Search results for: violent crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 658

Search results for: violent crime

268 Revolutionary Violence and Echoes of the «Thou Shalt Not Kill» Debate: A Tragic Reading of the Class Conflict in Colombia

Authors: Jaime Otavo

Abstract:

Oscar del Barco, a former member of Los Montoneros, an Argentine guerrilla group of the 1970s, published a letter in 2004 that sparked a heated debate in his country about revolutionary violence. Del Barco, on the subject of «No matarás» (Thou shalt not kill) –as this debate was known– wrote to Sergio Schmucler, his addressee, the following: "There is no 'ideal' that justifies the death of a man. The founding principle of any community is 'Thou shalt not kill'. Thou shalt not kill the man because every man is sacred, and every man is all men".In this paper, the «No matarás» debate will be used to problematize two interconnected ideas that, in Colombia, underpinned the use of revolutionary violence by the guerrilla movements that emerged in the 1970s. On the one hand, an anthropological optimism; on the other, a theological scheme of converting violence into justice. Based on this, two arguments are put forward: 1) that revolutionary violence arose from an ethical-political certainty, namely: the confidence in being on the right side of history (because the violent ones were others), but 2) that its persistence over time made visible a tragic element, that is, that the bipolarity between victim and executioner, good and evil, or friend and foe that is inscribed in the class struggle is a false dilemma for in the context of revolutionary violence –as in the context of Greek tragedy–, no one ever has to make a decision, nor can he do so. For this reason, it is maintained that the fundamental aspect about guerrilla violence in Colombia is that it imposed itself as a violence of negativity which not only exceeded the capacity of the extreme left to control its revolutionary praxis but also exploited the link with the political subjectivation to which it aspired, the proletariat as the gravedigger of the bourgeoisie.

Keywords: marxism, social movements, armed struggle, debate thou shalt not kill

Procedia PDF Downloads 76
267 Torture, Inhuman and Degrading Treatment in Nigeria: A Time for Legislative Intervention

Authors: Kolawole Oyekan

Abstract:

Torture, cruel, inhuman and degrading treatment is one of the issues dealt with by the United Nations in its development of human rights standard. Torture and other ill -treatments is banned at all times in all places including in times of war. There is no justification for torture, cruel, inhuman and degrading treatment under any law in Nigeria. All statutes; local, regional and international on human rights prohibits all forms of degrading treatment. This paper examines the definition of torture, inhuman and degrading treatment and the prevalence of confessional statements obtain through torture by security agencies during the interrogation of crime suspects and are mostly relied upon during trial even in cases involving capital punishment. The paper further reviews the Violence against Persons Prohibition Act 2015 which prohibits torture and other forms of ill-treatment. Presently, the Act is applicable only to the federal Federal Capital Territory, Abuja. Consequently, the paper concludes that the Act should be adopted as a matter of urgency by the 36 states of the Federation of Nigeria and in addition, cogent steps must be taken to ensure that the provisions of the Act are strictly complied with in order to eliminate torture, cruel and inhuman degrading treatment in Nigeria.

Keywords: confessional statement, human rights, torture, United Nations

Procedia PDF Downloads 302
266 Applying Massively Parallel Sequencing to Forensic Soil Bacterial Profiling

Authors: Hui Li, Xueying Zhao, Ke Ma, Yu Cao, Fan Yang, Qingwen Xu, Wenbin Liu

Abstract:

Soil can often link a person or item to a crime scene, which makes it a valuable evidence in forensic casework. Several techniques have been utilized in forensic soil discrimination in previous studies. Because soil contains a vast number of microbiomes, the analyse of soil microbiomes is expected to be a potential way to characterise soil evidence. In this study, we applied massively parallel sequencing (MPS) to soil bacterial profiling on the Ion Torrent Personal Genome Machine (PGM). Soils from different regions were collected repeatedly. V-region 3 and 4 of Bacterial 16S rRNA gene were detected by MPS. Operational taxonomic units (OTU, 97%) were used to analyse soil bacteria. Several bioinformatics methods (PCoA, NMDS, Metastats, LEfse, and Heatmap) were applied in bacterial profiles. Our results demonstrate that MPS can provide a more detailed picture of the soil microbiomes and the composition of soil bacterial components from different region was individualistic. In conclusion, the utility of soil bacterial profiling via MPS of the 16S rRNA gene has potential value in characterising soil evidences and associating them with their place of origin, which can play an important role in forensic science in the future.

Keywords: bacterial profiling, forensic, massively parallel sequencing, soil evidence

Procedia PDF Downloads 560
265 Aggressive Behavior Prevention: The Effect of Peace Education and Media Literacy towards Student's Understanding about Aggression

Authors: Dadang Gunawan, I. Dewa Ketut Kertawidana, Lufthi Noorfitriyani

Abstract:

For the last 5 years, there is the never-ending violent act and increased cases regarding aggressive behavior among high school students in Bogor, Indonesia. Those cases caused harm to many people, even death, and lead to the continuation circle of violence. This research was conducted to evaluate the effect of using peace education and media literacy in enhancing student’s understanding about aggression, as an effort to prevent aggressive behavior. In terms of methodology, this research was done by quasi-experiment with one group pretest and post-test design. A number of 38 students who were at risk of aggressive behavior from 3 vocational high school were involved to receive a 10 learning session about peace and media literacy. The aggression questionnaire was used to identify participants, supported by student’s record in school. To collect data, the questionnaire for measuring understanding about aggression has been developed and was used after the validity and reliability of this questionnaire tested. Post-test was carried out after the session ended. Data were analyzed using t-test. The finding result showed that the mean score of student’s understanding of aggression was increased, therefore learning session of peace education and media literacy is significantly effective to enhance student’s understanding of aggression. It also showed a meaningful difference of understanding between male and female student’s whereas female students have a better understanding of aggression.

Keywords: aggressive behavior prevention, aggression, media literacy, peace education, peacebuilding

Procedia PDF Downloads 178
264 The Evolution of Online Hate: How Decades of Tactical and Technological Innovation Created a Hate Epidemic

Authors: Kashvi Jain, Adam Burston

Abstract:

Right-wing social movements are a dominant force in American politics, as evidenced by the January 6th Insurrection, the prevalence of extremist conspiracy theories, and a nationwide surge in hate crime. Despite an abundance of scholarship on contemporary right-wing extremism, there is little scholarship that explains their rise. This paper examines how the white power movement developed through tactical innovation and strategic use of increasingly powerful digital technologies. Using qualitative content analysis of archived digital bulletin boards and websites, we examine right-wing extremists’ digital communication during three consequential time periods of tactical and technological innovation: pre-internet (1980s), web 1.0 (1990s), and web 2.0 (2000s). Our analysis suggests that right-wing activists innovatively exploited the features and affordances of digital technologies and their knowledge of free speech rights to spread supremacist collective identity and ideology. Beyond our empirical contribution, we offer policy advice that school administrators can employ to limit hate.

Keywords: leaderless resistance, technological affordances, anti-defamation league, white power movement, tactical

Procedia PDF Downloads 66
263 Threat of Islamic State of Khorasan in Pakistan and Afghanistan Region: Impact on Regional Security

Authors: Irfan U. Din

Abstract:

The growing presence and operational capacity of Islamic State aka Daesh, which emerged in Pak-Afghan region in 2015, poses a serious threat to the already fragile state of the security situation in the region. This paper will shed light on the current state of IS-K network in the Pak-Afghan region and will explain how its presence and operational capacity in the northern and central Afghanistan has increased despite intensive military operations against the group in Nangarhar province – the stronghold of IS-K. It will also explore the role of Pakistani Taliban in the emergence and expansion of IS-K in the region and will unveil the security implication of growing nexus of IS-K and transnational organized groups for the region in Post NATO withdrawal scenario. The study will be qualitative and will rely on secondary and primary data to explore the topic. For secondary data existing literature on the topic will be extensively reviewed while for primary data in-depth interviews will be conducted with subject experts, Taliban commanders, and field researchers.

Keywords: Islamic State of Khorasan (IS-K), North Atlantic Treaty Organization (NATO), Pak-Afghan Region, Transnational Organized Crime (TNOC)

Procedia PDF Downloads 289
262 River Analysis System Model for Proposed Weirs at Downstream of Large Dam, Thailand

Authors: S. Chuenchooklin

Abstract:

This research was conducted in the Lower Ping River Basin downstream of the Bhumibol Dam and the Lower Wang River Basin in Tak Province, Thailand. Most of the tributary streams of the Ping can be considered as ungauged catchments. There are 10- pumping station installation at both river banks of the Ping in Tak Province. Recently, most of them could not fully operate due to the water amount in the river below the level that would be pumping, even though included water from the natural river and released flow from the Bhumibol Dam. The aim of this research was to increase the performance of those pumping stations using weir projects in the Ping. Therefore, the river analysis system model (HEC-RAS) was applied to study the hydraulic behavior of water surface profiles in the Ping River with both cases of existing conditions and proposed weirs during the violent flood in 2011 and severe drought in 2013. Moreover, the hydrologic modeling system (HMS) was applied to simulate lateral streamflow hydrograph from ungauged catchments of the Ping. The results of HEC-RAS model calibration with existing conditions in 2011 showed best trial roughness coefficient for the main channel of 0.026. The simulated water surface levels fitted to observation data with R2 of 0.8175. The model was applied to 3 proposed cascade weirs with 2.35 m in height and found surcharge water level only 0.27 m higher than the existing condition in 2011. Moreover, those weirs could maintain river water levels and increase of those pumping performances during less river flow in 2013.

Keywords: HEC-RAS, HMS, pumping stations, cascade weirs

Procedia PDF Downloads 389
261 A Retrospective Study of the Effects of Xenophobia on South Africa-Nigeria Relations

Authors: O. Fayomi, F. Chidozie, C. Ayo

Abstract:

The underlying causes of xenophobia are complex and varied. Xenophobia has to do with being contemptuous of that which is foreign, especially of strangers or of people from different countries or cultures. Unemployment and mounting poverty among South Africans at the bottom of the economic ladder have provoked fears of the competition that better educated and experienced migrants can represent. South Africa’s long track-record of violence as a means of protest and the targeting of foreigners in particular, and, the documented tensions over migration policy and the scale of repatriation serve a very good explanation for its xenophobia. It was clear that while most of the attacks were directed against foreign, primarily African, migrants, this was not the rule. Attacks were also noted against Chinese-speakers, Pakistani migrants as well as against South Africans from minority language groups (in the conflict areas). Settlements that have recently experienced the expression of ‘xenophobic’ violence have also been the site of violent and other forms of protest around other issues, most notably service delivery. The failure of government in service delivery was vexed on this form of xenophobia. Due to the increase in migration, this conflict is certainly not temporary in nature. Xenophobia manifests in different regions and communities with devastating effects on the affected nationals. Nigerians living in South Africa have been objects of severe attacks and assault as a result of this xenophobic attitude. It is against this background that this study seeks to investigate the xenophobic attacks against Nigerians in South Africa. The methodology is basically qualitative with the use of secondary sources such as books, journals, newspapers and internet sources.

Keywords: xenophobia, unemployment, poverty, Nigeria, South Africa

Procedia PDF Downloads 469
260 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 326
259 The Connection between Heroism and Violence in War Narratives from the Aspect of Rituals

Authors: Rita Fofai

Abstract:

The aim of the study is to help peacebuilding by analyzing the symbolical level of fights in the war. Despite the sufferings, war heroism still represents such a noble value in war narratives (especially in literature and films, whether it is high- or popular culture) which can make warfare attractive for every age-group. The questions of the study will revolve around the events when heroism is not a necessary and unselfish act for a greater good, but when the primary aim is to express strength in order to build self-mythology. Since war is a scene where the mythological level can meet reality, and even modern narratives use the elements of rituals and sacral references in even secular contexts, understanding the connection between rites and modern battles will ground this study, and the analysis will follow the logic of the violent rites. From this aspect, war is not merely the fight for different countries and ideas, but the fight of mankind with superhuman and natural or supernatural phenomena, as well. In this context, enemy symbolizes the threat of the world which is unpredictable for mankind, and the fight becomes a ritual combat; therefore the winner’s symbolic reward is to redefine himself or herself not only in the human environment but in the context of the whole world. The analysis of the study reveals that this kind of violence does not represents real heroism and rarely results in recruitment, on the contrary, conserves fear and the feeling of weakness, which is the root cause of this kind of act. The result of this study is a way to reshape the attitude toward so-called heroic war violence which is often a part of war narratives even nowadays. Since stepping out of the war tradition is mainly a cultural question, redefining the connection between society and narratives which has an effect on mentality and emotions, giving a clear guide to making difference between heroism and useless violence is very important in peacebuilding.

Keywords: war, ritual, heroism, violence, narratives, culture

Procedia PDF Downloads 126
258 Psychotraumatology: The Relationship Between Posttraumatic Stress Disorder and Criminal Justice Involvement in Vietnam War Veterans

Authors: Danielle Page

Abstract:

Foregoing studies, statistics, and medical evaluations have established a relationship between Posttraumatic stress disorder (PTSD) and criminal justice involvement in Vietnam veterans. War is highly trauma inducing and can leave combat veterans with mental disorders ranging from psychopathic thoughts to suicidal ideation. The majority of those suffering are unaware that they have PTSD, and as a coping mechanism, they often turn to self isolation. Beyond isolation, many veterans with symptomatic PTSD turn to aggression and substance abuse to cope with their internal agony. The most common crimes committed by veterans with PTSD fall into the assault and drug/alcohol abuse categories. Thus, a relationship is established between veteran populations and the criminal justice system. This dissertation aims to define the relationship between PTSD and criminal justice involvement in veterans, explore the mediating factors in this relationship, and analyze numerous court cases in this subject area. Further, it will examine the ways in which crime rates can be reduced for veterans with symptoms of PTSD. This ranges from the improvement of healthcare systems to the implementation of special courts to handle veteran cases.

Keywords: psychotraumatology, forensic psychology, PTSD, vietnam veterans

Procedia PDF Downloads 80
257 Measures for Limiting Corruption upon Migration Wave in Europe

Authors: Jordan Georgiev Deliversky

Abstract:

Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.

Keywords: corruption, influence, human smuggling, legislation, migration

Procedia PDF Downloads 351
256 Analysis to the Characterization of Self-Esteem of Students in Eulogio 'Amang' Rodriguez Institute of Science and Technology: A Foundation of Conceptualizing Substantial Plan of Action

Authors: Eriberto R. Astorga Jr., Herbert D. Vertucio, Evelyn M. Polison

Abstract:

This study was conducted in order to determine the analysis with regards to the Characterization of Self-Esteem of EARIST Students according to their origin of self-esteem and low self-esteem as well as its causes. The respondents of this study are three thousand three hundred twenty three (3,323) randomly selected students from eight colleges of EARIST such as Arts and Sciences, Education, Public Administration and Criminology, Business Administration, Hospitality Management, Architecture and Fine Arts, Engineering, and Industrial Technology. A survey was conducted by using a validated questionnaire for information gathering about respondents profile and different factors relating to self-esteem of students such as self-origin, familial and social relationship, financial situation and education. Frequency, percentage, ranking and standards deviation, standard t-test and ANOVA were applied to investigate the differences of the answers of the respondents to the origin of their self-esteem and the reasons for low self-esteem. The results revealed that there are no significant differences in the origin of their self-esteem and the reasons of low esteem as to the eight group of respondent’s. Moreover, most causes of low esteem are caused by hearing a comment or experiencing an incident that has a negative impact student mentally and emotionally, poor health, being bullied, lack of support from family, friends, and job loss, experiencing verbal and sexual abuse and are in a violent relationship, feelings of isolation, divorce, dysfunctional family, death and lack of achievement at work and at school, trying to conform to stereotypes and prove our independence from our parents.

Keywords: characterization, plan of action, profile, self-esteem

Procedia PDF Downloads 173
255 Choosing the Lesser Evil: Tribal Alignment Formation in Civil Wars

Authors: Busra Nur Ozguler Aktel

Abstract:

This research aims to understand the factors that affect the ways in which tribes perceive and respond to violent conflicts in fragile states, given that tribes are essential stakeholders in many conflict-ridden fragile states, whether Afghanistan, Iraq, Syria, Libya, Somalia, Nigeria, or Yemen. It explores the primary questions of why some tribes align with extremist groups while others align with states during civil wars and why some tribes switch alignments. It argues that tribes form and switch alignments based on their perception of threats to their traditional tribal structure (internal dynamics) and clientelist relationships (external dynamics). Put differently; threat perceptions lead them to choose either the state or extremist groups that will more likely secure their traditional structure and patronage networks. This study focuses on Iraqi tribes as a case study. It builds a theory of tribal alignment formation based on ethnographic fieldwork in the Middle East, with a particular focus on Iraqi Sunni tribes living in the Kurdish region of Iraq and Jordan. As a result of the interviews with tribal leaders and members, local journalists, researchers, and politicians, it concludes that complex (re)alignments of tribes can determine the course and outcome of the conflicts, either mitigating or escalating violence. This study contributes to the larger body of conflict management and peacebuilding literature by introducing tribes as non-state actors and exploring their interactions with other actors in civil wars.

Keywords: civil wars, tribes, alignment formation, side-switching, Iraq

Procedia PDF Downloads 87
254 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 90
253 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method

Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López

Abstract:

The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.

Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people

Procedia PDF Downloads 127
252 Muddle Effort for Organized Crime in India: Social Work Concern for Anti Human Trafficking Unit

Authors: Rajkamal Ajmeri, Leena Mehta

Abstract:

Growing magnitude of human trafficking is the indicatory symptom of ill society. Despite of many treaties, legislation and protocols control over human trafficking require additional attention. However, many Anti Human Trafficking Units (AHTU) are working throughout India but it is a fact that incidence pertaining to illegal human trade is not fully under control. Social work as discipline and practice base profession has a lot of concern about situation and the trafficked victims. United state put Indian in tier II watch list because they are not fully complying with the minimum standard of Trafficking Victims Protection laws but they are making a significant effort to bring themselves into compliance with those standards. In order to solve the issue, scientific research of experiences and opinions of government / non government machineries can play an effective role in raising the standard legislation for trafficked victims. Proper study can enhance understanding on various problems faced by government machineries. The study can help in developing the scientific model, which can effectively solve the problem in human trafficking field.

Keywords: human trafficking, legislations, victims, social work, government machinery

Procedia PDF Downloads 297
251 A Progressive Techno-Legal Framework for Digital Evidence Management

Authors: Ayobami P. Olatunji, Saadat Ibiyeye, Abdulaziz Ibiyeye, Tahir M. Khan

Abstract:

Digital evidence has become a cornerstone in criminal investigations due to the vast amount of information available in digital form. Despite its prevalence, this evidence is often met with skepticism in court proceedings because of its inherently volatile nature. Traditional forensic processes, defined predominantly by technology experts, emphasize technical details in evidence collection while often neglecting legal procedures. This gap can pose significant challenges for legal practitioners in understanding and applying digital forensics. As digital evidence increasingly influences future cases, a cohesive framework integrating both technical and legal perspectives is essential. We propose a comprehensive techno-legal framework designed to bridge this gap. Our framework integrates key aspects of collection, preservation, examination, and documentation with legal components such as case building, certificate of compliance, cross-examination, and authorization. This balanced approach aims not to replace existing evidence presentation principles but to enhance the seamless integration of digital evidence into legal proceedings, addressing the common issues that lead to its dismissal.

Keywords: evidence presentation, warrant, digital-forensic, certificate of compliance, legal procedures, computer crime, violation, investigation cybercrime

Procedia PDF Downloads 30
250 The Rise of Populist Right-Wing Parties in Western Europe: A Case Study of the Front National in France

Authors: Jessica Da Silva

Abstract:

This paper examines France as a microcosm of the rise of right-wing populism in the broader European context. The attack on the Charlie Hebdo newspaper is arguably, a reaction to the aggressive European secularism spreading throughout Europe that sees its true enemy in the growth of extremist and violent interpretations of Islam. With each terrorist attack, the popularity of anti-immigrant policies and ideologies increases. What ultimately drives movements like the French National Front are the concepts of monoculture and ethnic identity. This paper analyses the character of right-wing populist parties using the National Front as a case study. Such parties generate anxiety and resentment by fomenting an irrational fear of the ‘other’. In this way, populists promote their identity on the basis of xenophobia, Islamophobia, and practices of social exclusion against targeted out-groups. They position immigrants and foreigners as ‘others’, claiming they are a threat to native cultures and a source of social and economic strife. Ultimately, right-wing populism exerts a negative influence over the democratic framework in Europe and opposes the European Union’s integration project. Right-wing populism attacks this supranational model because of its alleged inefficiency and departure from what it considers to be 'authentic' European traditions and citizenship. In this context, understanding the rise of radical right-wing populist parties is extremely important for the future of Europe, democracy and multiculturalism.

Keywords: cultural identity, Europeanization, front national, immigration, integration, Islamophobia, multiculturalism, nationalism, right-wing populist parties, xenophobia

Procedia PDF Downloads 353
249 'Infection in the Sentence': The Castration of a Black Woman's Dream of Authorship as Manifested in Buchi Emecheta's Second Class Citizen

Authors: Aseel Hatif Jassam, Hadeel Hatif Jassam

Abstract:

The paper discusses the phallocentric discourse that is challenged by women in general and of women of color in particular in spite of the simultaneity of oppression due to race, class, and gender in the diaspora. Therefore, the paper gives a brief account of women's experience in the light of postcolonial feminist theory. The paper also cast light on the theories of Luce Irigaray and Helen Cixous, two Feminist theorists who support and advise women to have their own discourse to challenge the infectious patriarchal sentence advocated by Sigmund Freud and Harold Bloom's model of literary history. Black women authors like BuchiEmecheta as well as her alter ego Adah, a Nigerian-born girl and the protagonist of her semi-autobiographical novel, Second Class Citizen, suffer from this phallocentric and oppressive sentence and displacement as they migrate from Nigeria, a former British colony where they feel marginalized to North London with the hope of realizing their dreams. Yet, in the British diaspora, they get culturally shocked and continue to suffer from further marginalization due to class and race and are insulted and interiorized ironically by their patriarchal husbands who try to put an end to their dreams of authorship. With the phallocentric belief that women aren't capable of self-representation in the background of their mindsets, the violent Sylvester Onwordi and Francis Obi, the husbands of both Emecheta and Adah, respectively have practiced oppression on them by burning their own authoritative voice, represented by the novels they write while they are struggling with their economically atrocious living experience in the British diaspora.

Keywords: authorship, British diaspora, discourse, phallocentric, patriarchy

Procedia PDF Downloads 176
248 The Applicability of Western Environmental Criminology Theories to the Arabic Context

Authors: Nawaf Alotaibi, Andy Evans, Alison Heppenstall, Nick Malleson

Abstract:

Throughout the last two decades, motor vehicle theft (MVT) has accounted for the largest proportion of property crime incidents in Saudi Arabia (SA). However, to date, few studies have investigated SA’s MVT problem. Those that have are primarily focused on the characteristics of car thieves, and most have overlooked any spatial-temporal distribution of MVT incidents and the characteristics of victims. This paper represents the first step in understanding this problem by reviewing the existing MVT studies contextualised within the theoretical frameworks developed in environmental criminology theories – originating in the West – and exploring to what extent they are relevant to the SA context. To achieve this, the paper has identified a range of key features in SA that are different from typical Western contexts, that could limit the appropriateness and capability of applying existing environmental criminology theories. Furthermore, despite these Western studies reviewed so far having introduced a number of explanatory variables for MVT rates, a range of significant elements are apparently absent in the current literature and this requires further analysis. For example, almost no attempts have been made to quantify the associations between the locations of vehicle theft, recovery of stolen vehicles, joyriding and traffic volume.

Keywords: environmental criminology theories, motor vehicle theft, Saudi Arabia, spatial analysis

Procedia PDF Downloads 297
247 Impact of Chimerism on Y-STR DNA Determination: Sex Mismatch Analysis

Authors: Anupuma Raina, Ajay P. Balayan, Prateek Pandya, Pankaj Shrivastava, Uma Kanga, Tulika Seth

Abstract:

DNA fingerprinting analysis aids in personal identification for forensic purposes and has always been a driving motivation for law enforcement agencies in almost all countries since its inception. The introduction of DNA markers (Y-STR) has allowed for greater precision and higher discriminatory power in forensic testing. A criminal/ person committing crime after bone marrow transplantation is a rare situation but not an impossible one. Keeping such a situation in mind, a study was carried out to find out the best biological sample to be used for personal identification, especially in forensic situation. We choose a female patient (recipient) and a male donor. The pre transplant sample (blood) and post transplant samples (blood, buccal swab, hair roots) were collected from the recipient (patient). The same were compared with the blood sample of the donor using DNA FP technique. Post transplant samples were collected at different interval of time (15, 30, 60, and 90 days). The study was carried out using Y-STR kit at 23 loci. The results determined discusses the phenomenon of chimerism and its impact on Y-STR. Hair sample was found the most suitable sample which had no donor DNA profiling up to 90 days.

Keywords: bone marrow transplantation, chimerism, DNA profiling, Y-STR

Procedia PDF Downloads 144
246 An International Comparison of Forensic Identification Evidence Legislation: Balancing Community Interests and Individual Rights

Authors: Marcus Smith

Abstract:

DNA profiling has made a valuable contribution to criminal investigations over the past thirty years. Direct matching DNA profiles from a crime scene and suspect, or between a suspect and a database remain of great importance to crimes such as murder, assault, and property theft. As scientific and technological advancement continues, a wide range of new DNA profiling applications has been developed. The application of new techniques involves an interesting balancing act between admitting probative evidence in a criminal trial, evaluating its degree of relevance and validity, and limiting its prejudicial impact. The impact of new DNA profiling applications that have significant implications for law enforcement and the legal system can be evaluated through a review of relevant case law, legislation and the latest empirical evidence from jurisdictions around the world including the United States, United Kingdom, and Australia. There are benefits in further examining the implications of these new developments, including how the criminal law can best be adapted to ensure that new technology is used to enhance criminal investigation and prosecution while ensuring it is applied in a measured way that respects individual rights and maintains principles of fairness enshrined in the legal system.

Keywords: criminal procedure, forensic evidence, DNA profiling, familial searching, phenotyping

Procedia PDF Downloads 130
245 Foreign Television Programme Contents and Effects on Youths

Authors: Eyitayo Francis Adanlawo

Abstract:

Television is one of humanity’s most important means of communication, a channel through which societal norms and values can be transferred to youths. The imagination created by foreign television programmes ultimately leads to strong emotional responses. Though some foreign films and programmes are educational in nature, the view that the majority of them are inimical to the youths’ positive-believe-system is rife. This has been occasioned by the adoption of repugnant alien cultures, imitation of vulgar slangs, weird hairdo and most visibly an adjustment in values. This study theoretically approaches two research questions: do youths act out the life style of characters seeing in foreign films? Is moral decadence, indiscipline, and vulgar habits being the results of the contents of foreign programmes and films? To establish the basis for relating foreign films watched to social vices as violence, sexual pervasiveness, cultural and traditional moral pollution on youths; Observational learning Theory and Reinnforcement Theory were utilized to answer the research questions and established the effect of foreign films content on youths. We conclude that constant showcasing of violent themes was highly responsible for the upsurge in social vices prevalent among the youths and can destroy the basis of the societal, cultural orientation. Recommendations made range from the need for government to halt the importation of foreign films not censored; the need for local films to portray more positive messages and the need for concrete steps to be taken to eradicate or minimise the use of programme capable of exerting negative influence.

Keywords: media (television), moral decadence, youths, values, observation learning theory, reinforcement theory

Procedia PDF Downloads 252
244 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation

Authors: Aditi Chauhan, Neethu S. Mohan

Abstract:

In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.

Keywords: documents, identity, computational system, suspect

Procedia PDF Downloads 175
243 Effectiveness of a Communication Training on Workplace Bullying Using Mobile Phone Application for Nurses

Authors: Jiyeon Kang, Yeon Jin Jeong, Hoon Heo

Abstract:

Purpose: Bullying in nursing workplace has been a serious problem that increases the turnover of nurses. Few studies have examined the effects of communication training on workplace bullying for nurses, and all used a single-group design and a small sample size. Thus, more rigorous research has been needed to evaluate the effects properly. This research was aimed to identify the effects of the mobile type communication training of responses on bullying behaviors among nurses. Methods: A randomized controlled trial was performed. Subjects were 62 critical care nurses working in university hospitals in Busan, South Korea. We developed a mobile phone application to train nurses to deal with bullying situation. This application includes 6 common bullying situations and appropriate empathetic communication (non-violent communication) samples in the form of webtoons. The experimental group used this application for 4 weeks, and we measured interpersonal relationship, workplace bullying, symptom experience, and intention to leave before, post, and 8 weeks after the intervention from both experimental and control groups. The effect of the intervention was analyzed using repeated measures ANOVA. Results: The mobile type communication training developed in this study was effective for decreasing nurses’ intention to leave workplace (F = 5.11, p = .027). However, it had no effect on interpersonal relationship (F = 2.54, p = .116), workplace bullying (F = 2.99, p = .089) or symptom experience (F = 2.81, p = .099). The beneficial effects on intention to leave lasted at least up to 4 weeks after the training. Conclusion: The mobile type communication training can be utilized as an effective personal coping strategy for workplace bullying among nurses. Further studies on the long-term effects of the communication training are necessary.

Keywords: bullying, communication, mobile applications, nurses, training, workplace

Procedia PDF Downloads 328
242 Disrupting Patriarchy: Transforming Gender Oppression through Dialogue between Women and Men at a South African University

Authors: S. van Schalkwyk

Abstract:

On international levels and across disciplines gender scholars have argued that patriarchal scripts of masculinity and femininity are harmful as they negatively impact constructions of selfhood and relations between women and men. Patriarchal ideologies serve as a scaffolding for dominance and subordination and fuel violence against women. Toxic masculinity—social discourses of men as violent, unemotional, and sexually dominant—are embedded in South African culture and are rooted in the high rates of gender violence occurring in the country. Finding strategies that can open up space for the interrogation of toxic masculinity is crucial in order to disrupt the destructive consequences of patriarchy in educational and social contexts. The University of the Free State (UFS) in South Africa in collaboration with the non-profit organization Gender Reconciliation International conducted a year-long series of workshops with male and female students. The aim of these workshops was to facilitate healing between men and women through collective dialogue processes. Drawing on a collective biography methodology outlined by feminist poststructuralists, this paper explores the impact of these workshops on gender relations. Findings show that the students experienced significant psychological connections with others during these dialogues, through which they began to interrogate their own gendered conditioning and harmful patriarchal assumptions and practices. This paper enhances insights into the possibilities for disrupting patriarchy in South African universities through feminist collective research efforts.

Keywords: collective biography methodology, South Africa, toxic masculinity, transforming gender oppression, violence against women

Procedia PDF Downloads 479
241 Prevalence of Drug Injection among Male Prisoners in the West of Iran

Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh

Abstract:

Background: Substance addiction is one of the major worldwide problems that destroys economy, familial relationships, and the abuser’s career and has several side effects; in the meantime drug injection due to the possibility of shared use of syringes among drug users could have multiple complications to be followed. The purpose of this study was to determine the prevalence of drug injection among male prisoners in Kermanshah city, the west of Iran. Methods: In this cross-sectional study 615 male prisoners were randomly selected to participate voluntarily in the study. Participants filled out a writing self-report questionnaire. Data were analyzed by the SPSS software (ver. 21.0) at 95% significant level. Results: The mean age of respondents was 31.13 years [SD: 7.76]. Mean initiation age for drug use was 14.36 years (range, 9-34 years). Almost, 39.4 % reported a history of drug use before prison. Opium (33.2%) and crystal (27.1%) was the most used drug among prisoners. Furthermore, 9.3 % had a history of injection addiction. There was a significant correlation between age, crime type, marital status, economic status, unprotected sex and drug injection (P < 0.05). Conclusion: The low age of drug abuse and the prevalence of drug injection among offenders can be as a warning for responsible; in this regard, implementation of prevention programs to risky behavior and harm reduction among high-risk groups can follow useful results.

Keywords: substance abuse, drug injection, prison, Iran

Procedia PDF Downloads 483
240 The Vulnerability of Climate Change to Farmers, Fishermen and Herdsmen in Nigeria

Authors: Nasiru Medugu Idris

Abstract:

This research is aimed at assessing the vulnerability of climate change to rural communities (farmers, herdsmen and fishermen) in Nigeria with the view to study the underlying causes and degree of vulnerability to climate change and examine the conflict between farmers and herdsmen as a result of climate change. This research employed the use of quantitative and qualitative means of data gathering techniques as well as physical observations. Six states (Kebbi, Adamawa, Nasarawa, Osun, Ebonyi, and Akwa Ibom) have been selected on the ground that they are key food production areas in the country and are therefore essential to continual food security in the country. So also, they also double as fishing communities in order to aid the comprehensive study of all the effects on climate on farmers and fishermen alike. Community focus group discussions were carried out in the various states for an interactive session and also to have firsthand information on their level of awareness on climate change. Climate data from the Nigerian Meteorological Agency over the past decade were collected for the purpose of analyzing trends in climate. The study observed that the level of vulnerability of rural dwellers most especially farmers, herdsmen and fishermen to climate change is very high due to their socioeconomic, ethnic and historical perspective of their trend. The study, therefore, recommends that urgent step needs to be put in place to help control natural hazards and man-made disasters and serious measures are also needed in order to minimize severe societal, economic and political crises; some of which may either escalate to violent conflicts or could be avoided by efforts of conflict resolution and prevention by the initiation of a process of de-escalation. So this study has recommended the best-fit adaptive and mitigation measures to climate change vulnerability in rural communities of Nigeria.

Keywords: adaptation, farmers, fishermen, herdsmen

Procedia PDF Downloads 190
239 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks

Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla

Abstract:

A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.

Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional

Procedia PDF Downloads 411