Search results for: civil forensics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 970

Search results for: civil forensics

940 O.MG- It’s a Cyber-Enabled Fraud

Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt

Abstract:

This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.

Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud

Procedia PDF Downloads 135
939 The Use of Artificial Intelligence in Digital Forensics and Incident Response in a Constrained Environment

Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane

Abstract:

Digital investigators often have a hard time spotting evidence in digital information. It has become hard to determine which source of proof relates to a specific investigation. A growing concern is that the various processes, technology, and specific procedures used in the digital investigation are not keeping up with criminal developments. Therefore, criminals are taking advantage of these weaknesses to commit further crimes. In digital forensics investigations, artificial intelligence is invaluable in identifying crime. It has been observed that an algorithm based on artificial intelligence (AI) is highly effective in detecting risks, preventing criminal activity, and forecasting illegal activity. Providing objective data and conducting an assessment is the goal of digital forensics and digital investigation, which will assist in developing a plausible theory that can be presented as evidence in court. Researchers and other authorities have used the available data as evidence in court to convict a person. This research paper aims at developing a multiagent framework for digital investigations using specific intelligent software agents (ISA). The agents communicate to address particular tasks jointly and keep the same objectives in mind during each task. The rules and knowledge contained within each agent are dependent on the investigation type. A criminal investigation is classified quickly and efficiently using the case-based reasoning (CBR) technique. The MADIK is implemented using the Java Agent Development Framework and implemented using Eclipse, Postgres repository, and a rule engine for agent reasoning. The proposed framework was tested using the Lone Wolf image files and datasets. Experiments were conducted using various sets of ISA and VMs. There was a significant reduction in the time taken for the Hash Set Agent to execute. As a result of loading the agents, 5 percent of the time was lost, as the File Path Agent prescribed deleting 1,510, while the Timeline Agent found multiple executable files. In comparison, the integrity check carried out on the Lone Wolf image file using a digital forensic tool kit took approximately 48 minutes (2,880 ms), whereas the MADIK framework accomplished this in 16 minutes (960 ms). The framework is integrated with Python, allowing for further integration of other digital forensic tools, such as AccessData Forensic Toolkit (FTK), Wireshark, Volatility, and Scapy.

Keywords: artificial intelligence, computer science, criminal investigation, digital forensics

Procedia PDF Downloads 188
938 The Effect of Artificial Intelligence on Civil Engineering Outputs and Designs

Authors: Mina Youssef Makram Ibrahim

Abstract:

Engineering identity contributes to the professional and academic sustainability of female engineers. Recognizability is an important factor that shapes an engineer's identity. People who are deprived of real recognition often fail to create a positive identity. This study draws on Hornet’s recognition theory to identify factors that influence female civil engineers' sense of recognition. Over the past decade, a survey was created and distributed to 330 graduate students in the Department of Civil, Civil and Environmental Engineering at Iowa State University. Survey items include demographics, perceptions of a civil engineer's identity, and factors that influence recognition of a civil engineer's identity, such as B. Opinions about society and family. Descriptive analysis of survey responses revealed that perceptions of civil engineering varied significantly. The definitions of civil engineering provided by participants included the terms structure, design and infrastructure. Almost half of the participants said the main reason for studying Civil Engineering was their interest in the subject, and the majority said they were proud to be a civil engineer. Many study participants reported that their parents viewed them as civil engineers. Institutional and operational treatment was also found to have a significant impact on the recognition of women civil engineers. Almost half of the participants reported feeling isolated or ignored at work because of their gender. This research highlights the importance of recognition in developing the identity of women engineers.

Keywords: civil service, hiring, merit, policing civil engineering, construction, surveying, mapping, pile civil service, Kazakhstan, modernization, a national model of civil service, civil service reforms, bureaucracy civil engineering, gender, identity, recognition

Procedia PDF Downloads 33
937 Improving Human Resources Management in Indian Civil Service

Authors: Anant Deogaonkar, Archana Nanoty

Abstract:

The term civil service plays a vital role in functioning of any government. In today’s modern era of globalization civil services essentially contribute for the success of the good governance system. The civil service in India refers to the body of government officials employed in civil occupations that are neither political nor judicial. The Indian Civil Services were created to foster the idea of unity in diversity with the expectation of giving continuity and change in administration independent of the political scenario and turmoil affecting the country. The civil service is an integral part of administration and the structures of administration to determine the way civil service functions. The concept of good governance necessarily precludes the effective human resource management ensuring the root level reach of the good governance. The serious matter of concern is the element of change. The civil service in general has maintained status quo instead of sweeping changes in social and economic scenario. One may disagree for this but it is a fact on the street that the Indian civil service was not able to deliver up to the expectations of the people and was lacking on the service front. The effective management of human resources at civil service needs to be prioritized and will form a key factor in successful delivery of the desired results may be in minimum duration. This paper focuses on the various ways of effective management of human resources in civil services. It also highlights the importance of improvement in human resource management in civil services with the detailed discussion of positives and negatives if any of the human resource management in civil services.

Keywords: civil services, human resources management, India, governance

Procedia PDF Downloads 294
936 The Investigation of Women Civil Engineers’ Identity Development through the Lens of Recognition Theory

Authors: Hasan Sungur, Evrim Baran, Benjamin Ahn, Aliye Karabulut Ilgu, Chris Rehmann, Cassandra Rutherford

Abstract:

Engineering identity contributes to the professional and educational persistence of women engineers. A crucial factor contributing to the development of the engineering identity is recognition. Those without adequate recognition often do not succeed in positively building their identities. This research draws on Honneth’s recognition theory to identify factors impacting women civil engineers’ feelings of recognition as civil engineers. A survey was composed and distributed to 330 female alumni who graduated from the Department of Civil, Construction, and Environmental Engineering at Iowa State University in the last ten years. The survey items include demographics, perceptions of the identity of civil engineering, and factors that influence the recognition of civil engineering identities, such as views of society and family. Descriptive analysis of the survey responses revealed that the perceptions of civil engineering varied widely. Participants’ definitions of civil engineering included the terms: construction, design, and infrastructure. Almost half of the participants reported that the major reason to study civil engineering was their interest in the subject matter, and most reported that they were proud to be civil engineers. Many study participants reported that their parents see them as civil engineers. Treatment of institutions and the workplace were also considered as having a significant impact on the recognition of women civil engineers. Almost half of the participants reported that they felt isolated or ignored at work because of their gender. This research emphasizes the importance of recognition for the development of the civil engineering identity of women

Keywords: civil engineering, gender, identity, recognition

Procedia PDF Downloads 225
935 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility

Authors: Alejandro Villegas, Cihan Varol

Abstract:

Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.

Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise

Procedia PDF Downloads 275
934 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10

Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin

Abstract:

The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.

Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10

Procedia PDF Downloads 149
933 The Reproducibility and Repeatability of Modified Likelihood Ratio for Forensics Handwriting Examination

Authors: O. Abiodun Adeyinka, B. Adeyemo Adesesan

Abstract:

The forensic use of handwriting depends on the analysis, comparison, and evaluation decisions made by forensic document examiners. When using biometric technology in forensic applications, it is necessary to compute Likelihood Ratio (LR) for quantifying strength of evidence under two competing hypotheses, namely the prosecution and the defense hypotheses wherein a set of assumptions and methods for a given data set will be made. It is therefore important to know how repeatable and reproducible our estimated LR is. This paper evaluated the accuracy and reproducibility of examiners' decisions. Confidence interval for the estimated LR were presented so as not get an incorrect estimate that will be used to deliver wrong judgment in the court of Law. The estimate of LR is fundamentally a Bayesian concept and we used two LR estimators, namely Logistic Regression (LoR) and Kernel Density Estimator (KDE) for this paper. The repeatability evaluation was carried out by retesting the initial experiment after an interval of six months to observe whether examiners would repeat their decisions for the estimated LR. The experimental results, which are based on handwriting dataset, show that LR has different confidence intervals which therefore implies that LR cannot be estimated with the same certainty everywhere. Though the LoR performed better than the KDE when tested using the same dataset, the two LR estimators investigated showed a consistent region in which LR value can be estimated confidently. These two findings advance our understanding of LR when used in computing the strength of evidence in handwriting using forensics.

Keywords: confidence interval, handwriting, kernel density estimator, KDE, logistic regression LoR, repeatability, reproducibility

Procedia PDF Downloads 98
932 19th Century Exam, 21st Century Policing: An Examination of the New York State Civil Service and Police Officer Recruitment Efforts

Authors: A. Edwards

Abstract:

The civil service was created to reform the hiring process for public officials, changing the patronage system to a merit-based system. Though exam reforms continued throughout the 20th century, there have been few during the 21st century, particularly in New York state. In the case of police departments, the civil service exam has acted as a hindrance to its ‘21st Century Policing’ goals and new exam reform efforts have left out officers voices and concerns. Through in-depth interviews of current and retired police officers and local and state civil service administrators in Albany County in New York, this study seeks to understand police influence and insight regarding the civil service exam, placing some of the voice and input for civil service reform on police departments, instead of local and state bureaucrats. The study also looks at the relationship between civil service administrators and police departments. Using practice theory, the study seeks to understand the ways in which the civil service exam was defined in the 20th century and how it is out of step with current thinking while examining possible changes to the civil service exam that would lead to a more equitable hiring process and successful police departments.

Keywords: civil service, hiring, merit, policing

Procedia PDF Downloads 182
931 Gender Equality and Career Opportunities among Female Civil Servants for Better Public Services in West Java, Indonesia

Authors: Nefi Aris Ambar Asmara

Abstract:

This paper discusses gender equality and career opportunities among female civil servants for better public services in a regency in West Java, Indonesia. Those two areas have not been considered comprehensively in terms of the goals of gender equality and career opportunities. The purposes of this paper are to describe (1) the number of available positions in relation to the number of female civil servants, (2) the socio-cultural outlook on female civil servants in relation to gender equality and career opportunities, and (3) socio-cultural views on gender equality and a career in politics. To achieve these three objectives, this paper used a qualitative approach with survey and interview techniques. The results showed that (1) only 37% of the official positions were presided by female civil servants. In contrast, male civil servants occupy 63% of the available positions, (2) the sociocultural view of female civil servants affirms that they are still regarded as male companions; (3) in addition, female civil servants do not need to compete with gender opponents, including the fact that women enter politics because the political world is considered dirty for women.

Keywords: gender equality, career opportunities, female civil servants, Indonesia

Procedia PDF Downloads 120
930 Gender Equality and Career Opportunities Among Female Civil Servants for Better Public Services in West Java - Indonesia

Authors: Nefi Aris Ambar Asmara

Abstract:

This paper discusses gender equality and career opportunities among female civil servants for better public services in a regency in West Java, Indonesia. Those two areas have not been considered comprehensively in terms of the goals of gender equality and career opportunities. The purposes of this paper are to describe (1) the number of available positions in relation to the number of female civil servants, (2) the socio-cultural outlook on female civil servants in relation to gender equality and career opportunities and (3) socio-cultural views on gender equality and a career in politics. To achieve these three objectives, this paper used a qualitative approach with survey and interview techniques. The results showed that (1) only 37% of the official positions were presided by female civil servants. In contrast, male civil servants occupy 63% of the available positions, (2) the sociocultural view of female civil servants affirms that they are still regarded as male companions; (3) in addition, female civil servants do not need to compete with gender opponents, including the fact that women enter politics because the political world is considered dirty for women.

Keywords: gender equality, career opportunities, female civil servants, indonesia

Procedia PDF Downloads 58
929 The Possible Application of Artificial Intelligence in Hungarian Court Practice

Authors: László Schmidt

Abstract:

In the context of artificial intelligence, we need to pay primary and particular attention to ethical principles not only in the design process but also during the application process. According to the European Commission's Ethical Guidelines, AI must have three main characteristics: it must be legal, ethical and stabil. We must never lose sight of the ethical principles because we risk that this new technology will not help democratic decision-making under the rule of law, but will, on the contrary, destroy it. The rapid spread and use of artificial intelligence poses an enormous challenge to both lawmaking and law enforcement. On legislation because AI permeates many areas of our daily lives that the legislator must regulate. We can see how challenging it is to regulate e.g., selfdriving cars/taxis/vans etc. Not to mention, more recently, cryptocurrencies and Chat GPT, the use of which also requires legislative intervention, from copyright to scientific use and even law of succession. Artificial intelligence also poses an extraordinary challenge to law enforcement. In criminal cases, police and prosecutors can make great use of AI in investigations, e.g. in forensics, DNA samples, reconstruction, identification, etc. But it can also be of great help in the detection of crimes committed in cyberspace. In criminal or civil court proceedings, AI can also play a major role in the evaluation of evidence and proof. For example, a photo or video or audio recording could be immediately revealed as genuine or fake. Likewise, the authenticity or falsification of a document could be determined much more quickly and cheaply than with current procedure (expert witnesses). Neither the current Hungarian Civil Procedure Act nor the Criminal Procedure Act allows the use of artificial intelligence in the evidentiary process. However, this should be changed. To use this technology in court proceedings would be very useful. The procedures would be faster, simpler, and therefore cheaper. Artificial intelligence could also replace much of the work of expert witnesses. Its introduction into judicial procedures would certainly be justified, but with due respect for human rights, the right to a fair trial and other democratic and rule of law guarantees.

Keywords: artificial intelligence, judiciary, Hungarian, court practice

Procedia PDF Downloads 56
928 Civil Liability for Digital Crimes

Authors: Pál Mészáros

Abstract:

The aim of this research topic is to examine civil law consequences caused by crimes committed in the digital space. During the commission of certain crimes, not only the rights of one person are violated, but also the rights of an entire institution, for example, if the information system of a university is attacked. The consequences of these crimes committed in the digital space may also be that the victim himself is liable to other third parties, for example, in the event that health data comes into the possession of unauthorized persons, and it can be proved that the service provider's IT system was inadequate. An interesting question may also be the civil liability of credit institutions if someone becomes a victim of fraud but is not expected from him/her to notice the fraud. In such a case, the liability of the credit institution may arise if they do not respond in time in the case of unauthorized bank transactions. Based on the above, the main topic of the research is the civil liability of the victim, or another person or company related to the victim in the case of damages caused by crimes.

Keywords: civil liability, digital crimes, transfer of responsibility, civil law

Procedia PDF Downloads 44
927 Cryptocurrency Forensics: Analysis on Bitcoin E-Wallet from Computer Source Evidence

Authors: Muhammad Nooraiman bin Noorashid, Mohd Sharizuan bin Mohd Omar, Mohd Zabri Adil bin Talib, Aswami Fadillah bin Mohd Ariffin

Abstract:

Nowadays cryptocurrency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The cryptocurrency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin cryptocurrency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, digital wallet, digital forensics

Procedia PDF Downloads 313
926 Civil Nuclear Liability Indian Perspective

Authors: Shivani Gupta, Shrishti Chaturvedi

Abstract:

By using a miniscule of nuclear matter, the problem of immeasurable human needs for energy can be resolved. However since nuclear energy also has the inherent potential for catastrophic destruction, one should be extremely mindful of the consequences should a mischance occur. Civil Nuclear Liability has recently gained a lot of momentum after India entered into agreements with nations like United States of America, France and others. Also now India is a part of the Convention on Supplementary Compensation (CSC). With a history of Bhopal Gas Tragedy, India is now much more vigilant about the latest developments in this sector. Therefore, it has become imperative to analyses the liability regime in the background of international conventions such as Vienna Convention 1963, Paris Convention 1960, Convention on Supplementary Compensation, 1997 and others. Also the present Indian legal scenarios in this regard which are derived from Civil Liability for Nuclear Damages Act, 2010 and Civil Liability for Nuclear Damages Rules, 2011 have also been extensively discussed in the paper.

Keywords: nuclear liability, civil liability for nuclear damages act, 2010, civil liability for nuclear damages rules, India

Procedia PDF Downloads 383
925 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services

Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar

Abstract:

This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.

Keywords: civil-id disclosure, awareness, linear regression, multiple regression

Procedia PDF Downloads 31
924 BIM Application and Construction Schedule Simulation for the Horizontal Work Area

Authors: Hyeon-Seong Kim, Sang-Mi Park, Seul-Gi Kim, Seon-Ju Han, Leen-Seok Kang

Abstract:

The use of BIM, including 4D CAD system, in a construction project is gradually increasing. Since the building construction works repeatedly in the vertical space, it is relatively easy to confirm the interference effect when applying the BIM, but the interference effect for the civil engineering project is relatively small because the civil works perform non-repetitive processes in the horizontal space. For this reason, it is desirable to apply BIM to the construction phase when applying BIM to the civil engineering project, and the most active BIM tool applied to the construction phase is the 4D CAD function for the schedule management. This paper proposes the application procedure of BIM by the construction phase of civil engineering project and a linear 4D CAD construction methodology suitable for the civil engineering project in which linear work is performed.

Keywords: BIM, 4D CAD, linear 4D simulation, VR

Procedia PDF Downloads 375
923 Applications of Artificial Neural Networks in Civil Engineering

Authors: Naci Büyükkaracığan

Abstract:

Artificial neural networks (ANN) is an electrical model based on the human brain nervous system and working principle. Artificial neural networks have been the subject of an active field of research that has matured greatly over the past 55 years. ANN now is used in many fields. But, it has been viewed that artificial neural networks give better results in particular optimization and control systems. There are requirements of optimization and control system in many of the area forming the subject of civil engineering applications. In this study, the first artificial intelligence systems are widely used in the solution of civil engineering systems were examined with the basic principles and technical aspects. Finally, the literature reviews for applications in the field of civil engineering were conducted and also artificial intelligence techniques were informed about the study and its results.

Keywords: artificial neural networks, civil engineering, Fuzzy logic, statistics

Procedia PDF Downloads 385
922 Civil Engineering Education at the University of the West Indies: An International Perspective

Authors: Gyan Shrivastava

Abstract:

Civil Engineering education, at undergraduate and graduate levels, commenced at the University of the West Indies (UWI) in 1961, in collaboration with Imperial College in London. From its inception, it has concentrated on natural hazard resistant design of structures, given the occurrence of earthquakes, hurricanes and volcanic eruption in the Commonwealth Caribbean Islands. Against this background, a number of international students, from Botswana, Canada, Germany, India, Nigeria and South Africa, have studied Civil Engineering at UWI over the years. This paper outlines the author’s experience in teaching Fluid Mechanics and Engineering design to the said students, and in so doing highlights their strengths and weaknesses.

Keywords: Caribbean, civil engineering, education, natural hazards

Procedia PDF Downloads 210
921 Strengthening Civil Society Organizations (CSOs) in ASEAN Community: The Case of Nahdlatul Ulama

Authors: Andi Triswoyo

Abstract:

The establishment of ASEAN Community 2015 was proposed to integrate concretely, in terms of regional cooperation. All of the members of the ASEAN itself compete to prepare themselves in the actual place. Regarding to the Bali Concord III, subsequently ASEAN Community was categorized by three elements, such as (1) ASEAN Political-security Community (APC), (2) ASEAN Economic Community (AEC), and (3) ASEAN Socio-cultural Community (ASC). Preparing on three components above, civil society organizations must be prioritized as the main body, which ensure grassroots society itself obtain maximum benefits or advantage of these declarations. NU, as the representative of mass-based organizations, was choose, due to the highly influences toward Moslem rural-traditionalist, which has the largest followers in Indonesia. This paper was aimed to explain the contribution of NU in developing and empowering society. Furthermore, it will use historical perspective, by looking for related data, which contain basic- knowledge and explanatory facts in literary desk. It would elaborate in NU’s urgency for promoting civil societies roles in ASEAN Community. In the ends, this paper was proposed to measure to what extend NU’s roles in promoting the Civil Society in Indonesia and its potential capability to get involved at the upcoming regional communities. Hopefully, the attempt to strengthen Civil Society Organizations (CSOs), like NU can push faster in creating good governance and democracy, toward social configurations amongst state, market and civil society.

Keywords: ASEAN community, Nahdlatul Ulama, civil society organizations(CSO), civil society

Procedia PDF Downloads 262
920 The Contract for Educational Services: Civil and Administrative Aspects

Authors: Yuliya Leonidovna Kiva-Khamzina

Abstract:

The legal nature of the contract for educational services causes a lot of controversies. In particular, it raises the question about industry sector relationships, which require making a contract for educational services. The article describes the different types of contracts classifications for services provision from the perspective of civil law, deals with the specifics of the contract on rendering educational services; the author makes the conclusion that the contract for the provision of educational services is a complex institution that includes elements of the civil and administrative law. The following methods were used to conduct the study: dialectical method of cognition, the historical method, systemic analysis, classification.

Keywords: administrative aspect, civil aspect, educational service, industry, legal nature, services provision

Procedia PDF Downloads 306
919 Controversies Connected with the Admission of Illegally Gained Evidences in Polish Civil Proceedings

Authors: Aleksandra Czubak

Abstract:

The need to present evidence in civil proceedings is essential for getting the right result. It is for this reason that it is particularly important for the parties to present the most relevant and convincing evidence to the Court. Therefore, parties often try to gain evidence, even when the acquisition of such evidence is in breach of the law. Firstly, there will be discussed how evidence is applied in the Polish civil process and the Polish regulations of the evidence proceedings; with specific reference to evidence of major importance in the developing world. Further, it will be discussed the controversies connected with the admission of illegally gained evidence in civil proceedings. The credibility of the various measures is circumstantial and can only be determined by factors related to the recognized problem. For that reason, it is not the amount of evidence, but the value and relevance of this evidence that should be considered in determining the right result. This paper will also consider whether the end justifies the means? How far should parties go in order to achieve a favorable sentence or to create stronger evidence? Methods of persuasion of the court, as well as the acquisition of evidence, are not always fair and moral. It is on this area of controversy that this essay will focus. This paper concludes by considering the value of evidence and the possibility of using it to achieve a just sentence. Examples are based on Polish law; nevertheless, they encompass ideas common to most civil jurisdictions.

Keywords: civil proceedings, Europe (Poland), evidence, law

Procedia PDF Downloads 229
918 Good Faith and Accession in the New Civil Code

Authors: Adelina Vrancianu

Abstract:

The problem of artificial real accession will be analyzed in this study both in terms of old and current Civil Code provisions and in terms of comparative law, European legal and Canadian systems. The current Civil Code from 2009 has brought new changes about the application and solutions regarding artificial real accession. The hypothesis in which a person is making works with his own materials on the real estate belonging to another person is developed and analyzed in detail from national and international point of view in relation with the good faith. The scope of this analysis is to point out what are the changes issued from case-law and which ones are new, inspired from other law systems in regard to the good/bad faith. The new civil code has promoted a definition for this notion. Is this definition a new one inspired from the comparative law or is it inspired from the case-law? Is it explained for every case scenario of accession or is a general notion? The study tries to respond to these questions and to present the new aspects in the area. has reserved a special place for the situation of execution of works with own materials exceeding the border with violation of another’s right of property, where the variety of solutions brings into discussion the case of expropriation for private interest. The new Civil Code is greatly influenced by the Civil Code from Quebec in comparison with the old code of French influence. The civil reform was needed and has brought into attention new solutions inspired from the Canadian system which has mitigated the permanent conflict between the constructor and the immovable owner.

Keywords: accession, good faith, new civil code, comparative law

Procedia PDF Downloads 446
917 Applications Of Mathematical Morphology Operators In Civil Infrastructures

Authors: Abrudan Dumitru

Abstract:

Civil infrastructures require permanent attention from the moment of taking over to the moment of demolition. One important aspect that is mandatory to be taken into consideration is crack detection. This operation, to detect cracks that can appear during the lifetime of the civil infrastructure, requires specialized personnel and, depending on the civil infrastructure, can require specialized skills (such as climbing). To overcome this issue with regard to specialized manpower, image processing is used. In our days images can be easily acquired using an unmanned aircraft vehicle system known also as a drone. The main advantages of a drone for civil infrastructure image acquisition are it can be operated at different heights, weather conditions are not an issue, being suitable to be used on rainy, windy, sunny days and so on. In this paper, we used a dataset that contains three types of images: with cracks, without cracks and with noise. To remove the noise presented in images, mathematical morphology operators (MMO) are used.

Keywords: VGG16, VGG19, image processing, mathematical morphology

Procedia PDF Downloads 29
916 Descriptive Analysis of the Relationship between State and Civil Society in Hegel's Political Thought

Authors: Garineh Keshishyan Siraki

Abstract:

Civil society is one of the most important concepts of the twentieth century and even so far. Modern and postmodern thinkers have provided different definitions of civil society. Of course, the concept of civil society has undergone many changes over time. The relationship between government and civil society is one of the relationships that attracted the attention of many contemporary thinkers. Hegel, the thinker we discussed in this article also explores the relationship between these concepts and emphasizing the dialectical method, he has drawn three lines between family, state, and civil society. In Hegel's view, the creation of civil society will lead to a reduction of social conflict and increased social cohesion. The importance of the issue is due to the study of social cohesion and the ways to increase it. The importance of the issue is due to the study of social cohesion and the ways to increase it. This paper, which uses a descriptive-analytic method to examine Hegel's dialectical theory of civil society, after examining the relationship between the family and the state and finding the concept of civil society as the interface and the interconnected circle of these two, investigates tripartite economic, legal, and pluralistic systems. In this article, after examining the concepts of the market, the right and duty, the individual interests and the development of the exchange economy, Hegel's view is to examine the concept of freedom and its relation with civil society. The results of this survey show that, in Hegel's thought, the separation between the political system and the social system is a natural and necessary thing. In Hegel's view, because of those who are in society, they have selfish features; the community is in tension and contradiction. Therefore, the social realms within which conflicts emerge must be identified and controlled by specific mechanisms. It can also be concluded that the government can act to reduce social conflicts by legislating, using force or forming trade unions. The bottom line is that Hegel wants to reconcile between the individual, the state and civil society and it is not possible to rely on ethics.

Keywords: civil society, cohesion system, economic system, family, the legal system, state

Procedia PDF Downloads 164
915 Counter-Terrorism and Civil Society in Nigeria

Authors: Emeka Thaddues Njoku

Abstract:

Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.

Keywords: counter-terrorism, civil society organizations, freedom, terrorism

Procedia PDF Downloads 360
914 An Appraisal of the Level of Civil Servants Participation in Recreational Activities

Authors: Isyaku Labaran Fagge

Abstract:

This study investigated on appraisal of civil servants level of participation in recreational activities in North Western States of Nigeria. To achieve this purpose, a descriptive survey was employed for the designed questionnaire which were administered on 300 respondents, who served as subject for this study, in North Western States of Nigeria. Descriptive statistics of simple frequency count, percentage and Chi square (x2) statistical techniques at 0.05 alpha level were used for all statistical tests of significance. The findings of the study revealed that senior civil servants by (gender, status and location) do participate in recreational activities. On the knowledgeable personnels, all the recreational centres (by gender, status and location) had no knowledgeable personnels to handle the centres across North Western States. Many recreational centers should be create. Government should train and employ more knowledgeable personnel to handle the centres. Civil servants in urban areas do participate more than the civil servants in rural areas.

Keywords: recreation, civil servants, participation, recreational activities

Procedia PDF Downloads 401
913 Low Enrollment in Civil Engineering Departments: Challenges and Opportunities

Authors: Alaa Yehia, Ayatollah Yehia, Sherif Yehia

Abstract:

There is a recurring issue of low enrollments across many civil engineering departments in postsecondary institutions. While there have been moments where enrollments begin to increase, civil engineering departments find themselves facing low enrollments at around 60% over the last five years across the Middle East. There are many reasons that could be attributed to this decline, such as low entry-level salaries, over-saturation of civil engineering graduates in the job market, and a lack of construction projects due to the impending or current recession. However, this recurring problem alludes to an intrinsic issue of the curriculum. The societal shift to the usage of high technology such as machine learning (ML) and artificial intelligence (AI) demands individuals who are proficient at utilizing it. Therefore, existing curriculums must adapt to this change in order to provide an education that is suitable for potential and current students. In this paper, In order to provide potential solutions for this issue, the analysis considers two possible implementations of high technology into the civil engineering curriculum. The first approach is to implement a course that introduces applications of high technology in Civil Engineering contexts. While the other approach is to intertwine applications of high technology throughout the degree. Both approaches, however, should meet requirements of accreditation agencies. In addition to the proposed improvement in civil engineering curriculum, a different pedagogical practice must be adapted as well. The passive learning approach might not be appropriate for Gen Z students; current students, now more than ever, need to be introduced to engineering topics and practice following different learning methods to ensure they will have the necessary skills for the job market. Different learning methods that incorporate high technology applications, like AI, must be integrated throughout the curriculum to make the civil engineering degree more attractive to prospective students. Moreover, the paper provides insight on the importance and approach of adapting the Civil Engineering curriculum to address the current low enrollment crisis that civil engineering departments globally, but specifically in the Middle East, are facing.

Keywords: artificial intelligence (AI), civil engineering curriculum, high technology, low enrollment, pedagogy

Procedia PDF Downloads 133
912 Impact of Globalization on Youth Bulge and Civil Unrest: An Empirical Approach

Authors: Swetasree Roy, Subaran Roy

Abstract:

The contemporary literature documents globalization affects the stability of a country in three ways i) it increases peace ii) it decreases the likelihood of civil unrest, and iii) it creates employment. In this paper, we show that unemployment amongst youth plays a significant role in the effect of globalization and the internal stability of a country. Using recent data on globalization for 88 countries (2000-2014), we examine whether the presence of a large section of youth exacerbates the negative effects of globalization, thereby increasing chances of civil unrest. Using recent measures of globalization, we find globalization affect adversely on the stability of a country. Our results indicate that globalization in the presence of a high youth unemployment rate can create more instability in an economy. Results are robust in the presence of other socio-economic variables.

Keywords: globalization, youth bulge, civil unrest, unemployment

Procedia PDF Downloads 136
911 The Role of Digital Technology in Crime Prevention: A Case Study of Cellular Forensics Unit, Capital City Police Peshawar

Authors: Muhammad Ashfaq

Abstract:

Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies, and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries, and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police. A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals. Latest digital analysis software should be provided to equip the Cellular Forensic Unit.

Keywords: criminology-pakistan, crime prevention-KP, digital forensics, digital technology-pakistan

Procedia PDF Downloads 72