Search results for: cyber victims
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 704

Search results for: cyber victims

104 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 71
103 How Unpleasant Emotions, Morals and Normative Beliefs of Severity Relate to Cyberbullying Intentions

Authors: Paula C. Ferreira, Ana Margarida Veiga Simão, Nádia Pereira, Aristides Ferreira, Alexandra Marques Pinto, Alexandra Barros, Vitor Martinho

Abstract:

Cyberbullying is a phenomenon of worldwide concern regarding children and adolescents’ mental health and risk behavior. Bystanders of this phenomenon can help diminish the incidence of this phenomenon if they engage in pro-social behavior. However, different social-cognitive and affective bystander reactions may surface because of the lack of contextual information and emotional cues in cyberbullying situations. Hence, this study investigated how cyberbullying bystanders’ unpleasant emotions could be related to their personal moral beliefs and their behavioral intentions to cyberbully or defend the victim. It also proposed to investigate how their normative beliefs of perceived severity about cyberbullying behavior could be related to their personal moral beliefs and their behavioral intentions. Three groups of adolescents participated in this study, namely a first of group 402 students (5th – 12th graders; Mage = 13.12; SD = 2.19; 55.7% girls) to compute explorative factorial analyses of the instruments used; a second group of 676 students (5th – 12th graders; Mage = 14.10; SD = 2.74; 55.5% were boys) to run confirmatory factor analyses; and a third group (N = 397; 5th – 12th graders; Mage = 13.88 years; SD = 1.45; 55.5% girls) to perform the main analyses to test the research hypotheses. Self-report measures were used, such as the Personal moral beliefs about cyberbullying behavior questionnaire, the Normative beliefs of perceived severity about cyberbullying behavior questionnaire, the Unpleasant emotions about cyberbullying incidents questionnaires, and the Bystanders’ behavioral intentions in cyberbullying situations questionnaires. Path analysis results revealed that unpleasant emotions were mediators of the relationship between adolescent cyberbullying bystanders’ personal moral beliefs and their intentions to help the victims in cyberbullying situations. Moreover, adolescent cyberbullying bystanders’ normative beliefs of gravity were mediators of the relationship between their personal moral beliefs and their intentions to cyberbully others. These findings provide insights for the development of prevention and intervention programs that promote social and emotional learning strategies as a means to prevent and intervene in cyberbullying.

Keywords: cyberbullying, normative beliefs of perceived severity, personal moral beliefs, unpleasant emotions

Procedia PDF Downloads 189
102 The ICC, International Criminal Justice and International Politics

Authors: Girma Y. Iyassu Menelik

Abstract:

The international community has gone through indescribable atrocities resulting from acts of war. These atrocities turned Europe and Africa into a wilderness of bloodshed and crime. In the period 1960- 1970s Africa witnessed unprecedented and well-documented assaults on life and property. This necessitated the adoption, signing and ratification of the International Criminal Court, establishment of the International Court of Justice which is a great achievement for the protection and fulfilling of human rights in the context of international political instability. The ICC came as an important opportunity to advance justice for serious crimes committed in violation of international law. Thus the Rome statute has become a formidable contribution to peace and security. There are concerns that the ICC is targeting African states. However, the ICC cannot preside over cases that are not parties to the Rome statute unless the UN Security council refers the situation or the relevant state asks the court to become involved. The instable international political situation thus deals with criminal prosecutions where amnesty is not permissible or is strongly repudiated. The court has become important justice instruments for states that are unable or unwilling to fulfill their obligation to address legacies of massive human rights violations. The ICJ as a court has a twofold role; to settle legal disputes submitted to it by states, and to give advisory opinions on legal questions referred to it by duly authorized United Nations organs and specialized agencies. All members of the UN are ipso facto parties to the statute of the ICJ. The court gives advisory opinion on any legal question. These courts are the most appropriate fora to pronounce on international crimes and are in a better position to know and apply international law. Cases that have been brought to the courts include Rwanda’s genocide, Liberia’s Charles Taylor etc. The receptiveness and cooperation of the local populations are important to the courts and if the ICC and ICJ can provide appropriate protections for the physical and economic safety of victims then peace and human rights observance can be attained. This paper will look into the effectiveness and impediments of these courts in handling criminal and injustices in international politics as while as what needs to be done to strengthen the capacity of these courts.

Keywords: ICC, international politics, justice, UN security council, violence, protection, fulfilling

Procedia PDF Downloads 424
101 Scourge of Sexual Offence: A Socio-Demographic Profile of Survivors of Sexual Offences

Authors: A. Priyanka, Sunil Kumar Kainoor, Parinitha Nayaka

Abstract:

Introduction: Ever since the ancient times, rape and other sexual offences are considered to be heinous crimes. Rape is not just another word in the dictionary, but it is the most barbaric act of violence committed with sex being the weapon. Rape is among the highest forms of crime experienced by women and children in all sectors of the society. In recent years, there has been an alarming rise in ratio of rape in India. The burden of such crimes on the society is very huge. The venereal diseases are the worst consequence along with unwanted pregnancies. Aims and Objectives: To determine the socio-demographic profile of the survivors of sexual offences reported to Dept. of Forensic Medicine of a South Indian medical college. Material methods: This retrospective study was conducted in the Department of Forensic Medicine of Raichur Institute of Medical Sciences, Raichur, Karnataka, India. Only survivors of sexual offences cases were included in the study group. Examination of all survivors was carried out by doctors of the said Department. Study period is one year six months, January 2015 to June 2016. Results/ case history: In total 140 cases of sexual offences were examined during study period of which the total survivors accounted to 62.85% i.e. 88 cases. Of the 88 survivors, 61 (69.31%) were registered under POCSO Act. The most affected age group of victims was 10-18 years in 59 (67%) cases. 61% were in acquaintance with the assailants, 18% were classmates/ friends, 13% of accused were Family members/ Relatives, 8% were strangers. 85% of the survivors were hailing from rural setup, while 15% were from urban. 60.65% of the survivors were students, 37.7% were doing Coolie/ Agricultural works. Conclusion: Delay in reporting of cases resulted in loss of vital physical evidences as no concrete report could be generated from the forensic lab after examination of specimens thus there should be coordination among doctors, forensic experts and investigating agency. It is worth mentioning that though a large number of cases of sexual offences are reported as rape many among them are consented acts and hence definite evidence of forceful sexual intercourse is lagging.

Keywords: consensual sex, India, POCSO Act- 2012, India, pregnancy, rape, sexual offence

Procedia PDF Downloads 285
100 The Feminism of Data Privacy and Protection in Africa

Authors: Olayinka Adeniyi, Melissa Omino

Abstract:

The field of data privacy and data protection in Africa is still an evolving area, with many African countries yet to enact legislation on the subject. While African Governments are bringing their legislation to speed in this field, how patriarchy pervades every sector of African thought and manifests in society needs to be considered. Moreover, the laws enacted ought to be inclusive, especially towards women. This, in a nutshell, is the essence of data feminism. Data feminism is a new way of thinking about data science and data ethics that is informed by the ideas of intersectional feminism. Feminising data privacy and protection will involve thinking women, considering women in the issues of data privacy and protection, particularly in legislation, as is the case in this paper. The line of thought of women inclusion is not uncommon when even international and regional human rights specific for women only came long after the general human rights. The consideration is that these should have been inserted or rather included in the original general instruments in the first instance. Since legislation on data privacy is coming in this century, having seen the rights and shortcomings of earlier instruments, then the cue should be taken to ensure inclusive wholistic legislation for data privacy and protection in the first instance. Data feminism is arguably an area that has been scantily researched, albeit a needful one. With the spate of increase in the violence against women spiraling in the cyber world, compounding the issue of COVID-19 and the needful response of governments, and the effect of these on women and their rights, fast forward, the research on the feminism of data privacy and protection in Africa becomes inevitable. This paper seeks to answer the questions, what is data feminism in the African context, why is it important in the issue of data privacy and protection legislation; what are the laws, if any, existing on data privacy and protection in Africa, are they women inclusive, if not, why; what are the measures put in place for the privacy and protection of women in Africa, and how can this be made possible. The paper aims to investigate the issue of data privacy and protection in Africa, the legal framework, and the protection or provision that it has for women if any. It further aims to research the importance and necessity of feminizing data privacy and protection, the effect of lack of it, the challenges or bottlenecks in attaining this feat and the possibilities of accessing data privacy and protection for African women. The paper also researches the emerging practices of data privacy and protection of women in other jurisprudences. It approaches the research through the methodology of review of papers, analysis of laws, and reports. It seeks to contribute to the existing literature in the field and is explorative in its suggestion. It suggests a draft of some clauses to make any data privacy and protection legislation women inclusive. It would be useful for policymaking, academic, and public enlightenment.

Keywords: feminism, women, law, data, Africa

Procedia PDF Downloads 172
99 Digital Transformation and Digitalization of Public Administration

Authors: Govind Kumar

Abstract:

The concept of ‘e-governance’ that was brought about by the new wave of reforms, namely ‘LPG’ in the early 1990s, has been enabling governments across the globe to digitally transform themselves. Digital transformation is leading the governments with qualitative decisions, optimization in rational use of resources, facilitation of cost-benefit analyses, and elimination of redundancy and corruption with the help of ICT-based applications interface. ICT-based applications/technologies have enormous potential for impacting positive change in the social lives of the global citizenry. Supercomputers test and analyze millions of drug molecules for developing candidate vaccines to combat the global pandemic. Further, e-commerce portals help distribute and supply household items and medicines, while videoconferencing tools provide a visual interface between the clients and hosts. Besides, crop yields are being maximized with the help of drones and machine learning, whereas satellite data, artificial intelligence, and cloud computing help governments with the detection of illegal mining, tackling deforestation, and managing freshwater resources. Such e-applications have the potential to take governance an extra mile by achieving 5 Es (effective, efficient, easy, empower, and equity) of e-governance and six Rs (reduce, reuse, recycle, recover, redesign and remanufacture) of sustainable development. If such digital transformation gains traction within the government framework, it will replace the traditional administration with the digitalization of public administration. On the other hand, it has brought in a new set of challenges, like the digital divide, e-illiteracy, technological divide, etc., and problems like handling e-waste, technological obsolescence, cyber terrorism, e-fraud, hacking, phishing, etc. before the governments. Therefore, it would be essential to bring in a rightful mixture of technological and humanistic interventions for addressing the above issues. This is on account of the reason that technology lacks an emotional quotient, and the administration does not work like technology. Both are self-effacing unless a blend of technology and a humane face are brought in into the administration. The paper will empirically analyze the significance of the technological framework of digital transformation within the government set up for the digitalization of public administration on the basis of the synthesis of two case studies undertaken from two diverse fields of administration and present a future framework of the study.

Keywords: digital transformation, electronic governance, public administration, knowledge framework

Procedia PDF Downloads 81
98 Dynamic Ambulance Deployment to Reduce Ambulance Response Times Using Geographic Information Systems

Authors: Masoud Swalehe, Semra Günay

Abstract:

Developed countries are losing many lives to non-communicable diseases as compared to their developing counterparts. The effects of these diseases are mostly sudden and manifest at a very short time prior to death or a dangerous attack and this has consolidated the significance of emergency medical system (EMS) as one of the vital areas of healthcare service delivery. The primary objective of this research is to reduce ambulance response times (RT) of Eskişehir province EMS since a number of studies have established a relationship between ambulance response times and survival chances of patients especially out of hospital cardiac arrest (OHCA) victims. It has been found out that patients who receive out of hospital medical attention in few (4) minutes after cardiac arrest because of low ambulance response times stand higher chances of survival than their counterparts who take longer times (more than 12 minutes) to receive out of hospital medical care because of higher ambulance response times. The study will make use of geographic information systems (GIS) technology to dynamically reallocate ambulance resources according to demand and time so as to reduce ambulance response times. Geospatial-time distribution of ambulance calls (demand) will be used as a basis for optimal ambulance deployment using system status management (SSM) strategy to achieve much demand coverage with the same number of ambulance resources to cause response time reduction. Drive-time polygons will be used to come up with time specific facility coverage areas and suggesting additional facility candidate sites where ambulance resources can be moved to serve higher demands making use of network analysis techniques. Emergency Ambulance calls’ data from 1st January 2014 to 31st December 2014 obtained from Eskişehir province health directorate will be used in this study. This study will focus on the reduction of ambulance response times which is a key Emergency Medical Services performance indicator.

Keywords: emergency medical services, system status management, ambulance response times, geographic information system, geospatial-time distribution, out of hospital cardiac arrest

Procedia PDF Downloads 281
97 A Unified Approach for Digital Forensics Analysis

Authors: Ali Alshumrani, Nathan Clarke, Bogdan Ghite, Stavros Shiaeles

Abstract:

Digital forensics has become an essential tool in the investigation of cyber and computer-assisted crime. Arguably, given the prevalence of technology and the subsequent digital footprints that exist, it could have a significant role across almost all crimes. However, the variety of technology platforms (such as computers, mobiles, Closed-Circuit Television (CCTV), Internet of Things (IoT), databases, drones, cloud computing services), heterogeneity and volume of data, forensic tool capability, and the investigative cost make investigations both technically challenging and prohibitively expensive. Forensic tools also tend to be siloed into specific technologies, e.g., File System Forensic Analysis Tools (FS-FAT) and Network Forensic Analysis Tools (N-FAT), and a good deal of data sources has little to no specialist forensic tools. Increasingly it also becomes essential to compare and correlate evidence across data sources and to do so in an efficient and effective manner enabling an investigator to answer high-level questions of the data in a timely manner without having to trawl through data and perform the correlation manually. This paper proposes a Unified Forensic Analysis Tool (U-FAT), which aims to establish a common language for electronic information and permit multi-source forensic analysis. Core to this approach is the identification and development of forensic analyses that automate complex data correlations, enabling investigators to investigate cases more efficiently. The paper presents a systematic analysis of major crime categories and identifies what forensic analyses could be used. For example, in a child abduction, an investigation team might have evidence from a range of sources including computing devices (mobile phone, PC), CCTV (potentially a large number), ISP records, and mobile network cell tower data, in addition to third party databases such as the National Sex Offender registry and tax records, with the desire to auto-correlate and across sources and visualize in a cognitively effective manner. U-FAT provides a holistic, flexible, and extensible approach to providing digital forensics in technology, application, and data-agnostic manner, providing powerful and automated forensic analysis.

Keywords: digital forensics, evidence correlation, heterogeneous data, forensics tool

Procedia PDF Downloads 169
96 Reconceptualizing Human Trafficking: Revealings of the Experience of Ethiopian Migrant Returnees

Authors: Waganesh Zeleke, Abebaw Minaye

Abstract:

This study examined the act, means, and purpose of human trafficking in the case of Ethiopian migrant returnees from the Middle East and South Africa. Using a questionnaire survey data was gathered from 1078 returnees. Twelve focus group discussions were used to solicit detailed experience of returnee about the process of their 'unsafe' immigration. Both quantitative and qualitative analysis results revealed that against the mainstream thinking of human trafficking means such as forcing, coercing, abducting or threatening, traffickers used 'victims’ free will' means by providing false promises to and capitalizing on the vulnerability of migrants. The migrants’ living condition including unemployment, ambitious view to change their life, and low level of risk perception were found to be risk factors which made them vulnerable and target of the brokers and smugglers who served as a catalyst in the process of their 'unsafe' migration. Equal to the traffickers/brokers/agency, the migrants’ family, friends and Ethiopian embassies contributed to the deplorable situation of migrant workers. 64.4% of the returnees reported that their migration is self-initiated, and 20% reported peer pressure and 13.8 percent reported family pressure, and it is only 1.8% who reported having been pushed by brokers. The findings revealed that 69.5% of the returnees do not know about the lifestyle and culture of the host community before their leave. In a similar vein, 50.9% of the returnees reported that they do not know about the nature of the work they are to do and their responsibilities. Further, 81% of the returnees indicated that the pre-migration training they received was not enough in equipping them with the required skill. Despite the returnees experiences of various forms of abuse and exploitation in the journey and at the destination they still have a positive attitude for migration (t=9.7 mean of 18.85 with a test value of 15). The returnees evaluated the support provided by sending agencies and Ethiopian embassies in the destination to be poor. 51.8% of the migrants do not know the details of the contract they signed during migration. Close to 70% of the returnees expressed that they had not got any legal support from stakeholders when they faced problems. What is more is that despite all these 27.9% of the returnees indicated re-immigrating as their plan. Based on these findings on the context and experience of Ethiopian migrant returnees, implications for training, policy, research, and intervention are discussed.

Keywords: trafficking, migrant, returnee, Ethiopia, experience, reconceptualizing

Procedia PDF Downloads 295
95 Geo-Visualization of Crimes against Children: An India Level Study 2001-2012

Authors: Ritvik Chauhan, Vijay Kumar Baraik

Abstract:

Crime is a rare event on earth surface. It is not simple but a complex event occurring in a spatio- temporal environment. Crime is one of the most serious security threats to human environments as it may result in harm to the individuals through the loss of property, physical and psychological injuries. The conventional studies done on different nature crime was mostly related to laws, psychological, social and political themes. The geographical areas are heterogeneous in their environmental conditions, associations between structural conditions, social organization which contributing specific crimes. The crime pattern analysis is made through theories in which criminal events occurs in persistent, identifiable patterns in a particular space and time. It will be the combined analysis of spatial factors and rational factors to the crime. In this study, we are analyzing the combined factors for the origin of crime against children. Children have always been vulnerable to victimization more because they are silent victims both physically and mentally to crimes and they even not realize what is happening with them. Their trusting nature and innocence always misused by criminals to perform crimes. The nature of crime against children is changed in past years like child rape, kidnapping &abduction, selling & buying of girls, foeticide, infanticide, prostitution, child marriage etc turned to more cruel and inhuman. This study will focus on understanding the space-time pattern of crime against children during the period 2001-2012. It also makes an attempt to explore and ascertain the association of crimes categorised against children, its rates with various geographical and socio-demographic factors through causal analysis using selected indicators (child sex-ratio, education, literacy rate, employment, income, etc.) obtained from the Census of India and other government sources. The outcome of study will help identifying the high crime regions with specified nature of crimes. It will also review the existing efforts and exploring the new plausible measure for tracking, monitoring and minimization of crime rate to meet the end goal of protecting the children from crimes committed against them.

Keywords: crime against children, geographic profiling, spatio-temporal analysis, hotspot

Procedia PDF Downloads 197
94 New Advanced Medical Software Technology Challenges and Evolution of the Regulatory Framework in Expert Software, Artificial Intelligence, and Machine Learning

Authors: Umamaheswari Shanmugam, Silvia Ronchi, Radu Vornicu

Abstract:

Software, artificial intelligence, and machine learning can improve healthcare through innovative and advanced technologies that are able to use the large amount and variety of data generated during healthcare services every day. As we read the news, over 500 machine learning or other artificial intelligence medical devices have now received FDA clearance or approval, the first ones even preceding the year 2000. One of the big advantages of these new technologies is the ability to get experience and knowledge from real-world use and to continuously improve their performance. Healthcare systems and institutions can have a great benefit because the use of advanced technologies improves the same time efficiency and efficacy of healthcare. Software-defined as a medical device, is stand-alone software that is intended to be used for patients for one or more of these specific medical intended uses: - diagnosis, prevention, monitoring, prediction, prognosis, treatment or alleviation of a disease, any other health conditions, replacing or modifying any part of a physiological or pathological process–manage the received information from in vitro specimens derived from the human samples (body) and without principal main action of its principal intended use by pharmacological, immunological or metabolic definition. Software qualified as medical devices must comply with the general safety and performance requirements applicable to medical devices. These requirements are necessary to ensure high performance and quality and also to protect patients’ safety. The evolution and the continuous improvement of software used in healthcare must take into consideration the increase in regulatory requirements, which are becoming more complex in each market. The gap between these advanced technologies and the new regulations is the biggest challenge for medical device manufacturers. Regulatory requirements can be considered a market barrier, as they can delay or obstacle the device approval, but they are necessary to ensure performance, quality, and safety, and at the same time, they can be a business opportunity if the manufacturer is able to define in advance the appropriate regulatory strategy. The abstract will provide an overview of the current regulatory framework, the evolution of the international requirements, and the standards applicable to medical device software in the potential market all over the world.

Keywords: artificial intelligence, machine learning, SaMD, regulatory, clinical evaluation, classification, international requirements, MDR, 510k, PMA, IMDRF, cyber security, health care systems.

Procedia PDF Downloads 70
93 Resourcing for Post-Disaster Housing Reconstruction: The Case of Cyclone Sidr and Aila in Bangladesh

Authors: Zahidul Islam

Abstract:

This study investigates the effectiveness of resourcing in post-disaster housing reconstruction with reference to Cyclones Sidr and Aila in Bangladesh. Through evaluating three key theories- Build Back Better approach, Balance Scorecard approach and Dynamic Competency theories, the synthesis of literature, and empirical fieldwork, this research develops a dynamic theoretical framework that moves the trajectory of post-disaster housing reconstruction towards the reconstruction of more resilient houses. The ultimate goal of any post-disaster housing reconstruction project is to provide quality houses and to achieve high levels of satisfaction for beneficiaries. However, post-disaster reconstruction projects often fail in their stated objectives; only 10-20% housing needs are met, with most houses constructed on a temporary rather than permanent basis. A number of scholars have argued that access to resources can significantly increase the capacity and capability of disaster victims to rebuild their lives, including the construction of new homes. This study draws on structured interviews of 285 villagers affected by cyclones to investigate the effectiveness of resourcing in rebuilding houses after Cyclone Sidr in 2007 and Cyclone Aila in 2009. Furthermore, semi-structured interviews were conducted with 20 key stakeholders in UNDP, Oxfam, government officials, and national and international NGOs. The results of this study show that recovery rate of cyclone resilient houses that can withstand cyclone is very low and majority of the population are still vulnerable. Furthermore, hierarchical regression of survey data and thematic analyses of qualitative data indicate that access to resources, level of education, quality of building materials and income generating activities of the respondents are critical for effective post-disaster recovery. Conversely, resource availability, lack of coordination among participant organisations, corruption and lack of access to appropriate land constituted significant obstacles to livelihood recovery. Finally, this study makes significant theoretical contributions to theories of post-disaster recovery by introducing new variables and measures for evaluating the quality and effectiveness of post-disaster housing.

Keywords: disaster, resourcing, housing, resilience

Procedia PDF Downloads 124
92 Features of Urban Planning Design of the Largest Cities Located in Areas with High Seismic (on the example of Almaty city, Republic of Kazakhstan)

Authors: Arkinzhan Mametov, Alexey Abilov

Abstract:

Strong earthquakes are dangerous natural phenomena that lead to the destruction of entire cities and the death of a large number of people. The recent strong earthquakes in Turkey and in a number of other states have shown that as a result of them, there are significant human casualties and huge destruction. The city of Almaty is located in the foothill basin of the Trans-Ili Alatau of the Tien Shan Mountain system, in a zone with 9–10-point seismicity. Almaty (formerly Verniy) was founded in 1856 and, since that period, has experienced two catastrophic earthquakes - in 1887 and 1911, which led almost to the complete destruction of the city. Since that time, according to seismologists, the city has been annually exposed to small seismic impacts of 2-3 points. This forced the subsequent search for ways to protect buildings and the public through the use of earthquake-resistant structures and materials, limiting the number of stores of buildings and increasing gaps between them, which was carried out quite consistently and since 1957. However, at present, it is necessary to state a number of violations, primarily of the urban development plan – the placement of high-density multi-stores commercial housing in the urban environment, bypassing the existing regulations and standards in the city. Their appearance contributes to a greater concentration of residents transport in a limited area, which can lead to harmful consequences during powerful earthquakes. The experience of eliminating the consequences of catastrophic earthquakes shows that an important factor in reducing human losses is timely technical and medical assistance to victims of earthquakes, the elimination of blockages, provision of temporary housing and evacuation of the population, especially in winter. In cities located in areas with high seismicity, it is necessary to ensure strict compliance with the requirements of urban development regulations, taking into account the entire complex of planning and organizational measures to minimize the destruction of buildings and human casualties.

Keywords: high seismic zones, urban planning regulations, special standards for planing, minimizing the human casualties

Procedia PDF Downloads 61
91 Effective Use of X-Box Kinect in Rehabilitation Centers of Riyadh

Authors: Reem Alshiha, Tanzila Saba

Abstract:

Physical rehabilitation is the process of helping people to recover and be able to go back to their former activities that have been delayed due to external factors such as car accidents, old age and victims of strokes (chronic diseases and accidents, and those related to sport activities).The cost of hiring a personal nurse or driving the patient to and from the hospital could be costly and time-consuming. Also, there are other factors to take into account such as forgetfulness, boredom and lack of motivation. In order to solve this dilemma, some experts came up with rehabilitation software to be used with Microsoft Kinect to help the patients and their families for in-home rehabilitation. In home rehabilitation software is becoming more and more popular, since it is more convenient for all parties affiliated with the patient. In contrast to the other costly market-based systems that have no portability, Microsoft’s Kinect is a portable motion sensor that reads body movements and interprets it. New software development has made rehabilitation games available to be used at home for the convenience of the patient. The game will benefit its users (rehabilitation patients) in saving time and money. There are many software's that are used with the Kinect for rehabilitation, but the software that is chosen in this research is Kinectotherapy. Kinectotherapy software is used for rehabilitation patients in Riyadh clinics to test its acceptance by patients and their physicians. In this study, we used Kinect because it was affordable, portable and easy to access in contrast to expensive market-based motion sensors. This paper explores the importance of in-home rehabilitation by using Kinect with Kinectotherapy software. The software targets both upper and lower limbs, but in this research, the main focus is on upper-limb functionality. However, the in-home rehabilitation is applicable to be used by all patients with motor disability, since the patient must have some self-reliance. The targeted subjects are patients with minor motor impairment that are somewhat independent in their mobility. The presented work is the first to consider the implementation of in-home rehabilitation with real-time feedback to the patient and physician. This research proposes the implementation of in-home rehabilitation in Riyadh, Saudi Arabia. The findings show that most of the patients are interested and motivated in using the in-home rehabilitation system in the future. The main value of the software application is due to these factors: improve patient engagement through stimulating rehabilitation, be a low cost rehabilitation tool and reduce the need for expensive one-to-one clinical contact. Rehabilitation is a crucial treatment that can improve the quality of life and confidence of the patient as well as their self-esteem.

Keywords: x-box, rehabilitation, physical therapy, rehabilitation software, kinect

Procedia PDF Downloads 322
90 Hybrid Strategies of Crisis Intervention for Sexualized Violence Using Digital Media

Authors: Katharina Kargel, Frederic Vobbe

Abstract:

Sexualized violence against children and adolescents using digital media poses particular challenges for practitioners with a focus on crisis intervention (social work, psychotherapy, law enforcement). The technical delimitation of violence increases the burden on those affected and increases the complexity of interdisciplinary cooperation. Urgently needed recommendations for practical action do not yet exist in Germany. Funded by the Federal Ministry of Education and Research, these recommendations for action are being developed in the HUMAN project together with science and practice. The presentation introduces the participatory approach of the HUMAN project. We discuss the application-oriented, casuistic approach of the project and present its results using the example of concrete case-based recommendations for Action. The participants will be presented with concrete prototypical case studies from the project, which will be used to illustrate quality criteria for crisis intervention in cases of sexualized violence using digital media. On the basis of case analyses, focus group interviews and interviews with victims of violence, we present the six central challenges of sexualized violence with the use of digital media, namely: • Diffusion (Ambiguities regarding the extent and significance of violence) , • Transcendence (Space and time independence of the dynamics of violence, omnipresence), • omnipresent anxiety (considering diffusion and transcendence), • being haunted (repeated confrontation with digital memories of violence or the perpetrator), • disparity (conflicts of interpretative power between those affected and the social environment) • simultaneity (of all other factors). We point out generalizable principles with which these challenges can be dealt with professionally. Dealing professionally with sexualized violence using digital media requires a stronger networking of professional actors. A clear distinction must be made between their own mission and the mission of the network partners. Those affected by violence must be shown options for crisis intervention in the context of the aid networks. The different competencies and the professional mission of the offers of help are to be made transparent. The necessity of technical possibilities for deleting abuse images beyond criminal prosecution will be discussed. Those affected are stabilized by multimodal strategies such as a combination of rational emotive therapy, legal support and technical assistance.

Keywords: sexualized violence, intervention, digital media, children and youth

Procedia PDF Downloads 211
89 Using Digital Innovations to Increase Awareness and Intent to Use Depo-Medroxy Progesterone Acetate-Subcutaneous Contraception among Women of Reproductive Age in Nigeria, Uganda, and Malawi

Authors: Oluwaseun Adeleke, Samuel O. Ikani, Fidelis Edet, Anthony Nwala, Mopelola Raji, Simeon Christian Chukwu

Abstract:

Introduction: Digital innovations have been useful in supporting a client’s contraceptive user journey from awareness to method initiation. The concept of contraceptive self-care is being promoted globally as a means for achieving universal access to quality contraceptive care; however, information about this approach is limited. An important determinant of the scale of awareness is the message construct, choice of information channel, and an understanding of the socio-epidemiological dynamics within the target audience. Significant gains have been made recently in expanding the awareness base of DMPA-SC -a relatively new entrant into the family planning method mix. The cornerstone of this success is a multichannel promotion campaign themed Discover your Power (DYP). The DYP campaign combines content marketing across select social media platforms, chatbots, Cyber-IPC, Interactive Voice Response (IVR), and radio campaigns. Methodology: During implementation, the project monitored predefined metrics of awareness and intent, such as the number of persons reached with the messages, the number of impressions, and meaningful engagement (link-clicks). Metrics/indicators are extracted through native insight/analytics tools across the various platforms. The project also enlists community mobilizers (CMs) who go door-to-door and engage WRA to advertise DISC’s online presence and support them to engage with IVR, digital companion (chatbot), Facebook page, and DiscoverYourPower website. Results: The result showed that the digital platforms recorded 242 million impressions and reached 82 million users with key DMPA-SC self-injection messaging in the three countries. As many as 3.4 million persons engaged (liked, clicked, shared, or reposted) digital posts -an indication of intention. Conclusion: Digital solutions and innovations are gradually becoming the archetype for the advancement of the self-care agenda. Digital innovations can also be used to increase awareness and normalize contraceptive self-care behavior amongst women of reproductive age if they are made an integral part of reproductive health programming.

Keywords: digital transformation, health systems, DMPA-SC, family planning, self-care

Procedia PDF Downloads 65
88 Identification of Information War in Lithuania

Authors: Vitalijus Leibenka

Abstract:

After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.

Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia

Procedia PDF Downloads 43
87 CyberSteer: Cyber-Human Approach for Safely Shaping Autonomous Robotic Behavior to Comply with Human Intention

Authors: Vinicius G. Goecks, Gregory M. Gremillion, William D. Nothwang

Abstract:

Modern approaches to train intelligent agents rely on prolonged training sessions, high amounts of input data, and multiple interactions with the environment. This restricts the application of these learning algorithms in robotics and real-world applications, in which there is low tolerance to inadequate actions, interactions are expensive, and real-time processing and action are required. This paper addresses this issue introducing CyberSteer, a novel approach to efficiently design intrinsic reward functions based on human intention to guide deep reinforcement learning agents with no environment-dependent rewards. CyberSteer uses non-expert human operators for initial demonstration of a given task or desired behavior. The trajectories collected are used to train a behavior cloning deep neural network that asynchronously runs in the background and suggests actions to the deep reinforcement learning module. An intrinsic reward is computed based on the similarity between actions suggested and taken by the deep reinforcement learning algorithm commanding the agent. This intrinsic reward can also be reshaped through additional human demonstration or critique. This approach removes the need for environment-dependent or hand-engineered rewards while still being able to safely shape the behavior of autonomous robotic agents, in this case, based on human intention. CyberSteer is tested in a high-fidelity unmanned aerial vehicle simulation environment, the Microsoft AirSim. The simulated aerial robot performs collision avoidance through a clustered forest environment using forward-looking depth sensing and roll, pitch, and yaw references angle commands to the flight controller. This approach shows that the behavior of robotic systems can be shaped in a reduced amount of time when guided by a non-expert human, who is only aware of the high-level goals of the task. Decreasing the amount of training time required and increasing safety during training maneuvers will allow for faster deployment of intelligent robotic agents in dynamic real-world applications.

Keywords: human-robot interaction, intelligent robots, robot learning, semisupervised learning, unmanned aerial vehicles

Procedia PDF Downloads 245
86 Modern Wars: States Responsibility

Authors: Lakshmi Chebolu

Abstract:

'War’, the word itself, is so vibrant and handcuffs the entire society. Since the beginning of manhood, the world has been evident in constant struggles. However, along with the growth of communities, relations, on the one hand, and disputes, on the other hand, infinitely increased. When states cannot or will not settle their disputes or differences by means of peaceful agreements, weapons are suddenly made to speak. It does not mean states can engage in war whenever they desire. At an international level, there has been a vast development of the law of war in the 20th century. War, it may be internal or international, in all situations, belligerent actors should follow the principles of warfare. With the advent of technology, the shape of war has changed, and it violates fundamental principles without observing basic norms. Conversely, states' attitudes towards international relationships are also undermined to some extent as state parties are not prioritized the communal interest rather than political or individual interest. In spite of the persistent development of communities, still many people are innocent victims of modern wars. It costs a toll on many lives, liberties, and properties and remains a major obstacle to nations' development. Recent incidents in Afghan are a live example to World Nations. We know that the principles of international law cannot be implemented very strictly on perpetrators due to the lacuna in the international legal system. However, the rules of war are universal in nature. The Geneva Convention, 1949 which are the core element of IHL, has been ratified by all 196 States. In fact, very few international treaties received this much of big support from nations. State’s approach towards Modern International Law, places a heavy burden on States practice towards in implementation of law. Although United Nations Security Council possesses certain powers under ‘Pacific Settlement of Disputes’, (Chapter VI) of the United Nations Charter to prevent disputes in a peaceful manner, conversely, this practice has been overlooked for many years due to political interests, favor, etc. Despite international consensus on the prohibition of war and protection of fundamental freedoms and human dignity, still, often, law has been misused by states’. The recent tendencies trigger questions about states’ willingness towards the implementation of the law. In view of the existing practices of nations, this paper aims to elevate the legal obligations of the international community to save the succeeding generations from the scourge of modern war practices.

Keywords: modern wars, weapons, prohibition and suspension of war activities, states’ obligations

Procedia PDF Downloads 56
85 Youth and Radicalization: Main Causes Who Lead Young People to Radicalize in a Context with Background of Radicalization

Authors: Zineb Emrane

Abstract:

This abstract addresses the issue of radicalization of young people in a context with background of radicalization, in North of Morocco, 5 terrorist of Madrid's Attacts on 11th March, were coming from this context. It were developed a study pilot that describing young people perception about the main causes that lead and motivate for radicalization. Whenever we talk about this topic, we obtain information from studies and investigations by specialists in field, but we don’t give voice to the protagonists who in many cases are victims, specifically, young people at social risk because of social factors. Extremist radicalization is an expanding phenomenon, that affect young people, in north of Morocco. They live in a context with radical background and at risk of social exclusion, their social, economic and familiar needs make them vulnerable. The extremist groups take advantage of this vulnerability to involve them in a process of radicalization, offering them an alternative environment where they can found all they are looking for. This study pilot approaches the main causes that lead and motivates young people to become radicals, analyzing their context with emphasis on influencing factors, and bearing in mind the analysis of young people about how the radical background affect them and their opinion this phenomenon. The pilot study was carried out through the following actions: - Group dynamics with young people to analyze the process of violent radicalization of young people. -A participatory workshop with members of organizations that work directly with young people at risk of radicalization. -Interviews with institutional managers -Participant observation. The implementation of actions has led to the conclusion that young people define violent radicalization as a sequential process, depending on the stage, it can be deconstructed. Young people recognize that they stop feeling belonging to their family, school and neighborhood when they see behavior contrary to what they consider good and evil. The emotional rupture and the search for references outside their circle, push them to sympathize with groups that have an extremist ideology and that offer them what they need. The radicalization is a process with different stages, the main causes and the factors which lead young people to use extremist violence are related their low level of belonging feeling to their context, and lack of critical thinking about important issues. The young people are in a vulnerable stage, searching their identity, a space in which they can be accepted, and when they don't find it they are easily manipulated and susceptible to being attracted by extremist groups.

Keywords: exclusion, radicalization, vulnerability, youth

Procedia PDF Downloads 145
84 A Life History of a Female Counselor Participated in Sewol Ferry Disaster Counseling Korea: Based on Qualitative Analysis of Mandelbaum's Life History

Authors: Donghun Lee, Jiyoung Shin, Youjin Kim, Jin Joo Kim

Abstract:

The sinking of Sewol ferry occurred in Korea on the morning of 16 April 2014 while carrying 476 people. In all, 304 passengers, mostly secondary school students from Danwon High School in Ansan City died in the disaster. The sinking of Sewol ferry has resulted in widespread social and political turmoil within South Korea. Many criticize the actions of the captain and crews of the ferry as well as the ferry operator and the regulators who oversaw its operations. However, huge criticism has been directed at the South Korean government for its national disaster response system. This disaster has made Korean government build up a new disaster management and psychological support system. The purpose of this study was to understand developmental and change process of a female counselor in her late fifties participated in Sewol ferry disaster counseling for a year. She has participated in providing as a counselor counseling and psychological support for the victims' families of Sewol ferry disaster, additionally as a director of community youth counseling center operated by local government by establishing governmental psychological supports plan for recovering collective trauma in the community, through which she have gotten self-reflection of whole her life. For in-depth interview data analysis, Mandelbaum’s three conceptual frameworks were employed; dimensions, turnings, and adaptation. The result of the study indicates extracted categories of life dimension, turning point and adaptation. The details of these categories are ‘having a self-image in youth’, ‘marriage in fairy-tale’, ‘unexpected death of husband’, ‘taking a step forward from darkness’, the way of counselor’, nice grown child’, ‘Sewol ferry disaster’ in life dimension, ‘death in front of life’, ‘milestone in life, counseling’ in turning points, ‘before Sewol ferry disaster’, ‘after Sewol ferry disaster’ in adaptation. Life history methods revealed the counselor’s internal developmental process by analyzing what Sewol ferry disaster influenced on an individual life, especially a counselor's one, what changes she went through, and how she adapted herself to that. Based on the results, discussions and suggestions are provided.

Keywords: development and change, disaster counseling, identity of female counselor, Mandelbaum’s life history, Sewol ferry

Procedia PDF Downloads 319
83 Exploiting the Potential of Fabric Phase Sorptive Extraction for Forensic Food Safety: Analysis of Food Samples in Cases of Drug Facilitated Crimes

Authors: Bharti Jain, Rajeev Jain, Abuzar Kabir, Torki Zughaibi, Shweta Sharma

Abstract:

Drug-facilitated crimes (DFCs) entail the use of a single drug or a mixture of drugs to render a victim unable. Traditionally, biological samples have been gathered from victims and conducted analysis to establish evidence of drug administration. Nevertheless, the rapid metabolism of various drugs and delays in analysis can impede the identification of such substances. For this, the present article describes a rapid, sustainable, highly efficient and miniaturized protocol for the identification and quantification of three sedative-hypnotic drugs, namely diazepam, chlordiazepoxide and ketamine in alcoholic beverages and complex food samples (cream of biscuit, flavored milk, juice, cake, tea, sweets and chocolate). The methodology involves utilizing fabric phase sorptive extraction (FPSE) to extract diazepam (DZ), chlordiazepoxide (CDP), and ketamine (KET). Subsequently, the extracted samples are subjected to analysis using gas chromatography-mass spectrometry (GC-MS). Several parameters, including the type of membrane, pH, agitation time and speed, ionic strength, sample volume, elution volume and time, and type of elution solvent, were screened and thoroughly optimized. Sol-gel Carbowax 20M (CW-20M) has demonstrated the most effective extraction efficiency for the target analytes among all evaluated membranes. Under optimal conditions, the method displayed linearity within the range of 0.3–10 µg mL–¹ (or µg g–¹), exhibiting a coefficient of determination (R2) ranging from 0.996–0.999. The limits of detection (LODs) and limits of quantification (LOQs) for liquid samples range between 0.020-0.069 µg mL-¹ and 0.066-0.22 µg mL-¹, respectively. Correspondingly, the LODs for solid samples ranged from 0.056-0.090 µg g-¹, while the LOQs ranged from 0.18-0.29 µg g-¹. Notably, the method showcased better precision, with repeatability and reproducibility both below 5% and 10%, respectively. Furthermore, the FPSE-GC-MS method proved effective in determining diazepam (DZ) in forensic food samples connected to drug-facilitated crimes (DFCs). Additionally, the proposed method underwent evaluation for its whiteness using the RGB12 algorithm.

Keywords: drug facilitated crime, fabric phase sorptive extraction, food forensics, white analytical chemistry

Procedia PDF Downloads 47
82 Influence of Various Disaster Scenarios Assumption to the Advance Creation of Wide-Area Evacuation Plan Confronting Natural Disasters

Authors: Nemat Mohammadi, Yuki Nakayama

Abstract:

After occurring Great East Japan earthquake and as a consequence the invasion of an extremely large Tsunami to the city, obligated many local governments to take into account certainly these kinds of issues. Poor preparation of local governments to deal with such kinds of disasters at that time and consequently lack of assistance delivery for local residents caused thousands of civilian casualties as well as billion dollars of economic damages. Those local governments who are responsible for governing such coastal areas, have to consider some countermeasures to deal with these natural disasters, prepare a comprehensive evacuation plan and contrive some feasible emergency plans for the purpose of victims’ reduction as much as possible. Under this evacuation plan, the local government should contemplate more about the traffic congestion during wide-area evacuation operation and estimate the minimum essential time to evacuate the whole city completely. This challenge will become more complicated for the government when the people who are affected by disasters are not only limited to the normal informed citizens but also some pregnant women, physically handicapped persons, old age citizens and foreigners or tourists who are not familiar with that conditions as well as local language are involved. The important issue to deal with this challenge is that how to inform these people to take a proper action right away noticing the Tsunami is coming. After overcoming this problem, next significant challenge is even more considerable. Next challenge is to evacuate the whole residents in a short period of time from the threated area to the safer shelters. In fact, most of the citizens will use their own vehicles to evacuate to the designed shelters and some of them will use the shuttle buses which are provided by local governments. The problem will arise when all residents want to escape from the threated area simultaneously and consequently creating a traffic jam on evacuation routes which will cause to prolong the evacuation time. Hence, this research mostly aims to calculate the minimum essential time to evacuate each region inside the threated area and find the evacuation start point for each region separately. This result will help the local government to visualize the situations and conditions during disasters and assist them to reduce the possible traffic jam on evacuation routes and consequently suggesting a comprehensive wide-area evacuation plan during natural disasters.

Keywords: BPR formula, disaster scenarios, evacuation completion time, wide-area evacuation

Procedia PDF Downloads 193
81 זכור (Remember): An Analysis of Art as a Reflection of Sexual and Gendered Violence against Jewish Women during the Pogroms (1919-1920S) And the Nazi Era (1933-1943)

Authors: Isabella B. Davidman

Abstract:

Violence used against Jewish women in both the Eastern European pogroms and during the Nazi era was specifically gendered, targeting their female identity and dignity of womanhood. Not only did these acts of gendered violence dehumanize Jewish women, but they also hurt the Jewish community as a whole. The devastating sexual violence that women endured during the pogroms and the Nazi era caused profound trauma. Out of shame and fear, silence about women’s experiences of sexual abuse manifests in forms that words cannot translate. Women have turned to art and other means of storytelling to convey their female experiences in visual and non-verbal ways. Therefore, this paper aims to address the historical accounts of gendered violence against Jewish women during the pogroms and Nazi era, as well as art that reflects upon the female experience, in order to understand the emotional impact resulting from these events. To analyze the artwork, a feminist analysis was used to understand the intersection of gender with the other systems of inequality, such as systemic anti-semitism, in women’s lives; this ultimately explained the ways in which cultural productions undermine and reinforce the political and social oppression of women by exploring how art confronts the exploitation of women's bodies. By analyzing the art in the context of specific acts of violence, such as public rape, as a strategic weapon, we are able to understand women’s experiences and how these experiences, in turn, challenged their womanhood. Additionally, these atrocities, which often occurred in the public space, were dismissed and forgotten due to the social stigma of rape. In this sense, the experiences of women in pogroms and the Nazi era were both highly unacknowledged and forgotten. Therefore, the art that was produced during those time periods, as well as those after those events, gives voice to the profound silence on the narratives of Jewish women. Sexual violence is a weapon of war used to cause physical and psychological destruction, not only as a product of war. In both the early twentieth-century pogroms and the Holocaust, the sexual violence that Jewish women endured was fundamentally the same: the rape of Jewish women became a focal target in the theater of violence– women were not raped because they were women, but specifically, because they were Jewish women. Although the events of the pogroms and the Holocaust are in the past, the art that serves as testimony to the experience of Jewish women remains an everlasting reminder of the gendered violence that occurred. Even though covert expressions, such as an embroidered image of a bird eating an apple, the artwork gives voice to the many silenced victims of sexualized and gendered violence.

Keywords: gendered violence, holocaust, Nazi era, pogroms

Procedia PDF Downloads 81
80 Causes, Consequences, and Alternative Strategies of Illegal Migration in Ethiopia: The Case of Tigray Region

Authors: Muuz Abraha Meshesha

Abstract:

Illegal Migration, specifically Trafficking in person is one of the primary issues of the day affecting all states of the world with variation on the extent of the root causes and consequences that led people to migrate irregularly and the consequences it is costing on humanity. This paper intends to investigate the root causes and consequences of illegal migration in Ethiopia’s Tigray Regional state and come up with alternative intervening strategy. To come up with pertinent and robust research finding, this study employed mixed research approach involving qualitative and quantitative data in line with purposive and snow ball sampling selection technique. The study revealed that, though poverty is the most commonly sensed pushing factor for people to illegally migrate, the issue of psycho-social orientation and attitudinal immersion of the local community for illegal migration, both in thinking and action is the most pressing problem that urges serious intervention. Trafficking in persons and Illegal migration in general, is becoming the norm of the day in the study area that overtly reveal illegal migration is an issue beyond livelihood securing demand in practice. Basically, parties engaged in illegal migration and the accomplice with human traffickers these days in the study area are found to be more than urgency for food security and a need to escape from livelihood impoverishment. Therefore, this study come up with a new paradigm insight indicating that illegal migration is believed by the local community members as an optional path way of doing business in illegal way while the attitude of the community and officials authorized to regulate is being part of the channel or to the least tolerant of this grave global danger. The study also found that the effect of illegal migration is significantly manifested in long run than in short term periods. Therefore, a need for critical consideration on attitudinal based intervention and youth oriented and enforceable legal and policy framework accountability framework is required to face and control illegal migration by international, national, local stakeholders. Besides this, economy based development interventions that could engage and reorient the youth, as primary victims of trafficking, and expansion of large scale projects that can employ large number of youths at a time.

Keywords: human traficking, illegal migration, migration, tigray region

Procedia PDF Downloads 43
79 Melaninic Discrimination among Primary School Children

Authors: Margherita Cardellini

Abstract:

To our knowledge, dark skinned children are often victims of discrimination from adults and society, but few studies specifically focus on skin color discrimination on children coming from the same children. Even today, the 'color blind children' ideology is widespread among adults, teachers, and educators and maybe also among scholars, which seem really careful about study expressions of racism in childhood. This social and cultural belief let people think that all the children, because of their age and their brief experience in the world, are disinterested in skin color. Sometimes adults think that children are even incapable of perceiving skin colors and that it could be dangerous to talk about melaninic differences with them because they finally could notice this difference, producing prejudices and racism. Psychology and neurology research projects are showing for many years that even the newborns are already capable of perceiving skin color and ethnic differences by the age of 3 months. Starting from this theoretical framework we conducted a research project to understand if and how primary school children talk about skin colors, picking up any stereotypes or prejudices. Choosing to use the focus group as a methodology to stimulate the group dimension and interaction, several stories about skin color discrimination's episodes within their classroom or school have emerged. Using the photo elicitation technique we chose to stimulate talk about the research object, which is the skin color, asking the children what was ‘the first two things that come into your mind’ when they look the photographs presented during the focus group, which represented dark and light skinned women and men. So, this paper will present some of these stories about episodes of discrimination with an escalation grade of proximity related to the discriminatory act. It will be presented a story of discrimination happened within the school, in an after-school daycare, in the classroom and even episode of discrimination that children tell during the focus groups in the presence of the discriminated child. If it is true that the Declaration of the Right of the Child state that every child should be discrimination free, it’s also true that every adult should protect children from every form of discrimination. How, as adults, can we defend children against discrimination if we cannot admit that even children are potential discrimination’s actors? Without awareness, we risk to devalue these episodes, implicitly confident that the only way to fight against discrimination is to keep her quiet. The right not to be discriminated goes through the right to talk about its own experiences of discrimination and the right to perceive the unfairness of the constant depreciation about skin color or any element of physical diversity. Intercultural education could act as spokesperson for this mission in the belief that difference and plurality could really become elements of potential enrichment for humanity, starting from children.

Keywords: colorism, experiences of discrimination, primary school children, skin color discrimination

Procedia PDF Downloads 177
78 The Situation in Afghanistan as a Step Forward in Putting an End to Impunity

Authors: Jelena Radmanovic

Abstract:

On 5 March 2020, the International Criminal Court has decided to authorize the investigation into the crimes allegedly committed on the territory of Afghanistan after 1 May 2003. The said determination has raised several controversies, including the recently imposed sanctions by the United States, furthering the United States' long-standing rejection of the authority of the International Criminal Court. The purpose of this research is to address the said investigation in light of its importance for the prevention of impunity in the cases where the perpetrators are nationals of Non-Party States to the Rome Statute. Difficulties that the International Criminal Court has been facing, concerning the establishment of its jurisdiction in those instances where an involved state is not a Party to the Rome Statute, have become the most significant stumbling block undermining the importance, integrity, and influence of the Court. The Situation in Afghanistan raises even further concern, bearing in mind that the Prosecutor’s Request for authorization of an investigation pursuant to article 15 from 20 November 2017 has initially been rejected with the ‘interests of justice’ as an applied rationale. The first method used for the present research is the description of the actual events regarding the aforementioned decisions and the following reactions in the international community, while with the second method – the method of conceptual analysis, the research will address the decisions pertaining to the International Criminal Court’s jurisdiction and will attempt to address the mentioned Decision of 5 March 2020 as an example of good practice and a precedent that should be followed in all similar situations. The research will attempt parsing the reasons used by the International Criminal Court, giving rather greater attention to the latter decision that has authorized the investigation and the points raised by the officials of the United States. It is a find of this research that the International Criminal Court, together with other similar judicial instances (Nuremberg and Tokyo Tribunals, The International Criminal Tribunal for the former Yugoslavia, The International Criminal Tribunal for Rwanda), has presented the world with the possibility of non-impunity, attempting to prosecute those responsible for the gravest of crimes known to the humanity and has shown that such persons should not enjoy the benefits of their immunities, with its focus primarily on the victims of such crimes. Whilst it is an issue that will most certainly be addressed further in the future, with the situations that will be brought before the International Criminal Court, the present research will make an attempt at pointing to the significance of the situation in Afghanistan, the International Criminal Court as such and the international criminal justice as a whole, for the purpose of putting an end to impunity.

Keywords: Afghanistan, impunity, international criminal court, sanctions, United States

Procedia PDF Downloads 103
77 Relationship of Sexually Abusive Behavior of Male Coach and Motivation of Female Athletes at Public Sector Universities, Sindh, Pakistan

Authors: Shireen Bhatti, M. Asif Shaikh, Atif Khan

Abstract:

Sexually abusive behavior is seen as a social phenomenon across different societies and different territories. An institution of sport has its own uniqueness. It is different from other workplaces and academia. The challenges in sports raised are different, which require a call to action for specific sexual harassment policies and practices. Many sportswomen who are members of team games or individual games experience sexually abusive behavior from their male counterparts, including trainers, coaches, and lower staff. The power of the coach over the athlete is massive due to the coach’s position. The power can be disguised for possible abuse, whether physical or emotional. Female athletes are victims in most offensive situations that occur in collegiate settings by male coaches. The objective of the study is to identify the relationship between the sexually abusive behavior of male coaches and the motivation of female athletes at public sector universities in Sindh, Pakistan. The descriptive approach was used, whereas The cross-sectional survey design was used to support the study. Intercollegiate, intervarsity, provincial, and national level female athletes of public sector universities of Sindh province were the subject of this study. The tool of research was a self-developed scale that encompassed the relationship between the sexually abusive behaviors of coaches and the motivation of female athletes. Frequency, percentage, and mean and Pearson Correlation, chi square, and ANOVA were used. The results indicate that there is a strong negative relationship between the sexually abusive behavior of male coaches and female athletes’ sports motivation. The Pearson correlation shows that there is a strong negative relation between the sexually abusive behavior of male athletes and female athletes’ sports motivation. The significant level is (r = -.741); however, The findings confirmed that the coach’s power, authority, decision-making position, the threat of rejection on the refusal of sexual cooperation, the ready availability of inexperienced female athletes, and lack of implication of policies regarding sexual misconducts in public sector universities decline motivation of female athletes witnessed. Based on the findings, the study recommended that the family background, career history, and participation record of coaches should be investigated to ensure that they have ever been involved in any criminal activity or sexual misconduct during their career or participation.

Keywords: abusive, athlete, coach, motivation

Procedia PDF Downloads 312
76 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms

Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga

Abstract:

Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.

Keywords: anomaly detection, clustering, pattern recognition, web sessions

Procedia PDF Downloads 267
75 Territorial Influence of Religious Based Armed Conflicts in Africa

Authors: Badru Hasan Segujja, Nassiwa Shamim

Abstract:

This study “Territorial Influence of Religious Based Armed Conflicts in Africa” was in place to identify the influence of religious based armed conflicts, their parsistance and their impact on African societies. The study employed a qualitative research methodology, as data from respondents was descriptively recorded using random sampling technics. The study discovered that, the world is experiencing religious based armed violence where actors fight under the umbrella of freedom fighters where the African continent in particular has been at the pic of such armed violence almost since each countries independence to date. Because of this situation, the Continent is torn apart as families are traumatized by the memories of their dear ones who never survived in yesterdays’ faith based armed violence. The study disvovered that, some of these faith based armed conflicts are caused by factors ranging from undemocratic practices due to poor governance, poverty, Unemployment, religious extremism and radicalism which later turn into intractable violence. Religious armed groups such as, Holly Spirit Movement (HSM), Allied Democratic Forces (ADF) and Lords Resistance Army (LRA) in Uganda and now Eastern DRC and Central African Republic, ALSHABAB in East Africa, SELEKE and ANTI BALAKA in Central African Republic, BOKO HARAM in Nigeria, JANJAWEED in Sudan and Republic of Chad, Sudaneess Peoples Liberation Army (SPLA) in Southern Sudan, Alqaida Mission in Islamic Magreeb (AQIIM) in Mali coupled with acute racism of Hutu and Tutsi in Rwanda or Burundi and Xenophobic Nationalism in (South Africa). The study futher discovered that, the component of “freedom fighters” has strongly made these groups maintain the ground without fear of any repucation, which situation has resulted into children and women becoming disproportionally victims and the response of international communities to the violence is inadequate. The study concludes that, dialogue for peace is better than going for wars. The study recommends that, in order to restore peace on the African continent and elsewhere in the world, UN should recommend the teaching of peace values in schools, pre-conflict early warnings must be well attended, actors must refrain from using religious lebles, democracy, unemployment and poverty issues should as well be addressed to avoid unnessesary conflicts.

Keywords: influence, religious, armed, conflicts

Procedia PDF Downloads 65