Search results for: internet crimes
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1888

Search results for: internet crimes

1408 Reduction of Process of Evidence in Specific Forms of Criminal Proceeding: Problems and Risks

Authors: Filip Ščerba, Veronika Pochylá

Abstract:

Performing of the acts within criminal proceedings usually takes too long and thus this phenomenon can be regarded as one of the most burning problems which have plagued the criminal justice not only in the Czech Republic but at least all over Europe for the last few decades. This problem obviously has to be dealt with and thus the need to tackle this issue has resulted in the trend which is sometimes called Criminal Justice Rationalization, i.e. introducing and enforcing methods supporting the increase in efficiency of the criminal justice in order to make the criminal proceedings shorter and administrative procedure easier. This resulted in the introduction of institutes such as e.g. diversions in criminal proceedings or other forms of shortened pre-trial proceedings, which may be used primarily for dealing with less serious crimes. But also the institute, which was originally mentioned in connection with the system of criminal law in the countries belonging to the Anglo-Saxon legal order where it is frequently called of plea bargaining, has been introduced into the criminal law of many European countries, and it may be applied also in cases of serious crimes. All these special and shortened forms of criminal proceedings are connected with limited extent of process of evidence; in fact, some of these specific forms of criminal proceedings are designed for the purpose to simplify the process of evidence. That is also the reason, why some of these procedures are conditioned with the defendant’s confession. Main hypothesis: Limited process of evidence represents also a potential conflict with certain fundamental principles upon which the criminal proceeding in the Continental legal system is based. (A conflict with principle of material truth may be considered as the most important problem. This principle states that the bodies in criminal proceedings must clarify the facts of the case beyond reasonable doubt to such extent that a decision can be made; the defendant’s confession does not mean that these bodies are freed from the duty to review all the circumstances and facts of the case. Such principle is typical for criminal law in Central European region.) Basic methodologies: The paper is going to analyze such a problem of weakening of the principle of material truth in modern criminal law. Such analysis will be provided primarily on the base of the Czech criminal law, but also other legal regulations will be taken into consideration, and its result may have some relevance for all legal regulations belonging to the Continental legal system, so the paper offers also a comparison with legal systems of other Central European countries.

Keywords: burden of proof, central European countries, criminal justice rationalization, criminal proceeding, Czech legislation, Czech republic, defendant, diversions, evidence, fundamental principles, plea bargaining, pre-trial proceedings, principle of material truth, process of evidence, process of evidence

Procedia PDF Downloads 287
1407 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies

Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell

Abstract:

Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.

Keywords: smart farming, Internet of Things, communication layer, cyber-attack

Procedia PDF Downloads 242
1406 Computer Fraud from the Perspective of Iran's Law and International Documents

Authors: Babak Pourghahramani

Abstract:

One of the modern crimes against property and ownership in the cyber-space is the computer fraud. Despite being modern, the aforementioned crime has its roots in the principles of religious jurisprudence. In some cases, this crime is compatible with the traditional regulations and that is when the computer is considered as a crime commitment device and also some computer frauds that take place in the context of electronic exchanges are considered as crime based on the E-commerce Law (approved in 2003) but the aforementioned regulations are flawed and until recent years there was no comprehensive law in this regard; yet after some years the Computer Crime Act was approved in 2009/26/5 and partly solved the problem of legal vacuum. The present study intends to investigate the computer fraud according to Iran's Computer Crime Act and by taking into consideration the international documents.

Keywords: fraud, cyber fraud, computer fraud, classic fraud, computer crime

Procedia PDF Downloads 332
1405 Challenges for IoT Adoption in India: A Study Based on Foresight Analysis for 2025

Authors: Shruti Chopra, Vikas Rao Vadi

Abstract:

In the era of the digital world, the Internet of Things (IoT) has been receiving significant attention. Its ubiquitous connectivity between humans, machines to machines (M2M) and machines to humans provides it a potential to transform the society and establish an ecosystem to serve new dimensions to the economy of the country. Thereby, this study has attempted to identify the challenges that seem prevalent in IoT adoption in India through the literature survey. Further, the data has been collected by taking the opinions of experts to conduct the foresight analysis and it has been analyzed with the help of scenario planning process – Micmac, Mactor, Multipol, and Smic-Prob. As a methodology, the study has identified the relationship between variables through variable analysis using Micmac and actor analysis using Mactor, this paper has attempted to generate the entire field of possibilities in terms of hypotheses and construct various scenarios through Multipol. And lastly, the findings of the study include final scenarios that are selected using Smic-Prob by assigning the probability to all the scenarios (including the conditional probability). This study may help the practitioners and policymakers to remove the obstacles to successfully implement the IoT in India.

Keywords: Internet of Thing (IoT), foresight analysis, scenario planning, challenges, policymaking

Procedia PDF Downloads 147
1404 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 143
1403 The Influence of Students’ Learning Factor and Parents’ Involvement in Their Learning and Suspension: The Application of Big Data Analysis of Internet of Things Technology

Authors: Chih Ming Kung

Abstract:

This study is an empirical study examining the enrollment rate and dropout rate of students from the perspectives of students’ learning, parents’ involvement and the learning process. Methods: Using the data collected from the entry website of Internet of Things (IoT), parents’ participation and the installation pattern of exit poll website, an investigation was conducted. Results: This study discovered that in the aspect of the degree of involvement, the attractiveness of courses, self-performance and departmental loyalty exerts significant influences on the four aspects: psychological benefits, physical benefits, social benefits and educational benefits of learning benefits. Parents’ participation also exerts a significant influence on the learning benefits. A suitable tool on the cloud was designed to collect the dynamic big data of students’ learning process. Conclusion: This research’s results can be valuable references for the government when making and promoting related policies, with more macro view and consideration. It is also expected to be contributory to schools for the practical study of promotion for enrollment.

Keywords: students’ learning factor, parents’ involvement, involvement, technology

Procedia PDF Downloads 146
1402 Characteristics and Guiding Strategies of College Students' Online Discourse: Based on the Analysis of One Student Forum

Authors: Hanwei Cheng, Chengbei Xu, Yijie Wang

Abstract:

More and more college students are accustomed to surfing the Internet everyday. As community members, college students have ability to express opinions and participate in social affairs, they not only accept information passively, but also voice their concerns on the Internet. We interpret the online discourses featured with anonymization, so it helps us more effectively and conveniently understand the behaviors and thoughts of college students, and educators can thus grasp the scales and directions in guiding online language. We analyzed online comments in both content and form aspects in one student forum (named Dandan, the BNU’s campus forum), and through methods of literature review and interview, we found that in term of content, college students pay attention to practical information online, emphasize on personal development and pursue hot issues; in term of form, college students' online language displays cross-border quality sometimes under the general feature of normative, and they often explore a certain topic in the form of question or discussion, and they like to show feelings in ironic and stream-of-consciousness ways. It is argued that college students intend to establish a community to facilitate personal development and meet emotional needs through the student forum, and by making comments at the forum they are also able to get involved in public affairs. We should pay attention to problems of college students' online discourse, such as boundary issues (like informal advertisement and information authenticity), emotional issues and the spread of gossip. Some possible solutions to solving online discourse problems can be applied, like we can improve access systems of student forum, clarify principles of Internet langue use, change oversimplified management approaches and use some other tactics, in order to form a mechanism of student self-regulation, also deepen the trust and cooperation between school administrators and students.

Keywords: online language, youth discourse, content and form, implication and strategy

Procedia PDF Downloads 141
1401 Awareness and Utilization of Social Network Tools among Agricultural Science Students in Colleges of Education in Ogun State, Nigeria

Authors: Adebowale Olukayode Efunnowo

Abstract:

This study was carried out to assess the awareness and utilization of Social Network Tools (SNTs) among agricultural science students in Colleges of Education in Ogun State, Nigeria. Simple random sampling techniques were used to select 280 respondents from the study area. Descriptive statistics was used to describe the objectives while Pearson Product Moment Correlation was used to test the hypothesis. The result showed that the majority (71.8%) of the respondents were single, with a mean age of 20 years. Almost all (95.7%) the respondents were aware of Facebook and 2go as a Social Network Tools (SNTs) while 85.0% of the respondents were not aware of Blackplanet, LinkedIn, MyHeritage and Bebo. Many (41.1%) of the respondents had views that using SNTs can enhance extensive literature survey, increase internet browsing potential, promote teaching proficiency, and update on outcomes of researches. However, 51.4% of the respondents perceived that SNTs usage as what is meant for the lecturers/adults only while 16.1% considered it as mainly used by internet fraudsters. Findings revealed that about 50.0% of the respondents browsed Facebook and 2go daily while more than 80% of the respondents used Blackplanet, MyHeritage, Skyrock, Bebo, LinkedIn and My YearBook as the need arise. Major constraints to the awareness and utilization of SNTs were high cost and poor quality of ICTs facilities (77.1%), epileptic power supply (75.0%), inadequate telecommunication infrastructure (71.1%), low technical know-how (62.9%) and inadequate computer knowledge (61.1%). The result of PPMC analysis showed that there was an inverse relationship between constraints and utilization of SNTs at p < 0.05. It can be concluded that constraints affect efficient and effective utilization of SNTs in the study area. It is hereby recommended that management of colleges of education and agricultural institutes should provide good internet connectivity, computer facilities, and alternative power supply in order to increase the awareness and utilization of SNTs among students.

Keywords: awareness, utilization, social network tools, constraints, students

Procedia PDF Downloads 351
1400 The Analysis of the Effectiveness of the Children’s Act of 2009 in Curbing Child Sexual Abuse: A Case Study of Francistown and the Surrounding Areas

Authors: Gabaikanngwe Ethel Mambo, Kinyanjui Godfrey Gichuhi

Abstract:

The study analysed the Children’s Act of 2009 of Botswana in curbing child sexual abuse (CSA) in Francistown and its surroundings. The qualitative methodology was used to collect data. Retrospective reports of CSA were obtained from various departments dealing with children. The research findings revealed the ineffectiveness of the Children’s Act of 2009 in identifying and preventing CSA. The Act has failed to deter or prevent the offenders from committing crimes against children. The study demonstrated an increase in CSA cases that were never reported. Lack of skills by the justice system exacerbated sexual molestation. The study also revealed that most CSA cases were underreported. Lastly, the study demonstrated those child victims were sexually molested by someone known to them.

Keywords: sexual abuse, molestation, incest, child

Procedia PDF Downloads 104
1399 Building Energy Modeling for Networks of Data Centers

Authors: Eric Kumar, Erica Cochran, Zhiang Zhang, Wei Liang, Ronak Mody

Abstract:

The objective of this article was to create a modelling framework that exposes the marginal costs of shifting workloads across geographically distributed data-centers. Geographical distribution of internet services helps to optimize their performance for localized end users with lowered communications times and increased availability. However, due to the geographical and temporal effects, the physical embodiments of a service's data center infrastructure can vary greatly. In this work, we first identify that the sources of variances in the physical infrastructure primarily stem from local weather conditions, specific user traffic profiles, energy sources, and the types of IT hardware available at the time of deployment. Second, we create a traffic simulator that indicates the IT load at each data-center in the set as an approximator for user traffic profiles. Third, we implement a framework that quantifies the global level energy demands using building energy models and the traffic profiles. The results of the model provide a time series of energy demands that can be used for further life cycle analysis of internet services.

Keywords: data-centers, energy, life cycle, network simulation

Procedia PDF Downloads 147
1398 The Role of Social Media in the Success or Failure of a Revolution: A Comparative Case Study of 2008/2018 Revolutions in Armenia

Authors: Nane Giloyan

Abstract:

The rapid development of social networks in the 21st century increases the interests towards the role and impact of social media on the success or failure of a revolution. Even though studies are investigating the role of social media on the outcome of a revolution, still, the conclusions on this matter are ambiguous so far. Hence, this research aims to investigate the role of social media in the success or failure of a revolution and make a contribution to the literature gap. The study aims to examine the research question whether the use of social media explains the success or failure of revolutions in 2008 and 2018 in Armenia. The research question is investigated through content analysis of two cases; failed revolution in 2008 and the successful revolution in 2018 in Armenia. The secondary data analysis was based on information devoted to two revolutions using local and major international news articles, journal and critical articles, in Armenian, Russian and English, also videos, posts and live streams of the revolutionary leaders. There can be many factors explaining the success or failure of a revolution. However, the investigation of the factors and their role to explain the outcome of a revolution other than the use of social media is beyond the scope of this research study. The study holds other variables constant and concludes that in the cases of 2008 and 2018 revolutions in Armenia the mobilization of society through social media explains the differences in the outcomes (failed or successful). The comparative case study of the revolutions in 2008 and 2018 in Armenia emphasizes the important role and impact of the use of social media on the success or failure of a revolution. The results highlight that the use of the Internet, particularly social media and live streams, by the opposition was the essential difference between two revolutions. Social media platforms, live streams, and communication apps that were absent in the revolutionary situation in 2008 were fundamental to the Armenian Velvet Revolution in 2018. The changes in the situation in favor of the opposition, so the outcome of the protests, were mainly based on the Internet-based mobilization of the society. It is also important to take into consideration that the country experienced a great increase in penetration rates over the decade. The percentage of access to the Internet drastically increased between 2008 and 2018. This fact may help to have a clearer understanding of the use of the Internet and social media by the opposition and the reliance on social media by society. According to the results of the continent analysis, the use of social media to direct the protests and to mobilize the society, have a vital role and positive impact on the outcome of a revolution. Thus the study concludes that it is the use of social media to initiate, organize, and direct the protests that explain the success or failure of two Armenian revolutions.

Keywords: social media, revolution, Armenia, success, failure

Procedia PDF Downloads 129
1397 E-Commercial Enterprises' Behavior on China's Local Government's Economic Policy: An Example from Zhejiang Province

Authors: Chia-Chi Cheng

Abstract:

After the implementation of “the internet plus,” several puzzles emerge as below: why does China impose more regulation and laws on economic development on the Internet? Why does China urge the importance of manufacturing industry? Why does China’s local government passively implement the policy imposed by the central government? What kind of factors can influence China’s local government’s economic preference? In the framework of neo-institutionalism, this research considers China’s local government as changing agents to analyze its preferences and behavior. In general, the interests urged by the local government will decide its preference and behaviors. They will change its counterpart to cooperate if the change will bring more benefits. Thus, they will change its preference and behavior while the external environment alters. While the local government has the same definition on political activity and economic interest, they will prefer to cooperate with the local enterprises in the way of laying symbiont, within the presumption that the institution remains. While the local government has the different positions on political activity and economic interest, they will re-define the existed regulation or create new regulation in the condition of institution vacuum. Sequentially, they will replace the targets, and the policy, which does not fit in the Central government’s policy, will emerge.

Keywords: China, institutional change, government enterprise relationship, e-commercial policy

Procedia PDF Downloads 237
1396 Solving the Wireless Mesh Network Design Problem Using Genetic Algorithm and Simulated Annealing Optimization Methods

Authors: Moheb R. Girgis, Tarek M. Mahmoud, Bahgat A. Abdullatif, Ahmed M. Rabie

Abstract:

Mesh clients, mesh routers and gateways are components of Wireless Mesh Network (WMN). In WMN, gateways connect to Internet using wireline links and supply Internet access services for users. We usually need multiple gateways, which takes time and costs a lot of money set up, due to the limited wireless channel bit rate. WMN is a highly developed technology that offers to end users a wireless broadband access. It offers a high degree of flexibility contrasted to conventional networks; however, this attribute comes at the expense of a more complex construction. Therefore, a challenge is the planning and optimization of WMNs. In this paper, we concentrate on this challenge using a genetic algorithm and simulated annealing. The genetic algorithm and simulated annealing enable searching for a low-cost WMN configuration with constraints and determine the number of used gateways. Experimental results proved that the performance of the genetic algorithm and simulated annealing in minimizing WMN network costs while satisfying quality of service. The proposed models are presented to significantly outperform the existing solutions.

Keywords: wireless mesh networks, genetic algorithms, simulated annealing, topology design

Procedia PDF Downloads 458
1395 Project Marayum: Creating a Community Built Mobile Phone Based, Online Web Dictionary for Endangered Philippine Languages

Authors: Samantha Jade Sadural, Kathleen Gay Figueroa, Noel Nicanor Sison II, Francis Miguel Quilab, Samuel Edric Solis, Kiel Gonzales, Alain Andrew Boquiren, Janelle Tan, Mario Carreon

Abstract:

Of the 185 languages in the Philippines, 28 are endangered, 11 are dying off, and 4 are extinct. Language documentation, as a prerequisite to language education, can be one of the ways languages can be preserved. Project Marayum is envisioned to be a collaboratively built, mobile phone-based, online dictionary platform for Philippine languages. Although there are many online language dictionaries available on the Internet, Project Marayum aims to give a sense of ownership to the language community's dictionary as it is built and maintained by the community for the community. From a seed dictionary, members of a language community can suggest changes, add new entries, and provide language examples. Going beyond word definitions, the platform can be used to gather sample sentences and even audio samples of word usage. These changes are reviewed by language experts of the community, sourced from the local state universities or local government units. Approved changes are then added to the dictionary and can be viewed instantly through the Marayum website. A companion mobile phone application allows users to browse the dictionary in remote areas where Internet connectivity is nonexistent. The dictionary will automatically be updated once the user regains Internet access. Project Marayum is still a work in progress. At the time of this abstract's writing, the Project has just entered its second year. Prototypes are currently being tested with the Asi language of Romblon island as its initial language testbed. In October 2020, Project Marayum will have both a webpage and mobile application with Asi, Ilocano, and Cebuano language dictionaries available for use online or for download. In addition, the Marayum platform would be then easily expandable for use of the more endangered language communities. Project Marayum is funded by the Philippines Department of Science and Technology.

Keywords: collaborative language dictionary, community-centered lexicography, content management system, software engineering

Procedia PDF Downloads 163
1394 Online Self-Help Metacognitive Therapy for OCD: A Case Series

Authors: C. Pearcy, C. Rees

Abstract:

Cognitive behavioural therapy (CBT) and exposure and response prevention (ERP) are currently the most efficacious treatments for Obsessive-compulsive disorder (OCD). Many clients, however, remain symptomatic following treatment. As a result, refusal of treatment, withdrawal from treatment, and partial adherence to treatment are common amongst ERP. Such limitations have caused few professionals to actually engage in ERP therapy, which has warranted the exploration of alternative treatments. This study evaluated an online self-help treatment program for OCD (the OCD Doctor Online); a 4-week Metacognitive Therapy (MCT) program which has implemented strategies from Wells’ Metacognitive model of OCD. The aim of the present study was to investigate whether an online self-help treatment using MCT would reduce symptoms of OCD, reduce unhelpful metacognitions and improve quality of life. Treatment effectiveness was assessed using a case series methodology in 3 consecutively referred individuals. At post-treatment, all participants showed reductions in unhelpful metacognitive beliefs (MCQ-30) and improvements in quality of life (Q-LES-Q), which were maintained through to 4 week follow-up. Two of the three participants showed reductions in OCD symptomology (OCI-R), which were further reduced at 4-week follow-up. The present study suggests that internet-based self-help treatment may be an effective means of delivering MCT to adults with OCD.

Keywords: internet-based, metacognitive therapy, obsessive-compulsive disorder, self-help

Procedia PDF Downloads 434
1393 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 274
1392 Forensic Investigation: The Impact of Biometric-Based Solution in Combatting Mobile Fraud

Authors: Mokopane Charles Marakalala

Abstract:

Research shows that mobile fraud has grown exponentially in South Africa during the lockdown caused by the COVID-19 pandemic. According to the South African Banking Risk Information Centre (SABRIC), fraudulent online banking and transactions resulted in a sharp increase in cybercrime since the beginning of the lockdown, resulting in a huge loss to the banking industry in South Africa. While the Financial Intelligence Centre Act, 38 of 2001, regulate financial transactions, it is evident that criminals are making use of technology to their advantage. Money-laundering ranks among the major crimes, not only in South Africa but worldwide. This paper focuses on the impact of biometric-based solutions in combatting mobile fraud at the South African Risk Information. SABRIC had the challenges of a successful mobile fraud; cybercriminals could hijack a mobile device and use it to gain access to sensitive personal data and accounts. Cybercriminals are constantly looting the depths of cyberspace in search of victims to attack. Millions of people worldwide use online banking to do their regular bank-related transactions quickly and conveniently. This was supported by the SABRIC, who regularly highlighted incidents of mobile fraud, corruption, and maladministration in SABRIC, resulting in a lack of secure their banking online; they are vulnerable to falling prey to fraud scams such as mobile fraud. Criminals have made use of digital platforms since the development of technology. In 2017, 13 438 instances involving banking apps, internet banking, and mobile banking caused the sector to suffer gross losses of more than R250,000,000. The final three parties are forced to point fingers at one another while the fraudster makes off with the money. A non-probability sampling (purposive sampling) was used in selecting these participants. These included telephone calls and virtual interviews. The results indicate that there is a relationship between remote online banking and the increase in money-laundering as the system allows transactions to take place with limited verification processes. This paper highlights the significance of considering the development of prevention mechanisms, capacity development, and strategies for both financial institutions as well as law enforcement agencies in South Africa to reduce crime such as money-laundering. The researcher recommends that strategies to increase awareness for bank staff must be harnessed through the provision of requisite training and to be provided adequate training.

Keywords: biometric-based solution, investigation, cybercrime, forensic investigation, fraud, combatting

Procedia PDF Downloads 101
1391 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 143
1390 Human Rights Abuse in the Garment Factory in Bekasi Indonesia

Authors: Manotar Tampubolon

Abstract:

Although the Indonesian human rights protection has increased in recent years, but human rights violations still occur in the industrial sector. Crimes against human rights continue to occur and go unnoticed in spite of the government's legislation on human rights, employment law in addition to an international treaty that has been ratified by Indonesia. The increasing number of garment companies in Bekasi, also give rise to increased human rights violations since the government does not have a commitment to protect it. The Indonesian government and industry owners should pay attention to and protect the human rights of workers and treat them accordingly. This paper will review the human rights violations experienced by workers at garment factories in the context of the law, as well as ideas to improve the protection of workers' rights.

Keywords: human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 460
1389 Use of Smartphones in 6th and 7th Grade (Elementary Schools) in Istria: Pilot Study

Authors: Maja Ruzic-Baf, Vedrana Keteles, Andrea Debeljuh

Abstract:

Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network.

Keywords: education, smartphone, social networks, teenagers

Procedia PDF Downloads 452
1388 A Framework of Product Information Service System Using Mobile Image Retrieval and Text Mining Techniques

Authors: Mei-Yi Wu, Shang-Ming Huang

Abstract:

The online shoppers nowadays often search the product information on the Internet using some keywords of products. To use this kind of information searching model, shoppers should have a preliminary understanding about their interesting products and choose the correct keywords. However, if the products are first contact (for example, the worn clothes or backpack of passengers which you do not have any idea about the brands), these products cannot be retrieved due to insufficient information. In this paper, we discuss and study the applications in E-commerce using image retrieval and text mining techniques. We design a reasonable E-commerce application system containing three layers in the architecture to provide users product information. The system can automatically search and retrieval similar images and corresponding web pages on Internet according to the target pictures which taken by users. Then text mining techniques are applied to extract important keywords from these retrieval web pages and search the prices on different online shopping stores with these keywords using a web crawler. Finally, the users can obtain the product information including photos and prices of their favorite products. The experiments shows the efficiency of proposed system.

Keywords: mobile image retrieval, text mining, product information service system, online marketing

Procedia PDF Downloads 359
1387 Real-Time Mine Safety System with the Internet of Things

Authors: Şakir Bingöl, Bayram İslamoğlu, Ebubekir Furkan Tepeli, Fatih Mehmet Karakule, Fatih Küçük, Merve Sena Arpacık, Mustafa Taha Kabar, Muhammet Metin Molak, Osman Emre Turan, Ömer Faruk Yesir, Sıla İnanır

Abstract:

This study introduces an IoT-based real-time safety system for mining, addressing global safety challenges. The wearable device, seamlessly integrated into miners' jackets, employs LoRa technology for communication and offers real-time monitoring of vital health and environmental data. Unique features include an LCD panel for immediate information display and sound-based location tracking for emergency response. The methodology involves sensor integration, data transmission, and ethical testing. Validation confirms the system's effectiveness in diverse mining scenarios. The study calls for ongoing research to adapt the system to different mining contexts, emphasizing its potential to significantly enhance safety standards in the industry.

Keywords: mining safety, internet of things, wearable technology, LoRa, RFID tracking, real-time safety system, safety alerts, safety measures

Procedia PDF Downloads 63
1386 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 155
1385 Efficient Storage and Intelligent Retrieval of Multimedia Streams Using H. 265

Authors: S. Sarumathi, C. Deepadharani, Garimella Archana, S. Dakshayani, D. Logeshwaran, D. Jayakumar, Vijayarangan Natarajan

Abstract:

The need of the hour for the customers who use a dial-up or a low broadband connection for their internet services is to access HD video data. This can be achieved by developing a new video format using H. 265. This is the latest video codec standard developed by ISO/IEC Moving Picture Experts Group (MPEG) and ITU-T Video Coding Experts Group (VCEG) on April 2013. This new standard for video compression has the potential to deliver higher performance than the earlier standards such as H. 264/AVC. In comparison with H. 264, HEVC offers a clearer, higher quality image at half the original bitrate. At this lower bitrate, it is possible to transmit high definition videos using low bandwidth. It doubles the data compression ratio supporting 8K Ultra HD and resolutions up to 8192×4320. In the proposed model, we design a new video format which supports this H. 265 standard. The major areas of applications in the coming future would lead to enhancements in the performance level of digital television like Tata Sky and Sun Direct, BluRay Discs, Mobile Video, Video Conferencing and Internet and Live Video streaming.

Keywords: access HD video, H. 265 video standard, high performance, high quality image, low bandwidth, new video format, video streaming applications

Procedia PDF Downloads 354
1384 Factors Influencing the Continuance Usage of Online Mobile Payment Apps: A Case Study of WECHAT Users in China

Authors: Isaac Kofi Mensah, Jianing Mi, Feng Cheng

Abstract:

This research paper seeks to investigate the factors determining the continuance usage of online mobile payment applications among WECHAT users in China. Technology Acceptance Model (TAM) and the Diffusion of Innovation (DOI) theory would both be applied as the theoretical foundation for this study. A developed instrument would be administered to the targeted sample of 1000 WECHAT Users in the City of Harbin, China, through an online questionnaire administration platform. Factors such as perceived usefulness, perceived ease of use, perceived service quality, social influence, trust in the internet, internet self-efficacy, relative advantage, compatibility, and complexity would be explored to determine its significant impact on the continuance intention to use mobile payment apps. This study is at the development and implementation stage. The successful completion of this research article would not only provide an insightful understanding of the factors influencing the decision of WECHAT users in China to use mobile payment applications but also enrich the e-commerce adoption literature.

Keywords: diffusion of innovation (DOI), e-commerce, mobile payment, technology acceptance model (TAM), WECHAT

Procedia PDF Downloads 192
1383 Use of Social Media in Political Communications: Example of Facebook

Authors: Havva Nur Tarakci, Bahar Urhan Torun

Abstract:

The transformation that is seen in every area of life by technology, especially internet technology changes the structure of political communications too. Internet, which is at the top of new communication technologies, affects political communications with its structure in a way that no traditional communication tools ever have and enables interaction and the channel between receiver and sender, and it becomes one of the most effective tools preferred among the political communication applications. This state as a result of technological convergence makes Internet an unobtainable place for political communication campaigns. Political communications, which means every kind of communication strategies that political parties called 'actors of political communications' use with the aim of messaging their opinions and party programmes to their present and potential voters who are a target group for them, is a type of communication that is frequently used also among social media tools at the present day. The electorate consisting of different structures is informed, directed, and managed by social media tools. Political parties easily reach their electorate by these tools without any limitations of both time and place and also are able to take the opinions and reactions of their electorate by the element of interaction that is a feature of social media. In this context, Facebook, which is a place that political parties use in social media at most, is a communication network including in our daily life since 2004. As it is one of the most popular social networks today, it is among the most-visited websites in the global scale. In this way, the research is based on the question, “How do the political parties use Facebook at the campaigns, which they conduct during the election periods, for informing their voters?” and it aims at clarifying the Facebook using practices of the political parties. In direction of this objective the official Facebook accounts of the four political parties (JDP–AKParti, PDP–BDP, RPP-CHP, NMP-MHP), which reach their voters by social media besides other communication tools, are treated, and a frame for the politics of Turkey is formed. The time of examination is constricted with totally two weeks, one week before the mayoral elections and one week after the mayoral elections, when it is supposed that the political parties use their Facebook accounts in full swing. As a research method, the method of content analysis is preferred, and the texts and the visual elements that are gotten are interpreted based on this analysis.

Keywords: Facebook, political communications, social media, electrorate

Procedia PDF Downloads 382
1382 Legal Rights of Parents of Justice-Involved Youth in the United Arab Emirates

Authors: Yusra Ibrahim

Abstract:

Parental involvement in their children’s education and behavioral modification is important. This article provides a policy analysis that describes laws and public education regulations concerning justice-involved youth and youth at risk of delinquency in the United Arab Emirates. The article aims to clarify the UAE laws for parents and guardians regarding their involvement in addressing school violations and crimes committed by their children, particularly those with emotional and behavioral disorders, youths at risk for delinquency, and justice-involved youths. The article concludes with implications for parents, policymakers, and educators and suggests ways to improve services and support for these parents and their youth.

Keywords: justice-involved youth, parents, incarceration, incarcerated youth, United Arab Emirates.

Procedia PDF Downloads 43
1381 Criminal Liability for Criminal Tax

Authors: Theresia Simatupang dan Rahmayanti

Abstract:

Tax Law is a legal product and therefore should be subject to the legal norms, both about this actions, implementation, and about the material. Law has always aimed at providing justice, and besides that the law as a tool used to organize the order or rule of law. tax classification of a crime in this is very necessary, because the crime of taxation is very detrimental to the country and is still very high in society and socialization associated with punishment in sentencing that would have to provide a deterrent for the perpetrators, so refer to the this, these criminal offenses can endanger the stability of the nation's economy and the country that require special snacks. The application of legal sanctions against the perpetrators of the crime of taxation already has a strong legal basis, namely UU KUP. UU KUP have loaded threat (sanctions) severe punishment for tax payers who commit offenses and crimes in the field of taxation, which is contained in Article 38, and Article 39, Article 41, Article 41 A, and 41 B as well as Article 43 of Law and Law No. 12 KUP about 1985 Land Tax and Building. Criminal sanctions against violators of the tax provision are important because tax payers sanctions for violating tax laws.

Keywords: accountability, tax crime, criminal liability, taxation

Procedia PDF Downloads 341
1380 The Effect of Advertising on Brand Choices of Z Generation Children and Their Social Media Consumption Habits

Authors: Hüseyin Altubaş, Hasret Aktaş, A. Mücahid Zengin

Abstract:

Children determine the direction of the power of consumption. They affect the decisions of their parents but they also reached to a significant purchasing power themselves. Children, who are turning interactive behavior to normal behavior are becoming the decision makers in a company’s survival. Companies that analyze this effective target audience can communicate successfully with children. Children, who are interactive individuals, are closer to advertising. They are almost talking better with advertising. They are not afraid to express their likings, as well as their dislikes. Children have an interactive lifestyle and they were exposed to the vast changes in technology after year 2000. They do not know a life without internet, they spend mobile life in internet. This Z generation is the new determinants of brands. Z generation finds it appropriate to be brand ambassadors and they completely changed traditional media and traditional consumer behavior. These children live social reality with virtual reality and they feed brands differently. Brands that interact with Z generation are affected by this feeding positively, while brands that keep interaction in traditional levels are affected negatively. In this research we examine the communication, advertising and brand behaviors of Z generation. We especially analyze this generation’s interaction with social media brands and their interactive attitudes.

Keywords: social media, Z generation, children, advertising, brand choice

Procedia PDF Downloads 550
1379 Banking and Accounting Analysis Researches Effect on Environment

Authors: Michael Saad Thabet Azrek

Abstract:

The advanced facts era is becoming a vital element within the improvement of financial offerings enterprise, in particular, the banking enterprise. It has introduced new approaches to delivering banking to the patron, including Internet Banking. Banks started to observe digital banking (e-banking) as a means to update a number of their conventional branch features using the net as a brand-new distribution channel. A few purchasers have, as a minimum, a couple of accounts across banks and get the right of entry to these accounts using e-banking offerings. To study the contemporary net really worth role, clients ought to log in to each of their debts and get the info and paintings on consolidation. This not simplest takes enough time, but it's also a repetitive hobby at a specific frequency. To cope with this point, an account aggregation idea is introduced as an answer. E-banking account aggregation, as one of the e-banking types, appeared to construct a more potent dating with clients. Account Aggregation provider usually refers to a provider that permits clients to manage their financial institution debts maintained in distinct establishments through a not unusual net banking operating a platform, with an excessive situation to protection and privateness. This paper gives an outline of an e-banking account aggregation method as a new provider in the e-banking field.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 36