Search results for: autopsy on criminal offense victim
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 645

Search results for: autopsy on criminal offense victim

285 Influence of the Popular Literature on Consciousness of the Person

Authors: Alua Temirbolat, Sergei Kibalnik, Zhuldyz Essimova

Abstract:

The article is devoted to research of influence of the modern literature on the consciousness of the person. Tendencies and features of the progress of the historical-cultural and artistic process at the end of XX–the beginning of XXI centuries are considered. The object of the analysis is the popular literature which has found last decades greater popularity among readers of different generations. In the article, such genres, as melodramas, female, espionage, criminal, pink, costume-historical novels, thrillers, elements, a fantasy are considered. During research, specific features of the popular literature, its difference from works of classics is revealed. On specific examples, its negative and positive influence on consciousness, psychology of the reader is shown, its role and value in a modern society are defined.

Keywords: the popular literature, the person, consciousness, a genre, psychology

Procedia PDF Downloads 274
284 Leveraging Natural Language Processing for Legal Artificial Intelligence: A Longformer Approach for Taiwanese Legal Cases

Authors: Hsin Lee, Hsuan Lee

Abstract:

Legal artificial intelligence (LegalAI) has been increasing applications within legal systems, propelled by advancements in natural language processing (NLP). Compared with general documents, legal case documents are typically long text sequences with intrinsic logical structures. Most existing language models have difficulty understanding the long-distance dependencies between different structures. Another unique challenge is that while the Judiciary of Taiwan has released legal judgments from various levels of courts over the years, there remains a significant obstacle in the lack of labeled datasets. This deficiency makes it difficult to train models with strong generalization capabilities, as well as accurately evaluate model performance. To date, models in Taiwan have yet to be specifically trained on judgment data. Given these challenges, this research proposes a Longformer-based pre-trained language model explicitly devised for retrieving similar judgments in Taiwanese legal documents. This model is trained on a self-constructed dataset, which this research has independently labeled to measure judgment similarities, thereby addressing a void left by the lack of an existing labeled dataset for Taiwanese judgments. This research adopts strategies such as early stopping and gradient clipping to prevent overfitting and manage gradient explosion, respectively, thereby enhancing the model's performance. The model in this research is evaluated using both the dataset and the Average Entropy of Offense-charged Clustering (AEOC) metric, which utilizes the notion of similar case scenarios within the same type of legal cases. Our experimental results illustrate our model's significant advancements in handling similarity comparisons within extensive legal judgments. By enabling more efficient retrieval and analysis of legal case documents, our model holds the potential to facilitate legal research, aid legal decision-making, and contribute to the further development of LegalAI in Taiwan.

Keywords: legal artificial intelligence, computation and language, language model, Taiwanese legal cases

Procedia PDF Downloads 48
283 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 258
282 Reliability of Eyewitness Statements in Fire and Explosion Investigations

Authors: Jeff Colwell, Benjamin Knox

Abstract:

While fire and explosion incidents are often observed by eyewitnesses, the weight that fire investigators should place on those observations in their investigations is a complex issue. There is no doubt that eyewitness statements can be an important component to an investigation, particularly when other evidence is sparse, as is often the case when damage to the scene is severe. However, it is well known that eyewitness statements can be incorrect for a variety of reasons, including deception. In this paper, we reviewed factors that can have an effect on the complex processes associated with the perception, retention, and retrieval of an event. We then review the accuracy of eyewitness statements from unique criminal and civil incidents, including fire and explosion incidents, in which the accuracy of the statements could be independently evaluated. Finally, the motives for deceptive eyewitness statements are described, along with techniques that fire and explosion investigators can employ, to increase the accuracy of the eyewitness statements that they solicit.

Keywords: fire, explosion, eyewitness, reliability

Procedia PDF Downloads 350
281 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 246
280 Comparative Forensic Analysis of Lipsticks Using Thin Layer Chromatography and Gas Chromatography

Authors: M. O. Ezegbogu, H. B. Osadolor

Abstract:

Lipsticks constitute a significant source of transfer evidence, and can, therefore, provide corroborative or inclusionary evidence in criminal investigation. This study aimed to determine the uniqueness and persistence of different lipstick smears using Thin Layer Chromatography (TLC), and Gas Chromatography with a Flame Ionisation Detector (GC-FID). In this study, we analysed lipstick smears retrieved from tea cups exposed to the environment for up to four weeks. The n-alkane content of each sample was determined using GC-FID, while TLC was used to determine the number of bands, and retention factor of each band per smear. This study shows that TLC gives more consistent results over a 4-week period than GC-FID. It also proposes a maximum exposure time of two weeks for the analysis of lipsticks left in the open using GC-FID. Finally, we conclude that neither TLC nor GC-FID can distinguish lipstick evidence recovered from hypothetical crime scenes.

Keywords: forensic science, chromatography, identification, lipstick

Procedia PDF Downloads 164
279 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria

Authors: Auwal Nata'ala

Abstract:

The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.

Keywords: cyber crimes, e-banking, policies, ICT

Procedia PDF Downloads 390
278 Sustainable Opportunities of Educational Facilities Provided to the Imprisoned Women's Children in Karachi's Central Jail

Authors: Waqar Un Nisa Faizi, Anila Fatima Shakil, Wilayat Bibi, Sajjad Hayat Akhtar

Abstract:

This study will discuss the sustainable opportunities regarding educational facilities provided to the children of imprisoned women in the different jails of Pakistan particularly in Central Jail of Karachi. It will also discuss the importance of educational facilities which are required for the mental and personal growth of the children as education has the capability to enhance the general knowledge and the personality of any individual. Education is extremely important for the children whether they live in a society or in prison, because they are the future of any country. Therefore, the point of discussion in this paper will be the provision of educational facilities and sustainable opportunities regarding these facilities to the children of imprisoned women in Karachi and other countries of the world.

Keywords: imprisoned, educational facilities, criminal activities, positive atmosphere

Procedia PDF Downloads 312
277 Polish Police in the Fight against Terrorism and Cyberterrorism

Authors: Izabela Nowicka, Jacek Dworzecki

Abstract:

The paper will be presented to selected legal and organizational solutions for the prevention and combating of terrorism by the police in Poland. Development will include information on the organization and functioning of the police anti-terrorist sub-units, whose officers are on the front line of the fight against terrorism. They will be presented to the conditions and cases of use of firearms by police officers in the course of special operations aimed against organizations and terrorist groups, and the perpetrators of criminal acts of terrorism as well as the legal foundation for the Polish police to take immediate counterterrorism operations. Article will be prepared in the context of an international research project entitled. Understand the Dimensions of Organised Crime and Terrorist Networks for Developing Effective and Efficient Security Solutions for First-line-practitioners and Professionals [Project: H2020-FCT-2015, No: 700688].

Keywords: the fight against terrorism, police, Poland, takedown

Procedia PDF Downloads 308
276 Where Is the Sultan of Aceh? Reconsidering the Return of the Aceh Sultanate

Authors: Muhammad Harya Ramdhoni, Nidzam Sulaiman, Muhammad Ridwan

Abstract:

The Helsinki Agreement between the Indonesian Government (RI) and the Aceh Liberation Movement (GAM) on 15th Aug. 2005 fails to reconcile social and political turmoil in Aceh Darussalam (NAD). The political powers that were once unified in their struggle against Indonesian Government prior to this agreement have now become divided due to differences in political and economic interests. Using descriptive analysis and intellectual discourse, this paper proposes that the Aceh Sultanate be revived as an attempt to unite these divided political powers and to curtail potential conflicts in the area. This proposal is based on three assumptions. First, the Aceh Sultanate is the only Sultanate in Sumatera that did not fall victim to the social revolution post 1945 proclamation of independence. Second, the Acehnese still acknowledge the Sultanate as a sovereign political power even though it was defeated by the Dutch in 1904. Third, there are emotional, historical and cultural ties between the Acehnese and the Sultanate as they still perceived them to be their patron. Consequently, the Sultanate is the unifying element of all political powers in the area. This, however, is not an attempt to reinstate feudalism in Aceh. It only seeks to facilitate the political reconciliation process in Aceh Darussalam founded on sociological and historical background of locals.

Keywords: Sultanate Aceh, political reconciliation, political power, patron-client

Procedia PDF Downloads 238
275 The Need for a More Robust Legal Framework to Curb the Rise in Violence against Game Officials

Authors: A. Roomy

Abstract:

The dramatic rise in violence against game officials has affected all levels of sports including recreational, amateur, and professional sports. One way to combat this rise in violence is through the creation of laws specifically aimed at preventing and punishing this kind of violence. This paper will use related legal cases as a starting point to explore possible ways of better protecting the safety of game officials. It will do this by looking at relevant cases, related legal issues, and two specific ways of reducing violence against game officials. In closing, it will be argued that there needs to be a more robust legal approach with emphasis on criminal and civil penalties for assault and battery, and a more comprehensive social approach with emphasis on raising social awareness on the need to protect game officials from violence.

Keywords: game officials, legal issues, safety, violence

Procedia PDF Downloads 354
274 Violence and Aggression of Women in Native Canada: A Postcolonial Feminist Study of The Rez Sisters and Rose by Tomson Highway

Authors: Sonia Sharma

Abstract:

In a multicultural country like Canada, Colonialism is still maintained in the form of Violence and Oppression. The Aboriginals are persistently facing Oppression and Marginalization in their own land owing to Colonial presence. Women in particular are getting most affected. They are facing double burden of patriarchy and their being Native. Tomson Highway, the Cree Canadian playwright has deftly exposed the theme of women violence and empowerment. In his plays (The Rez Sisters and Rose) taken from his Rez Septology, he has depicted Aboriginal women’s predicaments and sufferings. But simultaneously also talks about their empowerment and aggression refuting and fighting back to patriarchy and oppression. The Rez Sisters portrays women with shattering images and as a victim of both the male dominating society and the system. It represents the painful odyssey of the seven women facing several hardships. Rose represents women in entirely different light. They are shown more assertive and empowered raising their voice against the Violence and Discrimination meted out to them. The Aboriginal women in Canada are facing dual burden of Colonialism and Patriarchy which indeed is a Colonial construct. This paper is an attempt to explore the above facets Tomson Highway’s The Rez Sisters and Rose.

Keywords: violence, racism, discrimination, postcolonialism feminism

Procedia PDF Downloads 586
273 Truthful or Untruthful Social Media Posts: Applying Statement Analysis to Decode online Deception

Authors: Christa L. Arnold, Margaret C. Stewart

Abstract:

This research shares the results of an exploratory study examining Statement Analysis (SA) to detect deception in online truthful and untruthful social media posts. Applying a Law Enforcement methodology SA, used in criminal interview statements, this research analyzes what is stated to assist in evaluating written deceptive information. Preliminary findings reveal qualitative and quantitative nuances for SA in online deception detection and uncover insights regarding digital deceptive behavior. Thus far, findings reveal truthful statements tend to differ from untruthful statements in both content and quality.

Keywords: deception detection, online deception, social media content, statement analysis

Procedia PDF Downloads 43
272 Community Based Disaster Risk Reduction in Mizoram, India

Authors: Lalrokima Chenkual

Abstract:

Legal provision and various guidelines issued by the National Disaster Management Authority in India strives for setting up of disaster management authority from the central government to the district level. Community-Based Disaster Risk Reduction practice is still relevant as the communities are the victim as well as the first responder in any incidents. The primary goal of Community Based Disaster Risk Reduction is to reduce vulnerability of the concerned community and strengthen its existing capacity to cope with disaster. By involving the community in the preparedness phase, it not only increases the likelihood of coordinated action by the communities to help in mitigating disasters and lessening the impact of disaster but also brings the community together to address the issue collectively. Community participation ensures local ownership, addresses local needs, and promotes volunteerism and mutual help to prevent and minimise damage. Community-Based Disaster Risk Reduction is very much relevant for Mizoram as the society is closed knit, population is very less, religion homogeneity i.e Christianity, very active and widespread community-based organization viz, Young Mizo Association, MHIP (Women Federation), MUP (Elders Clubs which are guided together by Mizo code of morals conduct termed as Tlawmngaihna.

Keywords: community, close-knit, first responder, Tlawmngaihna

Procedia PDF Downloads 124
271 The Social Construction of the Family among the Survivors of Sex Trafficking

Authors: Nisha James, Shubha Ranganathan

Abstract:

Sex trafficking is a traumatic ongoing process which includes human rights violations against the victims. Majority of the trafficked individuals in India are from families with low socioeconomic status, from rural areas, unmarried or married off at a very young age. Many of the sex trafficked feel that it is necessary to make sacrifices, for the benefit of their families. The combination of these cultural family values with the stigma of rape and prostitution are manipulated and used as a tool in the abuse of power against the sex trafficked. The rescue, rehabilitation and reintegration of these individuals are usually difficult due to the stigma and social exclusion that they face. In these circumstances, social support is very effective in social inclusion of these individuals. The present study was a qualitative one, using semi-structured interviews with 29 Indian survivors of sex trafficking and a few sex workers. Thematic analysis was done on the data derived from the semi-structured interviews. The major findings indicate that the family can be seen as both the ‘cause’ for being sex trafficked, and the factor in victim continuing to be sex trafficked. At the same time, it can also become a driver for getting rescued, rehabilitated and reintegrated. The study also explores the social construction about ‘family’ among the survivors of sex trafficking, reflecting on who they refer to as ‘family’, what they mean by the term ‘family’ and how these families emerge. Therefore the analytic concept of ‘family’ is a crucial element in sex trafficking and cannot be defined only in terms of its conventional definition of a basic unit of society.

Keywords: sex-trafficking, survivor, family, social construction

Procedia PDF Downloads 563
270 Cybercrimes in Nigeria: Its Causes, Effects and Solutions

Authors: Uzoma Igboji

Abstract:

Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.

Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria

Procedia PDF Downloads 501
269 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method

Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López

Abstract:

The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.

Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people

Procedia PDF Downloads 97
268 State Violence: The Brazilian Amnesty Law and the Fight Against Impunity

Authors: Flavia Kroetz

Abstract:

From 1964 to 1985, Brazil was ruled by a dictatorial regime that, under the discourse of fight against terrorism and subversion, implemented cruel and atrocious practices against anyone who opposed the State ideology. At the same time, several Latin American countries faced dictatorial periods and experienced State repression through apparatuses of violence institutionalized in the very governmental structure. Despite the correspondence between repressive methods adopted by authoritarian regimes in States such as Argentina, Chile, El Salvador, Peru and Uruguay, the mechanisms of democratic transition adopted with the end of each dictatorship were significantly different. While some States have found ways to deal with past atrocities through serious and transparent investigations of the crimes perpetrated in the name of repression, in others, as in Brazil, a culture of impunity remains rooted in society, manifesting itself in the widespread disbelief of the population in governmental and democratic institutions. While Argentina, Chile, Peru and Uruguay are convincing examples of the possibility and importance of the prosecution of crimes such as torture, forced disappearance and murder committed by the State, El Salvador demonstrates the complete failure to punish or at least remove from power the perpetrators of serious crimes against civilians and political opponents. In a scenario of widespread violations of human rights, State violence becomes entrenched within society as a daily and even necessary practice. In Brazil, a lack of political and judicial will withstands the impunity of those who, during the military regime, committed serious crimes against human rights under the authority of the State. If the reproduction of violence is a direct consequence of the culture of denial and the rejection of everyone considered to be different, ‘the other’, then the adoption of transitional mechanisms that underpin the historical and political contexts of the time seems essential. Such mechanisms must strengthen democracy through the effective implementation of the rights to memory and to truth, the right to justice and reparations for victims and their families, as well as institutional changes in order to remove from power those who, when in power, could not distinguish between legality and authoritarianism. Against this background, this research analyses the importance of transitional justice for the restoration of democracy, considering the adoption of amnesty laws as a strategy to preclude criminal prosecution of offenses committed during dictatorial regimes. The study investigates the scope of Law No 6.683/79, the Brazilian amnesty law, which, according to a 2010 decision of the Brazilian Constitutional Supreme Court, granted amnesty to those responsible for political crimes and related crimes, committed between September 2, 1961 and August 15, 1979. Was the purpose of this Law to grant amnesty to violent crimes committed by the State? If so, is it possible to recognize the legitimacy of a Congress composed of indirectly elected politicians controlled by the dictatorship?

Keywords: amnesty law, criminal justice, dictatorship, state violence

Procedia PDF Downloads 422
267 The Ordinary Way of the Appeal in Penalty Part

Authors: Abdelkadir Elhaouari

Abstract:

The priciest thing in human life since his birth is his freedom, basing on this idea, the conflict exists till now, the fight against oppression, injustice, tyranny and slavery, searching for freedom and political resistances, and this makes the freedom is deeply related to the defense for its existence all over years. This project attempts using any way to preserve this freedom, and building and maintaining bases and rules to organize this life. Appeal is a one of the most important method that human uses to protect his freedom, and we will mention in this thesis our attempt to clarify this aspect to the individual. We can say that the law does not know just one color or one logic, and is not based on one rule to be taken by heart, but the law is neutrality, the diversity, abstraction and diligence diversity. The penal law is a valued law and it deserves to be studied and searched more… so that to attempt to master it. Our thesis is just a brief explanation of an important point in this law, where we attempt to clarify and simplify the image to the normal person, so that he can preserve his rights, and we hope that we had succeeded to choose the right topic for that.

Keywords: appeal, penalization, judgement, criminal

Procedia PDF Downloads 262
266 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria

Authors: Anyaogu Paul

Abstract:

The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.

Keywords: child labour, family income, national security, survey research

Procedia PDF Downloads 398
265 The Road to Abolition of Death Penalty in China: With the Perspective of the Ninth Amendment

Authors: Huang Gui

Abstract:

This paper supplies some possible approaches of the death penalty reform in China basic on the analyzing the reformation conducted by the Ninth Amendment. There now are 46 crimes punishable by death, and this penalty still plays a significant role in the criminal punishment structure. In order to abolish entirely the death penalty in Penal Code, the legislature of China should gradually abolish the death penalty for the nonviolent crimes and then for the nonlethal violent crimes and finally for the lethal violent crimes. In the case where the death penalty has not yet been abolished completely, increasing the applicable conditions of suspension of execution of death penalty and reducing the scope of applicable objects (elderly defendant and other kinds of special objects) of death penalty would be an effective road to control and limit the use of death penalty in judicial practice.

Keywords: death penalty, the eighth amendment, the ninth amendment, suspension of execution of death, immediate execution of death, China

Procedia PDF Downloads 445
264 Where the Girls Are: Gender Trends in Juvenile Crime

Authors: Revital Sela-Shayovitz

Abstract:

There is growing evidence that female rates of criminal nonlethal violent offending have increased during the 1990s. However, the debate regarding whether the gender gap in violence is closing is ongoing. This paper examines the trends in juvenile violent offending in Israel between the years 1996 and 2012. The findings indicate that female-to-male offending rate ratios have increased over time for simple assaults, aggravated assault, and knife crime. Moreover, the closing of the gender gap among youth (ages 12 to 14 years), principally results from the increase in female rates of offending, which is greater than the rise in male rates of offending. These findings are discussed in the context of existing research on the gender gap in the perpetration of violence with reference to future directions in research.

Keywords: gender violence, youth violence, crime rates, juvenile delinquency, crime policy

Procedia PDF Downloads 366
263 Shared Beliefs and Behavioral Labels in Bullying among Middle Schoolers: Qualitative Analysis of Peer Group Dynamics

Authors: Malgorzata Wojcik

Abstract:

Groups are a powerful and significant part of human development. They serve as major emergent microsocial structures in children’s and youth’s ecological system. During middle and secondary school, peer groups become a particularly salient influence. While they promote a range of prosocial and positive emotional and behavioral attributes, they can also elicit negative or antisocial attributes, effectively “bringing out the worst” in some individuals. The grounded theory approach was employed to guide data collection and analysis, as it allows for a deeper understanding of the group processes and students’ perspectives on complex intragroup relations. Students’ perspectives on bullying cases were investigated by observing daily interactions among those involved and interviewing 47 students. The results complement theories of labeling in bullying by showing that all students self-label themselves and find it difficult to break patterns of behaviors related to bullying, such as supporting the bully or not defending the victim. In terms of the practical implications, the findings indicate that it could be beneficial to use non-punitive, restorative anti-bullying interventions that implement peer influence to transform bullying relations by removing behavioral labels.

Keywords: bullying, peer group, victimization, class reputation

Procedia PDF Downloads 95
262 Edward Bond's Questioning of Existence in His Play 'Have I None?'

Authors: Aycan Gurluyer

Abstract:

21st-century theatre has been shaped by lots of world-changing forces devastating human psychology and existence. Accepted as the greatest living English playwright, it is post-war British dramatist Edward Bond who uses a late-21st-century apocalyptic landscape as a weapon to question the human existence in his play 'Have I None?'. In this play, he tries to underline the degenerating and destructive effects of the society and environment on a couple whose lives are changed by an unexpected and annoying stranger. As victim of the society and the cultural corruption, the three vulnerable Bondian characters struggle for their expectations to find a place in this fictional world by sacrificing their own lives. Set in the 2077’s world, the play depicts that rigidly formed rules of the system/authority eliminates the existence of humans. According to Bond, the fascist practices of the governments/systems make people paralyzed in any way, so they choose to deny all realities by becoming biological beings or they gather to commit to suicide as troops. Our main aim is to underscore the questioning of the human existence by drawing the socio-political framework of the era, the capitalist system’s dehumanized individuals and their defence to survive, and what reality is in the 21st century, by focusing on Bond’s hallucinatory and tragic vision of the future in 'Have I None?'.

Keywords: Edward Bond, apocalyptic, existence, Have I None?

Procedia PDF Downloads 117
261 The Gaps of Environmental Criminal Liability in Armed Conflicts and Its Consequences: An Analysis under Stockholm, Geneva and Rome

Authors: Vivian Caroline Koerbel Dombrowski

Abstract:

Armed conflicts have always meant the ultimate expression of power and at the same time, lack of understanding among nations. Cities were destroyed, people were killed, assets were devastated. But these are not only the loss of a war: the environmental damage comes to be considered immeasurable losses in the short, medium and long term. And this is because no nation wants to bear that cost. They invest in military equipment, training, technical equipment but the environmental account yet finds gaps in international law. Considering such a generalization in rights protection, many nations are at imminent danger in a conflict if the water will be used as a mass weapon, especially if we consider important rivers such as Jordan, Euphrates and Nile. The top three international documents were analyzed on the subject: the Stockholm Convention (1972), Additional Protocol I to the Geneva Convention (1977) and the Rome Statute (1998). Indeed, some references are researched in doctrine, especially scientific articles, to substantiate with consistent data about the extent of the damage, historical factors and decisions which have been successful. However, due to the lack of literature about this subject, the research tends to be exhaustive. From the study of the indicated material, it was noted that international law - humanitarian and environmental - calls in some of its instruments the environmental protection in war conflicts, but they are generic and vague rules that do not define exactly what is the environmental damage , nor sets standards for measure them. Taking into account the mains conflicts of the century XX: World War II, the Vietnam War and the Gulf War, one must realize that the environmental consequences were of great rides - never deactivated landmines, buried nuclear weapons, armaments and munitions destroyed in the soil, chemical weapons, not to mention the effects of some weapons when used (uranium, agent Orange, etc). Extending the search for more recent conflicts such as Afghanistan, it is proven that the effects on health of the civilian population were catastrophic: cancer, birth defects, and deformities in newborns. There are few reports of nations that, somehow, repaired the damage caused to the environment as a result of the conflict. In the pitch of contemporary conflicts, many nations fear that water resources are used as weapons of mass destruction, because once contaminated - directly or indirectly - can become a means of disguised genocide side effect of military objective. In conclusion, it appears that the main international treaties governing the subject mention the concern for environmental protection, however leave the normative specifications vacancies necessary to effectively there is a prevention of environmental damage in armed conflict and, should they occur, the repair of the same. Still, it appears that there is no protection mechanism to safeguard natural resources and avoid them to become a mass destruction weapon.

Keywords: armed conflicts, criminal liability, environmental damages, humanitarian law, mass weapon

Procedia PDF Downloads 396
260 Analysis of Maternal Death Surveillance and Response: Causes and Contributing Factors in Addis Ababa, Ethiopia, 2022

Authors: Sisay Tiroro Salato

Abstract:

Background: Ethiopia has been implementing the maternal death surveillance and response system to provide real-time actionable information, including causes of death and contributing factors. Analysis of maternal mortality surveillance data was conducted to identify the causes and underlying factors in Addis Ababa, Ethiopia. Methods: We carried out a retrospective surveillance data analysis of 324 maternal deaths reported in Addis Ababa, Ethiopia, from 2017 to 2021. The data were extracted from the national maternal death surveillance and response database, including information from case investigation, verbal autopsy, and facility extraction forms. The data were analyzed by computing frequency and presented in numbers, proportions, and ratios. Results: Of 324 maternal deaths, 92% died in the health facilities, 6.2% in transit, and 1.5% at home. The mean age at death was 28 years, ranging from 17 to 45. The maternal mortality ratio per 100,000 live births was 77for the five years, ranging from 126 in 2017 to 21 in 2021. The direct and indirect causes of death were responsible for 87% and 13%, respectively. The direct causes included obstetric haemorrhage, hypertensive disorders in pregnancy, puerperal sepsis, embolism, obstructed labour, and abortion. The third delay (delay in receiving care after reaching health facilities) accounted for 57% of deaths, while the first delay (delay in deciding to seek health care) and the second delay (delay in reaching health facilities) and accounted for 34% and 24%, respectively. Late arrival to the referral facility, delayed management after admission, andnon-recognition of danger signs were underlying factors. Conclusion: Over 86% of maternal deaths were attributed by avoidable direct causes. The majority of women do try to reach health services when an emergency occurs, but the third delays present a major problem. Improving the quality of care at the healthcare facility level will help to reduce maternal death.

Keywords: maternal death, surveillance, delays, factors

Procedia PDF Downloads 73
259 Practical Limitations of the Fraud Triangle Framework in Fraud Prevention

Authors: Alexander Glebovskiy

Abstract:

Practitioners charged with fraud prevention and investigation strongly rely on the Fraud Triangle framework developed by Joseph T. Wells in 1997 while analyzing the causes of fraud at business organizations. The Fraud Triangle model explains fraud by elements such as pressure, opportunity, and rationalization. This view is not fully suitable for effective fraud prevention as the Fraud Triangle model provides limited insight into the causation of fraud. Fraud is a multifaceted phenomenon, the contextual factors of which may not fit into any framework. Employee criminal behavior in business organizations is influenced by environmental, individual, and organizational aspects. Therefore, further criminogenic factors and processes facilitating fraud in organizational settings need to be considered in the root-cause analysis: organizational culture, leadership style, groupthink effect, isomorphic behavior, crime of obedience, displacement of responsibility, lack of critical thinking and unquestioning conformity and loyalty.

Keywords: criminogenesis, fraud triangle, fraud prevention, organizational culture

Procedia PDF Downloads 259
258 Existence of Financial Service Authority Prior to 2045

Authors: Syafril Hendrik Hutabarat, Hartiwiningsih, Pujiyono Suwadi

Abstract:

The Financial Service Authority (FSA) was formed as a response to the 1997 monetary crisis and the 2008 financial crisis so that it was more defensive in nature while developments in information and communication technology have required state policies to be more offensive to keep up with times. Reconstruction of Authorities of the FSA's Investigator is intended to keep the agency worthy to be part of an integrated criminal justice system in Indonesia which has implications for expanding its authority in line with efforts to protect and increase the welfare of the people. The results show that internal synergy between sub-sectors in the financial services sector is not optimised, some are even left behind so that the FSA is not truly an authority in the financial services sector. This research method is empirical. The goal of synergy must begin with internal synergy which has its moment when Indonesia gets a demographic bonus in the 2030s and becomes an international logistics hub supported by the national financial services sector.

Keywords: reconstruction, authorities, FSA investigators, synergy, demography

Procedia PDF Downloads 51
257 Femicide: The Political and Social Blind Spot in the Legal and Welfare State of Germany

Authors: Kristina F. Wolff

Abstract:

Background: In the Federal Republic of Germany, violence against women is deeply embedded in society. Germany is, as of March 2020, the most populous member state of the European Union with 83.2 million inhabitants and, although more than half of its inhabitants are women, gender equality was not certified in the Basic Law until 1957. Women have only been allowed to enter paid employment without their husband's consent since 1977 and have marital rape prosecuted only since 1997. While the lack of equality between men and women is named in the preamble of the Istanbul Convention as the cause of gender-specific, structural, traditional violence against women, Germany continues to sink on the latest Gender Equality Index. According to Police Crime Statistics (PCS), women are significantly more often victims of lethal violence, emanating from men than vice versa. The PCS, which, since 2015, also collects gender-specific data on violent crimes, is kept by the Federal Criminal Police Office, but without taking into account the relevant criteria for targeted prevention, such as the history of violence of the perpetrator/killer, weapon, motivation, etc.. Institutions such as EIGE or the World Health Organization have been asking Germany for years in vain for comparable data on violence against women in order to gain an overview or to develop cross-border synergies. The PCS are the only official data collection on violence against women. All players involved are depend on this data set, which is published only in November of the following year and is thus already completely outdated at the time of publication. In order to combat German femicides causally, purposefully and efficiently, evidence-based data was urgently needed. Methodology: Beginning in January 2019, a database was set up that now tracks more than 600 German femicides, broken down by more than 100 crime-related individual criteria, which in turn go far beyond the official PCS. These data are evaluated on the one hand by daily media research, and on the other hand by case-specific inquiries at the respective public prosecutor's offices and courts nationwide. This quantitative long-term study covers domestic violence as well as a variety of different types of gender-specific, lethal violence, including, for example, femicides committed by German citizens abroad. Additionallyalcohol/ narcotic and/or drug abuse, infanticides and the gender aspect in the judiciary are also considered. Results: Since November 2020, evidence-based data from a scientific survey have been available for the first time in Germany, supplementing the rudimentary picture of reality provided by PCS with a number of relevant parameters. The most important goal of the study is to identify "red flags" that enable general preventive awareness, that serve increasingly precise hazard assessment in acute hazard situations, and from which concrete instructions for action can be identified. Already at a very early stage of the study it could be proven that in more than half of all femicides with a sexual perpetrator/victim constellation there was an age difference of five years or more. Summary: Without reliable data and an understanding of the nature and extent, cause and effect, it is impossible to sustainably curb violence against girls and women, which increasingly often culminates in femicide. In Germany, valid data from a scientific survey has been available for the first time since November 2020, supplementing the rudimentary reality picture of the official and, to date, sole crime statistics with several relevant parameters. The basic research provides insights into geo-concentration, monthly peaks and the modus operandi of male violent excesses. A significant increase of child homicides in the course of femicides and/or child homicides as an instrument of violence against the mother could be proven as well as a danger of affected persons due to an age difference of five years and more. In view of the steadily increasing wave of violence against women, these study results are an eminent contribution to the preventive containment of German femicides.

Keywords: femicide, violence against women, gender specific data, rule Of law, Istanbul convention, gender equality, gender based violence

Procedia PDF Downloads 64
256 Data Mining Techniques for Anti-Money Laundering

Authors: M. Sai Veerendra

Abstract:

Today, money laundering (ML) poses a serious threat not only to financial institutions but also to the nation. This criminal activity is becoming more and more sophisticated and seems to have moved from the cliché of drug trafficking to financing terrorism and surely not forgetting personal gain. Most of the financial institutions internationally have been implementing anti-money laundering solutions (AML) to fight investment fraud activities. However, traditional investigative techniques consume numerous man-hours. Recently, data mining approaches have been developed and are considered as well-suited techniques for detecting ML activities. Within the scope of a collaboration project on developing a new data mining solution for AML Units in an international investment bank in Ireland, we survey recent data mining approaches for AML. In this paper, we present not only these approaches but also give an overview on the important factors in building data mining solutions for AML activities.

Keywords: data mining, clustering, money laundering, anti-money laundering solutions

Procedia PDF Downloads 514