Search results for: crime motivations
326 Influences of Victimization Experiences on Delinquency: Comparison between Young Offenders and Non-Offenders
Authors: Yoshihiro Horio
Abstract:
Many young offenders grow up in difficult environments. It has often been suggested that many young offenders are victims of abuse. However, there were restricted to abuse or family’s problem. Little research has examined data on ‘multiple victimization’ experiences of young offenders. Thus, this study investigated the victimization experiences of young offenders, including child abuse at home, bullying at school, and crime in the community. Specifically, the number of victimization experiences of young offenders was compared with those of non-delinquents at home, school, and in the community. It was found that young offenders experienced significantly more victimization than non-delinquents. Additionally, the influence of childhood victimization on later misconduct and/or delinquency was examined, then it was founded that victimization experiences to be a risk factor for subsequent delinquency. The hierarchical multiple regression analysis showed that young offenders who had a strong emotional reaction to their experience of abuse began their misconduct at an earlier age. If juveniles start their misconduct early, the degree of delinquency will increase. The anger of young offenders was stronger than that of non-delinquents. A strong emotion of anger may be related to juvenile delinquency.Keywords: abuse, bullying, delinquency, victimization, young offenders
Procedia PDF Downloads 243325 Partnerships between Public Administration and Private Social Investment for Territorial Development: Lessons after 15 Brazilian Cases
Authors: Graziela D. de Azevedo, Livia M. Pagotto, Mario P. Monzoni, Neto
Abstract:
This article aims to discuss partnerships between public administration and private social investment aimed at territorial development. There has been some approximation in Brazil from private social investors with initiatives aiming at territorial development policies in highly vulnerable territories or in places where the business sector operates. This represents this paper’s major justification: on the advance of academic debate about how businesses, institutes, and foundations have been working alongside local governments, taking the territory as the reference for joint action. The research was based on the literature on governance and territorial development and adopted a mixed iterative approach (inductive and deductive) through an interpretative lens so as to develop an analysis structure that complements and expands knowledge about the contribution of public policies and private social investments for territorial development in Brazil. The analysis of 15 cases based on three distinct blocks (territorial development plans, articulation for education, and thematic approaches) has made it possible to identify common elements regarding the motivations of partnerships, the specific needs of the actors involved, and the priority drivers for stimulating development. Findings include discussion on the leading role of territories in their development paths, on the institutionalization and strengthening of capacities, and on long-term perspectives in development strategies.Keywords: private social investment, public administration, territorial governance, territorial development
Procedia PDF Downloads 213324 An Investigation of Tourists’ Destination Loyalty: A Case Study of Bangkok, Thailand
Authors: Sukritta Larsen, Kevin Wongleedee
Abstract:
The purposes of this research were to study tourists’ destination loyalty from the perspective of international tourists in Bangkok and to study the level of interest to revisit Bangkok in the near future. A probability random sampling of 200 international tourists was utilized. Half of the sample group was male and the other half was female. A Likert-five-scale questionnaire was designed to collect the data and small in-depth interviews were also used to obtain their opinions. The findings revealed that the majority of respondents had a medium level of loyalty. When examined in detail, the destination loyalty indicators can be ranked according to the mean average from high to low as follows: to recommend the visit, to say positive things, to revisit in the next three years, to refer the information, and to plan to visit regularly. Finally, the findings from the in-depth interviews with small group of international tourists revealed that the major obstacles that prevented many international tourists who may interested in revisiting Thailand included traffic congestions, high crime rate, and political instability.Keywords: destination loyalty, international tourists, revisit, Bangkok
Procedia PDF Downloads 338323 Web-Based Criminal Diary: Paperless Criminal Evidence for Federal Republic of Nigeria
Authors: Yekini Nureni Asafe, Haastrup Victor Adeleye, Ikotun Abiodun Motunrayo, Ojo Olanrewaju
Abstract:
Web Based Criminal Diary is a web based application whereby data of criminals been convicted by a judge in the court of law in Nigeria are shown to the entire public. Presently, criminal records are kept manually in Nigeria, which means when a person needs to be investigated to know if the person has a criminal record in the country, there is need to pass through different manual processes. With the use of manual record keeping, the criminal records can easily be manipulated by people in charge. The focus of this research work is to design a web-based application system for criminal record in Nigeria, towards elimination of challenges (such as loss of criminal records, in-efficiency in criminal record keeping, data manipulation, and other attendant problems of paper-based record keeping) which surrounds manual processing currently in use. The product of this research work will also help to minimize crime rate in our country since the opportunities and benefits lost as a result of a criminal record create will a lifelong barriers for anyone attempting to overcome a criminal past in our country.Keywords: court of law, criminal, criminal diary, criminal evidence, Nigeria, web-based
Procedia PDF Downloads 320322 Gender Disparity in Film Industries: A Conceptual Study
Authors: Daniel Edem Adzovie, Jakub Kudlac
Abstract:
The subtle institutionalization of male dominance in the film industry in the 1930s and its rippling effect of gender imbalance especially, regarding female active participation in film industries across the globe in terms of number and influence, is a worrying trend. The main purpose of the study is to explore the role of gender themes, especially patriarchal themes in films, in influencing the disparity experienced in film industries. Partially, we examine the motivations vis-à-vis the demotivating factors that attract and or refract females from enrolling in film schools against their male contemporaries. Employing a qualitative inquiry with a specific focus on document analysis as well as experts’ opinions in order to ascertain the antecedents and consequences of patriarchal themes in films on female participation in film industries, we drew extant literature from reputable databases such as EBSCO, Scopus, Web of Science, ERIH Plus, Google Scholar as well as notable books on gender and film. Secondly, we conceptualized a research model for a future qualitative research design that could take into consideration a study from at least three different film industries and analyze using thematic analysis. This could help validate the proposed conceptual model of the study. The literature review revealed that culture, to a large extent, influences the patriarchal themes conveyed in films, which inhibits active female participation in film industries. Research implications have been discussed.Keywords: film industry, female, gender, male dominance, patriarchal themes
Procedia PDF Downloads 136321 Advocating in the Criminal Justice System for Individuals Who Use Drugs: Advice from Advocates in the Greater Vancouver Area
Authors: Haley Hrymak
Abstract:
For decades drug addiction has been understood to be a health problem and not a social problem. While research has advanced to allow for a more comprehensive understanding of the factors affecting addiction, the justice system has lagged behind. Given all that is known about addiction as a health issue and the need for effective rehabilitation to prevent further involvement with crime, there is a need for a dramatic shift in order to ensure individual's human right to health is being upheld within the Canadian criminal justice system. This research employs the qualitative methodology to interview advocates who work with substance users within the Greater Vancouver area to explore best practices for representing individuals with substance abuse issues within the Canadian justice system. The research shows that treatment, not punishment, is what is needed in order for recidivism to be reduced for individuals with substance abuse issues. The creative options that advocates employ to work within the current system are intended to provide a guide for lawyers working within the current criminal justice system.Keywords: addiction, criminal law, right to health, rehabilitation
Procedia PDF Downloads 146320 Cataphora in English and Chinese Conversation: A Corpus-based Contrastive Study
Authors: Jun Gao
Abstract:
This paper combines the corpus-based and contrastive approaches, seeking to provide a systematic account of cataphora in English and Chinese natural conversations. Based on spoken corpus data, the first part of the paper examines a range of characteristics of cataphora in the two languages, including frequency of occurrence, patterns, and syntactic features. On the basis of this exploration, cataphora in the two languages are contrasted in a structured way. The analysis shows that English and Chinese share a similar distribution of cataphora in natural conversations in terms of frequency of occurrence, with repeat identification cataphora higher than first mention cataphora and intra-sentential cataphora much higher than inter-sentential cataphora. In terms of patterns, three types are identified in English, i.e. P+N, Ø+N, and it+Clause, while in Chinese, two types are identified, i.e., P+N and Ø+N. English and Chinese are similar in terms of syntactic features, i.e., cataphor and postcedent in the intra-sentential cataphora mainly occur in the initial subject position of the same clause, with postcedent immediately followed or delayed, and cataphor and postcedent are mostly in adjacent sentences in inter-sentential cataphora. In the second part of the paper, the motivations of cataphora are investigated. It is found that cataphora is primarily motivated by the speaker and hearer’s different knowledge states with regard to the referent. Other factors are also involved, such as interference, word search, and the tension between the principles of Economy and Clarity.Keywords: cataphora, contrastive study, motivation, pattern, syntactic features
Procedia PDF Downloads 81319 Content Based Face Sketch Images Retrieval in WHT, DCT, and DWT Transform Domain
Authors: W. S. Besbas, M. A. Artemi, R. M. Salman
Abstract:
Content based face sketch retrieval can be used to find images of criminals from their sketches for 'Crime Prevention'. This paper investigates the problem of CBIR of face sketch images in transform domain. Face sketch images that are similar to the query image are retrieved from the face sketch database. Features of the face sketch image are extracted in the spectrum domain of a selected transforms. These transforms are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Walsh Hadamard Transform (WHT). For the performance analyses of features selection methods three face images databases are used. These are 'Sheffield face database', 'Olivetti Research Laboratory (ORL) face database', and 'Indian face database'. The City block distance measure is used to evaluate the performance of the retrieval process. The investigation concludes that, the retrieval rate is database dependent. But in general, the DCT is the best. On the other hand, the WHT is the best with respect to the speed of retrieving images.Keywords: Content Based Image Retrieval (CBIR), face sketch image retrieval, features selection for CBIR, image retrieval in transform domain
Procedia PDF Downloads 493318 The 'Currency' of Dolus Eventualis Considered during Sentencing for Murder
Authors: Reuben Govender
Abstract:
Culpability is an essential element for an accused to be held liable for a crime. The mental element or mens rea determines blameworthiness of an accused on a charge of killing a person. The mens rea required for a conviction of murder is intent while culpable homicide requires negligence. Central to blameworthiness in mens rea is individual freedom and voluntariness. The test for intent is subjective and objective for negligence. This paper presents a review of dolus eventualis in the context of murder trials and from a South African perspective. This paper poses a central questions namely, is dolus eventualis a ‘weaker currency’ during sentencing for murder? This paper attempts to answer this question by reviewing the concept of dolus eventualis, the test in judicial application, a review of decided South African cases in its application, its incorrect application and finally, considerations for its correct application. Lastly, the ‘weight’ of a dolus eventualis conviction in terms of sentencing will be reviewed to support the central question which is answered in the negative.Keywords: dolus eventualis, dolus indeterminatus, dolus generalis, mens rea
Procedia PDF Downloads 234317 IIROC's Enforcement Performance: Funnel in, Funnel out, and Funnel away
Authors: Mark Lokanan
Abstract:
The paper analyzes the processing of complaints against investment brokers and dealer members through the Investment Industry Regulatory Organization of Canada (IIROC) from 2008 to 2017. IIROC is the self-regulatory organization (SRO) that is responsible for policing investment dealers and brokerage firms that trade in Canada’s securities market. Data from the study came from IIROC's enforcement annual reports for the years examined. The case processing is evaluated base on the misconduct funnel that was originally designed for street crime and applies to the enforcement of investment fraud. The misconduct funnel is used as a framework to examine IIROC’s claim that it brought in more complaints (funnel in) than government regulators and shows how these complaints are funneled out and funneled away as they are processed through IIROC’s enforcement system. The results indicate that IIROC is ineffective in disciplining its members and is unable to handle the more serious quasi-criminal and improper sales practices offenses. It is hard not to see the results of the paper being used by the legislator in Ottawa to show the importance of a federal securities regulatory agency such as the Securities and Exchange Commission (SEC) in the United States.Keywords: investment fraud, securities regulation, compliance, enforcement
Procedia PDF Downloads 161316 School-Outreach Projects to Children: Lessons for Engineering Education from Questioning Young Minds
Authors: Niall J. English
Abstract:
Under- and post-graduate training can benefit from a more active learning style, and most particularly so in engineering. Despite this, outreach to young children in primary and secondary schools is less-developed in terms of its documented effectiveness, especially given new emphasis placed within the third level and advanced research program’s on Education and Public Engagement (EPE). Bearing this in mind, outreach and school visits form the basis to ascertain how active learning, careers stimulus and EPE initiatives for young children can inform the university sector, helping to improve future engineering-teaching standards, and enhancing both quality and practicalities of the teaching-and-learning experience. Indeed, engineering-education EPE/outreach work has been demonstrated to lead to several tangible benefits and improved outcomes, such as greater engagement and interest with science/engineering for school-children, careers awareness, enabling teachers with strong contributions to technical knowledge of engineering subjects, and providing development of general professional skills for engineering, e.g., communication and teamwork. This intervention involved active learning in ‘buzz’ groups for young children of concepts in gas engineering, observing their peer interactions to develop university-level lessons on activity learning. In addition, at the secondary level, careers-outreach efforts have led to statistical determinations of motivations towards engineering education and training, which aids in the redesign of engineering curricula for more active learning.Keywords: outreach, education and public engagement, careers, peer interactions
Procedia PDF Downloads 120315 The Nature of Origin of New Criminal Occurrences in Gjakova Region: Cultural and Criminological “Intersection” in 1999-2009
Authors: Bekim Avdiaj
Abstract:
The transition period of Kosovo society brought fundamental changes in all the spheres of organizing life. This was the period when also in the cultural tradition the biggest movement and an emerging from ‘isolation’ or from the ‘shell’ occurred. Transformation of the traditional and embracing of the modern began here. The same was experienced and is currently being experienced also by Gjakova and its surrounding which is historically renowned for its great tradition and culture. The population of this region is actually facing a transition from the traditional system into the modern one and quite often with huge leaps. These ‘movements’ or ‘evolutions’ of the society of this region, besides the numerous positive things it ‘harvested’, also brought things that do not at all correspond with their tradition as well as new criminal occurrences which in the past were not present in this area. Furthermore, some of the ‘new’ behaviours that are embraced from other ‘cultures’ and ‘civilizations’, and which are often exceeded, are quite perturbing. The security situation is also worrying, particularly following the appearance of some new criminal occurrences. Therefore, with this research paper we will strive to analyse the new cultural “intersections” as well as the nature of the origin of some new very worrying criminal occurrences. We will present there also some factors inciting into these occurrences, which were confessed by the persons involved in these criminal occurrences and who come from this very region.Keywords: crime, occurrence, culture, Gjakova Region
Procedia PDF Downloads 351314 The Decline of Verb-Second in the History of English: Combining Historical and Theoretical Explanations for Change
Authors: Sophie Whittle
Abstract:
Prior to present day, English syntax historically exhibited an inconsistent verb-second (V2) rule, which saw the verb move to the second position in the sentence following the fronting of a type of phrase. There was a high amount of variation throughout the history of English with regard to the ordering of subject and verb, and many explanations attempting to account for this variation have been documented in previous literature. However, these attempts have been contradictory, with many accounts positing the effect of previous syntactic changes as the main motivations behind the decline of V2. For instance, morphosyntactic changes, such as the loss of clitics and the loss of empty expletives, have been loosely connected to changes in frequency for the loss of V2. The questions surrounding the development of non-V2 in English have, therefore, yet to be answered. The current paper aims to bring together a number of explanations from different linguistic fields to determine the factors driving the changes in English V2. Using historical corpus-based methods, the study analyses both quantitatively and qualitatively the changes in frequency for the history of V2 in the Old, Middle, and Modern English periods to account for the variation in a range of sentential environments. These methods delve into the study of information structure, prosody and language contact to explain variation within different contexts. The analysis concludes that these factors, in addition to changes within the syntax, are responsible for the position of verb movement. The loss of V2 serves as an exemplar study within the field of historical linguistics, which combines a number of factors in explaining language change in general.Keywords: corpora, English, language change, mixed-methods, syntax, verb-second
Procedia PDF Downloads 135313 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns
Authors: Vitali Kremez
Abstract:
The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.Keywords: bitcoin, cybercrime, ransomware, Russia
Procedia PDF Downloads 195312 Cosmetic Surgery on the Rise: The Impact of Remote Communication
Authors: Bruno Di Pace, Roxanne H. Padley
Abstract:
Aims: The recent increase in remote video interaction has increased the number of requests for teleconsultations with plastic surgeons in private practice (70% in the UK and 64% in the USA). This study investigated the motivations for such an increase and the underlying psychological impact on patients. Method: An anonymous web-based poll of 8 questions was designed and distributed to patients seeking cosmetic surgery through social networks in both Italy and the UK. The questions gathered responses regarding 1. Reasons for pursuing cosmetic surgery; 2. The effects of delays caused by the SARS-COV-2 pandemic; 3. The effects on mood; 4. The influence of video conferencing on body-image perception. Results: 85 respondents completed the online poll. Overall, 68% of respondents stated that seeing themselves more frequently online had influenced their decision to seek cosmetic surgery. The types of surgeries indicated were predominantly to the upper body and face (82%). Delays and access to surgeons during the pandemic were perceived as negatively impacting patients' moods (95%). Body-image perception and self-esteem were lower than in the pre-pandemic, particularly during lockdown (72%). Patients were more inclined to undergo cosmetic surgery during the pandemic, both due to the wish to improve their “lockdown face” for video conferencing (77%) and also due to the benefits of home recovery while in smart working (58%). Conclusions: Overall, findings suggest that video conferencing has led to a significant increase in requests for cosmetic surgery and the so-called “Zoom Boom” effect.Keywords: cosmetic surgery, remote communication, telehealth, zoom boom
Procedia PDF Downloads 179311 Software Vulnerability Markets: Discoverers and Buyers
Authors: Abdullah M. Algarni, Yashwant K. Malaiya
Abstract:
Some of the key aspects of vulnerability-discovery, dissemination, and disclosure-have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In some of these markets, the exchange is regulated, but in others, there is little or no regulation. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous individuals. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored. Reports of buying and selling of the vulnerabilities are now appearing in the press; however, the existence of such markets requires validation, and the natures of the markets need to be analysed. To address this need, we have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located in Eastern and Western Europe and in the Far East. We have contacted several of them in order to collect first-hand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. The paper identifies the actual vulnerability markets, rather than the hypothetical ideal markets that are often examined. The emergence of worldwide government agencies as vulnerability buyers has significant implications. We discuss potential factors that can impact the risk to society and the need for detailed exploration.Keywords: risk management, software security, vulnerability discoverers, vulnerability markets
Procedia PDF Downloads 253310 Aggression, Satisfaction and Online Rant Engagement of College Students in General Santos City
Authors: Amanda Andrea Beatrix Brita, Dominic J. Buenaventura, Charmaine A. Seromines, Antonne Noel V. Chua, Ma. Luisa G. Badilles
Abstract:
Online ranting, or the act of forcefully expressing your opinion towards other people over the Internet, has been an ongoing issue ever since the creation of the Internet. Due to the COVID-19 pandemic, the rise of active users has been observed to have increased during this time, thus increasing the number of people being engaged in online activities, which consequently affects the number of individuals who participate in online ranting. However, with all that is observed, what is usually not a topic being discussed about this event are the motivations that lead people to do online ranting. The study was undertaken to discover the level of aggression, Satisfaction, and online engagement in their environment. We utilized 2 researcher-made questionnaires that were validated by three experts, namely for the Satisfaction and engagement levels. We adapted Cyber-Aggression Typology Questionnaire (CATQ) for the level of aggression. Quota sampling was used in determining the respondents. A quota of 250 students was recommended. The results showed that the students in every institution have a deficient level of aggression, and the majority of the institution has a shallow level of Satisfaction when it comes to online ranting. Similar findings are presented in the level of engagement; 2 out of 3 of the institution students have shallow engagement in the general settings that expound students' engagement. Although the result shows deficient levels, there are still instances and possibilities that students may still engage in an online rant regarding various circumstances when triggered. Researchers assumed that there are restrictions on movements likely to show opinions online because of consequences.Keywords: aggression, satisfaction, online rant engagement, online rant
Procedia PDF Downloads 77309 The Use of Self-Determination Theory to Assess the Opportunities and Challenges for Blended E-Learning in Egypt: An Analysis of the Motivations of Logistics Lecturers
Authors: Aisha Tarek Noour, Nick Hubbard
Abstract:
Blended e-Learning (BL) is proving to be an effective pedagogical tool in many areas of business and management education, but there remains a number of barriers to overcome before its implementation. This paper seeks to analyse the views of lecturers towards BL according to Self-Determination Theory (SDT), and identifies the opportunities and challenges for using BL in Logistics Education in an Egyptian higher education establishment. SDT is approached from a different perspective and the relationship between intrinsic motivation (IM), extrinsic motivation (EM), and amotivation (AM) is analysed and related to the opportunities and challenges of the BL method. The case study methodology comprises of a series of interviews with lecturers employed at three Colleges of International Transport and Logistics (CITLs) at the Arab Academy for Science, Technology, Maritime and Transport (AAST&MT) in Egypt. A structured face-to-face interview was undertaken with 61 interviewees across all faculty positions: Deans, Associate Professors, Assistant Professor, Department Heads, Part-time instructors, Teaching Assistants, and Graduate Teaching Assistants. The findings were based on "content analysis" of the interview transcripts and use of the NVivo10 software program. The research contributes to the application of SDT within the field of BL through an analysis of the views of lecturers towards the opportunities and challenges that BL offers to logistics educators in Egypt.Keywords: intrinsic motivation, extrinsic motivation, amotivation, autonomy, competence, relatedness, self-determination theory and blended e-learning
Procedia PDF Downloads 440308 Herbal Based Fingerprint Powder Formulation for Latent Fingermark Visualization: Catechu (Kattha)
Authors: Pallavi Thakur, Rakesh K. Garg
Abstract:
Latent fingerprints are commonly encountered evidence at the scene of the crime. It is very important to decipher these fingerprints in order to explore their identity and a lot of research has been made on the visualization of latent fingermarks on various substrates by numerous researchers. During the past few years large number of powder formulations has been evolved for the development of latent fingermarks on different surfaces. This paper reports a new and simple fingerprint powder which is non-toxic and has been employed on different substrates successfully for the development and visualization of latent fingermarks upto the time period of twelve days in varying temperature conditions. In this study, a less expensive, simple and easily available catechu (kattha) powder has been used to decipher the latent fingermarks on different substrates namely glass, plastic, metal, aluminium foil, white paper, wall tile and wooden sheet. It is observed that it gives very clear results on all the mentioned substrates and can be successfully used for the development and visualization of twelve days old latent fingermarks in varying temperature conditions on wall tiles.Keywords: fingermarks, catechu, visualization, aged fingermarks
Procedia PDF Downloads 189307 Torture, Inhuman and Degrading Treatment in Nigeria: A Time for Legislative Intervention
Authors: Kolawole Oyekan
Abstract:
Torture, cruel, inhuman and degrading treatment is one of the issues dealt with by the United Nations in its development of human rights standard. Torture and other ill -treatments is banned at all times in all places including in times of war. There is no justification for torture, cruel, inhuman and degrading treatment under any law in Nigeria. All statutes; local, regional and international on human rights prohibits all forms of degrading treatment. This paper examines the definition of torture, inhuman and degrading treatment and the prevalence of confessional statements obtain through torture by security agencies during the interrogation of crime suspects and are mostly relied upon during trial even in cases involving capital punishment. The paper further reviews the Violence against Persons Prohibition Act 2015 which prohibits torture and other forms of ill-treatment. Presently, the Act is applicable only to the federal Federal Capital Territory, Abuja. Consequently, the paper concludes that the Act should be adopted as a matter of urgency by the 36 states of the Federation of Nigeria and in addition, cogent steps must be taken to ensure that the provisions of the Act are strictly complied with in order to eliminate torture, cruel and inhuman degrading treatment in Nigeria.Keywords: confessional statement, human rights, torture, United Nations
Procedia PDF Downloads 306306 Applying Massively Parallel Sequencing to Forensic Soil Bacterial Profiling
Authors: Hui Li, Xueying Zhao, Ke Ma, Yu Cao, Fan Yang, Qingwen Xu, Wenbin Liu
Abstract:
Soil can often link a person or item to a crime scene, which makes it a valuable evidence in forensic casework. Several techniques have been utilized in forensic soil discrimination in previous studies. Because soil contains a vast number of microbiomes, the analyse of soil microbiomes is expected to be a potential way to characterise soil evidence. In this study, we applied massively parallel sequencing (MPS) to soil bacterial profiling on the Ion Torrent Personal Genome Machine (PGM). Soils from different regions were collected repeatedly. V-region 3 and 4 of Bacterial 16S rRNA gene were detected by MPS. Operational taxonomic units (OTU, 97%) were used to analyse soil bacteria. Several bioinformatics methods (PCoA, NMDS, Metastats, LEfse, and Heatmap) were applied in bacterial profiles. Our results demonstrate that MPS can provide a more detailed picture of the soil microbiomes and the composition of soil bacterial components from different region was individualistic. In conclusion, the utility of soil bacterial profiling via MPS of the 16S rRNA gene has potential value in characterising soil evidences and associating them with their place of origin, which can play an important role in forensic science in the future.Keywords: bacterial profiling, forensic, massively parallel sequencing, soil evidence
Procedia PDF Downloads 564305 Discursive Construction of Strike in the Media Coverage of Academic Staff Union of Universities vs Federal Government of Nigeria Industrial Conflict of 2013
Authors: Samuel Alaba Akinwotu
Abstract:
Over the years, Nigeria’s educational system has greatly suffered from the menace of industrial conflict. The smooth running of the nation’s public educational institutions has been hampered by incessant strikes embarked upon by workers of these institutions. Even though industrial conflicts in Nigeria have enjoyed wide reportage in the media, there has been a dearth of critical examination of the language use that index the conflict’s discourse in the media. This study which is driven by a combination of Critical Discourse Analysis (CDA) and Conceptual Metaphor (CM) examines the discursive and ideological features of language indexing the industrial conflict between the Academic Staff Union of Universities (ASUU) and the Federal Government of Nigeria (FGN) in 2013. It aims to identify and assess the conceptual and cognitive motivations of the stances expressed by the parties and the public and the role of the media in the management and resolution of the conflict. For data, media reports and readers’ comments were purposively sampled from six print and online news sources (The Punch, This Day, Vanguard, The Nation, Osun Defender and AITonline) published between July and December 2013. The study provides further insight into industrial conflict and proves to be useful for the management and resolution of industrial conflicts especially in our public educational institutions.Keywords: industrial conflict, critical discourse analysis, conceptual metaphor, federal government of Nigeria, academic staff union of universities
Procedia PDF Downloads 143304 Beliefs about the God of the Other in Intergroup Conflict: Experimental Results from Israel and Palestine
Authors: Crystal Shackleford, Michael Pasek, Allon Vishkin, Jeremy Ginges
Abstract:
In the Middle East, conflict is often viewed as religiously motivated. In this context, an important question is how we think the religion of the other drives their behavior. If people see conflicts as religious, they may expect the belief of the other to motivate intergroup bias. Beliefs about the motivations of the other impact how we engage with them. Conflict may result if actors believe the other’s religion promotes parochialism. To examine how actors on the ground in Israel-Palestine think about the God of the other as it relates to the other’s behavior towards them, we ran two studies in winter 2019 with an online sample of Jewish Israelis and fieldwork with Palestinians in the West Bank. We asked participants to predict the behavior of an outgroup member participating in an economic game task, dividing the money between themselves and another person, who is either an ingroup or outgroup member. Our experimental manipulation asks participants to predict the behavior of the other when the other is thinking of their God. Both Israelis and Palestinians believed outgroup members would show in-group favoritism, and that group members would give more to their in-group when thinking of their God. We also found that participants thought outgroup members would give more to their own ingroup when thinking of God. In other words, Palestinians predicted that Israelis would give more to fellow Israelis when thinking of God, but also more to Palestinians. Our results suggest that religious belief is seen to promote universal moral reasoning, even in a context with over 70 years of intense conflict. More broadly, this challenges the narrative that religion necessarily motivates intractable conflict.Keywords: conflict, psychology, religion, meta-cognition, morality
Procedia PDF Downloads 138303 Influential Elements Shaping Intra-Regional Migration Within the Higher Education Landscape of Kashmir
Authors: Tasaduk Musood
Abstract:
In the dynamic landscape of higher education, intra-regional migration within Kashmir represents a complex interplay of influential elements. This qualitative research study aims to explore and analyze the multifaceted factors that significantly shape the patterns and motivations driving students' migration within the region. The study employed a qualitative research approach. The research is carried out with a sample of 60 participants, consisting of 30 male and 30 female students selected from various higher education institutions in the Punjab region. Through self-structured interviews and thematic analysis, the research unravels the underlying drivers, aspirations, challenges, and opportunities that underpin the phenomenon of intra-regional migration in the Kashmiri higher education landscape. The results of this study are expected to offer valuable insights for policymakers, educational institutions, and stakeholders to better understand, address, and potentially enhance the experiences and outcomes of shareholders of students engaged in intra-regional mobility within Kashmir's higher education domain. This study's findings aim to contribute significantly to the existing body of knowledge surrounding intra-regional migration within Kashmir's higher education landscape, offering a nuanced understanding of the drivers behind student mobility. Ultimately, this research endeavors to facilitate more informed and effective decision-making in addressing the evolving dynamics of intra-regional migration in Kashmir's higher education sector.Keywords: intra-regional migration, student migration patterns, student mobility, higher education, kashmir
Procedia PDF Downloads 79302 The Role of the Tehran Conservatory Program in Providing a Supportive, Adaptable Music Learning Environment for Children with Autism Spectrum Disorder and Their Families
Authors: Ailin Agaahi, Nafise Daneshvar Hoseini, Shahnaz Tamizi, Mehrdad Sabet
Abstract:
Music education has been recognized as a valuable therapeutic and educational intervention for children with Autism Spectrum Disorder (ASD). This study explores the experiences and perceptions of parents whose children with ASD have participated in music lessons at the Tehran Conservatory. The aim is to understand the impacts and barriers of this educational approach, providing insights into the real-world experiences of families integrating music into the lives of their children. Qualitative research was conducted through in-depth interviews with parents of children with ASD enrolled in the Tehran Conservatory's music program. The interviews examined parental motivations, observations of their child's progress, and evaluations of the program's effectiveness. Preliminary findings suggest that the music program positively impacts social interaction, emotional regulation, and communication. Parents highlighted the program's adaptability to meet the unique needs of children with ASD and the supportive environment fostered by specialized instructors. However, several barriers were identified, including the need for greater awareness and acceptance of music education for children with ASD and the limited availability of similar programs in the region. This research contributes valuable insights from parents and caregivers, emphasizing the importance of inclusive and effective music programs to support the needs of children with ASD and their families.Keywords: autism spectrum disorder, music education, therapeutic intervention, parental perspectives
Procedia PDF Downloads 19301 An Explanatory Study into the Information-Seeking Behaviour of Egyptian Beggars
Authors: Essam Mansour
Abstract:
The key purpose of this study is to provide first-hand information about beggars in Egypt, especially from the perspective of their information seeking behaviour including their information needs. The researcher tries to investigate the information-seeking behaviour of Egyptian beggars with regard to their thoughts, perceptions, motivations, attitudes, habits, preferences as well as challenges that may impede their use of information. The research methods used were an adapted form of snowball sampling of a heterogeneous demographic group of participants in the beggary activity in Egypt. This sampling was used to select focus groups to explore a range of relevant issues. Data on the demographic characteristics of the Egyptian beggars showed that they tend to be men, mostly with no formal education, with an average age around 30s, labeled as low-income persons, mostly single and mostly Muslims. A large number of Egyptian beggars were seeking for information to meet their basic needs as well as their daily needs, although some of them were not able to identify their information needs clearly. The information-seeking behaviour profile of a very large number of Egyptian beggars indicated a preference for informal sources of information over formal ones to solve different problems and meet the challenges they face during their beggary activity depending on assistive devices, such as mobile phones. The high degree of illiteracy and the lack of awareness about the basic rights of information as well as information needs were the most important problems Egyptian beggars face during accessing information. The study recommended further research to be conducted about the role of the library in the education of beggars. It also recommended that beggars’ awareness about their information rights should be promoted through educational programs that help them value the role of information in their life.Keywords: user studies, information-seeking behaviour, information needs, information sources, beggars, Egypt
Procedia PDF Downloads 319300 The Evolution of Online Hate: How Decades of Tactical and Technological Innovation Created a Hate Epidemic
Authors: Kashvi Jain, Adam Burston
Abstract:
Right-wing social movements are a dominant force in American politics, as evidenced by the January 6th Insurrection, the prevalence of extremist conspiracy theories, and a nationwide surge in hate crime. Despite an abundance of scholarship on contemporary right-wing extremism, there is little scholarship that explains their rise. This paper examines how the white power movement developed through tactical innovation and strategic use of increasingly powerful digital technologies. Using qualitative content analysis of archived digital bulletin boards and websites, we examine right-wing extremists’ digital communication during three consequential time periods of tactical and technological innovation: pre-internet (1980s), web 1.0 (1990s), and web 2.0 (2000s). Our analysis suggests that right-wing activists innovatively exploited the features and affordances of digital technologies and their knowledge of free speech rights to spread supremacist collective identity and ideology. Beyond our empirical contribution, we offer policy advice that school administrators can employ to limit hate.Keywords: leaderless resistance, technological affordances, anti-defamation league, white power movement, tactical
Procedia PDF Downloads 69299 Threat of Islamic State of Khorasan in Pakistan and Afghanistan Region: Impact on Regional Security
Authors: Irfan U. Din
Abstract:
The growing presence and operational capacity of Islamic State aka Daesh, which emerged in Pak-Afghan region in 2015, poses a serious threat to the already fragile state of the security situation in the region. This paper will shed light on the current state of IS-K network in the Pak-Afghan region and will explain how its presence and operational capacity in the northern and central Afghanistan has increased despite intensive military operations against the group in Nangarhar province – the stronghold of IS-K. It will also explore the role of Pakistani Taliban in the emergence and expansion of IS-K in the region and will unveil the security implication of growing nexus of IS-K and transnational organized groups for the region in Post NATO withdrawal scenario. The study will be qualitative and will rely on secondary and primary data to explore the topic. For secondary data existing literature on the topic will be extensively reviewed while for primary data in-depth interviews will be conducted with subject experts, Taliban commanders, and field researchers.Keywords: Islamic State of Khorasan (IS-K), North Atlantic Treaty Organization (NATO), Pak-Afghan Region, Transnational Organized Crime (TNOC)
Procedia PDF Downloads 290298 The Information-Seeking Behaviour of Kuwaiti Judges (KJs)
Authors: Essam Mansour
Abstract:
The key purpose of this study is to show information-seeking behaviour of Kuwaiti Judges (KJs). Being one of the few studies about the information needs and information-seeking behaviour conducted in Arab and developing countries, this study is a pioneer one among many studies conducted in information seeking, especially with this significant group of information users. The authors tried to investigate this seeking behavior in terms of KJs' thoughts, perceptions, motivations, techniques, preferences, tools and barriers met when seeking information. The authors employed a questionnaire, with a response rate 77.2 percent. This study showed that most of KJs were likely to be older, educated and with a work experience ranged from new to old experience. There is a statistically reliable significant difference between KJs' demographic characteristics and some sources of information, such as books, encyclopedias, references and mass media. KJs were using information moderately to make a decision, to be in line with current events, to collect statistics and to make a specific/general research. The office and home were the most frequent location KJs were accessing information from. KJs' efficiency level of the English language is described to be moderately good, and a little number of them confirmed that their efficiency level of French was not bad. The assistance provided by colleagues, followed by consultants, translators, sectaries and librarians were found to be most strong types of assistance needed when seeking information. Mobile apps, followed by PCs, information networks (the Internet) and information databases were the highest technology tool used by KJs. Printed materials, followed by non-printed and audiovisual materials were the most preferred information formats KJs use. The use of languages, the recency of information and the place of information, the deficit role of the library to deliver information were at least significant barriers to KJs when seeking information.Keywords: information users, information-seeking behaviour, information needs, judges, Kuwait
Procedia PDF Downloads 307297 Harnessing Entrepreneurial Opportunities for National Security
Authors: Itiola Kehinde Adeniran
Abstract:
This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment
Procedia PDF Downloads 330