Search results for: employee theft
371 Interruption Overload in an Office Environment: Hungarian Survey Focusing on the Factors that Affect Job Satisfaction and Work Efficiency
Authors: Fruzsina Pataki-Bittó, Edit Németh
Abstract:
On the one hand, new technologies and communication tools improve employee productivity and accelerate information and knowledge transfer, while on the other hand, information overload and continuous interruptions make it even harder to concentrate at work. It is a great challenge for companies to find the right balance, while there is also an ongoing demand to recruit and retain the talented employees who are able to adopt the modern work style and effectively use modern communication tools. For this reason, this research does not focus on the objective measures of office interruptions, but aims to find those disruption factors which influence the comfort and job satisfaction of employees, and the way how they feel generally at work. The focus of this research is on how employees feel about the different types of interruptions, which are those they themselves identify as hindering factors, and those they feel as stress factors. By identifying and then reducing these destructive factors, job satisfaction can reach a higher level and employee turnover can be reduced. During the research, we collected information from depth interviews and questionnaires asking about work environment, communication channels used in the workplace, individual communication preferences, factors considered as disruptions, and individual steps taken to avoid interruptions. The questionnaire was completed by 141 office workers from several types of workplaces based in Hungary. Even though 66 respondents are working at Hungarian offices of multinational companies, the research is about the characteristics of the Hungarian labor force. The most important result of the research shows that while more than one third of the respondents consider office noise as a disturbing factor, personal inquiries are welcome and considered useful, even if in such cases the work environment will not be convenient to solve tasks requiring concentration. Analyzing the sizes of the offices, in an open-space environment, the rate of those who consider office noise as a disturbing factor is surprisingly lower than in smaller office rooms. Opinions are more diverse regarding information communication technologies. In addition to the interruption factors affecting the employees' job satisfaction, the research also focuses on the role of the offices in the 21st century.Keywords: information overload, interruption, job satisfaction, office environment, work efficiency
Procedia PDF Downloads 226370 How to Use E-Learning to Increase Job Satisfaction in Large Commercial Bank in Bangkok
Authors: Teerada Apibunyopas, Nithinant Thammakoranonta
Abstract:
Many organizations bring e-Learning to use as a tool in their training and human development department. It is getting more popular because it is easy to access to get knowledge all the time and also it provides a rich content, which can develop the employees skill efficiently. This study focused on the factors that affect using e-Learning efficiently, so it will make job satisfaction increased. The questionnaires were sent to employees in large commercial banks, which use e-Learning located in Bangkok, the results from multiple linear regression analysis showed that employee’s characteristics, characteristics of e-Learning, learning and growth have influence on job satisfaction.Keywords: e-Learning, job satisfaction, learning and growth, Bangkok
Procedia PDF Downloads 489369 Fight the Burnout: Phase Two of a NICU Nurse Wellness Bundle
Authors: Megan Weisbart
Abstract:
Background/Significance: The Intensive Care Unit (ICU) environment contributes to nurse burnout. Burnout costs include decreased employee compassion, missed workdays, worse patient outcomes, diminished job performance, high turnover, and higher organizational cost. Meaningful recognition, nurturing of interpersonal connections, and mindfulness-based interventions are associated with decreased burnout. The purpose of this quality improvement project was to decrease Neonatal ICU (NICU) nurse burnout using a Wellness Bundle that fosters meaningful recognition, interpersonal connections and includes mindfulness-based interventions. Methods: The Professional Quality of Life Scale Version 5 (ProQOL5) was used to measure burnout before Wellness Bundle implementation, after six months, and will be given yearly for three years. Meaningful recognition bundle items include Online submission and posting of staff shoutouts, recognition events, Nurses Week and Unit Practice Council member gifts, and an employee recognition program. Fostering of interpersonal connections bundle items include: Monthly staff games with prizes, social events, raffle fundraisers, unit blog, unit wellness basket, and a wellness resource sheet. Quick coherence techniques were implemented at staff meetings and huddles as a mindfulness-based intervention. Findings: The mean baseline burnout score of 14 NICU nurses was 20.71 (low burnout). The baseline range was 13-28, with 11 nurses experiencing low burnout, three nurses experiencing moderate burnout, and zero nurses experiencing high burnout. After six months of the Wellness Bundle Implementation, the mean burnout score of 39 NICU nurses was 22.28 (low burnout). The range was 14-31, with 22 nurses experiencing low burnout, 17 nurses experiencing moderate burnout, and zero nurses experiencing high burnout. Conclusion: A NICU Wellness Bundle that incorporated meaningful recognition, fostering of interpersonal connections, and mindfulness-based activities was implemented to improve work environments and decrease nurse burnout. Participation bias and low baseline response rate may have affected the reliability of the data and necessitate another comparative measure of burnout in one year.Keywords: burnout, NICU, nurse, wellness
Procedia PDF Downloads 84368 The Effect of Leadership Styles on Employees’ Organizational Commitment at Ambo Woreda Public Organizations, Oromia Regional State, Ethiopia
Authors: Mengistu Tulu Balcha, Endale Gadisa Motuma
Abstract:
The purpose of this study was to assess the effect of leadership styles on employees’ organizational commitments in Ambo Woreda public organizations. The study was guided by a Descriptive survey and correlation research design of the quantitative method. By using simple random sampling techniques, 80 participants of employees and by purposive sampling technique, 32 leaders were involved in research from five purposely selected Woreda public organizations without a non-response rate. Two separate instruments adopted from previous studies, namely the multifactor leadership questionnaire (MLQ), which has 36 items and the Organizational Commitment Questionnaire (OCQ), which has 12 items, were used as a data instrument tool. These items were rated by using a five-point Likert-scale. The survey data was processed by using an SPSS (version 27). Descriptive statistics to calculate mean and standard deviations of leaders’ and employees’ responses to leadership styles dominantly practiced in order to determine their perceptions, MLQ of leaders’ and employees’ responses (independent sample), and multiple linear regressions were used to calculate the effect of leadership styles on organizational commitment. The findings of the study show that the leadership style dominantly practiced in Ambo Woreda public organizations was more transactional than transformational and followed by laissez-faire. The level of EOC was ranked as continuance commitment and had the highest mean score, followed by normative commitment and then affective commitment. There is a strong, positive and significant relationship between leadership style dimensions and employees’ organizational commitment. Leadership styles were found statistically significant to predict employee commitment and there was a significant linear relationship between independent variables and dependent variables. Out of the three leadership variables, the transactional leadership style has the highest contribution, followed by the transformational leadership style, whereas the laissez-faire leadership style has the least contribution in predicting employees’ organizational commitment. Finally, the researcher forwarded possible recommendations for Ambo Woreda public organizational leaders and employees to work on improving leadership styles and employees’ commitment collaboratively.Keywords: organizations, employee, relations, commitments, style
Procedia PDF Downloads 26367 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 39366 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks
Authors: Naveed Ghani, Samreen Javed
Abstract:
In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.Keywords: network worms, malware infection propagating malicious code, virus, security, VPN
Procedia PDF Downloads 355365 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks
Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar
Abstract:
Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.Keywords: mobile operating system, security, privacy, Malware
Procedia PDF Downloads 87364 Investigating the Glass Ceiling Phenomenon: An Empirical Study of Glass Ceiling's Effects on Selection, Promotion and Female Effectiveness
Authors: Sharjeel Saleem
Abstract:
The glass ceiling has been a burning issue for many researchers. In this research, we examine gender of the BOD, training and development, workforce diversity, positive attitude towards women, and employee acts as antecedents of glass ceiling. Furthermore, we also look for effects of glass ceiling on likelihood of female selection and promotion and on female effectiveness. Multiple linear regression conducted on data drawn from different public and private sector organizations support our hypotheses. The research, however, is limited to Faisalabad city and only females from minority group are targeted here.Keywords: glass ceiling, stereotype attitudes, female effectiveness
Procedia PDF Downloads 290363 Children Protection in the Digital Space
Authors: Beverly Komen
Abstract:
Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse
Procedia PDF Downloads 183362 ECG Based Reliable User Identification Using Deep Learning
Authors: R. N. Begum, Ambalika Sharma, G. K. Singh
Abstract:
Identity theft has serious ramifications beyond data and personal information loss. This necessitates the implementation of robust and efficient user identification systems. Therefore, automatic biometric recognition systems are the need of the hour, and ECG-based systems are unquestionably the best choice due to their appealing inherent characteristics. The CNNs are the recent state-of-the-art techniques for ECG-based user identification systems. However, the results obtained are significantly below standards, and the situation worsens as the number of users and types of heartbeats in the dataset grows. As a result, this study proposes a highly accurate and resilient ECG-based person identification system using CNN's dense learning framework. The proposed research explores explicitly the calibre of dense CNNs in the field of ECG-based human recognition. The study tests four different configurations of dense CNN which are trained on a dataset of recordings collected from eight popular ECG databases. With the highest FAR of 0.04 percent and the highest FRR of 5%, the best performing network achieved an identification accuracy of 99.94 percent. The best network is also tested with various train/test split ratios. The findings show that DenseNets are not only extremely reliable but also highly efficient. Thus, they might also be implemented in real-time ECG-based human recognition systems.Keywords: Biometrics, Dense Networks, Identification Rate, Train/Test split ratio
Procedia PDF Downloads 160361 Literature Review and Evaluation of the Internal Marketing Theory
Authors: Hsiao Hsun Yuan
Abstract:
Internal marketing was proposed in 1970s. The theory of the concept has continually changed over the past forty years. This study discussed the following themes: the definition and implication of internal marketing, the progress of its development, and the evolution of its theoretical model. Moreover, the study systematically organized the strategies of the internal marketing theory adopted on enterprise and how they were put into practice. It also compared the empirical studies focusing on how the existent theories influenced the important variables of internal marketing. The results of this study are expected to serve as references for future exploration of the boundary and studies aiming at how internal marketing is applied to different types of enterprises.Keywords: corporate responsibility, employee organizational performance, internal marketing, internal customer
Procedia PDF Downloads 355360 A Study of Relationship between Leadership Style and Organisational Culture in Private Organisations
Authors: Shreya Sirohi, Vineeta Sirohi
Abstract:
In the 21st century, the nature of work has become quite complex and dynamic, and in response to this, the organizational culture continues to change and develop new perspectives. Organizational culture and leadership are important elements of any organization. Organization’s performance and success to a large extent, depend upon these two factors. The ability of a leader lies in confronting with the challenge of evolving and adapting the culture of the organization as per the situational demands. Leadership and organizational culture are conceptually intertwined. Leadership is a key ingredient for the successful transformation of any organization, and a favorable organizational culture helps to motivate the employees towards their work. Organizational culture and leadership style plays a crucial role in achieving the specified objectives of an organization. The harmony between culture and leader within organization undoubtedly affects relationships, processes, and employee performance. The present investigation aimed to study the Leadership style and Organisational Culture of private organizations and the relationship between the two. The study was carried out on a sample of 100 employees from five private organizations located in the cities of Gurgaon and Delhi in India. The data was collected by employing organisational culture profile and multifactor leadership questionnaire. The findings of the study indicate that the selected organizations had dominant transformation leadership style, whereas the organizational culture varied from one organization to another. However, technocratic culture was found to be prominent, followed by entrepreneurial organizational culture. A low positive correlation was found between leadership style and organizational culture. The transformational leaders have a positive and significant relationship with employee’s satisfaction, productivity, and organization’s culture. The leaders practicing transformational leadership style inspire their followers, are innovative and are aware of their needs as well as of their followers. Such leadership style has a positive impact both on employees and working culture. Employees of such organization are able to come up with innovative ideas and are efficient in handling situations and making effective decisions. However, low correlation is self indicative of the fact that a single leadership style or a single culture type alone cannot contribute solely towards the growth of an organization. There is a need to blend the culture types and leadership styles suiting the needs of the organization. Organisational culture represents the deeper values and beliefs of the employees and influences organizational performance; hence, the leader has a crucial role to play in creating and managing organizational culture in aligning to the requirements of the present era of competitiveness, globalization and technological advancement.Keywords: leadership style, organizational culture, technocratic, transformational
Procedia PDF Downloads 137359 Monitoring of Hydrological Parameters in the Alexandra Jukskei Catchment in South Africa
Authors: Vhuhwavho Gadisi, Rebecca Alowo, German Nkhonjera
Abstract:
It has been noted that technical programming for handling groundwater resources is not accessible. The lack of these systems hinders groundwater management processes necessary for decision-making through monitoring and evaluation regarding the Jukskei River of the Crocodile River (West) Basin in Johannesburg, South Africa. Several challenges have been identified in South Africa's Jukskei Catchment concerning groundwater management. Some of those challenges will include the following: Gaps in data records; there is a need for training and equipping of monitoring staff; formal accreditation of monitoring capacities and equipment; there is no access to regulation terms (e.g., meters). Taking into consideration necessities and human requirements as per typical densities in various regions of South Africa, there is a need to construct several groundwater level monitoring stations in a particular segment; the available raw data on groundwater level should be converted into consumable products for example, short reports on delicate areas (e.g., Dolomite compartments, wetlands, aquifers, and sole source) and considering the increasing civil unrest there has been vandalism and theft of groundwater monitoring infrastructure. GIS was employed at the catchment level to plot the relationship between those identified groundwater parameters in the catchment area and the identified borehole. GIS-based maps were designed for groundwater monitoring to be pretested on one borehole in the Jukskei catchment. This data will be used to establish changes in the borehole compared to changes in the catchment area according to identified parameters.Keywords: GIS, monitoring, Jukskei, catchment
Procedia PDF Downloads 92358 Navigating through Organizational Change: TAM-Based Manual for Digital Skills and Safety Transitions
Authors: Margarida Porfírio Tomás, Paula Pereira, José Palma Oliveira
Abstract:
Robotic grasping is advancing rapidly, but transferring techniques from rigid to deformable objects remains a challenge. Deformable and flexible items, such as food containers, demand nuanced handling due to their changing shapes. Bridging this gap is crucial for applications in food processing, surgical robotics, and household assistance. AGILEHAND, a Horizon project, focuses on developing advanced technologies for sorting, handling, and packaging soft and deformable products autonomously. These technologies serve as strategic tools to enhance flexibility, agility, and reconfigurability within the production and logistics systems of European manufacturing companies. Key components include intelligent detection, self-adaptive handling, efficient sorting, and agile, rapid reconfiguration. The overarching goal is to optimize work environments and equipment, ensuring both efficiency and safety. As new technologies emerge in the food industry, there will be some implications, such as labour force, safety problems and acceptance of the new technologies. To overcome these implications, AGILEHAND emphasizes the integration of social sciences and humanities, for example, the application of the Technology Acceptance Model (TAM). The project aims to create a change management manual, that will outline strategies for developing digital skills and managing health and safety transitions. It will also provide best practices and models for organizational change. Additionally, AGILEHAND will design effective training programs to enhance employee skills and knowledge. This information will be obtained through a combination of case studies, structured interviews, questionnaires, and a comprehensive literature review. The project will explore how organizations adapt during periods of change and identify factors influencing employee motivation and job satisfaction. This project received funding from European Union’s Horizon 2020/Horizon Europe research and innovation program under grant agreement No101092043 (AGILEHAND).Keywords: change management, technology acceptance model, organizational change, health and safety
Procedia PDF Downloads 44357 A Social Network Analysis for Formulating Construction Defect Generation Mechanisms
Authors: Hamad Aljassmi, Sangwon Han
Abstract:
Various solutions for preventing construction defects have been suggested. However, a construction company may have difficulties adopting all these suggestions due to financial and practical constraints. Based on this recognition, this paper aims to identify the most significant defect causes and formulate their defect generation mechanism in order to help a construction company to set priorities of its defect prevention strategies. For this goal, we conducted a questionnaire survey of 106 industry professionals and identified five most significant causes including: (1) organizational culture, (2) time pressure and constraints, (3) workplace quality system, (4) financial constraints upon operational expenses and (5) inadequate employee training or learning opportunities.Keywords: defect, quality, failure, risk
Procedia PDF Downloads 625356 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States
Authors: Muhammad Jawad Hashmi
Abstract:
The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan
Procedia PDF Downloads 354355 The Use of Social Media in the Recruitment Process as HR Strategy
Authors: Seema Sant
Abstract:
In the 21st century were four generation workforces are working, it’s crucial for organizations to build talent management strategy, as tech-savvy Gen Y has entered the work force. They are more connected to each other than ever – through the internet enabled Social media networks Social media has become important in today’s world. The users of such Social media sites have increased in multiple. From sharing their opinion for a brand/product to researching a company before going for an interview, making a conception about a company’s culture or following a Company’s updates due to sheer interest or for job vacancy, Work force today is constantly in touch with social networks. Thus corporate world has rightly realized its potential uses for business purpose. Companies now use social media for marketing, advertising, consumer survey, etc. For HR professionals, it is used for networking and connecting to the Talent pool- through Talent Community. Social recruiting is the process of sourcing or hiring candidates through the use of social sites such as LinkedIn, Facebook Twitter which provide them with an array of information about potential employee; this study represents an exploratory investigation on the role of social networking sites in recruitment. The primarily aim is to analyze the factors that can enhance the channel of recruitment used by of the recruiter with specific reference to the IT organizations in Mumbai, India. Particularly, the aim is to identify how and why companies use social media to attract and screen applicants during their recruitment processes. It also examines the advantages and limitations of recruitment through social media for employers. This is done by literature review. Further, the papers examine the recruiter impact and understand the various opportunities which have created due to technology, thus, to analyze and examine these factors, both primary, as well as secondary data, are collected for the study. The primary data are gathered from five HR manager working in five top IT organizations in Mumbai and 100 HR consultants’ i.e., recruiter. The data was collected by conducting a survey and supplying a closed-ended questionnaire. A comprehension analysis of the study is depicted through graphs and figures. From the analysis, it was observed that there exists a positive relationship between the level of employee recruited through social media and their organizational commitment. Finally the findings show that company’s i.e. recruiters are currently using social media in recruitment, but perhaps not as effective as they could be. The paper gives recommendations and conditions for success that can help employers to make the most out of social media in recruitment.Keywords: recruitment, social media, social sites, workforce
Procedia PDF Downloads 179354 Reforming the Law to Allow a Duress Defence to Those Committing Crime under Coercive Control
Authors: Amy Elkington
Abstract:
Women in abusive relationships who commit crimes under duress are unfairly treated by the English legal system. Despite the offence of Coercive Control being introduced in 2015 that recognises that a woman’s autonomy has been eroded, coercion is no longer a defence to women who feel compelled to act due to their partner’s behavior or abuse. This problem is intensified by the fact that women in abusive relationships are more likely to commit crimes to ensure their survival. Furthermore, the very fact that they are ‘associating’ with their abusive partners means that they are excluded from pleading a defence of duress. Women who kill their abusers may be able to reduce their conviction from murder to manslaughter, but this depends on successfully pleading either loss of control or diminished responsibility, both not without their issues, but this does not provide a defence where a lesser crime is committed. Self-defence is also widely unavailable to either murder or non-fatal offences, as the amount of force used is often deemed disproportionate because women are more likely to use weapons in their defence. Regardless, this would not provide a defence where the crime committed is one such as theft. An alternative that has been proposed would be to introduce a new defence that would work similarly to the exemption to prosecution afforded to those who are trafficked that commit crime under duress. Despite having support in the Lords in March 2021, this recommendation has been rejected by the Government on the basis that it would not achieve an appropriate balance of justice. The result is that abused women who commit crime are left without an appropriate defence. A doctrinal approach highlights the injustices in these types of cases and concludes that it is time for the current law of duress to change.Keywords: coercive control, crime, defences, duress
Procedia PDF Downloads 193353 Automatic Motion Trajectory Analysis for Dual Human Interaction Using Video Sequences
Authors: Yuan-Hsiang Chang, Pin-Chi Lin, Li-Der Jeng
Abstract:
Advance in techniques of image and video processing has enabled the development of intelligent video surveillance systems. This study was aimed to automatically detect moving human objects and to analyze events of dual human interaction in a surveillance scene. Our system was developed in four major steps: image preprocessing, human object detection, human object tracking, and motion trajectory analysis. The adaptive background subtraction and image processing techniques were used to detect and track moving human objects. To solve the occlusion problem during the interaction, the Kalman filter was used to retain a complete trajectory for each human object. Finally, the motion trajectory analysis was developed to distinguish between the interaction and non-interaction events based on derivatives of trajectories related to the speed of the moving objects. Using a database of 60 video sequences, our system could achieve the classification accuracy of 80% in interaction events and 95% in non-interaction events, respectively. In summary, we have explored the idea to investigate a system for the automatic classification of events for interaction and non-interaction events using surveillance cameras. Ultimately, this system could be incorporated in an intelligent surveillance system for the detection and/or classification of abnormal or criminal events (e.g., theft, snatch, fighting, etc.).Keywords: motion detection, motion tracking, trajectory analysis, video surveillance
Procedia PDF Downloads 545352 Addressing Urban Security Challenges in Nigeria through Neighborhood Renewal: A Reflection of Mokola World Bank Slum Upgrading Pilot Project
Authors: Tabiti S. Tabiti, A. M. Jinadu, Daramola Japheth
Abstract:
Urban insecurity is among the challenges militating against sustainable urban governance; in the first place it distorts the peace of urban areas making them unsafe. On the other hand it hinders the effective performance of urban functions. Urban security challenges manifest in different forms such as, street violence, theft and robbery, accidents of different types kidnapping, killings etc.. Efforts to address urban security challenges in Nigeria have been concentrated in legislative, law enforcement and the use of community vigilante groups. However in this study, the place of physical planning strategy through effective neighbourhood renewal as practiced in Mokola is presented as an effective complementary approach for addressing urban insecurity. On this backdrop, the paper recommends the need for gradual rehabilitation of urban slum neighborhoods by the state government in collaboration with World Bank and other development financiers. The local governments should be made autonomy in Nigeria so as to make them more responsible to the people. Other recommendations suggested in the paper include creating enabling environment that will promote economic empowerment and public enlightment on personal and community sanitation. It is certain that if these recommendations are adopted the challenge of urban insecurity will reduce significantly in Nigerian cities.Keywords: neighbourhood renewal, pilot project, slum upgrading, urban security
Procedia PDF Downloads 434351 The Impact of Cybercrime on Youth Development in Nigeria
Authors: Christiana Ebobo
Abstract:
Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.Keywords: armed robber, cybercrime, integrity, youth
Procedia PDF Downloads 522350 Pattern of Cybercrime Among Adolescents: An Exploratory Study
Authors: Mohamamd Shahjahan
Abstract:
Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.Keywords: cybercrime, adolescents, pattern, internet
Procedia PDF Downloads 78349 Corruption and Anti-Corruption Policies: The Case of Iraq
Authors: Sarwan Hasan
Abstract:
This article is to investigate the main forms and causes of corruption and provides anti-corruption policies. It is significant to find out how both interact and affect each other. The research focuses particularly on the case study of Iraq from 2003 to 2023. In this way, the main methods of analysis will be the system approach to analyze the relationship of different elements of the political system of Iraq in the context of corruption, the process-tracing method to explain the reasons for corruption, and content analysis of the official documents important for the research topic. Moreover, the SWOT analysis will be used in the part about the anti-corruption policies. This article concludes that the main causes behind corruption in Iraq are power distribution based on muhassasa tayifiya (power apportionment based on ethno-sectarianism), decentralized political system, sectarian division, Iran, and socio-cultural structure. The main forms of corruption in the country are illegal enrichment, using public positions for sectarian agenda, criminal corruption, bribery, political patronage, clientelism, cronyism, nepotism, embezzlement, kickback, extortion, money laundry, speed money, theft, and justice obstruction. The main anti-corruption policies in Iraq are establishing the Commission of Integrity, Board of Supreme Audit, Inspectors General and Parliamentary Committee, Internalization (assistance from foreign actors), economic adjustment and financial reform, and the new anti-corruption program of the new Prime Minister (Mohamed Shiyah al-Sudani).Keywords: anti-corruption, corruption, Iraq, anti-corruption policies
Procedia PDF Downloads 74348 Artificial Intelligence Ethics: What Business Leaders Need to Consider for the Future
Authors: Kylie Leonard
Abstract:
Investment in artificial intelligence (AI) can be an attractive opportunity for business leaders as there are many easy-to-see benefits. These benefits include task completion rates, overall cost, and better forecasting. Business leaders are often unaware of the challenges that can accompany AI, such as data center costs, access to data, employee acceptance, and privacy concerns. In addition to the benefits and challenges of AI, it is important to practice AI ethics to ensure the safe creation of AI. AI ethics include aspects of algorithm bias, limits in transparency, and surveillance. To be a good business leader, it is critical to address all the considerations involving the challenges of AI and AI ethics.Keywords: artificial intelligence, artificial intelligence ethics, business leaders, business concerns
Procedia PDF Downloads 144347 Investigating the Impact of Knowledge Management Components on Employee Productivity
Authors: Javad Moghtader Kargaran
Abstract:
Today, attention to knowledge and management Knowledge as a strategy is very important has taken with economy becoming knowledge-oriented, how and knowing the effective management and integration of different types Knowledge (obvious-implicit) to preserve and create advantage. Competition has become very important. Knowledge is a valuable resource for empowering organizations in the direction of innovation and competition. Due to the importance of human resources in the survival of organizations, extensive efforts are made to empower them. This knowledge can lead to awareness among employees. Employees and the knowledge that is in their minds are very valuable resources for the organization, which must be managed and developed. In fact, the ultimate goal of knowledge management is to increase the intelligence and productivity of employees and the organization.Keywords: knowledge, management, productivity, human
Procedia PDF Downloads 92346 An Effective Change in the Strategic Structure of Quality Management Systems: The Organization’s Needs Management
Authors: Joel Carlos Vieira Reinhardt, Mariana de Freitas Dewes, Odair Lelis Gonçalez
Abstract:
This paper proposes a method to implement a strategic framework for the quality management system that considers the analysis of prospective scenarios in the determination of policy, mission, vision, objectives, processes, monitoring, and goals. Semantic categorization of qualitative testimonial research on employee perception shows it was possible to implement an effective change in the organizations at the Department of Aerospace Science and Technology through the focus on the organization's needs management, producing a rupture with the historical managerial practice.Keywords: management of company needs, mission, prospective scenarios, quality management, quality policy, vision
Procedia PDF Downloads 117345 Sociodemographic Approach to Juveniles Directed to Delinquent Behaviour in Zonguldak
Authors: Riza Yilmaz, Samet Kiyak, Sezin Nur Yilmaz, Yasemin Yilmaz
Abstract:
Child delinquency has been increasing in our country as well as in many countries of the world. Child intelligence, abilities, family's social environment and life conditions are the factors which affect the child delinquency. The reports of 73 cases ages of 12-15 which were sent to the University of Bulent Ecevit, School of Medicine, Forensic Medicine Department between January 2011-September 2015, in order to evaluate medically, children pushed to crime by the judicial authorities are examined in terms of age, gender, educational background, place of residence, reasons for being sent, whether it’s a repeating crime or not, type of intelligence test, results revealed by forensic medicine and department of mental and neurological disorders. When children pushed to crime examined in terms of their crimes, the most common type of crime was identified as theft (n = 24). The crimes with 19 physical attacks and 12 sexual abuse were seen. Following that other 12 crimes were determined as damage to property, hemp crop, insult, incitement to crime, forgery of private documents, illegal excavation, threatening, involuntary manslaughter. The alleged crimes in 6 cases were more than one. The children pushed to crime are one of the major social problems of many countries. In this sense, it is not only the responsibility of government agencies to protect children pushed to crime, also, the civil society organizations should take place in this struggle.Keywords: delinquent behaviour, forensic medicine, crime, punishment
Procedia PDF Downloads 434344 Identifying and Ranking Environmental Risks of Oil and Gas Projects Using the VIKOR Method for Multi-Criteria Decision Making
Authors: Sasan Aryaee, Mahdi Ravanshadnia
Abstract:
Naturally, any activity is associated with risk, and humans have understood this concept from very long times ago and seek to identify its factors and sources. On the one hand, proper risk management can cause problems such as delays and unforeseen costs in the development projects, temporary or permanent loss of services, getting lost or information theft, complexity and limitations in processes, unreliable information caused by rework, holes in the systems and many such problems. In the present study, a model has been presented to rank the environmental risks of oil and gas projects. The statistical population of the study consists of all executives active in the oil and gas fields, that the statistical sample is selected randomly. In the framework of the proposed method, environmental risks of oil and gas projects were first extracted, then a questionnaire based on these indicators was designed based on Likert scale and distributed among the statistical sample. After assessing the validity and reliability of the questionnaire, environmental risks of oil and gas projects were ranked using the VIKOR method of multiple-criteria decision-making. The results showed that the best options for HSE planning of oil and gas projects that caused the reduction of risks and personal injury and casualties and less than other options is costly for the project and it will add less time to the duration of implementing the project is the entering of dye to the environment when painting the generator pond and the presence of the rigger near the crane.Keywords: ranking, multi-criteria decision making, oil and gas projects, HSEmanagement, environmental risks
Procedia PDF Downloads 156343 Closed-Loop Supply Chain under Price and Quality Dependent Demand: An Application to Job-Seeker Problem
Authors: Sutanto, Alexander Christy, N. Sutrisno
Abstract:
The demand of a product is linearly dependent on the price and quality of the product. It is analog to the demand of the employee in job-seeker problem. This paper address a closed-loop supply chain (CLSC) where a university plays role as manufacturer that produce graduates as job-seeker according to the demand and promote them to a certain corporation through a trial. Unemployed occurs when the job-seeker failed the trial or dismissed. A third party accomodates the unemployed and sends them back to the university to increase their quality through training.Keywords: CLSC, price, quality, job-seeker problem
Procedia PDF Downloads 271342 Evaluation of Robot Application in Hospitality
Authors: Lina Zhong, Sunny Sun, Rob Law
Abstract:
Artificial intelligence has been developing rapidly. Previous studies have evaluated hotel technology either from an employee or consumer perspective. However, impacts, which mainly include the social and economic impacts of hotel robots, are unknown as they are newly introduced. To bridge the aforementioned research gap, this study evaluates hotel robots from contextual, diagnostic, evaluative, and strategic aspects using framework analysis as a basis to assist hotel managers in real-time hotel marketing strategy management, adjustment and revenue achievement. Findings show that, from a consumer perspective, the overall acceptance of hotel robots is low. The main implication is that the cost of hotel robots should be carefully estimated, and the investment should be made based on phases.Keywords: application, evaluation, framework analysis, hotel robot
Procedia PDF Downloads 169