation. In the talk, data from study projects, as well as examples from real casework, will be demonstrated and discussed with the audience. Methods: Forensic genetic identification in our laboratories involves the analysis of Short Tandem Repeats and Single Nucleotide Polymorphisms in nuclear DNA along with mitochondrial DNA haplotyping. Extended DNA analysis involves phenotypic markers for skin, hair, and eye color together with the investigation of a person’s biogeographic ancestry. Assessment of the biological age of an individual employs CpG-island methylation analysis using bisulfite-converted DNA. Forensic Investigative Genealogy assessment allows the detection of an unknown person’s blood relatives in reference databases. Technically, end-point-PCR, real-time PCR, capillary electrophoresis, pyrosequencing as well as next generation sequencing using flow-cell-based and chip-based systems are used. Results and Discussion: Optimization of DNA extraction from various sources, including difficult matrixes like formalin-fixed, paraffin-embedded tissues, degraded specimens from decomposed bodies or from decedents exposed to blast or fire events, provides soil for successful PCR amplification and subsequent genetic profiling. For cases with extremely low yields of extracted DNA, whole genome preamplification protocols are successfully used, particularly regarding genetic phenotyping. Improved primer design for CpG-methylation analysis, together with validated sampling strategies for the analyzed substrates from, e.g., lymphocyte-rich organs, allows successful biological age estimation even in bodies with highly degraded tissue material. Conclusions: Successful identification of unknown individuals or at least their phenotypic characterization using pigmentation markers together with age-informative methylation profiles, possibly supplemented by family tree search employing Forensic Investigative Genealogy, can be provided in specialized laboratories. However, standard laboratory procedures must be adapted to work with difficult and highly degraded sample materials.

Keywords: identification, forensic genetics, phenotypic markers, CPG methylation, biological age estimation, forensic investigative genealogy

Procedia PDF Downloads 23
122 Armed Groups and Intra State Conflict: A Study on the Egyptian Case

Authors: Ghzlan Mahmoud Abdel Aziz

Abstract:

This case study aims to identify the intrastate conflicts between the nation state and armed groups. Nowadays, most wars weaken states against armed groups. Thus, it is very important to negotiate with such groups in order to reinforce the law for the protection of victims. These armed groups are the cause of conflicts and they are related with many of humanitarian issues that result out of conflicts. In this age of rivalry; terrorists, insurgents, or transnational criminal parties have surfaced to the top as a reaction to these armed groups in an effort to set up a new world order. Moreover, the intra state conflicts became increasingly treacherous than the interstate conflicts, particularly when nation state systems deal with armed groups which try to influence the state. The unexpected upraising of the Arab Spring during 2011 in parts of the Middle East and North Africa formed various patterns of conflicts. The events of the Arab Spring resulted in current and long term change across the region. Significant modifications in the level, strength and period of armed conflict around the world have been made. Egypt was in the center of these events. It has fought back the armed groups under the name of terrorism and spread common disorder and violence among civilians. On this note, this study focuses on the problem of the transformation in the methods of organized violence within one state rather than between two state or more and analyzes the objectives, strategies, and internal composition of armed groups and the environments that foster them, with a focus on the Egyptian case.

Keywords: armed groups, conflicts, Egyptian armed forces, intrastate conflicts

Procedia PDF Downloads 431
121 Comparison of Impulsivity Trait in Males and Females: Exploring the Sex Difference in Impulsivity

Authors: Pinhas Dannon, Aviv Weinstein

Abstract:

Impulsivity is raising major interest clinically because it is associated with various clinical conditions such as delinquency, antisocial behavior, suicide attempts, aggression, and criminal activity. The evolutionary perspective argued that impulsivity relates to self-regulation and it has predicted that female individuals should have evolved a greater ability to inhibit pre-potent responses. There is supportive evidence showing that female individuals have better performance on cognitive tasks measuring impulsivity such as delay in gratification and delayed discounting mainly in childhood. During adolescence, brain imaging studies using diffusion tensor imaging on white matter architecture indicated contrary to the evolutionary perspective hypothesis, that young adolescent male individuals may be less vulnerable than age-matched female individuals to risk- and reward- related maladaptive behaviors. In adults, the results are mixed presumably owing to hormonal effects on neuro-biological mechanisms of reward. Consequently, female individuals were less impulsive than male individuals only during fertile stages of the menstrual cycle. Finally, there is evidence the serotonin (5-HT) system is more involved in the impulsivity of men than in that of women. Overall, there seem to be sex differences in impulsivity but these differences are more pronounced in childhood and they are later subject to maturational and hormonal changes during adolescence and adulthood and their effects on the brain, cognition, and behavior.

Keywords: impulse control, male population, female population, gender differences, reward, neurocognitive tests

Procedia PDF Downloads 325
120 Measuring the Height of a Person in Closed Circuit Television Video Footage Using 3D Human Body Model

Authors: Dojoon Jung, Kiwoong Moon, Joong Lee

Abstract:

The height of criminals is one of the important clues that can determine the scope of the suspect's search or exclude the suspect from the search target. Although measuring the height of criminals by video alone is limited by various reasons, the 3D data of the scene and the Closed Circuit Television (CCTV) footage are matched, the height of the criminal can be measured. However, it is still difficult to measure the height of CCTV footage in the non-contact type measurement method because of variables such as position, posture, and head shape of criminals. In this paper, we propose a method of matching the CCTV footage with the 3D data on the crime scene and measuring the height of the person using the 3D human body model in the matched data. In the proposed method, the height is measured by using 3D human model in various scenes of the person in the CCTV footage, and the measurement value of the target person is corrected by the measurement error of the replay CCTV footage of the reference person. We tested for 20 people's walking CCTV footage captured from an indoor and an outdoor and corrected the measurement values with 5 reference persons. Experimental results show that the measurement error (true value-measured value) average is 0.45 cm, and this method is effective for the measurement of the person's height in CCTV footage.

Keywords: human height, CCTV footage, 2D/3D matching, 3D human body model

Procedia PDF Downloads 226
119 Automatic Motion Trajectory Analysis for Dual Human Interaction Using Video Sequences

Authors: Yuan-Hsiang Chang, Pin-Chi Lin, Li-Der Jeng

Abstract:

Advance in techniques of image and video processing has enabled the development of intelligent video surveillance systems. This study was aimed to automatically detect moving human objects and to analyze events of dual human interaction in a surveillance scene. Our system was developed in four major steps: image preprocessing, human object detection, human object tracking, and motion trajectory analysis. The adaptive background subtraction and image processing techniques were used to detect and track moving human objects. To solve the occlusion problem during the interaction, the Kalman filter was used to retain a complete trajectory for each human object. Finally, the motion trajectory analysis was developed to distinguish between the interaction and non-interaction events based on derivatives of trajectories related to the speed of the moving objects. Using a database of 60 video sequences, our system could achieve the classification accuracy of 80% in interaction events and 95% in non-interaction events, respectively. In summary, we have explored the idea to investigate a system for the automatic classification of events for interaction and non-interaction events using surveillance cameras. Ultimately, this system could be incorporated in an intelligent surveillance system for the detection and/or classification of abnormal or criminal events (e.g., theft, snatch, fighting, etc.).

Keywords: motion detection, motion tracking, trajectory analysis, video surveillance

Procedia PDF Downloads 514
118 The Impact of Cognition and Communication on the Defense of Capital Murder Cases

Authors: Shameka Stanford

Abstract:

This presentation will discuss how cognitive and communication disorders in the areas of executive functioning, receptive and expressive language can impact the problem-solving and decision making of individuals with such impairments. More specifically, this presentation will discuss approaches the legal defense team of capital case lawyers can add to their experience when servicing individuals who have a history of educational decline, special education, and limited intervention and treatment. The objective of the research is to explore and identify the correlations between impaired executive function skills and decision making and competency for individuals facing death penalty charges. To conduct this research, experimental design, randomized sampling, qualitative analysis was employed. This research contributes to the legal and criminal justice system related to how they view, defend, and characterize, and judge individuals with documented cognitive and communication disorders who are eligible for capital case charges. More importantly, this research contributes to the increased ability of death penalty lawyers to successfully defend clients with a history of academic difficulty, special education, and documented disorders that impact educational progress and academic success.

Keywords: communication disorders, cognitive disorders, capital murder, death penalty, executive function

Procedia PDF Downloads 143
117 Corruption and Anti-Corruption Policies: The Case of Iraq

Authors: Sarwan Hasan

Abstract:

This article is to investigate the main forms and causes of corruption and provides anti-corruption policies. It is significant to find out how both interact and affect each other. The research focuses particularly on the case study of Iraq from 2003 to 2023. In this way, the main methods of analysis will be the system approach to analyze the relationship of different elements of the political system of Iraq in the context of corruption, the process-tracing method to explain the reasons for corruption, and content analysis of the official documents important for the research topic. Moreover, the SWOT analysis will be used in the part about the anti-corruption policies. This article concludes that the main causes behind corruption in Iraq are power distribution based on muhassasa tayifiya (power apportionment based on ethno-sectarianism), decentralized political system, sectarian division, Iran, and socio-cultural structure. The main forms of corruption in the country are illegal enrichment, using public positions for sectarian agenda, criminal corruption, bribery, political patronage, clientelism, cronyism, nepotism, embezzlement, kickback, extortion, money laundry, speed money, theft, and justice obstruction. The main anti-corruption policies in Iraq are establishing the Commission of Integrity, Board of Supreme Audit, Inspectors General and Parliamentary Committee, Internalization (assistance from foreign actors), economic adjustment and financial reform, and the new anti-corruption program of the new Prime Minister (Mohamed Shiyah al-Sudani).

Keywords: anti-corruption, corruption, Iraq, anti-corruption policies

Procedia PDF Downloads 48
116 Female Criminality in Lagos State: A Case of Armed Robbery

Authors: Ebobo Urowoli Christiana

Abstract:

The Nigerian Prison Service statistics of 2007; 2009 revealed that though crime in the past was ascribed to men, but today there is a steady increase in the population of women involved in crime. This study focused on the investigation of female criminality in Lagos State: A case of Armed Robbery. Its major objective was to find out if there is an increase or decrease in female involvement in armed robbery and its growth rate. The major research question is 'Is there an increase in the perpetration of armed robbery by females in Lagos State?' the null hypotheses is 'There is no significant increase in the perpetration of armed robbery by females in Lagos State.' As a result, this study adopted the survey design, purposive sampling method and a sample size of 120 respondents. The rational choice theory was used to explain the reason for female involvement in armed robbery. Both primary and secondary data was generated for this study; the primary data was collected from the criminal records in Lagos State Police Command, Panti while the Quantitative data was collected using the questionnaire from 120 female detainees and inmates. The data collected was analyzed using the simple frequency tables and percentages and chi square was used to test for relationships. The study revealed a persistent rise in the prevalence of female armed robbery and recommended that youths should be equipped with educational/vocational skills in order to lead responsible lives.

Keywords: criminality, armed robbery, female, police commands, panti, nature

Procedia PDF Downloads 382
115 Analysis of a Movie about Juvenile Delinquency

Authors: Guliz Kolburan

Abstract:

Juvenile delinquency studies has a special place and importance in criminality researches. Young adolescents, have not reached psychological, mental and physical maturity, and they cannot understand their roles and duties in society. In this case, if such an adolescent turns into a crime machine as a gang leader, he has the least responsibility of this result. All institutions, like family, school, community and the state as a whole have duties and responsibilities in this regard. While planning the studies about prevention of juvenile delinquency, all institutions related with the development of the children, should be involved in the center of the study. So that effective goals for prevention studies can be determined only in this way. Most of youth who commit homicide feel no attachment to anybody or society except for themselves. Children who committed homicide generally developed defense mechanisms about their guilt, sadness, fear and anger. For this reason, treatment of these children should be based on the awareness of these feelings and copying with them. In the movie, events making the youth realize his own feelings and responsibilities were studied from a theoretical perspective. In this study, some of the dialogs and the scenes in the movie were analyzed and the factors cause the young gang leader to be drawn to crime were evaluated in terms of the science of psychology. The aim of this study is to analyze the process of the youth to being drawn into criminal behavior in terms of social and emotional developmental phases in a theoretical perspective via the movie produced in 2005 (94. Min.). The method of this study is discourse analysis.

Keywords: crime, child, evaluation (development), psychology

Procedia PDF Downloads 425
114 Combating Money Laundering and Inroads into Banking Secrecy: Evidence from Malaysia

Authors: Aspalella A. Rahman

Abstract:

It is widely accepted that the investigation of money laundering and the tracing and confiscation of criminal proceeds have intruded into the principles of banking secrecy. The inroads into banking secrecy present serious threats to democracy, and more importantly, to the traditional banker-customer relationship. It is generally accepted that the fight against money laundering is in conflict with the secrecy rule. Banking secrecy is a customer privilege whereas combating crime is critical for public safety and security. Indeed, achieving a proper balance is a desirable goal. But how we go about achieving such a balance is a question encountered by many law enforcement authorities. Therefore, this paper examines the effect of disclosure under the Malaysian anti-money laundering laws on the traditional duty of banks to keep the customer’s information confidential. It also analyzes whether the Malaysian laws provide a right balance between a duty to keep customer’s information secret and a duty to disclose such information in the fight against money laundering. On closer inspection, it is submitted that the Malaysian laws provide sufficient safeguards to ensure that the disclosure of customer’s information is carried out in a manner that is not prejudicial to the interest of legitimate customers. This is a positive approach that could protect the innocent customers from being mistreated by the law. Ultimately, it can be said that the growing threat of global money laundering and terrorism makes the overriding of banking secrecy justified because without a flow of information from the banks, the effective prevention of the menace is not possible.

Keywords: anti-money laundering law, banker-customer relationship, banking secrecy, confidentiality, money laundering

Procedia PDF Downloads 399
113 Lies of Police Interrogators in the Ultimatum Game

Authors: Eitan Elaad

Abstract:

The present study's purpose was to examine lyingand pretend fairness by police interrogators in sharing situations. Forty police officers and 40 laypeople from the community, all males, self-assessed their lie-telling ability, rated the frequency of their lies, evaluated the acceptability of lying, and indicated using rational and intuitive thinking while lying. Next, according to the ultimatum game procedure, participants were asked to share 100 points with a virtual target, either a male police interrogator or a male layman. Participantsallocated points to the target person bearing in mind that the other person must accept their offer. Participants' goal was to retain as many points as possible, and to this end, they could tell the target person that fewer than 100 points were available for distribution. The difference between the available 100 points and the sum of points designated for sharing defines lying. The ratio of offered and designated points defines pretend fairness. Results indicate that those police officers lied more than laypeople. Similar results emergedeven when the target person was a police interrogator. However, police interrogators presented higher pretend fairness than laypeople. The higher pretend fairness may be in line with interrogation tactics of persuasion used in the criminal interrogation. Higher-lying frequency reported by police interrogators compared with laypeople support the present results. Finally, lie acceptability predicted lying in the ultimatum game. Specifically, participants who rated lying as more acceptable tended to lie more than low acceptability raters.

Keywords: lying, police interrogators, lie acceptability, ultimatum game, pretend fairness

Procedia PDF Downloads 129
112 Victims and Violators: Open Source Information, Admissibility Standards, and War Crimes Investigations in Iraq and Syria

Authors: Genevieve Zingg

Abstract:

Modern technology and social media platforms have fundamentally altered the nature of war crimes investigations by providing new forms of data, evidence, and documentation, and pose a unique opportunity to expand the efficacy of international law. However, much of the open source information available is deemed inadmissible in subsequent legal proceedings and fails to function as evidence largely due to issues of reliability and verifiability. Focusing on current judicial investigations related to ongoing conflicts in Syria and Iraq, this paper will examine key challenges and opportunities for the effective use of open source information in securing justice. This paper will consider strategies and approaches that can be used to ensure that information collected by affected populations meets basic admissibility standards. This paper argues that the critical failure to equip civilian populations in conflict zones with knowledge and information regarding established admissibility standards and guidelines both jeopardizes the potential of open source information and compromises the ability of victims to participate effectively in justice and accountability processes. The ultimate purpose of this paper is, therefore, to examine how to maximize the value of open source information based on the rules of evidence in international, regional, and national courts, and how to maximize the participation of affected populations in holding their abusers to account.

Keywords: human rights, international criminal law, international justice, international law, Iraq, open source information, social media, Syria, transitional justice, war crimes

Procedia PDF Downloads 319
111 The Nigeria Police Force: Human Resources Management Issues and the Community Policing Policy Transfer

Authors: Aminu Musa Audu

Abstract:

This paper examines the human resources management issues of the Nigeria Police and how it is impacting the community policing policy transfer. Nigeria Police Force is the organisation in the country with the constitutional responsibility of maintaining law and order. The high level of crime and other forms of insecurity called for the introduction of ‘police-community partnership’ strategy in 2003. The trend of events has suggested that the effort is not yielding result, partly because the police in Nigeria are facing human resources management challenges. For instance, the prospective candidates for the police jobs are usually not vetted a situation which provides the possibility of recruiting persons of low academic background and questionable character, or even criminal records. Moreover, the existing training, development infrastructure and other logistics for the job of policing are not in good condition. Consequently, the implementation of the ‘community policing’ policy for crime prevention and control in Nigeria stands to suffer setbacks. Adopting qualitative methods and with focus groups discussions and individual in-depth interviews for data collections, the findings from the views and perspectives of the participants were suggestive of poor handlings of human resources management of the Nigeria police organisation and with negative effect on the implementation of community policing policy. The paper therefore recommends that a total overhaul of the human resources component of the police organisation is necessary in the community policing policy transfer process for crime prevention and control in Nigeria.

Keywords: Nigeria Police Force, community policing policy transfer, human resources management, police-community partnership

Procedia PDF Downloads 482
110 Fear of Crime Among Females on University Campuses

Authors: Shahed, Tala, Ahlam, Marah, Sara, Shaden

Abstract:

Research on fear of crime has shown that there are many influences on it, including gender, age, and geographic location. For example, women are more afraid of crime than men. The campus has a high crime rate and fear of crime due to many hiding places and blind spots; women are more likely than men to be victims of certain types of crime, such as rape and verbal and sexual harassment. And it became clear that older female students have a different perception of the place over time and other knowledge and fear of it, another study at Hashemite University. This study aims to understand better how the environment affects the negative experiences of female students and how their age and familiarity environment affects their sense of safety. This study also examines whether CPTED can be used to help prevent crime. The Broken Windows Theory also states that crime occurs in areas with overt indications of criminal activity, antisocial behavior, and civil unrest. This is related to the principle of CPTED maintenance and monitoring, activity support, regional development, and access control. Given their increased vulnerability to harassment, “sexual harassment” can refer to different behaviors. On campuses, harassment was happening everywhere, but it was most prevalent in "blind spots" that were out of sight and deserted. This study uses a methodology based on quantitative data that depends on putting a number on the amount of a particular phenomenon that exists in the world. The main finding shows how CPTED works in an academic context and what adjustments need to be made.

Keywords: Hashmite University, CPTED, crime prevention, university campus, fear of crime, female faer, broken window theory

Procedia PDF Downloads 62
109 Development of Latent Fingerprints on Non-Porous Surfaces Recovered from Fresh and Sea Water

Authors: A. Somaya Madkour, B. Abeer sheta, C. Fatma Badr El Dine, D. Yasser Elwakeel, E. Nermine AbdAllah

Abstract:

Criminal offenders have a fundamental goal not to leave any traces at the crime scene. Some may suppose that items recovered underwater will have no forensic value, therefore, they try to destroy the traces by throwing items in water. These traces are subjected to the destructive environmental effects. This can represent a challenge for Forensic experts investigating finger marks. Accordingly, the present study was conducted to determine the optimal method for latent fingerprints development on non-porous surfaces submerged in aquatic environments at different time interval. The two factors analyzed in this study were the nature of aquatic environment and length of submerged time. In addition, the quality of developed finger marks depending on the used method was also assessed. Therefore, latent fingerprints were deposited on metallic, plastic and glass objects and submerged in fresh or sea water for one, two, and ten days. After recovery, the items were subjected to cyanoacrylate fuming, black powder and small particle reagent processing and the prints were examined. Each print was evaluated according to fingerprint quality assessment scale. The present study demonstrated that the duration of submersion affects the quality of finger marks; the longer the duration, the worse the quality.The best results of visualization were achieved using cyanoacrylate either in fresh or sea water. This study has also revealed that the exposure to sea water had more destructive influence on the quality of detected finger marks.

Keywords: fingerprints, fresh water, sea, non-porous

Procedia PDF Downloads 431
108 Child Homicide Victimization and Community Context: A Research Note

Authors: Bohsiu Wu

Abstract:

Among serious crimes, child homicide is a rather rare event. However, the killing of children stirs up a special type of emotion in society that pales other criminal acts. This study examines the relevancy of three possible community-level explanations for child homicide: social deprivation, female empowerment, and social isolation. The social deprivation hypothesis posits that child homicide results from lack of resources in communities. The female empowerment hypothesis argues that a higher female status translates into a higher level of capability to prevent child homicide. Finally, the social isolation hypothesis regards child homicide as a result of lack of social connectivity. Child homicide data, aggregated by US postal ZIP codes in California from 1990 to 1999, were analyzed with a negative binomial regression. The results of the negative binomial analysis demonstrate that social deprivation is the most salient and consistent predictor among all other factors in explaining child homicide victimization at the ZIP-code level. Both social isolation and female labor force participation are weak predictors of child homicide victimization across communities. Further, results from the negative binomial regression show that it is the communities with a higher, not lower, degree of female labor force participation that are associated with a higher count of child homicide. It is possible that poor communities with a higher level of female employment have a lesser capacity to provide the necessary care and protection for the children. Policies aiming at reducing social deprivation and strengthening female empowerment possess the potential to reduce child homicide in the community.

Keywords: child homicide, deprivation, empowerment, isolation

Procedia PDF Downloads 168
107 Patriarchy and Clearance Rates of Sexual Victimization: A Multilevel Analysis

Authors: Margaret Schmuhl, Michelle Cubellis

Abstract:

Violence against women (VAW) is a widespread social problem affecting nearly two million women in the United States each year. Recently, feminist criminologists have sought to examine patriarchy as a guiding framework for understanding violence against women. Literature on VAW often examines measures of structural gender equality, often overlooking ideological patriarchy which is necessary for structural inequality to remain unchallenged. Additionally, empirical literature generally focuses on extreme forms of VAW, rape, and femicide, often neglecting more common types of violence. This literature, under the theoretical guidance of the Liberal, Radical, and Marxist feminist traditions, finds mixed support for the relationship of patriarchy and VAW. Explanations for these inconsistencies may include data availability, and the use of different operationalizations of structural patriarchy. Research is needed to examine fuller operationalizations of patriarchy in social institutions and to extend this theoretical framework to the criminal justice response to VAW (i.e., clearance rates). This study examines sexual violence clearance rates under the theoretical guidance of these feminist traditions using incident- and county-level data from National Incident Based Reporting System and other sources in multilevel modelling. The findings suggest mixed support for the feminist hypotheses and that patriarchy and gender equality differentially affect arrest clearance rates and clearance through exceptional means for sexual violence.

Keywords: clearance rates, gender equality, multilevel modelling, patriarchy, sexual victimization, violence against women

Procedia PDF Downloads 157
106 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools

Authors: M. Kaya, M. Eris

Abstract:

Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.

Keywords: block matching, digital evidence, hash list, evaluation of digital evidence

Procedia PDF Downloads 233
105 The Influence of Immunity on the Behavior and Dignity of Judges

Authors: D. Avnieli

Abstract:

Immunity of judges from liability represents a departure from the principle that all are equal under the law, and that victims may be granted compensation from their offenders. The purpose of the study is to determine if judicial immunity coincides with the need to ensure the existence of highly independent and incorruptible judiciary. Judges are immune from civil and criminal liability for their judicial acts. Judicial immunity is justified by the need to maintain complete independence and discretion of the judiciary. Scholars and judges believe that absolute immunity is needed to shield judges from pressures, threats, or outside interference. It is commonly accepted, that judges should be free to perform their judicial role in accordance with their assessment of the fact and their understanding of the law, without any restrictions, influences, inducements or interferences. In most countries, immunity applies when judges act in excess of jurisdiction. In some countries, it applies even when they act maliciously or corruptly. The only exception to absolute immunity applicable in all judicial systems is when judges act without jurisdiction over the subject matter. The Israeli Supreme Court recently decided to embrace absolute immunity and strike off a lawsuit of a refugee, who was unlawfully incarcerated. The Court ruled that the plaintiff cannot sue the State or the judge for damages. The questions of malice, dignity, and public scrutiny were not discussed. This paper, based on comparative analysis of many cases, aims to determine if immunity affects the dignity and behavior of judges. It demonstrates that most judges maintain their dignity and ethical code of behavior, but sometimes do not hesitate to act consciously in excess of jurisdiction, and in rare cases even corruptly. Therefore, in order to maintain independent and incorruptible judiciary, immunity should not be applied where judges act consciously in excess of jurisdiction or with malicious incentives.

Keywords: incorruptible judiciary, immunity, independent, judicial, judges, jurisdiction

Procedia PDF Downloads 83