Search results for: criminal justice debt
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1220

Search results for: criminal justice debt

470 Teaching Legal English in Russia: Traditions and Problems

Authors: Irina A. Martynenko, Viktoriia V. Pikalova

Abstract:

At the moment, there are more than a thousand law schools in Russia. The program of preparation in each of them without exception includes English language course. It is believed that lawyers in Russia are best trained at the MGIMO University, the All-Russian State University of Justice, Kutafin Moscow State Law University, Peoples’ Friendship University of Russia, Lomonosov Moscow State University, St. Petersburg State University, Diplomatic Academy of Russian Foreign Ministry and some others. Currently, the overwhelming majority of universities operate using the two-level system of education: bachelor's plus master's degree. Foreign languages are taught at both levels. The main example of consideration used throughout this paper is Kutafin Moscow State Law University being one of the best law schools in the country. The article examines traditions of teaching legal English in Russia and highlights problem arising in this process. The authors suggest ways of solving them in the scope of modern views and practice of teaching English for specific purposes.

Keywords: Kutafin Moscow State Law University, legal English, Russia, teaching

Procedia PDF Downloads 227
469 A Study on Al-Riba Al-Hukmi and Its Instances from View of Islam

Authors: Abolfazl Alishahi Ghalehjoughi, Bi Bi Zeinab Hoseni

Abstract:

Islam is a comprehensive religion, and has rules for any thing. Islam attaches respect and importance to properties as well, and outlaws some types of transaction. A type of transaction that is strictly forbidden by the Islam is riba (usury), for which special punishments is considered in the Qur’an and hadiths. Usury is divided into (riba qarzi) loan usury and riba muamili (transaction usury); sometimes, in transaction and interest free loan contracts, ziyadah aini (interest in kind and of the same kind as that of the object of transaction) is not stipulated, but performance of work, provision of an advantage or a service, or a respite is stipulated, in which case although no ziyadah aini is in place, the transaction still constitutes usury and is outlaw. For instance, if a bank stipulates in an interest free loan contract that it pays a person the interest free loan only if he/she deposits a sum in the bank, this is an instance of riba hukmi. Or, for muamilah sarfi (transaction is which object of transaction and consideration is gold or silver) to be legitimate, it necessary that both the object of transaction and the consideration be handed over between the parties, because if a party takes delivery of the considered or object of transaction while the other party does not, the party who has taken delivery will accrue a benefit, as he/she wins time until he/she makes delivery to the other party, and this tantamount to usury in muamilah sarfi. Or, if a person lends a sum to another person, while the lender is indebted to the borrower, if the lender stipulates that he/she lends such amount only if the borrower postpones the maturity date of the lender’s debt to borrower, which is in one month, for a particular period of time, such loan will constitute usury. This research first provides views on riba hukmi, and then proceeds to analysis of views, trying to study fundamentals and proof regarding prohibition of riba hukmi, and to analyze instances of riba hukmi according to religious and hadith books.

Keywords: Islam, riba, prohibition, riba hukmi

Procedia PDF Downloads 367
468 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 274
467 Distributed Energy Resources in Low-Income Communities: a Public Policy Proposal

Authors: Rodrigo Calili, Anna Carolina Sermarini, João Henrique Azevedo, Vanessa Cardoso de Albuquerque, Felipe Gonçalves, Gilberto Jannuzzi

Abstract:

The diffusion of Distributed Energy Resources (DER) has caused structural changes in the relationship between consumers and electrical systems. The Photovoltaic Distributed Generation (PVDG), in particular, is an essential strategy for achieving the 2030 Agenda goals, especially SDG 7 and SDG 13. However, it is observed that most projects involving this technology in Brazil are restricted to the wealthiest classes of society, not yet reaching the low-income population, aligned with theories of energy justice. Considering the research for energy equality, one of the policies adopted by governments is the social electricity tariff (SET), which provides discounts on energy tariffs/bills. However, just granting this benefit may not be effective, and it is possible to merge it with DER technologies, such as the PVDG. Thus, this work aims to evaluate the economic viability of the policy to replace the social electricity tariff (the current policy aimed at the low-income population in Brazil) by PVDG projects. To this end, a proprietary methodology was developed that included: mapping the stakeholders, identifying critical variables, simulating policy options, and carrying out an analysis in the Brazilian context. The simulation answered two key questions: in which municipalities low-income consumers would have lower bills with PVDG compared to SET; which consumers in a given city would have increased subsidies, which are now provided for solar energy in Brazil and for the social tariff. An economic model was created for verifying the feasibility of the proposed policy in each municipality in the country, considering geographic issues (tariff of a particular distribution utility, radiation from a specific location, etc.). To validate these results, four sensitivity analyzes were performed: variation of the simultaneity factor between generation and consumption, variation of the tariff readjustment rate, zeroing CAPEX, and exemption from state tax. The behind-the-meter modality of generation proved to be more promising than the construction of a shared plant. However, although the behind-the-meter modality presents better results than the shared plant, there is a greater complexity in adopting this modality due to issues related to the infrastructure of the most vulnerable communities (e.g., precarious electrical networks, need to reinforce roofs). Considering the shared power plant modality, many opportunities are still envisaged since the risk of investing in such a policy can be mitigated. Furthermore, this modality can be an alternative due to the mitigation of the risk of default, as it allows greater control of users and facilitates the process of operation and maintenance. Finally, it was also found, that in some regions of Brazil, the continuity of the SET presents more economic benefits than its replacement by PVDG. However, the proposed policy offers many opportunities. For future works, the model may include other parameters, such as cost with low-income populations’ engagement, and business risk. In addition, other renewable sources of distributed generation can be studied for this purpose.

Keywords: low income, subsidy policy, distributed energy resources, energy justice

Procedia PDF Downloads 109
466 Financial Fraud Prediction for Russian Non-Public Firms Using Relational Data

Authors: Natalia Feruleva

Abstract:

The goal of this paper is to develop the fraud risk assessment model basing on both relational and financial data and test the impact of the relationships between Russian non-public companies on the likelihood of financial fraud commitment. Relationships mean various linkages between companies such as parent-subsidiary relationship and person-related relationships. These linkages may provide additional opportunities for committing fraud. Person-related relationships appear when firms share a director, or the director owns another firm. The number of companies belongs to CEO and managed by CEO, the number of subsidiaries was calculated to measure the relationships. Moreover, the dummy variable describing the existence of parent company was also included in model. Control variables such as financial leverage and return on assets were also implemented because they describe the motivating factors of fraud. To check the hypotheses about the influence of the chosen parameters on the likelihood of financial fraud, information about person-related relationships between companies, existence of parent company and subsidiaries, profitability and the level of debt was collected. The resulting sample consists of 160 Russian non-public firms. The sample includes 80 fraudsters and 80 non-fraudsters operating in 2006-2017. The dependent variable is dichotomous, and it takes the value 1 if the firm is engaged in financial crime, otherwise 0. Employing probit model, it was revealed that the number of companies which belong to CEO of the firm or managed by CEO has significant impact on the likelihood of financial fraud. The results obtained indicate that the more companies are affiliated with the CEO, the higher the likelihood that the company will be involved in financial crime. The forecast accuracy of the model is about is 80%. Thus, the model basing on both relational and financial data gives high level of forecast accuracy.

Keywords: financial fraud, fraud prediction, non-public companies, regression analysis, relational data

Procedia PDF Downloads 117
465 Islamic Banking: An Ultimate Source of Financial Inclusion

Authors: Tasawar Nawaz

Abstract:

Promotion of socioeconomic justice through redistribution of wealth is one of the most salient features of Islamic economic system. Islamic financial institutions known as Islamic banks are used to implement this in practice under the guidelines of Islamic Shariah law. Islamic banking systems strive to promote and achieve financial inclusion among the society by offering interest-free banking and risk-sharing financing solutions. Shariah-compliant micro finance is one of the most popular financial instruments used by Islamic banks to enhance access to finance. Benevolent loan (or Qard-al-Hassanah) is one of the popular financial tools used by the Islamic banks to promote financial inclusion. This aspect of Islamic banking is empirically examined in this paper with specific reference to firm’s resources, largely defined here as intellectual capital. The paper finds that Islamic banks promote financial inclusion by exploiting available resources especially, the human intellectual capital.

Keywords: financial inclusion, intellectual capital, Qard-al-Hassanah, Islamic banking

Procedia PDF Downloads 310
464 Human Trafficking in Your Backyard: Know the Signs and How to Help

Authors: Jessie Fazel, Kristen Smith

Abstract:

Human trafficking is a multi-billion-dollar criminal industry that affects 24.9 million people around the world. There are several different types of trafficking, the most common being sex trafficking, labor trafficking, and domestic servitude. Survival sex is common in the pediatric population, as they engage in sex for food, a place to sleep, or other basic needs. Statistics show that health care workers are at a unique advantage to help identify victims and get them the help they need, as 88% of trafficked victims encounter a health care worker while being trafficked. Unfortunately, victims don’t usually self-identify that they are being trafficked and the situations they face can vary dramatically. It is imperative to remember that traditional red flags are not always present in the pediatric population. Risk factors and red flags with their history and physical exam are one of the best indicators that health care providers need to be vigilant in looking at. There are numerous barriers for disclosure in the healthcare setting. Periods of time before and after disclosure are often emotionally difficult and could be dangerous for the victim. It is extremely important to have a plan in place for intervention if the victim does disclose trafficking. A trauma informed approach to medical and mental health interventions, that focus on safety, are vital in this population. This is happening where you live and you can make a difference in their lives.

Keywords: human trafficking, public health, emergency medicine, sexual health

Procedia PDF Downloads 30
463 Transnational Solidarity and Philippine Society: A Probe on Trafficked Filipinos and Economic Inequality

Authors: Shierwin Agagen Cabunilas

Abstract:

Countless Filipinos are reeling in dire economic inequality while many others are victims of human trafficking. Where there is extreme economic inequality, majority of the Filipinos are deprived of basic needs to have a good life, i.e., decent shelter, safe environment, food, quality education, social security, etc. The problem on human trafficking poses a scandal and threat in respect to human rights and dignity of a person on matters of sex, gender, ethnicity and race among others. The economic inequality and trafficking in persons are social pathologies that needed considerable amount of attention and visible solution both in the national and international level. However, the Philippine government seems falls short in terms of goals to lessen, if not altogether eradicate, the dire fate of many Filipinos. The lack of solidarity among Filipinos seems to further aggravate injustice and create hindrances to economic equity and protection of Filipinos from syndicated crimes, i.e., human trafficking. Indifference towards the welfare and well-being of the Filipino people trashes them into an unending cycle of marginalization and neglect. A transnational solidaristic action in response to these concerns is imperative. The subsequent sections will first discuss the notion of solidarity and the motivating factors for collective action. While solidarity has been previously thought of as stemming from and for one’s own community and people, it can be argued as a value that defies borders. Solidarity bridges peoples of diverse societies and cultures. Although there are limits to international interventions on another’s sovereignty, such as, internal political autonomy, transnational solidarity may not be an opposition to solidarity with people suffering injustices. Governments, nations and institutions can work together in securing justice. Solidarity thus is a positive political action that can best respond to issues of economic, class, racial and gender injustices. This is followed by a critical analysis of some data on Philippine economic inequality and human trafficking and link the place of transnational solidaristic arrangements. Here, the present work is interested on the normative aspect of the problem. It begins with the section on economic inequality and subsequently, human trafficking. It is argued that a transnational solidarity is vital in assisting the Philippine governing bodies and authorities to seriously execute innovative economic policies and developmental programs that are justice and egalitarian oriented. Transnational solidarity impacts a corrective measure in the economic practices, and activities of the Philippine government. Moreover, it is suggested that in order to mitigate Philippine economic inequality and human trafficking concerns it involves a (a) historical analysis of systems that brought about economic anomalies, (b) renewed and innovated economic policies, (c) mutual trust and relatively high transparency, and (d) grass-root and context-based approach. In conclusion, the findings are briefly sketched and integrated in an optimistic view that transnational solidarity is capable of influencing Philippine governing bodies towards socio-economic transformation and development of the lives of Filipinos.

Keywords: Philippines, Filipino, economic inequality, human trafficking, transnational solidarity

Procedia PDF Downloads 276
462 Gender Equality in Brazil: Advances and Retreats in Times of Social Networks

Authors: Lara Góes Da Costa

Abstract:

This paper analyzes the social dimension of the empowerment of women in Brazil, following the principles of human development of the UN WOMEN, in particular the sixth principle, which establishes the promotion of gender equality through social policy initiatives and activism in general aimed at community. In Brazil, women's empowerment has taken social networks through the creation of avatars and pages of dissemination and promotion of gender equality, as well as denunciations and educational posts such as 'Observe Gender', 'Empower Two Women', 'Black Intellectual Women', among others. At the same time, women's social inclusion bills in various sectors are trailing in the legislative apparatus, with little or no relation to the current discussion of gender diversity and intersectionality. In this sense, this article establishes an analytical parallel between the media manifestations of social networks and the social distance of the representatives of the legislative power. This parallelly shows the political failing to meet the social demands of inclusion, as to multiply the creation of laws and the effectiveness of the principle of promoting gender equality.

Keywords: gender, rights, justice, social networks

Procedia PDF Downloads 393
461 China-Africa Diplomatic Discourse: Reconstructing the Principle of “Yi” as a Framework for Analyzing Sino-Africa Cooperation

Authors: Modestus Queen

Abstract:

As we know, diplomatic languages carry the political ideology and cultural stance of the country. Knowing that China's diplomatic discourse is complicated and is heavily flavored with Chinese characteristics, one of the core goals of President Xi's administration is to properly tell the story of China. This cannot be done without proper translation or interpretation of major Chinese diplomatic concepts. Therefore, this research seeks to interpret the relevance of "Yi" as used in "Zhèngquè Yì Lì Guān". The author argues that it is not enough to translate a document but that it must be properly interpreted to portray it as political, economic, cultural and diplomatic relevant to the target audience, in this case, African people. The first finding in the current study indicates that literal translation is a bad strategy, especially in Chinese diplomatic discourses. The second finding indicates that "Yi" can be used as a framework to analyze Sino-Africa relations from economic, social and political perspectives, and the third finding indicates that "Yi" is the guiding principle of China's foreign policy towards Africa.

Keywords: Yi, justice, China-Africa, interpretation, diplomatic discourse, discourse reconstruction

Procedia PDF Downloads 131
460 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 360
459 Application of XRF and Other Principal Component Analysis for Counterfeited Gold Coin Characterization in Forensic Science

Authors: Somayeh Khanjani, Hamideh Abolghasemi, Hadi Shirzad, Samaneh Nabavi

Abstract:

At world market can be currently encountered a wide range of gemological objects that are incorrectly declared, treated, or it concerns completely different materials that try to copy precious objects more or less successfully. Counterfeiting of precious commodities is a problem faced by governments in most countries. Police have seized many counterfeit coins that looked like the real coins and because the feeling to the touch and the weight were very similar to those of real coins. Most people were fooled and believed that the counterfeit coins were real ones. These counterfeit coins may have been made by big criminal organizations. To elucidate the manufacturing process, not only the quantitative analysis of the coins but also the comparison of their morphological characteristics was necessary. Several modern techniques have been applied to prevent counterfeiting of coins. The objective of this study was to demonstrate the potential of X-ray Fluorescence (XRF) technique and the other analytical techniques for example SEM/EDX/WDX, FT-IR/ATR and Raman Spectroscopy. Using four elements (Cu, Ag, Au and Zn) and obtaining XRF for several samples, they could be discriminated. XRF technique and SEM/EDX/WDX are used for study of chemical composition. XRF analyzers provide a fast, accurate, nondestructive method to test the purity and chemistry of all precious metals. XRF is a very promising technique for rapid and non destructive counterfeit coins identification in forensic science.

Keywords: counterfeit coins, X-ray fluorescence, forensic, FT-IR

Procedia PDF Downloads 486
458 Teaching Philosophy to Nigerian Students: Some Pedagogic Considerations

Authors: Patricia Agboro

Abstract:

The dominant strands of pedagogic ideas are often western in origin/orientation. This is the case because of the hegemony of the western world in global academia. For this reason, peculiarities and considerations of context are often swept to the margins as educational thinkers emphasize patently Eurocentric and one-size-fits-all solutions to the problems of effective teaching. This paper takes as a starting point the notion that pedagogy must be context specific and pragmatic in its application. It is from this perspective that it focuses on the challenges of teaching philosophy to students in the Nigerian tertiary institutions. Philosophy students in Nigeria usually come across philosophy for the first time at the tertiary level. This raises the problem of inadequate exposure. Beyond this, a substantial number of candidates are admitted into the philosophy program based on the Nigerian version of ‘affirmative action’ which is known as the quota system. This paper addresses the problems highlighted above and hosts of other issues as well as provides recommendations that can improve effectiveness of teaching philosophy at the university level.

Keywords: justice, quota system, pedagogy, federal character

Procedia PDF Downloads 239
457 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 89
456 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 279
455 A Progressive Techno-Legal Framework for Digital Evidence Management

Authors: Ayobami P. Olatunji, Saadat Ibiyeye, Abdulaziz Ibiyeye, Tahir M. Khan

Abstract:

Digital evidence has become a cornerstone in criminal investigations due to the vast amount of information available in digital form. Despite its prevalence, this evidence is often met with skepticism in court proceedings because of its inherently volatile nature. Traditional forensic processes, defined predominantly by technology experts, emphasize technical details in evidence collection while often neglecting legal procedures. This gap can pose significant challenges for legal practitioners in understanding and applying digital forensics. As digital evidence increasingly influences future cases, a cohesive framework integrating both technical and legal perspectives is essential. We propose a comprehensive techno-legal framework designed to bridge this gap. Our framework integrates key aspects of collection, preservation, examination, and documentation with legal components such as case building, certificate of compliance, cross-examination, and authorization. This balanced approach aims not to replace existing evidence presentation principles but to enhance the seamless integration of digital evidence into legal proceedings, addressing the common issues that lead to its dismissal.

Keywords: evidence presentation, warrant, digital-forensic, certificate of compliance, legal procedures, computer crime, violation, investigation cybercrime

Procedia PDF Downloads 26
454 The Determinants of Financial Ratio Disclosures and Quality: Evidence from an Emerging Market

Authors: Ben Kwame Agyei-Mensah

Abstract:

This study investigated the influence of firm-specific characteristics which include proportion of Non-Executive Directors, ownership concentration, firm size, profitability, debt equity ratio, liquidity and leverage on the extent and quality of financial ratios disclosed by firms listed on the Ghana Stock Exchange. The research was conducted through detailed analysis of the 2012 financial statements of the listed firms. Descriptive analysis was performed to provide the background statistics of the variables examined. This was followed by regression analysis which forms the main data analysis. The results of the extent of financial ratio disclosure level, mean of 62.78%, indicate that most of the firms listed on the Ghana Stock Exchange did not overwhelmingly disclose such ratios in their annual reports. The results of the low quality of financial ratio disclosure mean of 6.64% indicate that the disclosures failed woefully to meet the International Accounting Standards Board's qualitative characteristics of relevance, reliability, comparability and understandability. The results of the multiple regression analysis show that leverage (gearing ratio) and return on investment (dividend per share) are associated on a statistically significant level as far as the extent of financial ratio disclosure is concerned. Board ownership concentration and proportion of (independent) non-executive directors, on the other hand were found to be statistically associated with the quality of financial ratio disclosed. There is a significant negative relationship between ownership concentration and the quality of financial ratio disclosure. This means that under a higher level of ownership concentration less quality financial ratios are disclosed. The findings also show that there is a significant positive relationship between board composition (proportion of non-executive directors) and the quality of financial ratio disclosure.

Keywords: voluntary disclosure, firm-specific characteristics, financial reporting, financial ratio disclosure, Ghana stock exchange

Procedia PDF Downloads 588
453 The Contribution of Woman Towards Social Development: A Case of Saudi Arabia

Authors: Haga Elimam

Abstract:

The study has contributed to determine the degree to which the women of Saudi Arabia play an imperative role in the developmental processes. This research provided a twofold objective to motivate Saudi females to take part in the development of society. The quantitative design has been implied for assessing outcomes through descriptive statistics techniques. The data has been analyzed by regression analysis. The outcomes of the study showed that when women were provided with health and educational necessities and adequate opportunities, they were able to contribute effectively in achieving desired developmental objectives for the nation. Saudi women constitute approximately half of the society; thus, they are equally provided health and justice rights. It has been concluded through the results of the study that the nature of Saudi society, customs, traditions, and beliefs affect the role played by women of Saudi Arabia. This study examines the tangible changes that comprised all aspects of life due to international exposure.

Keywords: social development, social service, sustainable development, civil society and educational sector

Procedia PDF Downloads 127
452 Special Plea That The Prosecutor Does Not Have Title To Prosecute

Authors: Wium de Villiers

Abstract:

Section 106(1)(h) of the South African Criminal Procedure Act 51 of 1977 provides that an accused may enter a special plea that the prosecutor does not have title to prosecute. In a seminal matter (S v Mousa 2021 2 SACR 378 (GJ)) regarding section 106(1)(h), certain interesting legal aspects emerged. The first aspect concerned the meaning of the term “prosecutor”. More specifically, the question arose whether the term included a prosecutor who was previously involved with the matter, as well as the relevant Deputy Director of Public Prosecutions (DDPP) who instituted the prosecution and oversaw the prosecution on behalf of the state. The meaning of the term “title”, and with regard to the conduct of the “prosecutor”, the term “abuse of process,” were also raised and decided. In the paper, the facts, and the arguments in, and the decisions of the court, are discussed critically. The author argue that the intended objection in section 106(1)(h) is not to cure the abuse inflicted by a previous prosecutor or by the DDPP. I point out that the term “title” includes a lack of authority, non-compliance with jurisdictional requirements or absence of locus standi. I also point out that an abuse of process takes place if the process is used for an improper, ulterior or collateral purpose. I also argue that the accused should, instead of relying on section 106(1)(h), have relied on the prior agreement and applied for a permanent stay of prosecution.

Keywords: special plea, prosecutor, title, abuse of process

Procedia PDF Downloads 54
451 Development of a Predictive Model to Prevent Financial Crisis

Authors: Tengqin Han

Abstract:

Delinquency has been a crucial factor in economics throughout the years. Commonly seen in credit card and mortgage, it played one of the crucial roles in causing the most recent financial crisis in 2008. In each case, a delinquency is a sign of the loaner being unable to pay off the debt, and thus may cause a lost of property in the end. Individually, one case of delinquency seems unimportant compared to the entire credit system. China, as an emerging economic entity, the national strength and economic strength has grown rapidly, and the gross domestic product (GDP) growth rate has remained as high as 8% in the past decades. However, potential risks exist behind the appearance of prosperity. Among the risks, the credit system is the most significant one. Due to long term and a large amount of balance of the mortgage, it is critical to monitor the risk during the performance period. In this project, about 300,000 mortgage account data are analyzed in order to develop a predictive model to predict the probability of delinquency. Through univariate analysis, the data is cleaned up, and through bivariate analysis, the variables with strong predictive power are detected. The project is divided into two parts. In the first part, the analysis data of 2005 are split into 2 parts, 60% for model development, and 40% for in-time model validation. The KS of model development is 31, and the KS for in-time validation is 31, indicating the model is stable. In addition, the model is further validation by out-of-time validation, which uses 40% of 2006 data, and KS is 33. This indicates the model is still stable and robust. In the second part, the model is improved by the addition of macroeconomic economic indexes, including GDP, consumer price index, unemployment rate, inflation rate, etc. The data of 2005 to 2010 is used for model development and validation. Compared with the base model (without microeconomic variables), KS is increased from 41 to 44, indicating that the macroeconomic variables can be used to improve the separation power of the model, and make the prediction more accurate.

Keywords: delinquency, mortgage, model development, model validation

Procedia PDF Downloads 220
450 Impact of Chimerism on Y-STR DNA Determination: Sex Mismatch Analysis

Authors: Anupuma Raina, Ajay P. Balayan, Prateek Pandya, Pankaj Shrivastava, Uma Kanga, Tulika Seth

Abstract:

DNA fingerprinting analysis aids in personal identification for forensic purposes and has always been a driving motivation for law enforcement agencies in almost all countries since its inception. The introduction of DNA markers (Y-STR) has allowed for greater precision and higher discriminatory power in forensic testing. A criminal/ person committing crime after bone marrow transplantation is a rare situation but not an impossible one. Keeping such a situation in mind, a study was carried out to find out the best biological sample to be used for personal identification, especially in forensic situation. We choose a female patient (recipient) and a male donor. The pre transplant sample (blood) and post transplant samples (blood, buccal swab, hair roots) were collected from the recipient (patient). The same were compared with the blood sample of the donor using DNA FP technique. Post transplant samples were collected at different interval of time (15, 30, 60, and 90 days). The study was carried out using Y-STR kit at 23 loci. The results determined discusses the phenomenon of chimerism and its impact on Y-STR. Hair sample was found the most suitable sample which had no donor DNA profiling up to 90 days.

Keywords: bone marrow transplantation, chimerism, DNA profiling, Y-STR

Procedia PDF Downloads 142
449 Arabic Fables in Contemporary Garbs: Ahmed Shawqī’s Reconstruction of Fables in the Modern Era

Authors: Monia Hejaiej

Abstract:

The fable has lent itself to memorable imitations and reinventions. The writing of fables, in prose and verse, was widely cultivated not only in pre-Islamic Arabia but also in the middle ages, reaching its culmination with the Egyptian poet and man of letters Ahmad Shawqī (1989-1932), who revived the ancient tradition, a relatively minor and unexploited genre in the modern era, and re-wrote rimed fables with an Arab Islamic flavor, articulating a set of modern ethico-political concepts and sensibilities such as a belief in good judgment in governance, individual liberty, democracy, a sense of the brotherhood of man and justice. This essay aims to restore the 20th Century poet to his rightful place in the international pantheon of literary achievement, and offers an examination of the Arabian fabulist tradition as it appears in Arabic literature, and a treatment of this genre re-visiting a few representative samples of Ahmad Shawqī collection of fables and their implications for contemporary politics in the Middle East.

Keywords: fable, politcs, governace, democracy, ethics of care

Procedia PDF Downloads 671
448 Post-Conflict; The Shift of Social Values of Women in Aceh Indonesia Islamic Law

Authors: Khairul Hasni

Abstract:

A Memorandum of Understanding (MoU) for the cessation of hostilities was signed by Aceh's longstanding adversaries (the Government of Indonesia and the Free Aceh Movement (GAM) in August 2005. The Government of Indonesia has given the autonomy to Aceh Province of Indonesia, the Law Number 11 of 2006 the authority of the Aceh government to the implementation of the Islamic Sharia. The implementation of Islamic Sharia, Aceh can be a role model of Islam that glorifies women, the implementation of Islamic law in Aceh when enacted and got legality because it supported the socio-cultural and historical community. The value of the value of women's lives is shifted under the pressure of applying Islamic law, with this argument, the importance of justice and equality of policy enforcement in women's lives. Based on interviews conducted in 2016 and 2017 with women's activists, government officials, women non-governmental organizations in Aceh, this paper finds that there is lack of gender balance because of the many problems involving women in the enactment of regional regulations and control policies on women's bodies. The research points to ensure the implementation of Islamic Sharia practitioners have only directed to women and discrimination against women.

Keywords: women, policy, Islamic law, social

Procedia PDF Downloads 293
447 Evaluation of Sustainable Blue Economy Development Performance: Method and Case

Authors: Mingbao Chen

Abstract:

After Rio+20, the blue economy rises all over the world, and it has become the focus field of national development. At present, the blue economy has become a new growth point in the field of global economy and the direction of the development of ‘green’ in the ocean. However, in fact, the key factors affecting the development of the blue economy have not been explored in depth, and the development policies and performance of the blue economy have not been scientifically evaluated. This cannot provide useful guidance for the development of the blue economy. Therefore, it is urgent to establish a quantitative evaluation framework to measure the performance of the blue economic development. Based on the full understanding of the connotation and elements of the blue economy, and studying the literature, this article has built an universality and operability evaluation index system, including ecological environment, social justice, sustainable growth, policy measures, and so on. And this article also established a sound evaluation framework of blue economic development performance. At the same time, this article takes China as a sample to test the framework of the adaptability, and to assess the performance of China's blue economic.

Keywords: Blue economy, development performance, evaluation framework, assess method

Procedia PDF Downloads 244
446 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks

Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla

Abstract:

A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.

Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional

Procedia PDF Downloads 404
445 Company's Orientation and Human Resource Management Evolution in Technological Startup Companies

Authors: Yael Livneh, Shay Tzafrir, Ilan Meshoulam

Abstract:

Technological startup companies have been recognized as bearing tremendous potential for business and economic success. However, many entrepreneurs who produce promising innovative ideas fail to implement them as successful businesses. A key argument for such failure is the entrepreneurs' lack of competence in adaptation of the relevant level of formality of human resource management (HRM). The purpose of the present research was to examine multiple antecedents and consequences of HRM formality in growing startup companies. A review of the research literature identified two central components of HRM formality: HR control and professionalism. The effect of three contextual predictors was examined. The first was an intra-organizational factor: the development level of the organization. We based on a differentiation between knowledge exploration and knowledge exploitation. At a given time, the organization chooses to focus on a specific mix of these orientations, a choice which requires an appropriate level of HRM formality, in order to efficiently overcome the challenges. It was hypothesized that the mix of orientations of knowledge exploration and knowledge exploitation would predict HRM formality. The second predictor was the personal characteristics the organization's leader. According the idea of blueprint effect of CEO's on HRM, it was hypothesized that the CEO's cognitive style would predict HRM formality. The third contextual predictor was an external organizational factor: the level of investor involvement. By using the agency theory, and based on Transaction Cost Economy, it was hypothesized that the level of investor involvement in general management and HRM would be positively related to the HRM formality. The effect of formality on trust was examined directly and indirectly by the mediation role of procedural justice. The research method included a time-lagged field study. In the first study, data was obtained using three questionnaires, each directed to a different source: CEO, HR position-holder and employees. 43 companies participated in this study. The second study was conducted approximately a year later. Data was recollected using three questionnaires by reapplying the same sample. 41 companies participated in the second study. The organizations samples included technological startup companies. Both studies included 884 respondents. The results indicated consistency between the two studies. HRM formality was predicted by the intra-organizational factor as well as the personal characteristics of the CEO, but not at all by the external organizational context. Specifically, the organizational orientations was the greatest contributor to both components of HRM formality. The cognitive style predicted formality to a lesser extent. The investor's involvement was found not to have any predictive effect on the HRM formality. The results indicated a positive contribution to trust in HRM, mainly via the mediation of procedural justice. This study contributed a new concept for technological startup company development by a mixture of organizational orientation. Practical implications indicated that the level of HRM formality should be matched to that of the company's development. This match should be challenged and adjusted periodically by referring to the organization orientation, relevant HR practices, and HR function characteristics. A relevant matching could enhance further trust and business success.

Keywords: control, formality, human resource management, organizational development, professionalism, technological startup company

Procedia PDF Downloads 260
444 Elvis Improved Method for Solving Simultaneous Equations in Two Variables with Some Applications

Authors: Elvis Adam Alhassan, Kaiyu Tian, Akos Konadu, Ernest Zamanah, Michael Jackson Adjabui, Ibrahim Justice Musah, Esther Agyeiwaa Owusu, Emmanuel K. A. Agyeman

Abstract:

In this paper, how to solve simultaneous equations using the Elvis improved method is shown. The Elvis improved method says; to make one variable in the first equation the subject; make the same variable in the second equation the subject; equate the results and simplify to obtain the value of the unknown variable; put the value of the variable found into one equation from the first or second steps and simplify for the remaining unknown variable. The difference between our Elvis improved method and the substitution method is that: with Elvis improved method, the same variable is made the subject in both equations, and the two resulting equations equated, unlike the substitution method where one variable is made the subject of only one equation and substituted into the other equation. After describing the Elvis improved method, findings from 100 secondary students and the views of 5 secondary tutors to demonstrate the effectiveness of the method are presented. The study's purpose is proved by hypothetical examples.

Keywords: simultaneous equations, substitution method, elimination method, graphical method, Elvis improved method

Procedia PDF Downloads 131
443 Games behind Bars: A Longitudinal Study of Inmates Pro-Social Preferences

Authors: Mario A. Maggioni, Domenico Rossignoli, Simona Beretta, Sara Balestri

Abstract:

The paper presents the results of a Longitudinal Randomized Control Trial implemented in 2016 two State Prisons in California (USA). The subjects were randomly assigned to a 10-months program (GRIP, Guiding Rage Into Power) aiming at undoing the destructive behavioral patterns that lead to criminal actions by raising the individual’s 'mindfulness'. This study tests whether the participation to this program (treatment), based on strong relationships and mutual help, affects pro-social behavior of participants, in particular with reference to trust and inequality aversion. The research protocol entails the administration of two questionnaires including a set of behavioral situations ('games') - widely used in the relevant literature in the field - to 80 inmates, 42 treated (enrolled in the program) and 38 controls. The first questionnaire has been administered before treatment and randomization took place; the second questionnaire at the end of the program. The results of a Difference-in-Differences estimation procedure, show that trust significantly increases GRIP participants to compared to the control group. The result is robust to alternative estimation techniques and to the inclusion of a set of covariates to further control for idiosyncratic characteristics of the prisoners.

Keywords: behavioral economics, difference in differences, longitudinal study, pro-social preferences

Procedia PDF Downloads 390
442 Satire of Victorian Mores in Charles Dickens’ Great Expectations

Authors: Nagwa Abouserie Soliman

Abstract:

The Victorian era, which started with the reign of Queen Victoria from June 1837 to January 1901, could be considered as one of the most significant eras that had a crucial impact which formed contemporary British life despite the fact that with the rise of the British empire many negative aspects surfaced, namelysocial inequalities such as class differences, child labor, population increase and poverty due to the industrial revolution. Charles Dickens was one of the most prominent writers of the Victorian era who perceived the hypocrisy of the Victorian mores. The appropriate researchstyle that was chosen for this literary analysis is a qualitative research method in which the researcher used the conceptual approach to analyse theDickensian characterisation andwriting style through diction, narrative voice, and images. The aim of this paper is to argue that Charles Dickens inGreat Expectations (1861) was highly satirical of the Victorian mores, as he uses a lot of sharp irony-to satirize various Victorian traditions such as class divisions, the justice system, the poor working class, and the upper-class snobbery that he thought are inhumane and unjust.

Keywords: victorian, child labour, poverty, class division, snobbery

Procedia PDF Downloads 120
441 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 374