Search results for: criminal law reform
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 862

Search results for: criminal law reform

352 Accounting Legislation, Corporate Governance Codes and Disclosure in Jordan

Authors: Ayman Haddad, Wafaa Sbeiti, Amr Qasem

Abstract:

The main aim of this paper is to provide an overview of the most influential economic changes and accounting legislation affecting financial reporting and disclosure practices in Jordan. It also provides an overview of disclosure studies conducted in Jordan covering the year(s) between 1986 and 2014. The economic changes in Jordan required conducting economic reform and revising/issuing new regulations and financial market reforms that led to an improvement in disclosure practices. The issuance of Temporary Securities Law and its Directives of Disclosure in 1997, which came into effect in 1998, is considered as the turning point in the improvement of disclosure practice in Jordan. Based on a review of prior disclosure studies, we conclude that disclosure practices have improved overtime. We also observe that that firm size as a factor has always affected the level of disclosure in Jordan and followed by external auditing while liquidity was found to have the least effect. The paper also addresses the disclosure items required in Corporate Governance Codes that exist for listed shareholding companies, banks, and insurance companies. Finally, the paper discusses the quality of accounting education in Jordan since prior studies noted its impact on accounting practice.

Keywords: accounting legislation, corporate governance, disclosure practice, Jordan

Procedia PDF Downloads 349
351 Face Recognition Using Eigen Faces Algorithm

Authors: Shweta Pinjarkar, Shrutika Yawale, Mayuri Patil, Reshma Adagale

Abstract:

Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this, demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application. Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this , demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application.

Keywords: face detection, face recognition, eigen faces, algorithm

Procedia PDF Downloads 345
350 A Historical Overview of the General Implementation of the European Union Market Abuse Directive in the United Kingdom before the Brexit and Its Future Implications

Authors: Howard Chitimira

Abstract:

The European Union (EU) was probably the first body to establish multinational anti-market abuse laws aimed at enhancing the detection and curbing of cross-border market abuse activities in its member states. Put differently, the EU Insider Dealing Directive was adopted in 1989 and was the first law that harmonised the insider trading ban among the EU member states. Thereafter, the European Union Directive on Insider Dealing and Market Manipulation (EU Market Abuse Directive) was adopted in a bid to improve and effectively discourage all the forms of market abuse in the EU’s securities and financial markets. However, the EU Market Abuse Directive had its own gaps and flaws. In light of this, the Market Abuse Regulation and the Criminal Sanctions for Market Abuse Directive were enacted to repeal and replace the EU Market Abuse Directive in 2016. The article examines the adequacy of the EU Market Abuse Directive and its implementation in the United Kingdom (UK) prior to the British exit (Brexit). This is done to investigate the possible implications of the Brexit referendum outcome of 23 June 2016 on the future regulation of market abuse in the UK.

Keywords: market abuse, insider trading, market manipulation, European Union, United Kingdom

Procedia PDF Downloads 241
349 Examining K-12 In-Service Teachers’ Comfort Level with the Social Model of Disability and Its Impact on Inclusive Measures in the Classroom

Authors: Frederic Fovet

Abstract:

Inclusive provisions have been statutorily mandated in North America for now over two decades. Despite a growing body of literature around inclusive practices, many in-service teachers continue to express difficulties when it comes to tangible implementation of inclusion in the everyday classroom. While there is debate around the various forms inclusion can take (UDL, differentiation, personalization, etc.), there appears to be a more significant hurdle in getting in-service teachers to fully embrace inclusion both as a goal and a practice. This paper investigates teachers’ degree of awareness around the Social Model of Disability. It argues that teachers often lack basic awareness of disability studies, more particularly of the Social Model of Disability, and that this has a direct impact on their capacity to conceptualize and embrace inclusion. The paper draws from the researcher’s experience as a graduate instructor with in-service teachers, as well as from his experience as a consultant working with schools and school boards. The methodology chosen here is phenomenology, and it draws on tools such as auto-ethnography. The paper opens a discussion around the reform and transformation of pre-service teacher training. It argues that disability studies should be integrated into teacher training as it plays a key role in having teachers develop a theoretical understanding of disability as a social construct.

Keywords: disability, K-12, inclusion, social model, in-service teachers

Procedia PDF Downloads 175
348 Prison Pipeline or College Pathways: Transforming the Urban Classroom

Authors: Marcia J. Watson

Abstract:

The “school-to-prison pipeline” is a widely known phenomenon within education. Although data surrounding this epidemic is daunting, we coin the term “school-to-postsecondary pipeline” to explore proactive strategies that are currently working in K-12 education for African American students. The assumption that high school graduation, postsecondary matriculation, and social success are not the assumed norms for African American youth, positions the term “school-to-postsecondary pipeline” as the newly casted advocacy term for African American educational success. Using secondary data from the Children’s Defense Fund and the U.S. Department of Education’s Office of Civil Rights, we examine current conditions of educational accessibility and attainment for African American students, and provide effective strategies for classroom teachers, administrators, and parents to use for the immediate implementation in schools. These strategies include: (a) engaging instruction, (b) relevant curriculum, and (c) utilizing useful enrichment and community resources. By providing proactive steps towards the school-to-postsecondary pipeline, we hope to counter the docility of the school-to-prison pipeline as the assumed reality for African American youth.

Keywords: college access, higher education, school-to-prison pipeline, urban education reform

Procedia PDF Downloads 524
347 The Difficulties Encountered in Overseeing Learner-Centered Instructional Activities for Elementary School Children in Ho Chi Minh City, Vietnam

Authors: Van Son Huynh, Thanh Huan Nguyen, Tat Thien Do, Thi Mai Thu Nguyen, Thien Vu Giang

Abstract:

Given the necessity for substantial and all-encompassing educational reform, particularly in elementary Education, it is imperative to prioritize learner-centered instruction at the elementary level. This study focuses on the difficulties encountered in overseeing learner-centered instructional activities for elementary school children in Ho Chi Minh City (HCMC), the largest city in Vietnam in terms of population. Although learner-centered solutions have been implemented, there are still certain weaknesses, including an emphasis on content and worries about lax monitoring. The purpose of this study, named "Management of Learner-Centered Teaching Activities for Primary School Students in HCMC," is to enhance and advance theories related to the management of learner-centered teaching activities. The study evaluates the present condition of learner-centered teaching activities and management practices in HCMC, aiming to suggest solutions for improving the efficiency of managing such activities in primary schools.

Keywords: primary school, school children in Ho Chi Minh City, learner-centered instructional activities, learner-centered teaching activities and management.

Procedia PDF Downloads 59
346 The Battle Against Corruption in Indonesia’s Municipalities

Authors: Edy Wahyu Susilo

Abstract:

This research discusses a comparative analysis of various anti-corruption responses of three Indonesian City Governments (Jakarta, Surabaya, and Medan) and completes previous findings on the effectiveness of the city anti-corruption program. Some factors (transparency, accountability, leadership, law enforcement, and bureaucratic reform) have been chosen in this study to diagnose the main role in the success and the failure of anti-corruption programs in these cities. These factors diagnose the relationship between factors and their dominancy, which is then utilized to create the city’s strategic anti-corruption programs. Although this study found leadership had a dominant influence both in encouraging and discouraging the performance of city transformation drastically, however, it is not the only factor that determined the performance of the city in the fight against corruption. It needs other factors as an ideal balancing element to achieve an anti-corruption program, namely KPK’s intervention and public engagement. Based on the dominance factors found, this research then develops an appropriate strategy using a policy evaluation approach to create a real practical guide regardless of the existence of good or bad leadership in the city. This research is expected to be a useful reference for stakeholders, especially the government, as a blueprint to prevent corruption by considering several important steps and guidance in efforts to eradicate corruption in the city, especially in Indonesia.

Keywords: intervention, KPK (corruption eradication commission), law enforcements, leadership, policy evaluation

Procedia PDF Downloads 88
345 Aliens in Space: Reflections on an Applied Theatre Project in a Medium Secure Hospital

Authors: Ashley Barnes

Abstract:

This paper will consider the ways in which varied notions of Space played a central role in a 12-week drama project with patients in a Medium Secure Hospital in the UK. In the project, the patients devised and performed a series of sketches, inspired by Science Fiction films, which echoed their own experience of alienation. During the project, the familiar and rigorously regulated Activity Room became a site of imagination, adventure and laughter; transforming the atmosphere of the hospital and allowing the patients to be transported to another space entirely. A space that was as much in their heads as in the physical domain. It will be argued that, although work created in an institution such as a Medium Secure Hospital is infused with hegemonic associations and meanings, the starting point for such work should be to seek an empty space in which the participants can allow their imaginations to be released. This work sits within a range of contexts and will be consciously interdisciplinary. It will draw from Human Geography and Criminology, as well as Performance and Applied Theatre Literature. It is hoped that this paper will build upon the literature that relates to the very particular environment of Secure Hospitals and to provide a starting point for further practical exploration.

Keywords: criminal justice, mental health, science fiction films, space and place

Procedia PDF Downloads 206
344 Social Inclusion of Rural Elderly Left Behind by Internal Labor Migration: A Case Study in a Chinese Rural Village in Anhui Province

Authors: Lei Liu

Abstract:

Since the famous opening up and reform strategy of China, lots of migrants have flowed from rural areas to urban areas. In this paper, the author investigates the rural elderly left behind, which are defined aged people left alone at home while their adult children have to migrant outside. This phenomenon is a quite general and serious social problem that cannot be ignored, accompanied by the process of urbanization and regional transferring of rural labor. The Chinese internal migration not only exerts great influence to China’s economy and urbanization but also obviously reduces the labor and care to rural aged people. Contrary to assumptions in some migration and aging studies, which show the inevitable negative effects of migration upon the old age care, the author highlights unique features in their daily strategies of house holding to integrate into society with the analysis of the conception of social inclusion. Through life history interviews with elderly left behind in one rural village, this article sheds light on three different factors of social inclusion, namely, economic inclusion, social identity and political inclusion and shows its necessaries to fully understand the status of the social wellbeing of rural elderly left behind.

Keywords: labor migration, elderly left behind, social inclusion, rural China

Procedia PDF Downloads 289
343 The Relevance of PISA Tests in the Decentralization of the Educational System in Romania

Authors: Nitu Marilena Cristina

Abstract:

Decentralization of the education system is an educational policy option necessary from the perspective of democratizing internal life and streamlining service administration public. The experience of recent years has shown that decisions taken at central level do not to take into account all situations and especially all the specific needs and interests of the various institutions and individuals. A democratic society implies that the decision-making process is brought closer to the place of application, allowing citizens to take part in the decision-making that affects them directly or indirectly. Essentially decentralization of pre-university education is the transfer of authority, responsibility and resources in decision-making and general management, and financially to the educational units and the local community. This creates a frame of an effective collaboration between school and community. Modern theories on the leadership of education advocate the adoption of decentralization measures and participatory strategies. Numerous countries confronted with the educational impasse has appealed to these strategies. Reforming projects have begun application diversified and nuanced social decentralization models according to the specific social and educational situation. Analysis of legal provisions and measures adopted in the framework of the reform process indicates that, at least formally, decentralization is the solution chosen.

Keywords: decentralization, educational, management, reforming

Procedia PDF Downloads 154
342 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 315
341 The Case of ESPRIT (HigherSchool of Engineering)

Authors: Amira Potter

Abstract:

Since three years, ESPRIT has adopted project-based learning across its curricula. The philosophy behind this reform is to prepare its future engineers to become more operational once they integrate the workplace. It allows them to learn all the required skills expected from them by their future employers. This learner-centered method helps the students take responsibility for their own learning, solve real-world problems and carry out muli-faceted projects. Therefore, the teacher who used to be considered as the detainer of the knowledge has become more of a facilitator and a coach, encouraging their students’ learning process. This innovative way to English teaching has enabled the students to learn the English language differently. The target language is learnt cooperatively through group work, presentations, debating and many other communicative activities. The speaking skill in English language remains by far the most challenging skill for Tunisian students with an educational background based on Arabic as a first language and French as a second language. The student’s initial resistance to speak English in front of their classmates and the way they end up performing their work, shows the real progress they managed to achieve through PBL approach. The article will focus on the positive impact PBL has had on oral fluency among Esprit engineering students and how it has been achieved. It will also describe how speaking skill is taught and assessed at ESPRIT.

Keywords: cooperative, engineer, innovative, project-based learning

Procedia PDF Downloads 309
340 Importance of Cadastral Infrastructure in Rural Development

Authors: Saban Inam, Necdet Sahiner, Tayfun Cay

Abstract:

Environmental factors such as rapid population growth, changing economic conditions, desertification and climate change increase demand for the acquisition and use of land. Demands on the land are increasing due to the lack of production of soils and scarcity. This causes disagreements on the land. Reducing the pressure on the land and protecting the natural resources, public investments should be directed economically and rationally. This will make it possible to achieve equivalent living conditions between the rural area and the urban area. Initiating the development from the rural area and the cadastre needs to be redefined to allow the management of the land. The planned, regular, effective agriculture and rural development policies that Turkey will implement in the process of European Union membership will also significantly shape Turkey's position in the European Union. For this reason, Turkey enjoys the most appropriate use of natural resources, which is one of the main objectives of the European Union's recent rural development policy. This study deals with the urgent need to provide cadastral data infrastructure that will form the basis for land management which is supposed to support economic and societal sustainable development in rural and urban areas.

Keywords: rural development, cadastre, land management, agricultural reform implementation project, land parcel identification system

Procedia PDF Downloads 556
339 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 264
338 Ways for the Development of the Audit Quality Control System through the Analysis of Ongoing Problems, Experience and Challenges: Example of the Republic of Georgia

Authors: Levan Sabauri

Abstract:

Audit is an independent inspection of the financial statement of the audited person and expresses the opinion of an auditor on the reliability of this statement. The auditor’s activity (auditor’s service) is realized by auditing organizations, individual auditors in connection to conduction of an audit and rendering of audit accompanying services. The profession of auditor means a high level of responsibility for rendered service. Results of decisions made by information users depend on the quality of the auditor’s conclusion. Owners, investors, creditors, and society rely on the opinion of the auditor under the condition that inspection was conducted with good quality. Therefore, the existence of the well-functioning audit quality control system for the administering of the audit is an important issue. An efficient audit quality control system is a substantial challenge that many countries face worldwide, especially those states where these systems are being formed within the respective reform program. The presented article reflects on the best practices of the leading countries, the assumptions and recommendations for the financial accounting, reporting and audit; current reforms in Georgia are made based on this comparative analysis.

Keywords: audit quality control, audit program, financial statement, perspective analysis

Procedia PDF Downloads 145
337 Federalism and Foreign Affairs: The International Relations of Mexican Sub-State Governments

Authors: Jorge A. Schiavon

Abstract:

This article analyzes the international relations of sub-State governments (IRSSG) in Mexico. It aims to answer five questions: 1) What explains the recent and dramatic increase in their international activities? 2) What is the impact of federalism on the foreign affairs of the federal units? 3) What are the levels or degrees of IRSSG and how have they changed over the last years? 4) How do Mexican federal units institutionalize their international activities? 5) What are the perceptions and capacities of the federal units in their internationalization process? The first section argues that the growth in the IRSSG is generated by growing interdependence and globalization in the international system, and democratization, decentralization and structural reform in the national arena. The second section sustains that the renewed Mexican federalism has generated the incentives for SSG to participate more intensively in international affairs. The third section defends that there is a wide variation in their degree of international participation, which is measured in three moments in time (2004 2009 and 2014), and explains how this activity has changed in the last decade. The fourth section studies the institutionalization of the IRSSG in Mexico through the analysis of Inter-Institutional Agreements (IIA). Finally, the last section concentrates in explaining the perceptions and capacities of Mexican sub-State governments to conduct international relations.

Keywords: federalism, foreign policy, international relations of sub-state governments, paradiplomacy, Mexico

Procedia PDF Downloads 136
336 The Impact of the Saudi New E-Commerce Law on Protecting E-Commerce Investments in Saudi Arabia

Authors: Faris Algarni

Abstract:

The Kingdom of Saudi Arabia adopted a new law of e-commerce on July 10, 2019, which is the first Saudi law regarding e-commerce. The practice of e-commerce has been started in Saudi Arabia a few years ago with no specific rules to govern e-commerce in the Kingdom. The adoption of the law raises the concern of the ability of the law to provide real protection to both the investors and the customers. Based on that, this article seeks to respond to some questions related to the protection of investors of e-commerce in Saudi Arabia, using a quantitative method through questionnaires to gather primary data. The study tried to find the impact of adopting a new Saudi law of e-commerce on the protection of the investors from the point of view of those investors. By answering this main question, this article provides an answer to the question of whether there is a need to reform the Saudi law of e-commerce to convince existing and potential foreign investors to invest in the Kingdom through e-commerce. Questions were put to the respondents to determine their level of satisfaction with the Saudi law of e-commerce and what reforms to that system would enhance the attractiveness of the Kingdom as an investment environment for e-commerce investors, based on the information gathered and the analysis of them. A key finding is that the law of e-commerce is a core factor in the decision of investors to continue investing in the e-commerce market in Saudi Arabia. A subsequent finding is that some of the respondents are not fully satisfied with the new law and think that the law provides more protection to the customers than the investors. So, they are suggesting some legal reforms to be implemented in the bylaw of e-commerce, which is not adopted yet in order to attract them to continue investing in the Kingdom.

Keywords: e-commerce, law, investors, protection, Saudi Arabia

Procedia PDF Downloads 111
335 Human Trafficking in Your Backyard: Know the Signs and How to Help

Authors: Jessie Fazel, Kristen Smith

Abstract:

Human trafficking is a multi-billion-dollar criminal industry that affects 24.9 million people around the world. There are several different types of trafficking, the most common being sex trafficking, labor trafficking, and domestic servitude. Survival sex is common in the pediatric population, as they engage in sex for food, a place to sleep, or other basic needs. Statistics show that health care workers are at a unique advantage to help identify victims and get them the help they need, as 88% of trafficked victims encounter a health care worker while being trafficked. Unfortunately, victims don’t usually self-identify that they are being trafficked and the situations they face can vary dramatically. It is imperative to remember that traditional red flags are not always present in the pediatric population. Risk factors and red flags with their history and physical exam are one of the best indicators that health care providers need to be vigilant in looking at. There are numerous barriers for disclosure in the healthcare setting. Periods of time before and after disclosure are often emotionally difficult and could be dangerous for the victim. It is extremely important to have a plan in place for intervention if the victim does disclose trafficking. A trauma informed approach to medical and mental health interventions, that focus on safety, are vital in this population. This is happening where you live and you can make a difference in their lives.

Keywords: human trafficking, public health, emergency medicine, sexual health

Procedia PDF Downloads 22
334 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 350
333 Application of XRF and Other Principal Component Analysis for Counterfeited Gold Coin Characterization in Forensic Science

Authors: Somayeh Khanjani, Hamideh Abolghasemi, Hadi Shirzad, Samaneh Nabavi

Abstract:

At world market can be currently encountered a wide range of gemological objects that are incorrectly declared, treated, or it concerns completely different materials that try to copy precious objects more or less successfully. Counterfeiting of precious commodities is a problem faced by governments in most countries. Police have seized many counterfeit coins that looked like the real coins and because the feeling to the touch and the weight were very similar to those of real coins. Most people were fooled and believed that the counterfeit coins were real ones. These counterfeit coins may have been made by big criminal organizations. To elucidate the manufacturing process, not only the quantitative analysis of the coins but also the comparison of their morphological characteristics was necessary. Several modern techniques have been applied to prevent counterfeiting of coins. The objective of this study was to demonstrate the potential of X-ray Fluorescence (XRF) technique and the other analytical techniques for example SEM/EDX/WDX, FT-IR/ATR and Raman Spectroscopy. Using four elements (Cu, Ag, Au and Zn) and obtaining XRF for several samples, they could be discriminated. XRF technique and SEM/EDX/WDX are used for study of chemical composition. XRF analyzers provide a fast, accurate, nondestructive method to test the purity and chemistry of all precious metals. XRF is a very promising technique for rapid and non destructive counterfeit coins identification in forensic science.

Keywords: counterfeit coins, X-ray fluorescence, forensic, FT-IR

Procedia PDF Downloads 476
332 Discussion about Frequent Adjustment of Urban Master Planning in China: A Case Study of Changshou District, Chongqing City

Authors: Sun Ailu, Zhao Wanmin

Abstract:

Since the reform and opening, the urbanization process of China has entered a rapid development period. In recent years, the authors participated in some projects of urban master planning in China and found a phenomenon that the rapid urbanization area of China is experiencing frequent adjustment process of urban master planning. This phenomenon is not the natural process of urbanization development. It may be caused by different government roles from different levels. Through the methods of investigation, data comparison and case study, this paper aims to explore the reason why the rapid urbanization area is experiencing frequent adjustment of master planning and give some solution strategies. Firstly, taking Changshou district of Chongqing city as an example, this paper wants to introduce the phenomenon about frequent adjustment process in China. And then, discuss distinct roles in the process between national government, provincial government and local government of China. At last, put forward preliminary solutions strategies for this area in China from the aspects of land use, intergovernmental cooperation and so on.

Keywords: urban master planning, frequent adjustment, urbanization development, problems and strategies, China

Procedia PDF Downloads 352
331 Exploring the Mechanisms of Quality Assurance in the Chinese Translation Industry

Authors: Youru Zhou

Abstract:

This paper seeks to unveil the quality assurance practices in the Chinese translation industry. Since China’s reform and opening up, the Chinese language service industry has enjoyed impressively rapid growth. However, while still in its early stage of professionalization, the Chinese translation industry is also facing many challenges, such as the lack of clear admission requirements, a powerful regulation authority and a great number of qualified professionals. ‘How quality is assured’ means a great deal to translation in China at this stage. In order to examine the mechanisms in which quality is assured, this paper studied four international and national standards that have gained widespread adoption by Chinese translation companies and examined the content that is relevant to translation quality assurance. Case studies with six selected Chinese translation companies of different sizes were conducted to confirm and exemplify the descriptions on the standards. It has been found that quality in the industry is a relative concept which is mainly determined by the demand of clients. Furthermore, the procedures of translation can vary from task to task dependent on the agreement made between the service provider and clients. Finally, there are companies relying on expert-oriented mechanisms to assure the quality of translation, while other companies and standards insist on process-oriented ones.

Keywords: case study, Chinese translation industry, professional practice, translation quality assurance, translation standards

Procedia PDF Downloads 132
330 A Review of Lortie’s Schoolteacher

Authors: Tsai-Hsiu Lin

Abstract:

Dan C. Lortie’s Schoolteacher: A sociological study is one of the best works on the sociology of teaching since W. Waller’s classic study. It is a book worthy of review. Following the tradition of symbolic interactionists, Lortie demonstrated the qualities who studied the occupation of teaching. Using several methods to gather effective data, Lortie has portrayed the ethos of the teaching profession. Therefore, the work is an important book on the teaching profession and teacher culture. Though outstanding, Lortie’s work is also flawed in that his perspectives and methodology were adopted largely from symbolic interactionism. First, Lortie in his work analyzed many points regarding teacher culture; for example, he was interested in exploring “sentiment,” “cathexis,” and “ethos.” Thus, he was more a psychologist than a sociologist. Second, symbolic interactionism led him to discern the teacher culture from a micro view, thereby missing the structural aspects. For example, he did not fully discuss the issue of gender and he ignored the issue of race. Finally, following the qualitative sociological tradition, Lortie employed many qualitative methods to gather data but only foucused on obtaining and presenting interview data. Moreover, he used measurement methods that were too simplistic for analyzing quantitative data fully.

Keywords: education reform, teacher culture, teaching profession, Lortie’s Schoolteacher

Procedia PDF Downloads 218
329 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 77
328 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 271
327 The Legal Position of Criminal Prevention in the Metaverse World

Authors: Andi Intan Purnamasari, Supriyadi, Sulbadana, Aminuddin Kasim

Abstract:

Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values ​​achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research.

Keywords: crime, cyber, metaverse, law

Procedia PDF Downloads 138
326 Defying the Walls of Autocracy: The Role of the Catholic Church in the Resistance against Dictatorships in South Korea and the Philippines during the Early 1960s and Late 1980s

Authors: Marvin R. Tenecio

Abstract:

The analysis of "religious resistance" has been prevalent in Asian and Philippine studies. Discussions on religious resistance from a variety of perspectives are deemed as crucial turning points in the concept's ongoing development and expansion. By broadening the backdrop of religious protest between the early 1960s and the late 1980s, the researchers contend that a study examining the role carried by the Catholic Church in the upheavals against dictatorships in South Korea and the Philippines would be beneficial to the body of knowledge. This study examines a variety of historical writings about the activities occurring at that time. The researchers also compare and contrast the Catholic Church's contributions to the Korean and Philippine resistance against Park Chung-Hee and Ferdinand Marcos Sr., respectively, during the early 1960s until the late 1980s, using the lens of history from below, particularly the Pasyon and Revolution. The Catholic Church stood out against human rights abuses, promoted social justice, and mobilized the public for political reform in response to the dictatorships in South Korea and the Philippines. Even though the specific circumstances and personalities may have changed, the Church's position in both countries was vital in opposing authoritarian governments and supporting democratic movements.

Keywords: resistance, movements, catholic, church, dictatorship

Procedia PDF Downloads 63
325 A Progressive Techno-Legal Framework for Digital Evidence Management

Authors: Ayobami P. Olatunji, Saadat Ibiyeye, Abdulaziz Ibiyeye, Tahir M. Khan

Abstract:

Digital evidence has become a cornerstone in criminal investigations due to the vast amount of information available in digital form. Despite its prevalence, this evidence is often met with skepticism in court proceedings because of its inherently volatile nature. Traditional forensic processes, defined predominantly by technology experts, emphasize technical details in evidence collection while often neglecting legal procedures. This gap can pose significant challenges for legal practitioners in understanding and applying digital forensics. As digital evidence increasingly influences future cases, a cohesive framework integrating both technical and legal perspectives is essential. We propose a comprehensive techno-legal framework designed to bridge this gap. Our framework integrates key aspects of collection, preservation, examination, and documentation with legal components such as case building, certificate of compliance, cross-examination, and authorization. This balanced approach aims not to replace existing evidence presentation principles but to enhance the seamless integration of digital evidence into legal proceedings, addressing the common issues that lead to its dismissal.

Keywords: evidence presentation, warrant, digital-forensic, certificate of compliance, legal procedures, computer crime, violation, investigation cybercrime

Procedia PDF Downloads 10
324 Special Plea That The Prosecutor Does Not Have Title To Prosecute

Authors: Wium de Villiers

Abstract:

Section 106(1)(h) of the South African Criminal Procedure Act 51 of 1977 provides that an accused may enter a special plea that the prosecutor does not have title to prosecute. In a seminal matter (S v Mousa 2021 2 SACR 378 (GJ)) regarding section 106(1)(h), certain interesting legal aspects emerged. The first aspect concerned the meaning of the term “prosecutor”. More specifically, the question arose whether the term included a prosecutor who was previously involved with the matter, as well as the relevant Deputy Director of Public Prosecutions (DDPP) who instituted the prosecution and oversaw the prosecution on behalf of the state. The meaning of the term “title”, and with regard to the conduct of the “prosecutor”, the term “abuse of process,” were also raised and decided. In the paper, the facts, and the arguments in, and the decisions of the court, are discussed critically. The author argue that the intended objection in section 106(1)(h) is not to cure the abuse inflicted by a previous prosecutor or by the DDPP. I point out that the term “title” includes a lack of authority, non-compliance with jurisdictional requirements or absence of locus standi. I also point out that an abuse of process takes place if the process is used for an improper, ulterior or collateral purpose. I also argue that the accused should, instead of relying on section 106(1)(h), have relied on the prior agreement and applied for a permanent stay of prosecution.

Keywords: special plea, prosecutor, title, abuse of process

Procedia PDF Downloads 43
323 Contextualizing Torture in Closed Institutions

Authors: Erinda Bllaca Ndroqi

Abstract:

The dilemma with which the monitoring professionals are facing in today’s reality is whether to accept that prisons all over the world constitute a place where not all rights are respected (ethical approach), or widen the scope of monitoring by prioritizing the special needs of people deprived of their liberties (human right approach), despite the context and the level of improved prison condition, staff profiling, more services oriented towards rehabilitation instead of punishment. Such dilemma becomes a concern if taking into consideration the fact that prisoners, due to their powerlessness and 'their lives at the hand of the state', are constantly under the threat of abuse of power and neglect, which in the Albanian case, has never been classified as torture. Scientific research in twenty-four (24) Albanian prisons shows that for some rights, prisoners belonging to 'vulnerable groups' such as mental illness, HIV positive status, sexual orientation, and terminal illness remain quite challenged and do not ensure that their basic rights are being met by the current criminal justice system (despite recommendations set forwards to prison authorities by the European Committee for the Prevention of Torture and Inhuman or Degrading Treatment or Punishment (CPT)). The research orients more discussion about policy and strategic recommendations that would need a thorough assessment of the impact of rehabilitation in special categories of prisoners, including recidivists.

Keywords: prisons, rehabilitation, torture, vulnerability

Procedia PDF Downloads 122