Search results for: corruption criminal act
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 732

Search results for: corruption criminal act

252 Democratic Political Culture of the 5th and 6th Graders under the Authority of Dusit District Office, Bangkok

Authors: Vilasinee Jintalikhitdee, Phusit Phukamchanoad, Sakapas Saengchai

Abstract:

This research aims to study the level of democratic political culture and the factors that affect the democratic political culture of 5th and 6th graders under the authority of Dusit District Office, Bangkok by using stratified sampling for probability sampling and using purposive sampling for non-probability sampling to collect data toward the distribution of questionnaires to 300 respondents. This covers all of the schools under the authority of Dusit District Office. The researcher analyzed the data by using descriptive statistics which include arithmetic mean, standard deviation, and inferential statistics which are Independent Samples T-test (T-test) and One-Way ANOVA (F-test). The researcher also collected data by interviewing the target groups, and then analyzed the data by the use of descriptive analysis. The result shows that 5th and 6th graders under the authority of Dusit District Office, Bangkok have exposed to democratic political culture at high level in overall. When considering each part, it found out that the part that has highest mean is “the constitutional democratic governmental system is suitable for Thailand” statement. The part with the lowest mean is “corruption (cheat and defraud) is normal in Thai society” statement. The factor that affects democratic political culture is grade levels, occupations of mothers, and attention in news and political movements.

Keywords: democratic, political culture, political movements, democratic governmental system

Procedia PDF Downloads 262
251 Face Recognition Using Eigen Faces Algorithm

Authors: Shweta Pinjarkar, Shrutika Yawale, Mayuri Patil, Reshma Adagale

Abstract:

Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this, demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application. Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this , demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application.

Keywords: face detection, face recognition, eigen faces, algorithm

Procedia PDF Downloads 355
250 Causal Relationship between Macro-Economic Indicators and Fund Unit Price Behaviour: Evidence from Malaysian Equity Unit Trust Fund Industry

Authors: Anwar Hasan Abdullah Othman, Ahamed Kameel, Hasanuddeen Abdul Aziz

Abstract:

In this study, an attempt has been made to investigate the relationship specifically the causal relation between fund unit prices of Islamic equity unit trust fund which measure by fund NAV and the selected macro-economic variables of Malaysian economy by using VECM causality test and Granger causality test. Monthly data has been used from Jan, 2006 to Dec, 2012 for all the variables. The findings of the study showed that industrial production index, political election and financial crisis are the only variables having unidirectional causal relationship with fund unit price. However, the global oil prices is having bidirectional causality with fund NAV. Thus, it is concluded that the equity unit trust fund industry in Malaysia is an inefficient market with respect to the industrial production index, global oil prices, political election and financial crisis. However, the market is approaching towards informational efficiency at least with respect to four macroeconomic variables, treasury bill rate, money supply, foreign exchange rate and corruption index.

Keywords: fund unit price, unit trust industry, Malaysia, macroeconomic variables, causality

Procedia PDF Downloads 465
249 A Historical Overview of the General Implementation of the European Union Market Abuse Directive in the United Kingdom before the Brexit and Its Future Implications

Authors: Howard Chitimira

Abstract:

The European Union (EU) was probably the first body to establish multinational anti-market abuse laws aimed at enhancing the detection and curbing of cross-border market abuse activities in its member states. Put differently, the EU Insider Dealing Directive was adopted in 1989 and was the first law that harmonised the insider trading ban among the EU member states. Thereafter, the European Union Directive on Insider Dealing and Market Manipulation (EU Market Abuse Directive) was adopted in a bid to improve and effectively discourage all the forms of market abuse in the EU’s securities and financial markets. However, the EU Market Abuse Directive had its own gaps and flaws. In light of this, the Market Abuse Regulation and the Criminal Sanctions for Market Abuse Directive were enacted to repeal and replace the EU Market Abuse Directive in 2016. The article examines the adequacy of the EU Market Abuse Directive and its implementation in the United Kingdom (UK) prior to the British exit (Brexit). This is done to investigate the possible implications of the Brexit referendum outcome of 23 June 2016 on the future regulation of market abuse in the UK.

Keywords: market abuse, insider trading, market manipulation, European Union, United Kingdom

Procedia PDF Downloads 248
248 Feasibility Studies in Public Construction Projects in South Africa: Barriers and Implications

Authors: Kenneth O. Otasowie, Matthew Ikuabe, Clinton Aigbavboa, Ayodeji Oke

Abstract:

The practice of feasibility studies plays a huge role in the success of construction projects. Feasibility studies according to several research should be the reason for embarking on any project. However, it has been discovered that in South Africa (SA), feasibility studies are mainly done in the private sector construction but skipped in the construction of most public projects. Hence, this study aims to evaluate the barriers to feasibility studies practice in public projects and the implications. A survey design was adopted. A total number of One hundred and fifty (150) questionnaires were administered to Quantity Surveyors, Construction managers, Construction project managers, Project managers, Architects and Civil and Structural engineers in Guateng Province, SA and ninety (90) were returned and found suitable for analysis. Collected data was analysed using percentage, mean item score, standard deviation, one-sample t-test. The findings show that political interference and corruption are the most significant barriers to feasibility studies practice in the public construction projects in SA, while late project completion, poor quality infrastructure are among the implication of not conducting feasibility studies in SA public projects. Therefore, the study recommends the development of a framework for public projects execution that will reduce the interference of the political class in the country, that way the risk of late project completion and poor quality infrastructure will be mitigated.

Keywords: arriers, feasibility studies, public construction, South Africa.

Procedia PDF Downloads 86
247 Aliens in Space: Reflections on an Applied Theatre Project in a Medium Secure Hospital

Authors: Ashley Barnes

Abstract:

This paper will consider the ways in which varied notions of Space played a central role in a 12-week drama project with patients in a Medium Secure Hospital in the UK. In the project, the patients devised and performed a series of sketches, inspired by Science Fiction films, which echoed their own experience of alienation. During the project, the familiar and rigorously regulated Activity Room became a site of imagination, adventure and laughter; transforming the atmosphere of the hospital and allowing the patients to be transported to another space entirely. A space that was as much in their heads as in the physical domain. It will be argued that, although work created in an institution such as a Medium Secure Hospital is infused with hegemonic associations and meanings, the starting point for such work should be to seek an empty space in which the participants can allow their imaginations to be released. This work sits within a range of contexts and will be consciously interdisciplinary. It will draw from Human Geography and Criminology, as well as Performance and Applied Theatre Literature. It is hoped that this paper will build upon the literature that relates to the very particular environment of Secure Hospitals and to provide a starting point for further practical exploration.

Keywords: criminal justice, mental health, science fiction films, space and place

Procedia PDF Downloads 219
246 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon

Authors: Forbah Julius Ajamah

Abstract:

The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.

Keywords: justice, security, human rights abuses, conflicts, crisis

Procedia PDF Downloads 82
245 Law Relating to Health and Health Care: A Systematic Mechanism and Critical Study with Reference to Bangladesh

Authors: MD. Kamruzzaman

Abstract:

As a developing country, Bangladesh has seen an increase in total GDP in recent years. But it can be further improved by developing “Health-Care” (HC) services because it has enormous infrastructure problems all over the country. Bangladesh's HC system is now clearly poised to undergo reform at any process level, including prevention, diagnosis, and treatment. Although the Bangladeshi government is trying to develop the HC sector, due to health corruption in this sector, the improvement has not accelerated yet. For this reason, lots of Bangladeshi people are facing acute diseases. Regarding the prevention, diagnosis, and treatment of disease, this research will illustrate the law relating to health and HC to ensure excellent health and well-being. Firstly, this paper investigates health under Bangladeshi law from different perspectives related to the HC system. A massive gap has been investigated in this research after comparing Bangladeshi and international health law (HL). Secondly, a practical scenario is investigated and compared with international HC law. It is evident that the Bangladeshi HC system did not achieve a satisfactory standard level concerning international law. A staggering 70% of Bangladesh's population lives in rural areas, with no restrictions on access to hospitals and clinics. However, it is clear that proper HC infrastructure and some new medical practices are urgently needed to ensure HC quality. Finally, this research provides suggestions for developing a HC system to ensure the health of all Bangladeshi people that needs to be immediately implemented by the Bangladeshi government. This research has practical implications in the HC system for any developing country to maintain their citizen's safety.

Keywords: HC system, law relating, bangladeshi HL, international HL, human HC suggestions

Procedia PDF Downloads 66
244 Enhancing Entrepreneurial Skills, Vocational, and Technical Education in Nigeria Schools: The Challenges and Way Forward

Authors: Stella Chioma Nwizu, Emmanuel Nwangwu

Abstract:

Entrepreneurship, Vocational, and Technical education is an education that prepares one for effective adaptation to the world of work. It equally makes individuals self-reliant, self-sufficient and contributes to the development of society. It is, therefore, imperative that this type of education should be a priority in the development of any nation and should be given the utmost political support because of its importance and increasing demand on a global scale. This paper qualitatively explores three research questions on the policy status of Entrepreneurial, Vocational, and Technical Education (EVTE) in Nigeria, challenges hindering the enhancement of Entrepreneurial skills, Vocational and Technical Education in Nigeria, and strategies for the way forward. The major sources of data are secondary, interview and observation. Findings revealed the need to revise the policy of ETVE to meet the needs of the changing world of work. Challenges identified include corruption, inadequate funding, inadequate equipment, unqualified TVET Teachers/Instructors, poor documentation, policy implementation, poor conditions of service, and poor supervision of TVET programmes. Finally, the study identified policy revision, improvement in budgetary allocation, collaboration, sensitization, Public-Private Partnership, and training and retraining of instructors as the way forward toward the amelioration of the issues raised.

Keywords: entrepreneurship, entrepreneurial skills, vocational and technical education, technical and vocational education and training, VTE policy

Procedia PDF Downloads 58
243 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 77
242 Social Media's Roles in the Change of Vietnamese Society: Emerging Public Sphere for Citizens

Authors: Ly Thi Hai Yen

Abstract:

The Internet in Vietnam has developed significantly over the last 20 years and made impressive advances, permeating into every part of daily life, changing people's habits as well as the way people's communication. Under this situation, social media have become useful tools for the citizen to get and share information. About 10 years ago, most Vietnamese people got the information through state media, but thanks to the development of the Internet, nowadays, social media have been giving them rich sources of information at any area of society. By using case study research methods, documentary research method and in-depth interviews conducted with social media users, NGO activists, and Vietnamese scholars in 2017, the paper found that social media has been bringing a cyber public sphere to whom wish to discuss social and political issues. And, more importantly, it gives them a chance to connect with the government and policy makers quickly and effectively. Moreover, people use social media to supervise activities in society to prevent social evils and corruption in Vietnam. However, besides these positive points, people also have to cope with the rising situation of fake news which causing consequences for the society, such as pulling off crimes or cheating money and others. The paper concluded that social media plays important roles in the change of Vietnamese society, giving citizens a cyber public sphere unrestrictedly to discuss social and political issues but also bringing many bad risks to citizens.

Keywords: Vietnamese, social media, politics-society

Procedia PDF Downloads 143
241 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 324
240 Inappropriate Job Behaviour and Performance of Employees

Authors: Prakash Singh

Abstract:

The focus of this paper is on the impact of internal organizational factors on the inappropriate job performance and behaviour of employees. The Buffalo City Metropolitan Municipality (BCMM) in South Africa has been experiencing inappropriate job behaviour and performance of some of its workers. They include misappropriation of resources, maladministration, mismanagement, lack of service delivery, fraud, and corruption. Since many workers in this organization have various levels of formal education, such practices are not expected, because the structural-functionalist assumption is that formal education is a solution to societal challenges. Since inappropriate job behaviour and performance continue to be reported in spite of the formal education of BCMM workers, this study seeks to investigate how the two phenomena co-exist. It thus seeks to put into perspective the paradoxical co-existence of formal education with inappropriate job behaviour and performance, by focusing on the BCMM as a case-study. For data collection, this study used the mixed method approach; that is, a combination of qualitative and quantitative methods. The findings revealed structural, systemic and human impediments to labour productivity in the organization. By and large, the unquestioning acceptance of the assumption that the skills shortage is responsible for inappropriate workers’ job performance and behaviour is discredited by the evidence of skilled personnel who exercise their responsibilities in a manner that undermines their occupational requirements. Therefore, this exploratory study affirms that the narrow conception of skills, that privileges job-specific capabilities, is not enough for cultivating a workforce with appropriate job behaviour and performance practices.

Keywords: inappropriate job behaviour, labour productivity, mismanagement, skills shortage

Procedia PDF Downloads 369
239 Content Analysis of Images Shared on Twitter during 2017 Iranian Protests

Authors: Maryam Esfandiari, Bohdan Fridrich

Abstract:

On December 28, 2017, a wave of protests erupted in several Iranian cities. Protesters demonstrated against the president, Hasan Rohani, and theocratical nature of the regime. Iran has a recent history with protest movements, such as Green Movement responsible for demonstrations after 2009 Iranian presidential election. However, the 2017/2018 protests differ from the previous ones in terms of organization and agenda. The events show little to no central organization and seem as being sparked by grass root movements and by citizens’ fatigue of government corruption, authoritarianism, and economic problems of the country. Social media has played important role in communicating the protests to the outside world and also in general coordination. By using content analyses, this paper analyzes the visual content of Twitter posts published during the protests. It aims to find the correlation between their decentralized nature and nature of the tweets – either emotionally arousing or efficiency-elicit. Pictures are searched by hashtags and coded by their content, such as ‘crowds,’ ‘protest activities,’ ‘symbols of unity,’ ‘violence,’ ‘iconic figures,’ etc. The study determines what type of content prevails and what type is the most impactful in terms of reach. This study contributes to understanding the role of social media both as a tool and a space in protest organization and portrayal in countries with limited Internet access.

Keywords: twitter, Iran, collective action, protest

Procedia PDF Downloads 148
238 The Complementary Explanations of Institutional and Feminist Perspectives for Female Social Enterprise in Pakistan

Authors: Mohammad Sohail Yunis, Hina Hashim, Alistair R. Anderson

Abstract:

Entrepreneurship is gendered with masculine qualities, yet social enterprise epitomizes caring a feminine quality. However enterprising practices may have little to do with gender. Consequently, the purpose of this paper is to examine practices using two very different explanatory theories, feminist and institutional theory, to establish the role played by gender. This study is situated in KP, the poor but traditional north of Pakistan. Utilising on an interpretive qualitative research approach, this research collected data through in-depth interviews with ten women social entrepreneurs of KP, Pakistan and analyzed using thematic analysis. Empirically, this paper identifies and describes on a number of interesting themes that relate to the women entrepreneurship such as 'women empowerment, patriarchal culture, role of culture and societal norms, religious extremism and terrorism, forced entrepreneurs, change creators, institutional corruption, and security issues'. In addition, female social enterprise in KP is set in a patriarchal, masculine culture, but the practices negotiate institutional obstacles to bring benefits to the disenfranchised. Finally, this research claims to present an original insight into female social entrepreneurship in a developing country context and provide fresh theoretical and empirical perspectives to advance knowledge and scholarship.

Keywords: female social entrepreneurship, institutional theory, feminist theory, developing countries

Procedia PDF Downloads 215
237 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 274
236 Framework for Aligning Supply Chain Strategies and Organizational Strategies in an SOE Environment

Authors: R. Setino, I. M. Ambe, J. A Badenhorst-Weiss

Abstract:

The South African government supply chain management system is not adequately implemented in State Owned Enterprises (SOEs). There are weaknesses in the SOEs SCM enablers, strategies and policies. In addition, top management of SOEs still do not see SCM as strategic enough to deserve their attention, and therefore, there is very little support from top management, thus making it even difficult for SCM practitioners to execute their day to day functions, let alone delivering the letter and spirit of the relevant legislations. Supply chain strategies lack buy in from the top, and as a result senior SCM practitioners has not been involved in the corporate strategy. This has resulted in supply chain and corporate strategies being misaligned. Due to service delivery backlog, high level of corruption and continuous strikes across the country for better services it is inevitable that government leaders be more strategic about how South Africa can use SCM as a tool to improve service delivery. Consequently, there is a need to close the gap between the strategic level dealt by top management and the application of operational SCM concepts: the use of SCM concepts and, therefore, supply chain strategies – should be aligned with the corporate and business strategies in order to ensure the achievement of top level business objectives. This paper aims to explore supply chain practices in State Owned Enterprises (SOEs). The paper based on a conceptual review provides the status, trends and development and suggests a framework for aligning supply chain strategies and organizational strategies in an SOE environment.

Keywords: alignment, strategies, state owned enterprises, supply chain management, South Africa

Procedia PDF Downloads 417
235 Cash Management and the Impact of Cashless Policy in a Developing Nation: Nigeria as a Case Study

Authors: Ossai Paulinus Edwin

Abstract:

Cash Management is a broad area having to do with the collection, concentration, and disbursement of cash including measuring the level of liquidity and managing the cash balance and short-Term Investments. Cash Management involves the efficient collection and disbursement of cash and cash equivalents. It also includes management of marketable securities because, in modern Terminology, money comprises marketable securities and actual cash in hand or in a bank. This cash management is concerned with management of cash inflow and cash outflow of a business especially as it concerns a developing nation like Nigeria. The paper throws light on the impact of cashless policy in Nigeria as it was introduced by the Central Bank of Nigeria (CBN) in December 2011 and was kick-started in Lagos in January 2012. Survey research was adopted with the questionnaires as data collection instrument. Responses show that cashless policy if adopted generally shall increase employment opportunities, reduce cash related robbery thereby reducing risk of carrying cash; it shall also reduce cash related corruption and attract more foreign investors to the country. It is expected that the introduction of cashless policy in Nigeria is a step in the right direction as it shall bring about modernization of Nigeria payment system, reduction in the cost of banking services, reduction in high security and safety risk and also curb banking related corruptions.

Keywords: cashless economy, cash management, cashless policy, e-banking, Nigeria

Procedia PDF Downloads 536
234 Globalization and Civil Society Organization of Nigeria: The Business Community

Authors: Mary I. Marire

Abstract:

This seminar examined globalization and civil society organization of Nigeria: The business community. The study examined the effect of globalization on the growth of civil society organizations in Nigeria. It equally evaluated the effect of globalization on the development of Nigerian business environment. The population consists of 562 members of Ohanaeze Ndigbo civil society organisation in Enugu State. The study used the survey approach. The primary sources used were used to administer 290 copies of questionnaire to the sampled members of the group, 282 were returned and accurately filled. The validity of the instrument was tested using content analysis and the result was good. The reliability was tested using the Pearson correlation coefficient (r). It gave a reliability co-efficient of 0.79 which was also good. The hypotheses were analyzed using f-statistics (ANOVA) tool. The findings indicated that that globalization has significant effect on the growth of civil society organizations in Nigeria and development of Nigerian business environment. Based on the findings, the study recommends that efforts should be directed at service delivery and the reduction of corruption to bring about a sustainable socio economic development in Nigeria. This will enable civil society groups to stand the test of time by organizing itself in a manner that will not make them apron or dependent on the government. There is the dire need for government at all levels to show and indeed demonstrate the political will and zeal to cope and meet with the current global realities in its totality.

Keywords: globalization, business environment, civil society, business growth

Procedia PDF Downloads 104
233 Human Trafficking in Your Backyard: Know the Signs and How to Help

Authors: Jessie Fazel, Kristen Smith

Abstract:

Human trafficking is a multi-billion-dollar criminal industry that affects 24.9 million people around the world. There are several different types of trafficking, the most common being sex trafficking, labor trafficking, and domestic servitude. Survival sex is common in the pediatric population, as they engage in sex for food, a place to sleep, or other basic needs. Statistics show that health care workers are at a unique advantage to help identify victims and get them the help they need, as 88% of trafficked victims encounter a health care worker while being trafficked. Unfortunately, victims don’t usually self-identify that they are being trafficked and the situations they face can vary dramatically. It is imperative to remember that traditional red flags are not always present in the pediatric population. Risk factors and red flags with their history and physical exam are one of the best indicators that health care providers need to be vigilant in looking at. There are numerous barriers for disclosure in the healthcare setting. Periods of time before and after disclosure are often emotionally difficult and could be dangerous for the victim. It is extremely important to have a plan in place for intervention if the victim does disclose trafficking. A trauma informed approach to medical and mental health interventions, that focus on safety, are vital in this population. This is happening where you live and you can make a difference in their lives.

Keywords: human trafficking, public health, emergency medicine, sexual health

Procedia PDF Downloads 30
232 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 360
231 Application of XRF and Other Principal Component Analysis for Counterfeited Gold Coin Characterization in Forensic Science

Authors: Somayeh Khanjani, Hamideh Abolghasemi, Hadi Shirzad, Samaneh Nabavi

Abstract:

At world market can be currently encountered a wide range of gemological objects that are incorrectly declared, treated, or it concerns completely different materials that try to copy precious objects more or less successfully. Counterfeiting of precious commodities is a problem faced by governments in most countries. Police have seized many counterfeit coins that looked like the real coins and because the feeling to the touch and the weight were very similar to those of real coins. Most people were fooled and believed that the counterfeit coins were real ones. These counterfeit coins may have been made by big criminal organizations. To elucidate the manufacturing process, not only the quantitative analysis of the coins but also the comparison of their morphological characteristics was necessary. Several modern techniques have been applied to prevent counterfeiting of coins. The objective of this study was to demonstrate the potential of X-ray Fluorescence (XRF) technique and the other analytical techniques for example SEM/EDX/WDX, FT-IR/ATR and Raman Spectroscopy. Using four elements (Cu, Ag, Au and Zn) and obtaining XRF for several samples, they could be discriminated. XRF technique and SEM/EDX/WDX are used for study of chemical composition. XRF analyzers provide a fast, accurate, nondestructive method to test the purity and chemistry of all precious metals. XRF is a very promising technique for rapid and non destructive counterfeit coins identification in forensic science.

Keywords: counterfeit coins, X-ray fluorescence, forensic, FT-IR

Procedia PDF Downloads 486
230 Employee Whistleblower Protection: An Analysis of Malaysian Law and Islamic Law

Authors: Ashgar Ali Ali Mohamed, Farheen Baig Sardar Baig

Abstract:

In Malaysia, the Whistle-blower Protection Act 2010 provides protection to a person in an organization who exposes misconduct, alleged dishonest or illegal activity that violates the existing laws, among others. For example, alleged fraud, health and safety violations, and corruption, to name but a few. Undeniable, most whistle-blowers are internal to an organisation who report misconduct of a fellow employee or superior within their company and they frequently face reprisal at the hands of the organisation which they have accused. In fact, many people do not consider blowing the whistle because of fear of retaliation and losing their relationships at workplace. Although whistle-blowers are protected under law from employer retaliation, there have been many cases where punishment for whistleblowing has occurred, such as suspension, demotion, termination, or harsh mistreatment by other employees. Hence, this paper will analyse the adequacy of the legal protection available to employees who whistle-blow on their employers with reference to the Whistle-blower Protection Act 2010. Reference will also be made to the approach taken in other selected jurisdiction with a view of highlighting the adequacy of the Malaysian legislation on this subject besides strengthen employee whistle-blower protection. Further, reference is also made to the Islamic approach on this subject with particular reference to the concept of amr-bil-Ma’roof (ordering for acknowledged virtues) and nahi anil munkar (forbidding from sin). Allah (SWT) says: “And there should be a group amongst you who invite towards good, order for acknowledged virtues, forbid from sin and these it is that are the successful ones” (Al Imran(Chp 3), verse 104).

Keywords: whistleblower protection, employee whistleblower, detrimental and reprisal, Malaysian law

Procedia PDF Downloads 547
229 Safe School Program in Indonesia: Questioning Whether It Is Too Hard to Succeed

Authors: Ida Ngurah

Abstract:

Indonesia is one of the most prone disaster countries, which has earthquake, tsunami or high wave, flood and landslide as well as volcano eruption and drought. Disaster risk reduction has been developing extensively and comprehensively, particularly after tsunami hit in 2004. Yet, saving people live including children and youth from disaster risk is still far from succeed. Poor management of environment, poor development of policy and high level of corruption has become challenges for Indonesia to save its people from disaster impact. Indonesia is struggling to ensure its future best investment, children and youth to have better protection when disaster strike in school hours and have basic knowledge on disaster risk reduction. The program of safe school is being initiated and developed by Plan Indonesia since 2010, yet this effort still needs to be elaborated. This paper is reviewing sporadic safe school programs that have been implemented or currently being implemented Plan Indonesia in few areas of Indonesia, including both rural and urban setting. Methods used are in-depth interview with dedicated person for the program from Plan Indonesia and its implementing patners and analysis of project documents. The review includes program’s goal and objectives, implementation activity, result and achievement as well as its monitoring and evaluation scheme. Moreover, paper will be showing challenges, lesson learned and best practices of the program. Eventually, paper will come up with recommendation for strategy for better implementation of safe school program in Indonesia.

Keywords: disaster impact, safe school, programs, children, youth

Procedia PDF Downloads 365
228 Cash Management in a Cashless Economy of a Developing Nation, Problems and Prospects: Nigeria a Case Study

Authors: Ossai Paulinus Edwin

Abstract:

Cash Management is a broad area having to do with the collection, concentration and disbursement of cash including measuring the level of liquidity and managing the cash balance and Short-Term Investments. Cash Management involves the efficient collection and disbursement of cash and cash equivalents. It also includes management of marketable securities because, in modern Terminology, money comprises marketable securities and actual cash in hand or in a bank. This cash management is concerned with management of cash inflow and cash outflow of a business especially as it concerns a developing nation like Nigeria. The paper throws light on the impact of cashless policy in Nigeria as it was introduced by the Central Bank of Nigeria (CBN) in December 2011 and was kick started in Lagos in January 2012. Survey research was adopted with the questionnaires as data collection instrument. Responses show that cashless policy if adopted generally shall increase employment opportunities, reduce cash related robbery thereby reducing risk of carrying cash; it shall also reduce cash related corruption and attract more foreign investors to the country. It is expected that the introduction of cashless policy in Nigeria is a step in the right direction as it shall bring about modernization of Nigeria payment system, reduction in the cost of banking services, reduction in high security and safety risk and also curb banking related corruptions.

Keywords: cashless economy, cash management, cashless policy, e-banking, Nigeria

Procedia PDF Downloads 384
227 The Application of King IV by Rugby Clubs Affiliated to a Rugby Union in South Africa

Authors: Anouschka Swart

Abstract:

In 2023, sport faces a plethora of challenges including but not limited to match-fixing, corruption and doping to its integrity that, threatens both the commercial and public appeal. The continuous changes and commercialisation that has occurred within sport have led to a variety of consequences resulting in the need for ethics to be revived, as it used to be in the past to ensure sport is not in danger. In order to understand governance better, the Institute of Directors in Southern Africa, a global network of professional firms providing Audit, Tax and Advisory services, outlined a process explaining all elements with regards to corporate governance. This process illustrates a governing body’s responsibilities as strategy, policy, oversight and accountability. These responsibilities are further elucidated to 16 governing principles which are highlighted as essential for all organisations in order to achieve and deliver on effective governance outcomes. These outcomes are good ethical culture, good performance, effective control and legitimacy therefore, the aim of the study was to investigate the general state of governance within the clubs affiliated with a rugby club in South Africa by utilizing the King IV Code as the framework. The results indicated that the King Code IV principles are implemented by these rugby clubs to ensure they demonstrate commitment to corporate governance to both internal and external stakeholders. It is however evident that a similar report focused solely on sport is a necessity in the industry as this will provide more clarity on sport specific problems.

Keywords: South Africa, sport, King IV, responsibilities

Procedia PDF Downloads 67
226 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 279
225 The Legal Position of Criminal Prevention in the Metaverse World

Authors: Andi Intan Purnamasari, Supriyadi, Sulbadana, Aminuddin Kasim

Abstract:

Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values ​​achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research.

Keywords: crime, cyber, metaverse, law

Procedia PDF Downloads 145
224 Comparative Study on Inhibiting Factors of Cost and Time Control in Nigerian Construction Practice

Authors: S. Abdulkadir, I. Y. Moh’d, S. U. Kunya, U. Nuruddeen

Abstract:

The basis of any contract formation between the client and contractor is the budgeted cost and the estimated duration of projects. These variables are paramount important to project's sponsor in a construction projects and in assessing the success or viability of construction projects. Despite the availability of various techniques of cost and time control, many projects failed to achieve their initial estimated cost and time. The paper evaluate the inhibiting factors of cost and time control in Nigerian construction practice and comparing the result with the United Kingdom practice as identified by one researcher. The populations of the study are construction professionals within Bauchi and Gombe state, Nigeria, a judgmental sampling employed in determining the size of respondents. Descriptive statistics used in analyzing the data in SPSS. Design change, project fraud and corruption, financing and payment of completed work found to be common among the top five inhibiting factors of cost and time control in the study area. Furthermore, the result had shown some comprising with slight contrast as in the case of United Kingdom practice. Study recommend the adaptation of mitigation measures developed in the UK prior to assessing its effectiveness and so also developing a mitigating measure for other top factors that are not within the one developed in United Kingdom practice. Also, it recommends a wider assessing comparison on the modify inhibiting factors of cost and time control as revealed by the study to cover almost all part of Nigeria.

Keywords: comparison, cost, inhibiting factor, United Kingdom, time

Procedia PDF Downloads 437
223 A Progressive Techno-Legal Framework for Digital Evidence Management

Authors: Ayobami P. Olatunji, Saadat Ibiyeye, Abdulaziz Ibiyeye, Tahir M. Khan

Abstract:

Digital evidence has become a cornerstone in criminal investigations due to the vast amount of information available in digital form. Despite its prevalence, this evidence is often met with skepticism in court proceedings because of its inherently volatile nature. Traditional forensic processes, defined predominantly by technology experts, emphasize technical details in evidence collection while often neglecting legal procedures. This gap can pose significant challenges for legal practitioners in understanding and applying digital forensics. As digital evidence increasingly influences future cases, a cohesive framework integrating both technical and legal perspectives is essential. We propose a comprehensive techno-legal framework designed to bridge this gap. Our framework integrates key aspects of collection, preservation, examination, and documentation with legal components such as case building, certificate of compliance, cross-examination, and authorization. This balanced approach aims not to replace existing evidence presentation principles but to enhance the seamless integration of digital evidence into legal proceedings, addressing the common issues that lead to its dismissal.

Keywords: evidence presentation, warrant, digital-forensic, certificate of compliance, legal procedures, computer crime, violation, investigation cybercrime

Procedia PDF Downloads 26