Search results for: crime scene behviours
222 No Space for Subculture, No Space for Disruption: Taming Creativity in Urban Development Projects
Authors: Nadine Osbild
Abstract:
Recent urban development projects often try to cater to both high-tech innovation/start-up culture and local culture/sustainable living. In the process, the so-called “creative class” (Florida 2002) has become a focal point for innovative answers to increasing urban pressures. Our paper explores local subculture and art scenes as a place where current innovation policies and alternative approaches to urban future-making collide. We explore the (re-)making of prevalent understanding of creativity in the context of Munich – an economically successful and over-saturated city with a relatively conservative approach to innovation and disruption and no apparent need for the “creative class” remedy. In particular, we investigate the opportunities and manifestations of subculture in three urban development projects that are envisioned as collaborations between innovators and (sub)culturally oriented creativity. Following a co-production STS approach, we observe that these development projects serve as sites where understandings of innovation and creativity are configured and stabilized in keeping with broader socio-political and economic rationalities. What is more, the projects materialize a de-facto split between the two understandings of a “creative scene,” whereby alternative and potentially disruptive forms of creativity become sidelined or even prevented in Munich’s imagination of urban development in the name of innovation and economic growth. Thus taming the unruliness of creativity, Munich also manages to tame the disruptive threats of innovation, ensuring that the innovation-centered modes of future-making still leave socio-economic hierarchies intact while displacing (counter-)visions rooted in the subculture.Keywords: creative districts, science and technology studies, public engagement, innovation studies
Procedia PDF Downloads 99221 Political Economy of Ungoverned Spaces and Rural Armed Banditry in Nigeria
Authors: Collins Ogbu, Godwin Johnny Akpan, James NDA Jacob
Abstract:
The debilitating outcomes of violent conflict, consummated by rural armed banditry have nonetheless, occasioned the need for the mapping of crime zones in Nigeria. As a step towards understanding the scourge of armed bandits, ungoverned spaces have been uncovered as the most dominant excuse for rural crimes and fierce confrontations. From the creeks of the Niger Delta to the forest of Sambisa, Small Arms and Light Weapons (SALW) have proliferated to the vagaries of national insecurity. While the trends present indications of State fragility, the paucity of governance in these so-called ungoverned spaces has persistently reflected a Hobbesian state of nature, where the fittest survives. This study, therefore, interrogates the demographic implications of these ungoverned spaces by specifically identifying the most immediate features of the characters in the areas under investigation. The Farmers-Herders Crises, Niger-Delta Militancy, Boko-Haram Insurgency, Armed Robbery, Kidnapping and Cattle Rustling all define the major focus. In undertaking this study, anecdotal sources will be relied on, while extant information on the concept of ungoverned spaces will be content-analyzed. It is hoped that the knowledge gathered, as a result, will ultimately aid in proffering a dependable panacea to the crises of rural armed banditry in Nigeria.Keywords: ungoverned spaces, rural armed banditry, state fragility, conflicts
Procedia PDF Downloads 184220 Heroin and Opiates Metabolites Tracing by Gas-Chromatography Isotope Ratio Mass Spectrometry
Authors: Yao-Te Yen, Chao-Hsin Cheng, Meng-Shun Huang, Shan-Zong Cyue
Abstract:
'Poppy-seed defense' has been a serious problem all over the world, that is because the opiates metabolites in urine are difficult to distinguish where they come from precisely. In this research, a powerful analytic method has been developed to trace the opiates metabolites in urine by Gas-Chromatography Isotope Ratio Mass Spectrometry (GC-IRMS). In order to eliminate the interference of synthesis to heroin or metabolism through human body, opiates metabolites in urine and sized heroin were hydrolyzed to morphine. Morphine is the key compound for tracing between opiates metabolites and seized heroin in this research. By matching δ13C and δ15N values through morphine, it is successful to distinguish the opiates metabolites coming from heroin or medicine. We tested seven heroin abuser’s metabolites and seized heroin in crime sites, the result showed that opiates metabolites coming from seized heroin, the variation of δ13C and δ15N for morphine are within 0.2 and 2.5‰, respectively. The variation of δ13C and δ15N for morphine are reasonable with the result of matrix match experiments. Above all, the uncertainty of 'Poppy-seed defense' can be solved easily by this analytic method, it provides the direct evidence for judge to make accurate conviction without hesitation.Keywords: poppy-seed defense, heroin, opiates metabolites, isotope ratio mass spectrometry
Procedia PDF Downloads 241219 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees
Authors: Afsana Afsar Tuly
Abstract:
The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar
Procedia PDF Downloads 146218 Tourism Potentials of Ikogosi Warm Spring in Nigeria
Authors: A.I. Adeyemo
Abstract:
Ikogosi warm spring results from a complex mechanical and chemical forces that generates internal heat in the rocks forming a warm and cold water at the same geographical location at the same time. From time immemorial, the local community had thought, it to be the work of a deity, and they were worshipping the spring. This complex phenomenon has been a source of tourist attraction to both local and international tourists over the years. 450 copies of a structured questionnaire were given out, and a total of 500 respondents were interviewed. The result showed that ikogosi warm spring impacts the community positively by providing employment to the teeming youths, and it provides income to traders. The result shows that 66% of the respondents confirmed that it increased their income and that transportation business increased more than 73%.the level of enlightenment and socialization increased greatly in the community. However, it also impacted the community negatively as it increased crime rates such as stealing, kidnapping, prostitution, and unwanted pregnancy among the secondary school girls and the other teenagers. Generally, 50% of the respondents reported that tourism in the warm spring results in insecurity in the community. IT also increased environmental problems such as noise and waste pollutions; the continuous movement on the land results in soil compartment leading to erosion, and leaching, which also results in loss of soil fertility. It was concluded that if the potentials of the spring are fully tapped, it will be a good avenue for income generation to the country.Keywords: community, Ikogosi, revenue, warm spring
Procedia PDF Downloads 159217 [Keynote Talk] The Practices and Issues of Career Education: Focusing on Career Development Course on Various Problems of Society
Authors: Azusa Katsumata
Abstract:
Several universities in Japan have introduced activities aimed at the mutual enlightenment of a diversity of people in career education. However, several programs emphasize on delivering results, and on practicing the prepared materials as planned. Few programs focus on unexpected failures and setbacks. This way of learning is important in career education so that classmates can help each other, overcome difficulties, draw out each other’s strengths, and learn from them. Seijo University in Tokyo offered excursion focusing Various Problems of Society, as second year career education course, Students will learn about contraception, infertility, homeless people, LGBT, and they will discuss based on the excursion. This paper aims to study the ‘learning platform’ created by a series of processes such as the excursion, the discussion, and the presentation. In this course, students looked back on their lives and imagined the future in concrete terms, performing tasks in groups. The students came across a range of values through lectures and conversations, thereby developing feelings of self-efficacy. We conducted a questionnaire to measure the development of career in class. From the results of the questionnaire, we can see, in the example of this class, that students respected diversity and understood the importance of uncertainty and discontinuity. Whereas the students developed career awareness, they actually did not come across that scene and would do so only in the future when it became necessary. In this class, students consciously considered social problems, but did not develop the practical skills necessary to deal with these. This is appropriate for one of project, but we need to consider how this can be incorporated into future courses. University constitutes only a single period in life-long career formation. Thus, further research may be indicated to determine whether the positive effects of career education at university continue to contribute to individual careers going forward.Keywords: career education of university, excursion, learning platform, problems of society
Procedia PDF Downloads 263216 Juvenile Justice in Maryland: The Evidence Based Approach to Youth with History of Victimization and Trauma
Authors: Gabriela Wasileski, Debra L. Stanley
Abstract:
Maryland efforts to decrease the juvenile criminality and recidivism shifts towards evidence based sentencing. While in theory the evidence based sentencing has an impact on the reduction of juvenile delinquency and drug abuse; the assessment of juveniles’ risk and needs usually lacks crucial information about juvenile’s prior victimization. The Maryland Comprehensive Assessment and Service Planning (MCASP) Initiative is the primary tool for developing and delivering a treatment service plan for juveniles at risk. Even though it consists of evidence-based screening and assessment instruments very little is currently known regarding the effectiveness and the impact of the assessment in general. In keeping with Maryland’s priority to develop successful evidence-based recidivism reduction programs, this study examined results of assessments based on MCASP using a representative sample of the juveniles at risk and their assessment results. Specifically, it examined: (1) the results of the assessments in an electronic database (2) areas of need that are more frequent among delinquent youth in a system/agency, (3) the overall progress of youth in an agency’s care (4) the impact of child victimization and trauma experiences reported in the assessment. The project will identify challenges regarding the use of MCASP in Maryland, and will provide a knowledge base to support future research and practices.Keywords: Juvenile Justice, assessment of risk and need, victimization and crime, recidivism
Procedia PDF Downloads 320215 “Divorced Women are Like Second-Hand Clothes” - Hate Language in Media Discourse (Using the Example of Electronic Media Platforms)
Authors: Sopio Totibadze
Abstract:
Although the legal framework of Georgia reflects the main principles of gender equality and is in line with the international situation (UNDP, 2018), Georgia remains a male-dominated society. This means that men prevail in many areas of social, economic, and political life, which frequently gives women a subordinate status in society and the family (UN women). According to the latest study, “violence against women and girls in Georgia is also recognized as a public problem, and it is necessary to focus on it” (UN women). Moreover, the Public Defender's report on the protection of human rights in Georgia (2019) reveals that “in the last five years, 151 women were killed in Georgia due to gender and family violence”. Sadly, these statistics have increased significantly since that time. The issue was acutely reflected in the document published by the Organization for Security and Cooperation in Europe, “Gender Hate Crime” (March 10, 2021). “Unfortunately, the rates of femicide ..... are still high in the country, and distrust of law enforcement agencies often makes such cases invisible, which requires special attention from the state.” More precisely, the cited document considers that there are frequent cases of crimes based on gender-based oppression in Georgia, which pose a threat not only to women but also to people of any gender whose desires and aspirations do not correspond to the gender norms and roles prevailing in society. According to the study, this type of crime has a “significant and lasting impact on the victim(s) and also undermines the safety and cohesion of society and gender equality”. It is well-known that language is often used as a tool for gender oppression (Rusieshvili-Cartledge and Dolidze, 2021; Totibadze, 2021). Therefore, feminist and gender studies in linguistics ultimately serve to represent the problem, reflect on it, and propose ways to solve it. Together with technical advancement in communication, a new form of discrimination has arisen- hate language against women in electronic media discourse. Due to the nature of social media and the internet, messages containing hate language can spread in seconds and reach millions of people. However, only a few know about the detrimental effects they may have on the addressee and society. This paper aims to analyse the hateful comments directed at women on various media platforms to determine (1) the linguistic strategies used while attacking women and (2) the reasons why women may fall victim to this type of hate language. The data have been collected over six months, and overall, 500 comments will be examined for the paper. Qualitative and quantitative analysis was chosen for the methodology of the study. The comments posted on various media platforms, including social media posts, articles, or pictures, have been selected manually due to several reasons, the most important being the problem of identifying hate speech as it can disguise itself in different ways- humour, memes, etc. The comments on the articles, posts, pictures, and videos selected for sociolinguistic analysis depict a woman, a taboo topic, or a scandalous event centred on a woman that triggered a lot of hatred and hate language towards the person to whom the post/article was dedicated. The study has revealed that a woman can become a victim of hatred directed at them if they do something considered to be a deviation from a societal norm, namely, get a divorce, be sexually active, be vocal about feministic values, and talk about taboos. Interestingly, people who utilize hate language are not only men trying to “normalize” the prejudiced patriarchal values but also women who are equally active in bringing down a "strong" woman. The paper also aims to raise awareness about the hate language directed at women, as being knowledgeable about the issue at hand is the first step to tackling it.Keywords: femicide, hate language, media discourse, sociolinguistics
Procedia PDF Downloads 83214 Attempt Survivor Families’ Views on Criminalizing Attempted Suicide in Ghana
Authors: Joseph Osafo, Winifred Asare-Doku, Charity Akotia
Abstract:
Decriminalizing suicide is one of the major goals of suicide prevention worldwide. In Ghana, suicide is legally prescribed and there is a wide-spread societal condemnation of the act, the survivor and families share the stigma. Evidence and advocacy continue to mount towards pressuring the government, the legal fraternity and lawmakers to consider decriminalizing the act. However, within this discourse, the views of families of attempt survivors are absent. The purpose of this study was to explore from relatives of suicide attempters their reactions towards the criminality of suicide attempt in the country. A total of 10 relatives of suicide attempters were interviewed using a semi-structured interview guide. Thematic analysis was used to analyze the data. We found that there were divergent views from families on decriminalizing suicide. We generated two major themes; Out-group bias versus In-group bias. Half of the participants opined that suicide attempt should not be decriminalized and others advocated for help and mental health care for victims of the suicide attempt. It was generally observed that although all 10 participants were cognizant that suicide attempt is a crime in Ghana, they preferred their relatives were spared from prosecution. The findings indicate incongruity, especially when participants want their relatives to avoid jail term but want the law that criminalizes suicide to remain. Findings are explained using the Fundamental Attribution Error and the concept of Kin selection. Implications for public education on decriminalization and advocacy are addressed.Keywords: decriminalization, families, Ghana suicide, suicide attempt
Procedia PDF Downloads 520213 The Influences of Green Infrastructure Develop on Urban Renewals for Real Essence and Non-Real Essence Economic Value
Authors: Chao Jen-Chih, Hsu Kuo-Wei
Abstract:
Climate change and natural disasters take effect on urban development. It has been discussed urban renewals can prevent natural disasters. Integrating green infrastructure and urban renewals may have great effect on adapting the impact of climate change. To highlight the economic value of green infrastructure development on urban renewals, some strategies need to be carry on to reduce environmental impact. A number of urban renewals studies has been conducted on right transfer, financial risk, urban renewal policy, and public participation. Little research has been devoted on the subject of the economic value of green infrastructure development on urban renewals. The purpose of this study is to investigate the affecting factors on the economic value of green infrastructure development on urban renewals. This study will present the benefits of green infrastructure development and summarize the critical factors of green infrastructure develop on urban renewals for real essence and non-real essence on economic value from literature. Our results indicate that factors of housing price, land value, floor area incentive, and facilitation of the construction industry affect the outcome of real essence economic value. Factors of enhancement of urban disaster prevention, improvement of urban environment and landscape, crime reduction, climate control, pollution reduction, biological diversity, health impacts, and leisure space affects the outcome of non-real essence economic value.Keywords: economic value, green infrastructure, urban renewals, urban development
Procedia PDF Downloads 419212 Russia’s Role in Resolving the Nagorno-Karabakh Conflict 1990-2020
Authors: Friba Haidari
Abstract:
The aim of the study is to identify Russia's role in managing the Nagorno-Karabakh conflict betweenArmenia and Azerbaijan during the years 1990 to 2020. The Nagorno-Karabakh crisis can not be considered a mere territorial conflict but also a crossroads of interests of foreign actors. Geopolitical rivalries and the access to energy by regional and trans-regional actors have complicated the crisis and created a security challenge in the region, which is likely to escalate into a full-blown war between the parties involved. The geopolitical situation of Nagorno-Karabakh and its current situation have affected all peripheral states in some way. Russia, as one of the main actors in this scene, has been actively involved since the beginning of the crisis. The Russians have always sought to strengthen their influence and presence in the Nagorno-Karabakh crisis. Russia's efforts to weaken the role of the Minsk Group, The presence of Western actors, and the deployment of Russian forces in the disputed area can be assessed in this context. However, this study seeks to answer the question of what role did Russia play in managing the Nagorno-Karabakh conflict between Armenia and Azerbaijan between 1990 and 2020? The study hypothesizes that Russia has prevented the escalation of the Nagorno-Karabakh conflict through mediation and some coercion. This study is divided into four parts, including conflict management as a theoretical framework; Examining the competition and the role of actors in the Caucasus region, especially the role of the Minsk Group, and what approach or tools and methods Russia has used in its foreign policy in managing the conflict, and finally what are the relations between the countries involved and what will be Russia's role in the future? Was discussed. This study examines the analysis and transfer of ideas and information using authoritative international sources with an explanatory method and shares its results with everyone.Keywords: Russia, conflict, nagorno-karabakh, management
Procedia PDF Downloads 91211 A Real-Time Moving Object Detection and Tracking Scheme and Its Implementation for Video Surveillance System
Authors: Mulugeta K. Tefera, Xiaolong Yang, Jian Liu
Abstract:
Detection and tracking of moving objects are very important in many application contexts such as detection and recognition of people, visual surveillance and automatic generation of video effect and so on. However, the task of detecting a real shape of an object in motion becomes tricky due to various challenges like dynamic scene changes, presence of shadow, and illumination variations due to light switch. For such systems, once the moving object is detected, tracking is also a crucial step for those applications that used in military defense, video surveillance, human computer interaction, and medical diagnostics as well as in commercial fields such as video games. In this paper, an object presents in dynamic background is detected using adaptive mixture of Gaussian based analysis of the video sequences. Then the detected moving object is tracked using the region based moving object tracking and inter-frame differential mechanisms to address the partial overlapping and occlusion problems. Firstly, the detection algorithm effectively detects and extracts the moving object target by enhancing and post processing morphological operations. Secondly, the extracted object uses region based moving object tracking and inter-frame difference to improve the tracking speed of real-time moving objects in different video frames. Finally, the plotting method was applied to detect the moving objects effectively and describes the object’s motion being tracked. The experiment has been performed on image sequences acquired both indoor and outdoor environments and one stationary and web camera has been used.Keywords: background modeling, Gaussian mixture model, inter-frame difference, object detection and tracking, video surveillance
Procedia PDF Downloads 477210 Investigating Malaysian Prereader’s Cognitive Processes when Reading English Picture Storybooks: A Comparative Eye-Tracking Experiment
Authors: Siew Ming Thang, Wong Hoo Keat, Chee Hao Sue, Fung Lan Loo, Ahju Rosalind
Abstract:
There are numerous studies that explored young learners’ literacy skills in Malaysia but none that uses the eye-tracking device to track their cognitive processes when reading picture storybooks. This study used this method to investigate two groups of prereaders’ cognitive processes in four conditions. (1) A congruent picture was presented, and a matching narration was read aloud by a recorder; (2) Children heard a narration telling about the same characters in the picture but involves a different scene; (3) Only a picture with matching text was present; (4) Students only heard the reading aloud of the text on the screen. The two main objectives of this project are to test which content of pictures helps the prereaders (i.e., young children who have not received any formal reading instruction) understand the narration and whether children try to create a coherent mental representation from the oral narration and the pictures. The study compares two groups of children from two different kindergartens. Group1: 15 Chinese children; Group2: 17 Malay children. The medium of instruction was English. An eye-tracker were used to identify Areas of Interest (AOI) of each picture and the five target elements and calculate number of fixations and total time spent on fixation of pictures and written texts. Two mixed factorial ANOVAs with the storytelling performance (good, average, or weak) and vocabulary level (low, medium, high) as between-subject variables, and the Areas of Interests (AOIs) and display conditions as the within-subject variables were performedon the variables.Keywords: eye-tracking, cognitive processes, literacy skills, prereaders, visual attention
Procedia PDF Downloads 95209 Religious Coercion as Means of Trafficking in Women and Faith Communities’ Role in Ending Such Religious Exploitation
Authors: Xiaoyu Stephanie Ren
Abstract:
With the increase of massive migration, economic polarization, as well as increasing awareness and respects for religious freedom in the world, women have become unprecedentedly vulnerable to trafficking involving religious coercion. Such cases can also bring enormous challenges for prosecution in which the prosecutor bears the burden of proving that the victim acted, or not acted in a certain way due to the exploitation of her belief system: (1) Jurors who are nonbelievers tend not to be convinced that something of intangible nature can act as the force to get victim into women trafficking situation; (2) Court more often than not rules in favor of victims in women trafficking cases involving religious exploitation only when there is physical coercion in addition to religious coercion; (3) Female victims are often reluctant to testify at court due to their godly fear and loyalty to trafficker. Using case study methodology, this paper examines the unique characteristics of religious coercion as means of trafficking in women from a legal perspective and proposes multiple ways based on communal beliefs that faith communities, as victims for such crime themselves, can act in order to help to end religious exploitation. The purpose of this paper is threefold: to improve acknowledgment for the role of religious coercion as a sole force for women trafficking situation; to discuss legal hurdles in prosecuting women trafficking cases involving religious coercion; and to propose collaboration across borders among faith communities to end such exploitation.Keywords: women trafficking, sex violence, religious exploitation, faith community, prosecution, law
Procedia PDF Downloads 166208 Exploring Challenges Faced by Small Business Owners on Poverty Reduction in Rural Eastern Cape, South Africa
Authors: Akinwale Olusola Mokayode, Emaanuel Adu, Seriki Idowu Ibrahim
Abstract:
Small business can serve as a tool for poverty reduction in South Africa, but it requires adequate support and development for its continuous sustenance in spite of rigorous challenges, especially in the rural environment. This study explored the challenges faced by the small business owners in the rural Eastern Cape Province of South Africa. The objective of the study is to identify the challenges faced by small business owners in the case study area and to examine the effects of those challenges on poverty rate. Survey research design was adopted, with the distribution of structured questionnaire for data collection through a simple random sampling method. Descriptive and inferential statistics was used to analyse the data. Findings showed that small business owners face various challenges in their commercial operations. It was also made clearer that these challenges have effects on the poverty rate as well as crime rate. In conclusion, in other for small businesses to be effective instrument to tackle poverty, certain measure must be taken into considerations. This therefore necessitates recommendation from the researcher that potential and current business owners must seek valuable advice from the more experienced business tycoon and seek information about the business assistance programmes provided by government and private sectors.Keywords: eastern cape, poverty, poverty reduction, rural, small business, sustainable livelihood
Procedia PDF Downloads 488207 The Impact of Cybercrime on Youth Development in Nigeria
Authors: Christiana Ebobo
Abstract:
Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.Keywords: armed robber, cybercrime, integrity, youth
Procedia PDF Downloads 527206 Pattern of Cybercrime Among Adolescents: An Exploratory Study
Authors: Mohamamd Shahjahan
Abstract:
Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.Keywords: cybercrime, adolescents, pattern, internet
Procedia PDF Downloads 81205 Analyzing the Effectiveness of Communication Practices and Processes within Project-Based Firms
Authors: Paul Saah, Charles Mbohwa, Nelson Sizwe Madonsela
Abstract:
The capacity to deliver projects on schedule, within budget, and to the pleasure of the client depends on effective communication, which is the lifeblood of project-based businesses. In order to pinpoint areas for development and shed light on the crucial role that communication plays in project success, the aim of this study is to evaluate the efficacy of communication practises and processes inside project-based organisations. In order to analyse concepts and get a greater grasp of their theoretical basis, this study's methodology combines a careful review of the relevant literature with a conceptual analysis of the subject. Data from a varied sample of project-based businesses spanning all industries and sizes were collected via document analysis. The relationship between communication practises, and processes were investigated in connection to key performance measures such as project outcomes, client satisfaction, and team dynamics. According to the study's findings, project-based businesses that adopt effective communication practises, and procedures experience a reduction in unfavourable experiences, stronger integration, and coordination, clarity of purpose, and practises that can hasten problem resolution. However, failing to adopt effective communication practises and procedures in project-based company result in counter issues, including project derailment from the schedule, failure to meet goals, inefficient use of existing resources, and failure to meet organisational goals. Therefore, optimising their communication practises, and procedures are crucial for sustainable growth and competitive advantage as project-based enterprises continue to play a crucial part in today's dynamic business scene.Keywords: effective communication, project-based firms, communication practices, project success, communication strategies
Procedia PDF Downloads 70204 Design and Creation of a BCI Videogame for Training and Measure of Sustained Attention in Children with ADHD
Authors: John E. Muñoz, Jose F. Lopez, David S. Lopez
Abstract:
Attention Deficit Hyperactivity Disorder (ADHD) is a disorder that affects 1 out of 5 Colombian children, converting into a real public health problem in the country. Conventional treatments such as medication and neuropsychological therapy have been proved to be insufficient in order to decrease high incidence levels of ADHD in the principal Colombian cities. This work demonstrates a design and development of a videogame that uses a brain computer interface not only to serve as an input device but also as a tool to monitor neurophysiologic signal. The video game named “The Harvest Challenge” puts a cultural scene of a Colombian coffee grower in its context, where a player can use his/her avatar in three mini games created in order to reinforce four fundamental aspects: i) waiting ability, ii) planning ability, iii) ability to follow instructions and iv) ability to achieve objectives. The details of this collaborative designing process of the multimedia tool according to the exact clinic necessities and the description of interaction proposals are presented through the mental stages of attention and relaxation. The final videogame is presented as a tool for sustained attention training in children with ADHD using as an action mechanism the neuromodulation of Beta and Theta waves through an electrode located in the central part of the front lobe of the brain. The processing of an electroencephalographic signal is produced automatically inside the videogame allowing to generate a report of the theta/beta ratio evolution - a biological marker, which has been demonstrated to be a sufficient measure to discriminate of children with deficit and without.Keywords: BCI, neuromodulation, ADHD, videogame, neurofeedback, theta/beta ratio
Procedia PDF Downloads 372203 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective
Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella
Abstract:
Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law
Procedia PDF Downloads 385202 Identification of Individuals in Forensic Situations after Allo-Hematopoietic Stem Cell Transplantation
Authors: Anupuma Raina, Ajay Parkash
Abstract:
In forensic investigation, DNA analysis helps in the identification of a particular individual under investigation. A set of Short Tandem Repeats loci are widely used for individualization at a molecular level in forensic testing. STRs with tetrameric repeats of DNA are highly polymorphic and widely used for forensic DNA analysis. Identification of an individual became challenging for forensic examiners after Hematopoietic Stem Cell Transplantation. HSCT is a well-accepted and life-saving treatment to treat malignant and nonmalignant diseases. It involves the administration of healthy donor stem cells to replace the patient’s own unhealthy stem cells. A successful HSCT results in complete donor-derived cells in a patient’s hematopoiesis and hence have the capability to change the genetic makeup of the patient. Although an individual who has undergone HSCT and then committed a crime is a very rare situation, but not impossible. Keeping such a situation in mind, various biological samples like blood, buccal swab, and hair follicle were collected and studied after a certain interval of time after HSCT. Blood was collected from both the patient and the donor before the transplant. The DNA profile of both was analyzed using a short tandem repeat kit for autosomal chromosomes. Among all exhibits studied, only hair follicles were found to be the most suitable biological exhibit, as no donor DNA profile was observed for up to 90 days of study.Keywords: chimerism, HSCT, STRs analysis, forensic identification
Procedia PDF Downloads 65201 A Trail of Decoding a Classical Riddle: An Analysis of Russian Military Strategy
Authors: Karin Megheșan, Alexandra Popescu, Teodora Dobre
Abstract:
In the past few years, the Russian Federation has become a central point on the security agenda of the most important international actors, due to its reloaded aggressiveness of foreign policy. Vladimir Putin, the actual president of the Russian Federation, has proven that Russia can and has the willingness to become the powerful actor that used to be during the Cold War. Russia’s new behavior on the international scene showed that Russia has not only expansionist (where expansionist is not only in terms of territory but also of ideology) intentions, but also the necessary resources, to build an empire that may have the power to counterbalance the influence of the United States and stop the expansion of the North-Atlantic Treaty Organization in an equation understood of multipolar Russian view. But in order to do this, there is necessary to follow a well-established plan or policy. Thus, the aim of the paper is to discuss how has the foreign policy of the Russian Federation evolved under the influence of the military and security strategies of the Russian nation, to briefly examine some of the factors that sculpture Russian foreign policy and behavior, in order to reshape a Russian (Soviet) profile so far considered antiquated. Our approach is an argument in favor of the analyses of the recent evolutions embedded in the course of history. In this context, the paper will include analytical thoughts about the Russian foreign policy and the latest strategic documents (security strategy and military doctrine) adopted by the Putin administration, with the purpose to highlight the main direction of action followed by all these documents together. The paper concludes that the military component is to be found in all these strategic documents, as well as at the core of Russian national interest, aspect that proves that Russia is still the adept of the traditional realist paradigm, reshaped in a Russian theory of the multipolar world.Keywords: hybrid warfare, military component, military doctrine, Russian foreign policy, security strategy
Procedia PDF Downloads 304200 Music for Peace, a Model for Socialization
Authors: Mina Fenercioglu
Abstract:
This study discusses a Turkish music education model similar to El Sistema. The Music for Peace (Baris icin Muzik) program, founded in 2005 by an idealist humanitarian in Istanbul, started as a pilot project with accordion and then with flute in ensembles at the Ulubatlı Hasan Primary School where mostly underprivileged children attend. The program gives complimentary music lessons particularly to deprived children, who at the beginning were prone to crime. With music education, the attitudes of the children turn to a positive aspect. The aim of this initiative provides social and cultural awareness, which serves the same mission as the world known El Sistema. In 2009, the Music for Peace project received Deutsche Bank Urban Age Award, which is a prize presented to enterprises that improve the quality of life in urban environment. Since 2010, the Music for Peace continues the symphonic music education at its own place. In 2011, Music for Peace gained foundation status, and started to accept donations as musical instruments for children who attend the courses. On July 2013, IKSV (Istanbul Culture and Arts Foundation) became the institutional partner of Music for Peace Foundation and in June 2014, the foundation signed up to join El Sistema’s global program. Now in 2015, the foundation has three ensembles: the Music for Peace Orchestra, which consists of two orchestras practicing and performing in different levels; the Music for Peace Chorus, which has joined Istanbul International Polyphonic Choruses Festival; and the recently established Music for Peace Brass Ensemble.Keywords: El Sistema, music education, music for peace, socialization
Procedia PDF Downloads 421199 Combating Money Laundering and Inroads into Banking Secrecy: Evidence from Malaysia
Authors: Aspalella A. Rahman
Abstract:
It is widely accepted that the investigation of money laundering and the tracing and confiscation of criminal proceeds have intruded into the principles of banking secrecy. The inroads into banking secrecy present serious threats to democracy, and more importantly, to the traditional banker-customer relationship. It is generally accepted that the fight against money laundering is in conflict with the secrecy rule. Banking secrecy is a customer privilege whereas combating crime is critical for public safety and security. Indeed, achieving a proper balance is a desirable goal. But how we go about achieving such a balance is a question encountered by many law enforcement authorities. Therefore, this paper examines the effect of disclosure under the Malaysian anti-money laundering laws on the traditional duty of banks to keep the customer’s information confidential. It also analyzes whether the Malaysian laws provide a right balance between a duty to keep customer’s information secret and a duty to disclose such information in the fight against money laundering. On closer inspection, it is submitted that the Malaysian laws provide sufficient safeguards to ensure that the disclosure of customer’s information is carried out in a manner that is not prejudicial to the interest of legitimate customers. This is a positive approach that could protect the innocent customers from being mistreated by the law. Ultimately, it can be said that the growing threat of global money laundering and terrorism makes the overriding of banking secrecy justified because without a flow of information from the banks, the effective prevention of the menace is not possible.Keywords: anti-money laundering law, banker-customer relationship, banking secrecy, confidentiality, money laundering
Procedia PDF Downloads 429198 Bringing Feminist Critical Pedagogy to the ESP Higher Education Classes: Feasibility and Challenges
Authors: Samira Essabari
Abstract:
What, unfortunately, governs the Moroccan educational philosophy and policy today is a concerning neoliberal discourse with its obsession with market logics and individualism. Critical education has been advocated to resist the neoliberal hegemony since it holds the promise to reclaim the social function of education. Significantly, the mounting forms of sexism and discrimination against women combined with hegemonic educational practices are jeopardizing the social function of teaching and learning, hence the relevance of feminist critical pedagogy. A substantial body of research worldwide has explored the ways in which feminist pedagogy can develop feminist consciousness and examine power relations in different educational contexts. In Morocco, however, the feasibility of feminist pedagogy has not been researched despite the overwhelming interest in gender issues in different educational settings. The research on critical pedagogies in Morocco remains very promising. Yet, most studies were conducted in contexts which are already engaged with issues of theory, discourse, and discourse analysis. The field of ESP ( English for Specific Purposes) is pragmatic by nature, and priority in research has been given to questions that adhere to the mainstream concerns of need analysis and study skills and ignore issues of power, gender power relations, and intersectional forms of oppression. To address these gaps in the existing literature, this participatory action research seeks to investigate the feasibility of Feminist pedagogy in ESP higher education and how it can foster feminist critical consciousness among ESP students without compromising their language learning needs. The findings of this research will contribute to research on critical applied linguistics and critical ESP more specifically and add to the practice of critical pedagogies in Moroccan higher education by providing in-depth insights into the enablers and barriers to the implementation of feminist critical pedagogy, which is still feeling its way into the educational scene in Morocco.Keywords: feminist pedagogy, critical pedagogy, power relations, gender, ESP, intersectionality
Procedia PDF Downloads 130197 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 97196 Composite Approach to Extremism and Terrorism Web Content Classification
Authors: Kolade Olawande Owoeye, George Weir
Abstract:
Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.Keywords: sentiposit, classification, extremism, terrorism
Procedia PDF Downloads 280195 Representation of Islamophobia on Social Media: Facebook Comments Analysis
Authors: Nadia Syed
Abstract:
The digital age has inevitably changed the way in which hate crime is committed. The cyber world has become a highly effective means for individuals and groups to be targeted, harmed, and marginalized , largely through online medium. Facebook has become one of the fastest growing social media platforms. At the end of 2013, Facebook had 1,23bn monthly active users and 757 million daily users who log onto Facebook. Within this online space, there are also an increasing number of online virtual communities, and hate groups who are using this freedom to share a violent, Islamophobic and racist description which attempts to create a aggressive virtual environment. This paper is a research on the rise of Islamophobia and the role of media in spreading it. This paper focusing on how the media especially Facebook is portraying Islam as the religion which promotes violence and ultimately playing a significant role in the global rise of Islamophobia against Muslims. It is important to analyse these ‘new’ communities by monitoring the activities they conduct, because the material they post, potentially can have a harmful impact on community cohesion within society. Additionally, as a result of recent figures that shows an increase in online anti-Muslim abuse, there is a pertinent need to address the issue about Islamophobia on social media. On the whole, this study found Muslims being demonized and vilified online which had manifested through negative attitudes, discrimination, stereotypes, physical threats and online harassment which all had the potential to incite violence or prejudicial action because it disparages and intimidates a protected individual or group.Keywords: Islamophobia, online, social media, facebook, internet, extremism
Procedia PDF Downloads 93194 Stimulating Policy for Attracting Foreign Direct Investment in Georgia
Authors: G. Erkomaishvili, M. Kobalava, T. Lazariashvili, N. Damenia
Abstract:
Current state of foreign direct investment (FDI) in Georgia is analyzed and evaluated in the paper, the existing legislative background for regulating investments and stimulating policies to attract investments are shown. It is noted that in developing countries encouragement of investment activity, support and implementation are of the most important tasks, implying a consistent investment policy, investor-friendly tax regime and the legal system, reducing administrative barriers and restrictions, fare competitive conditions and business development infrastructure. The work deals with the determining factor of FDIs and the main directions of stimulation, as well as prospective industries where new investments are needed. Contributing and hindering factors and stimulating measures are analyzed. As a result of the research, the direct and indirect factors attracting FDI have been identified. Facilitating factors to FDI inflow are as follows: simplicity of starting business, geopolitical location, low taxes, access to credit, ease of ownership registration, natural resources, low burden of regulations, low level of corruption and low crime rates. Hindering factors to FDI inflow are as follows: small market, lack of policy for attracting investments, low qualification of the workforce (despite the large number of unemployed people it is difficult to find workers with necessary special skills and qualifications), high interest rates, instability of national currency exchange rate, presence of conflict zones within the country and so forth.Keywords: foreign direct investment, investor, investment attracting marketing policies, reinvestment
Procedia PDF Downloads 261193 Consent, Agency and Abuse: Intimate Partner Violence in the Indian Context: A Primary Study Based on Working Women from Lower Income Groups in Smart Cities across North India
Authors: Shirin Abbas, Sandeep Kumar Dubey
Abstract:
Intimate partner violence (IPV) is one of the most common forms of gender-based violence (GBV) and is classified as discrimination on the basis of gender. Article 2 of the non-binding UN Declaration on the Elimination of Violence against Women (DEVAW). This was adopted in 1993 as the first international pronouncement regarding violence against women, including physical, sexual, and psychological violence in the family (i.e., domestic violence, marital rape, battery, statutory rape, rape by male members of the family, etc.) While crime against women continues unabated, the Indian government has strongly refuted the 2018 study by the Thomson Reuters Foundation categorizing India as a risky country for women due to the high risk of sexual violence and being forced into slave labour, according to a poll of global experts. This paper has explored consent, agency, and abuse through the lens of intimate partner violence among women from lower income groups in smart cities in the state of Uttar Pradesh, India. Using focused mapping, the paper has explored the situation on IPV internationally and studied the status of working women from lower income groups to ascertain if their lot was any different where IPV was concerned to study. The findings of the study also vindicate global reports which rate India as a country unsafe for women, even within marriage.Keywords: consent and agency, domestic violence, gender based violence GBV, intimate partner violence IPV
Procedia PDF Downloads 74