Search results for: identity threat
1603 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria
Authors: Auwal Nata'ala
Abstract:
The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.Keywords: cyber crimes, e-banking, policies, ICT
Procedia PDF Downloads 4071602 Debunking Sexual Myths in Bangladesh through an Intervention on the Internet
Authors: E. Rommes, Els Toonen, Rahil Roodsaz, Suborna Camellia, Farhana Alam, Saad Khan, Jhalok Ranjon Talukder, Tanveer Hassan, Syeda Farjana Ahmed, Sabina Faiz Rashid
Abstract:
In Bangladesh, a country in which adults (both parents and teachers) find it particularly hard to speak with youth about sexuality, adolescents seem to struggle with various insecurities about their sexual feelings, thoughts, behavior and physical characteristics. On the basis of a large number of interviews and focus groups with rural and urban Bangla adolescent girls and boys of lower and middle class as part of the large-scale three-year project ‘Breaking the Shame’, we have identified ten sexual themes or ‘myths’ that youth struggle with most. These encompass amongst others beliefs and insecurities on masturbation, discharge, same-sex behavior and feelings, the effects of watching porn and gender norms. We argue that the Internet is a particularly suitable medium to ‘debunk’ those myths, as youth can consult it anonymously and privately and so avoid social shame. Moreover, amongst the myths, we have identified two kinds which may need different debunking techniques. One kind of myth concerns scientifically uncontested, generally biological related information, such as the effects of having sex with a pregnant woman, questions on the effects of a penile or vaginal discharge or questions on the effects of masturbation. The second kind of myths concerns more diverse information sources and deals with e.g. religious or culturally specific norms, such as on the meaning and existence of homosexuality or gender appropriate norms of behavior in Bangladesh. For addressing both kinds of myths, expert information including a wealth of references to information resources needs to be provided, which the Internet is very suitable for. For the second kind of myths, adolescents also need to learn how to deal with sometimes conflicting norms and information sources, and they need to develop and reflect on their own opinions as part of their identity formation. On the basis of a literature review, we thus distinguish general information needs from identity formation needs, which includes the need to be able to relate information and opinions to one’s own opinions and situation. Hence, we argue that youth not only need abstract expert information to be able to debunk sexual myths, but also the option to discuss this information with other adolescents and compare their own situation and opinions with other peers, who in that way serve as ‘warm experts’ for each other. In this paper, we will describe the outcomes of our qualitative study above. In addition, we will present our findings of an intervention by presenting youth with general, uncontested information on the Internet with additional peer discussion options to compare the debunking effects on different kinds of myths.Keywords: peer discussion, intervention, sexual myths, shame
Procedia PDF Downloads 2161601 New York’s Heat Pump Mandate: Doubling Annual Heating Costs to Achieve a 13% Reduction in New York’s CO₂ Gas Emissions
Authors: William Burdick
Abstract:
Manmade climate change is an existential threat that must be mitigated at the earliest opportunity. The role of government in climate change mitigation is enacting and enforcing law and policy to affect substantial reductions in greenhouse gasses, in the short and long term, without substantial increases in the cost of energy. To be optimally effective those laws and policies must be established and enforced based on peer reviewed evidence and scientific facts and result in substantial outcomes in years, not decades. Over the next fifty years, New York’s 2019 Climate Change and Community Protection Act and 2021 All Electric Building Act that mandate replacing natural gas heating systems with heat pumps will, immediately double annual heating costs and by 2075, yield less than 16.2% reduction in CO₂ emissions from heating systems in new housing units, less than a 13% reduction in total CO₂ emissions, and affect a $40B in cumulative additional heating cost, compared to natural gas fueled heating systems.Keywords: climate change, mandate, heat pump, natural gas
Procedia PDF Downloads 701600 Establishment of Gene Pools for Yield Within the Ghanaian Sweetpotato Parental Germplasm
Authors: John Saaka
Abstract:
The increasing world population poses a threat to food security. To meet current and future food demands, sweetpotato stand a good chance because of its recent food security roles. Concerted efforts are needed for both regional and local level varietal development. Heterosis exploiting breeding scheme (HEBS) is one of the options used to improve yield in some crop species and could be a good approach for sweetpotato improvement in Ghana by establishing heterotic gene pools within a population. To achieve this, 22 parental lines were collected from different sources and put in a full diallel arrangement. A total of 149 families, 20 individual cuttings per family, were taken to the field, including ‘checks’ and parental lines for experimentation in a 1m X 0.3m planting order according to the Westcott design. Results from this study led to the characterization of the selected parents into three main heterotic gene pools based on their suitability for use as male, female or both, respectively. This study serves as a baseline for further characterization of the rest of the germplasm in the Ghanaian sweetpotato breeding program.Keywords: sweetpotato, heterosis, germplasm, food security
Procedia PDF Downloads 751599 Commercialization of Film Festivals: An Autobiographical Analysis
Authors: Önder M. Özdem
Abstract:
Producing and circulating films of professional standards have become technically easier with the development and widespread use of digital recording and distribution technologies. Additionally, film festivals on common platforms have rapidly increased in numbers and diversity. On the one hand, no-charge applications result in excessive submissions; thus, it complicates the evaluation and selection process. On the other hand, festival’s high submission fees may make the distribution of films with a limited budget very difficult. Inspired by the author’s engagement with the film industry as both a pre-jury member of an international film festival and an applicant to many festivals, this study discusses the causes and consequences of the increasing commercialization of film festivals. The author’s double identity, both as a jury and an applicant, provides a comparative perspective through which one can unfold the different dimensions and dynamics in the film production and distribution processes.Keywords: commercialization, film distribution, film festivals, film production
Procedia PDF Downloads 771598 Awareness and Recognition: A Legitimate-Geographic Model for Analyzing the Determinants of Corporate Perceptions of Climate Change Risk
Authors: Seyedmohammad Mousavian, Hanlu Fan, Quingliang Tang
Abstract:
Climate change is emerging as a severe threat to our society, so businesses are expected to take actions to mitigate carbon emissions. However, the actions to be taken depend on managers’ perceptions of climate change risks. Yet, there is scant research on this issue, and understanding of the determinants of corporate perceptions of climate change is extremely limited. The purpose of this study is to close this gap by examining the relationship between perceptions of climate risk and firm-level and country-level factors. In this study, climate change risk captures physical, regulatory, and other risks, and we use data from European companies that participated in CDP from 2010 to 2017. This study reveals those perceptions of climate change risk are significantly positively associated with the environmental, social, and governance score, firm size, and membership in a carbon-intensive sector. In addition, we find that managers in firms operating in a geographic area that is sensitive to the consequences of global warming are more likely to perceive and formally recognize carbon-related risks in their CDP reports.Keywords: carbon actions, CDP, climate change risk, risk perception
Procedia PDF Downloads 2901597 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing
Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas
Abstract:
This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.Keywords: cyber security, threat intelligence, forensics, heath care
Procedia PDF Downloads 661596 Act East Policy and the Politics of the Non-Recognized Thai-Indian Diasporic Community in Thailand
Authors: Ruchi Agarwal
Abstract:
The Indian diaspora in Thailand is as ethnically diverse as any other country. Although a relatively small community, the Indian diaspora has long established its roots, some with their fifth generation now living in Thailand. The community has a solid social and economic standing recognized by the host country but lacks connections with its ethnic roots in the home country. The biggest dilemma faced by the younger generation of the Indian diasporic community is the identity crisis. Regardless of being born and brought up in Thailand and possessing Thai citizenship, they do not get recognition as Thais by their Thai counterparts. However, with the Act Asia Policy of the Indian government, there has been an increase in social and political activities organized by old and new Indian associations, bringing new hopes of recognizing the Thai-Indian diasporic community.Keywords: Indian, Thailand, diaspora, Act East Policy, Thai
Procedia PDF Downloads 1521595 Histopathological Examination of Lung Surgery Camel in Iran
Authors: Ali Chitgar
Abstract:
Respiratory infections including diseases in camels are important not only because of the threat of animal health but also to reduce their production. Since that deal with respiratory problems and their treatment requires adequate knowledge of the existing respiratory problems, unfortunately, there is limited information about the species of camels. This study aimed to identify lung lesions camels slaughtered in a slaughterhouse more important was performed using histopathology. Respiratory camels (n = 477) was examined after the killing fully and tissue samples were placed in 10% formalin. The samples and histological sections using hematoxylin and eosin staining and color were evaluated. In this study 79.6 % (236 of 477 samples) of the samples was at least a lung lesion. Rate acute interstitial pneumonia, chronic interstitial pneumonia, bronchopneumonia, bronchiolitis, an inflammation of the pleura and 52.8 % respectively atelectasis (236 of 477 samples), 5.4 % (24 of 477 samples), 7.8 % (35 of 477 samples), 6.7 % (30 of 477 samples), 3.4 % (15 of 477 samples) and 15.2% (68 of 477 samples). The lung lesions, acute interstitial pneumonia and bronchopneumonia in autumn winter rather than spring and summer (p <0/05) and as a result, this study showed that high rates of lung lesions in the camel population. Waste higher results in cold seasons (fall and winter) shows.Keywords: camel, surgery, histopathology, breathing organ
Procedia PDF Downloads 2031594 Topological Language for Classifying Linear Chord Diagrams via Intersection Graphs
Authors: Michela Quadrini
Abstract:
Chord diagrams occur in mathematics, from the study of RNA to knot theory. They are widely used in theory of knots and links for studying the finite type invariants, whereas in molecular biology one important motivation to study chord diagrams is to deal with the problem of RNA structure prediction. An RNA molecule is a linear polymer, referred to as the backbone, that consists of four types of nucleotides. Each nucleotide is represented by a point, whereas each chord of the diagram stands for one interaction for Watson-Crick base pairs between two nonconsecutive nucleotides. A chord diagram is an oriented circle with a set of n pairs of distinct points, considered up to orientation preserving diffeomorphisms of the circle. A linear chord diagram (LCD) is a special kind of graph obtained cutting the oriented circle of a chord diagram. It consists of a line segment, called its backbone, to which are attached a number of chords with distinct endpoints. There is a natural fattening on any linear chord diagram; the backbone lies on the real axis, while all the chords are in the upper half-plane. Each linear chord diagram has a natural genus of its associated surface. To each chord diagram and linear chord diagram, it is possible to associate the intersection graph. It consists of a graph whose vertices correspond to the chords of the diagram, whereas the chord intersections are represented by a connection between the vertices. Such intersection graph carries a lot of information about the diagram. Our goal is to define an LCD equivalence class in terms of identity of intersection graphs, from which many chord diagram invariants depend. For studying these invariants, we introduce a new representation of Linear Chord Diagrams based on a set of appropriate topological operators that permits to model LCD in terms of the relations among chords. Such set is composed of: crossing, nesting, and concatenations. The crossing operator is able to generate the whole space of linear chord diagrams, and a multiple context free grammar able to uniquely generate each LDC starting from a linear chord diagram adding a chord for each production of the grammar is defined. In other words, it allows to associate a unique algebraic term to each linear chord diagram, while the remaining operators allow to rewrite the term throughout a set of appropriate rewriting rules. Such rules define an LCD equivalence class in terms of the identity of intersection graphs. Starting from a modelled RNA molecule and the linear chord, some authors proposed a topological classification and folding. Our LCD equivalence class could contribute to the RNA folding problem leading to the definition of an algorithm that calculates the free energy of the molecule more accurately respect to the existing ones. Such LCD equivalence class could be useful to obtain a more accurate estimate of link between the crossing number and the topological genus and to study the relation among other invariants.Keywords: chord diagrams, linear chord diagram, equivalence class, topological language
Procedia PDF Downloads 2011593 Reviewing Soil Erosion in Greece
Authors: Paschalis Koutalakis, George N. Zaimes, Valasia Iakovoglou, Konstantinos Ioannou
Abstract:
Mitigating soil erosion, especially in Mediterranean countries such as Greece, is essential in order to maintain environmental and agricultural sustainability. In this paper, scientific publications related to soil erosion studies in Greece were reviewed and categorized. To accomplish this, the online search engine of Scopus was used. The key words were “soil”, “erosion” and “Greece.” An analysis of the published articles was conducted at three levels: i) type of publication, ii) chronologic and iii) thematic. A hundred and ten publications published in scientific journals were reviewed. The results showed that the awareness regarding the soil erosion in Greece has increased only in the last decades. The publications covered a wide range of thematic categories such as the type of studied areas, the physical phenomena that trigger and influence the soil erosion, the negative anthropogenic impacts on them, the assessment tools that were used in order to examine the threat and the proper management. The analysis of these articles was significant and necessary in order to find the scientific gaps of soil erosion studies in Greece and help enhance the sustainability of soil management in the future.Keywords: climate change, agricultural sustainability, environmental sustainability, soil management
Procedia PDF Downloads 3981592 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.Keywords: image security, random LSB, steganography, visual cryptography
Procedia PDF Downloads 3301591 Formation of Physicalist and Mental Consciousness from a Continuous Four-Dimensional Continuum
Authors: Nick Alex
Abstract:
Consciousness is inseparably connected with energy. Based on panpsychism, consciousness is a fundamental substance that emerged with the birth of the Universe from a continuous four-dimensional continuum. It consists of a physicalist form of consciousness characteristic of all matter and a mental form characteristic of neural networks. Due to the physicalist form of consciousness, metabolic processes were formed, and life in the form of living matter emerged. It is the same for all living matter. Mental consciousness began to develop 3000 million years after the birth of the Universe due to the physicalist form of consciousness, with the emergence of neural networks. Mental consciousness is individualized in contrast to physicalist consciousness. It is characterized by cognitive abilities, self-identity, and the ability to influence the world around us. Each level of consciousness is in its own homeostasis environment.Keywords: continuum, physicalism, neurons, metabolism
Procedia PDF Downloads 281590 Level of Behavioral Development for Hepatitis C Virus Cases Versus Their Contacts: Does Infection Make a Difference and What Is Beyond?
Authors: Ammal M. Metwally, Lobna A. ElEtreby, Rehan M. Saleh, Ghada Abdrabou, Somia I. Salama, Amira Orabi, Mohamed Abdelrahman
Abstract:
Hepatitis C virus infection is a public health threat in Egypt. To control infection, efforts should be spent to encourage healthy behavior. This study aimed to assess the level of behavioral development in order to create a positive environment for the adoption of the recommended behaviors. The study was conducted over one year from Jan. 2011 till Jan. 2012. Knowledge, attitude and behavior of 540 HCV patients and 102 of their contacts were assessed and the level of behavioral development was determined. The study revealed that the majority of patients and contacts knew that HCV infection is dangerous with perceived concern for early diagnosis and treatment. More than 75% knew the correct modes of transmission. The assessment showed positive attitudes towards the recommended practices with the intention to adopt those practices. Strategies to create opportunities to continue the recommended behaviors should be adopted together with the reinforcement of social support.Keywords: hepatitis C virus, level of behavioral development, recommended behaviors
Procedia PDF Downloads 3971589 Encouraging Skills and Entrepreneurial Spirit to Improve Employability of Young Artists
Authors: Olga Lasaga, Carmen Parra
Abstract:
Within the EU 'New Skills for New Jobs' initiative, the art and music sector is considered one of the most vulnerable. Its graduates are faced with the threat of the dole or of not finding work in the sector in which they trained. In this regard, an increasing number of students are graduating every year from European Conservatories and Fine Arts Centres, while the number of job opportunities in this sector has stagnated or decreased. Moreover, the traditional teaching of these institutes does not favour the acquisition of basic skills, such as team building, entrepreneurship, marketing, website design and the design of events, which are among the most important facets of project management and are precisely those aspects that are often most related to the improvement of employability in the art world. To remedy this situation, the results of the European Erasmus+ OMEGA project (Opening More Employment Gates for Art and Music Students) are presented. The OMEGA project aims to increase the employability of art and music students by equipping them with additional skills needed for the search for work. As a result of this project, a manual has been created, a pilot course has been designed and taught, and a comparative study has been conducted on the state of play of the participating countries.Keywords: artists, employability, entrepreneurship, musicians, skills
Procedia PDF Downloads 2431588 Ecological Planning Method of Reclamation Area Based on Ecological Management of Spartina Alterniflora: A Case Study of Xihu Harbor in Xiangshan County
Abstract:
The study region Xihu Harbor in Xiangshan County, Ningbo City is located in the central coast of Zhejiang Province. Concerning the wave dispating issue, Ningbo government firstly introduced Spartina alterniflora in 1980s. In the 1990s, S. alterniflora spread so rapidly thus a ‘grassland’ in the sea has been created nowadays. It has become the most important invasive plant of China’s coastal tidal flats. Although S. alterniflora had some ecological and economic functions, it has also brought series of hazards. It has ecological hazards on many aspects, including biomass and biodiversity, hydrodynamic force and sedimentation process, nutrient cycling of tidal flat, succession sequence of soil and plants and so on. On engineering, it courses problems of poor drainage and channel blocking. On economy, the hazard mainly reflected in the threat on aquaculture industry. The purpose of this study is to explore an ecological, feasible and economical way to manage Spartina alterniflora and use the land formed by it, taking Xihu Harbor in Xiangshan County as a case. Comparison method, mathematical modeling, qualitative and quantitative analysis are utilized to proceed the study. Main outcomes are as follows. By comparing a series of S. alterniflora managing methods which include the combination of mechanical cutting and hydraulic reclamation, waterlogging, herbicide and biological substitution from three standpoints – ecology, engineering and economy. It is inferred that the combination of mechanical cutting and hydraulic reclamation is among the top rank of S. alternifora managing methods. The combination of mechanical cutting and hydraulic reclamation means using large-scale mechanical equipment like large screw seagoing dredger to excavate the S. alterniflora with root and mud together. Then the mix of mud and grass was blown off nearby coastal tidal zone transported by pipelines, which can cushion the silt of tidal zone to form a land. However, as man-made land by coast, the reclamation area’s ecological sensitivity is quite high and will face high possibility of flood threat. Therefore, the reclamation area has many reasonability requirements, including ones on location, specific scope, water surface rate, direction of main watercourse, site of water-gate, the ratio of ecological land to urban construction land. These requirements all became important basis when the planning was being made. The water system planning, green space system planning, road structure and land use all need to accommodate the ecological requests. Besides, the profits from the formed land is the managing project’s source of funding, so how to utilize land efficiently is another considered point in the planning. It is concluded that by aiming at managing a large area of S. alterniflora, the combination of mechanical cutting and hydraulic reclamation is an ecological, feasible and economical method. The planning of reclamation area should fully respect the natural environment and possible disasters. Then the planning which makes land use efficient, reasonable, ecological will promote the development of the area’s city construction.Keywords: ecological management, ecological planning method, reclamation area, Spartina alternifora, Xihu harbor
Procedia PDF Downloads 3091587 Teacher Professional Development with Collaborative Action Research: Teachers' Responses to Research
Authors: Sumaya Saqr
Abstract:
Although many teachers regard academic research as the inclusive domain of academic researchers, teachers should contribute to the body of research guiding their own practice. Drawing on the qualitative analysis of 20 teachers’ reflection journals and interviews, this case study sheds light on the personal and professional benefits of teachers’ applications of collaborative action research in English language teaching context. The findings reveal that several aspects of teacher identity and classroom practice were changed. The present paper aspires to reveal the way in which collaborative action research process, as a learner-centered approach to staff development, would help teachers to become more independent and professionally autonomous and hence effecting change that is far greater than its initial purpose.Keywords: change, collaborative action research, personal and professional benefits, professional development
Procedia PDF Downloads 1791586 Investigation of Utilizing L-Band Horn Antenna in Landmine Detection
Authors: Ahmad H. Abdelgwad, Ahmed A. Nashat
Abstract:
Landmine detection is an important and yet challenging problem remains to be solved. Ground Penetrating Radar (GPR) is a powerful and rapidly maturing technology for subsurface threat identification. The detection methodology of GPR depends mainly on the contrast of the dielectric properties of the searched target and its surrounding soil. This contrast produces a partial reflection of the electromagnetic pulses that are being transmitted into the soil and then being collected by the GPR. One of the most critical hardware components for the performance of GPR is the antenna system. The current paper explores the design and simulation of a pyramidal horn antenna operating at L-band frequencies (1- 2 GHz) to detect a landmine. A prototype model of the GPR system setup is developed to simulate full wave analysis of the electromagnetic fields in different soil types. The contrast in the dielectric permittivity of the landmine and the sandy soil is the most important parameter to be considered for detecting the presence of landmine. L-band horn antenna is proved to be well-versed in the investigation of landmine detection.Keywords: full wave analysis, ground penetrating radar, horn antenna design, landmine detection
Procedia PDF Downloads 2191585 Results and Insights from a Developmental Psychology Study on the Presentation of Juvenility in Punk Fanzines
Authors: Marc Dietrich
Abstract:
Youth cultures like Punk as much as media relevant to the specific scenes associated with them offer ample opportunity for young people or juvenile adults to construct their personal identities. However, developmental psychology has largely neglected such identity construction processes during the last decades. Such was not always the case: Early developmental psychologists intensely studied youth cultures and their meaningful objects and media in the early 20th century but lost interest when cultural studies and the social sciences occupied the field after World War II. Our project Constructions of Juvenility and Generation(ality), funded by the German Federal Ministry for Education and Research, reintegrates the study of youth cultures and their meaningful objects and media in a developmental psychology perspective. We present an empirical study of the ways in which youth, juvenility, and generation (ality) are constructed and negotiated in underground media like punk fanzines (a portmanteau of fan and magazine), including both semantic and aesthetic aspects of these construction processes within punk culture. The fanzine sample was accessed by the theoretical sampling strategy typical for GTM studies. Acknowledging fanzines as artful self-produced media by scene members for scene members, we conceptualize them as authentic documents of scene norms and values. Drawing on an analysis of both text and (cover) images in Punk fanzines published in Germany (and within a sample dating from 1981 until 2015) using a novel Visual Grounded Theory approach, we found that: a) Juvenility is a highly contested concept in punk culture. Its semantic quality and valuation varies with the perspectives present within the culture (e.g. embryo punks versus older punks); b) Juvenility is constructed as having energy and being socio-critical that does not depend on biological age; c) Juvenility is regarded not an ideal per se in German Punk culture; Punk culture constructs old age in a largely positive way (e.g., as marker of being real and a historical innovator); d) Juvenility is constructed as a habit that should be kept for life as it is constantly adapted to individual biographical trajectories like specific job situations or having a family. Consequently, identity negotiation as documented in the zines attempts to balance subculturally driven perspectives on life and society with the pragmatic requirements of a bourgeois life. The proposed paper will present the main results of this large-scale study of punk fanzines and show how developmental psychology perspectives as represented in the novel methodology applied in it can advance the study of youth cultures.Keywords: construction of juvenility, developmental psychology, visual GTM, youth culture, fanzines
Procedia PDF Downloads 2921584 'Naming, Blaming, Shaming': Sexual Assault Survivors' Perceptions of the Practice of Shaming
Authors: Anat Peleg, Hadar Dancig-Rosenberg
Abstract:
This interdisciplinary study, to our knowledge the first in this field, is located on the intersection of victimology-law and society-and media literature, and it corresponds both with feminist writing and with cyber literature which explores the techno-social sphere. It depicts the multifaceted dimensions of shaming in the eyes of the survivors through the following research questions: What are the motivations of sexual-assault survivors to publicize the assailants' identity or to refrain from this practice? Is shaming on Facebook perceived by sexual–assault victims as a substitute for the CJS or as a new form of social activism? What positive and negative consequences do survivors experience as a result of shaming their assailants online? The study draws on in-depth semi-structured interviews which we have conducted between 2016-2018 with 20 sexual-assaults survivors who exposed themselves on Facebook. They were sexually attacked in various forms: six participants reported that they had been raped when they were minors; eight women reported that they had been raped as adults; three reported that they had been victims of an indecent act and three reported that they had been harassed either in their workplace or in the public sphere. Most of our interviewees (12) reported to the police and were involved in criminal procedures. More than half of the survivors (11) disclosed the identity of their attackers online. The vocabularies of motives that have emerged from the thematic analysis of the interviews with the survivors consist of both social and personal motivations for using the practice of shaming online. Some survivors maintain that the use of shaming derives from the decline in the public trust in the criminal justice system. It reflects demand for accountability and justice and serves also as a practice of warning other potential victims of the assailants. Other survivors assert that shaming people in a position of privilege is meant to fulfill the public right to know who these privileged men really are. However, these aforementioned moral and practical justifications of the practice of shaming are often mitigated by fear from the attackers' physical or legal actions in response to their allegations. Some interviewees who are feminist activists argue that the practice of shaming perpetuates the social ancient tendency to define women by labels linking them to the men who attacked them, instead of being defined by their own life complexities. The variety of motivations to adopt or resent the practice of shaming by sexual assault victims presented in our study appear to refute the prevailing intuitive stereotype that shaming is an irrational act of revenge, and denote its rationality. The role of social media as an arena for seeking informal justice raises questions about the new power relations created between victims, assailants, the community and the State, outside the formal criminal justice system. At the same time, the survivors' narratives also uncover the risks and pitfalls embedded within the online sphere for sexual assault survivors.Keywords: criminal justice, gender, Facebook, sexual-assaults
Procedia PDF Downloads 1121583 Meeting the Challanges of Regulating Artificial Intelligence
Authors: Abdulrahman S. Shryan Aldossary
Abstract:
Globally, artificial intelligence (AI) is already performing legitimate tasks on behalf of humans. In Saudi Arabia, large-scale national projects, primarily based on AI technologies and receiving billions of dollars of funding, are projected for completion by 2030. However, the legal aspect of these projects is seriously vulnerable, given AI’s unprecedented ability to self-learn and act independently. This paper, therefore, identifies the critical legal aspects of AI that authorities and policymakers should be aware of, specifically whether AI can possess identity and be liable for the risk of public harm. The article begins by identifying the problematic characteristics of AI and what should be considered by legal experts when dealing with it. Also discussed are the possible competent institutions that could regulate AI in Saudi Arabia. Finally, a procedural proposal is presented for controlling AI, focused on Saudi Arabia but potentially of interest to other jurisdictions facing similar concerns about AI safety.Keywords: regulation, artificial intelligence, tech law, automated systems
Procedia PDF Downloads 1751582 Management Workspaces to Create Value
Authors: Nevruz Zogu, Shpetim Rezniqi
Abstract:
It is very important that a new environment where work shall be constructed in such a strong record to be creative and eligible for workers, can not have success in the workplace. But, is it possible to design the inner-inspire to create and collaborate? By watching and analyzing examples of creativity in business, construction managers can learn ways on how to encourage their imagination inside buildings. We struggle to find and retain talented employees and skilled labor environment is becoming more and always an important tool for recruiting and retaining employees. Managers who recognize the importance are gaining an edge over their competitors. The physical work environment is as important as its quality is often used as a recruiting tool and even to companies with The relationship between the company and the employees between strategy and behavior, between the product and the customer can reincorporated under the light of symbolic mediation of space, as instrument and interpreter of the core values and identity of the organization.Keywords: strategy, business, quality, productivity, space, offices, assets
Procedia PDF Downloads 3891581 Role of Authorized Agencies to Combat Financial Crime in Bangladesh
Authors: Khan Sarfaraz, Mohammad Ali Mia
Abstract:
Money laundering and other financial crime have become a global threat in recent years, impacting both developed and poor countries. In developing countries like Bangladesh, it is more difficult to combat financial crime than in developing countries because of the inadequate regulatory environment and vulnerable financial system. Bangladesh's central bank issues guidelines to facilitate the implementation of the prevention of the money laundering act. According to the guideline of Bangladesh Bank, all financial institution has to develop anti-money laundering policy to ensure the safety and soundness of their institutions. The paper aims to focus on the role of authorized agencies in combating financial crime. In this paper, the latest trends in financial crimes have been discussed from global and Asian perspectives. The preventive measures for money laundering and other financial crimes have been discussed elaborately. So far, financial crime is a sophisticated and dynamic crime, and criminals continuously took innovative processes to use the financial system to launder money. The study will take a step in pointing out new techniques, effects and challenges of financial crime in Bangladesh.Keywords: financial crime, illegal money transfer, online gambling, money laundering, authorized agencies
Procedia PDF Downloads 771580 The Names of the Traditional Motif of Batik Solo
Authors: Annisa D. Febryandini
Abstract:
Batik is a unique cultural heritage that strongly linked with its community. As a product of current culture in Solo, Batik Solo not only has a specific design and color to represent the cultural identity, cultural values, and spirituality of the community, but also has some specific names given by its community which are not arbitrary. This qualitative research paper uses the primary data by interview method as well as the secondary data to support it. Based on the data, this paper concludes that the names consist of a word or words taken from a current name of things in Javanese language. They indicate the cultural meaning such as a specific event, a hope, and the social status of the people who use the motif. Different from the other research, this paper takes a look at the names of traditional motif of Batik Solo which analyzed linguistically to reveal the cultural meaning.Keywords: traditional motif, Batik, solo, anthropological linguistics
Procedia PDF Downloads 2771579 Plasma Gasification as a Sustainable Way for Energy Recovery from Scrap Tyre
Authors: Gloria James, S. K. Nema, T. S. Anantha Singh, P. Vadivel Murugan
Abstract:
The usage of tyre has increased enormously in day to day life. The used tyre and rubber products pose major threat to the environment. Conventional thermal techniques such as low temperature pyrolysis and incineration produce high molecular organic compounds (condensed and collected as aromatic oil) and carbon soot particles. Plasma gasification technique can dispose tyre waste and generate combustible gases and avoid the formation of high molecular aromatic compounds. These gases generated in plasma gasification process can be used to generate electricity or as fuel wherever required. Although many experiments have been done on plasma pyrolysis of tyres, very little work has been done on plasma gasification of tyres. In this work plasma gasification of waste tyres have been conducted in a fixed bed reactor having graphite electrodes and direct current (DC) arc plasma system. The output of this work has been compared with the previous work done on plasma pyrolysis of tyres by different authors. The aim of this work is to compare different process based on gas generation, efficiency of the process and explore the most effective option for energy recovery from waste tyres.Keywords: plasma, gasification, syngas, tyre waste
Procedia PDF Downloads 1821578 Violations of Press Freedom
Authors: Khalid Achaat
Abstract:
It is difficult to speak about freedom of the press in Algeria without first talking to fifty-seven journalists killed in the country between 1993 and 1997 and the five missing journalists. No serious investigation was conducted to find the culprits. When a State is not able to guarantee law, there is no justice and violations of the law become "systematic". How to claim the freedom of press in Algeria, when death becomes "banal"? In these circumstances, can we talk of rights of the Algerian press? It is impossible to understand the problems of the press in Algeria, focusing solely legal issues. Take into account technical, financial and political. Their respective roles varies depending on whether one focuses on the collection of information, the regime of the newspaper company or publication and dissemination. Can we say that the Algerian press is "the freest in the Arab world", while the latter reflects only partially the real problems facing the country? While any newspaper company is subject, de facto, to an authorization scheme, permanently subjected to the constant threat of withdrawal of the authorization, suspension, prohibition or closure without it has the right to a remedy? Can it be free when the majority of "media owners", head of the largest daily newspapers are derived from the single party in power since independence? Some of this release does not it serves the interests of the Algerian power?Keywords: freedom, press, power, closure, suspension
Procedia PDF Downloads 3501577 Actually Existing Policy Mobilities in Czechia: Comparing Creative and Smart Cities
Authors: Ondrej Slach, Jan Machacek, Jan Zenka, Lucie Hyllova, Petr Rumpel
Abstract:
The aim of the paper is to identify and asses different trajectories of two fashionable urban policies –creative and smart cities– in specific post-socialistic context. Drawing on the case of Czechia, we employ the concept of policy mobility research. More specifically, we employ a discourse analysis in order to identify the so-called 'infrastructure' of both policies (such as principal actors, journals, conferences, events), with the special focus on 'agents of transfer' in a multiscale perspective. The preliminary results indicate faster and more aggressive spatial penetration of smart cities policy compared to creative cities policy in Czechia. Further, it seems that existed translation and implementation of smart cities policy into the national and urban context resulted in deliberated fragmented policy of smart cities in Czechia (pure technocratic view), which might be a threat for the future development of social sustainability, especially in cities that are facing increasing social polarisation. Last but not least, due to the fast spatial penetration of the concept and policies of smart cities, it seems that creative cities policy has almost been crowded out of the Czech urban agenda.Keywords: policy mobility, smart cities, creative cities, Czechia
Procedia PDF Downloads 1681576 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve
Authors: Eun-Jun Yoon
Abstract:
Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis
Procedia PDF Downloads 3321575 Establishment of Thuja Label: Development Prospects for the Marketing Practices of the Handicraft of Essaouira's Marquetry
Authors: Fatima El Kandoussi, Lamiae El Hdiddioui, Mustapha Bouragba
Abstract:
The woodwork of thuja in Essaouira is one of the main crafts in Morocco. Certainly, marquetry reflects both cultural and artistic identity of the city, considering the talent and ancestral knowledge of craftsman working in marquetry. Yet, the production units encounter a considerable number of difficulties among which insufficiencies within marketing practices. Consequently, it is obvious that major improvements are needed, and supportive solutions must be provided in order to improve the Essaouira’s marquetry, as a symbol of the entire province. Thus, the establishment of Thuja Label is a necessary measure that would be the key to ensuring sustainability of this vital craft. The main purpose of this paper is to study marketing practices’ current state of the production units in the marquetry of Essaouira, therefore to recommend remedial actions likely to raise them up to the required functional level.Keywords: craft, marketing practices, marquetry, thuja label
Procedia PDF Downloads 1981574 Harnessing the Potential of Renewable Energy Sources to Reduce Fossil Energy Consumption in the Wastewater Treatment Process
Authors: Hen Friman
Abstract:
Various categories of aqueous solutions are discharged within residential, institutional, commercial, and industrial structures. To safeguard public health and preserve the environment, it is imperative to subject wastewater to treatment processes that eliminate pathogens (such as bacteria and viruses), nutrients (such as nitrogen and phosphorus), and other compounds. Failure to address untreated sewage accumulation can result in an array of adverse consequences. Israel exemplifies a special case in wastewater management. Appropriate wastewater treatment significantly benefits sectors such as agriculture, tourism, horticulture, and industry. Nevertheless, untreated sewage in settlements lacking proper sewage collection or transportation networks remains an ongoing and substantial threat. Notably, the process of wastewater treatment entails substantial energy consumption. Consequently, this study explores the integration of solar energy as a renewable power source within the wastewater treatment framework. By incorporating renewable energy sources into the process, costs can be minimized, and decentralized facilities can be established even in areas lacking adequate infrastructure for traditional treatment methods.Keywords: renewable energy, solar energy, innovative, wastewater treatment
Procedia PDF Downloads 108