Search results for: digital crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3209

Search results for: digital crime

3119 Transform to Succeed: An Empirical Analysis of Digital Transformation in Firms

Authors: Sarah E. Stief, Anne Theresa Eidhoff, Markus Voeth

Abstract:

Despite all progress firms are facing the increasing need to adapt and assimilate digital technologies to transform their business activities in order to pursue business development. By using new digital technologies, firms can implement major business improvements in order to stay competitive and foster new growth potentials. The corresponding phenomenon of digital transformation has received some attention in previous literature in respect to industries such as media and publishing. Nevertheless, there is a lack of understanding of the concept and its organization within firms. With the help of twenty-three in-depth field interviews with German experts responsible for their company’s digital transformation, we examined what digital transformation encompasses, how it is organized and which opportunities and challenges arise within firms. Our results indicate that digital transformation is an inevitable task for all firms, as it bears the potential to comprehensively optimize and reshape established business activities and can thus be seen as a strategy of business development.

Keywords: business development, digitalization, digital strategies, digital transformation

Procedia PDF Downloads 427
3118 Digital Library in India: Importance and Problem Issues in Present Days: A Conceptual Study

Authors: Mehtab Alam Ansari, Shamim Aktar Munshi

Abstract:

The purpose of this paper is to find out the importance of digital libraries in Indian educational system, and also different types of problems faced by the digital library in modern age. This study uses both qualitative and quantitative approaches along with review of related literature. The conceptual and textual information related to the present study were collected from primary and secondary sources of information such as books and National and International journals etc. Websites were also used for collecting information. The study finds out that due to high demand of information resources so many digital libraries are established in India, e.g. IGNCA digital library, Digital Library of India, Archives of Indian Labour, Digital Library of Library and Information Science etc, and also it found that it is very helpful to the modern civilization. The digital library movement in India is rapidly increasing and the traditional libraries are now on their way to digitization in a phased manner. But digital library in India has failed to spread its root in each and every part. So many problems are facing to develop the digital libraries in present days. This study briefly explained the services, impact, and problems of digital libraries in Indian.

Keywords: digital Libraries, India, information technology, education

Procedia PDF Downloads 582
3117 Preparedness for Microbial Forensics Evidence Collection on Best Practice

Authors: Victor Ananth Paramananth, Rashid Muniginin, Mahaya Abd Rahman, Siti Afifah Ismail

Abstract:

Safety issues, scene protection, and appropriate evidence collection must be handled in any bio crime scene. There will be a scene or multi-scene to be cordoned for investigation in any bio-incident or bio crime event. Evidence collection is critical in determining the type of microbial or toxin, its lethality, and its source. As a consequence, from the start of the investigation, a proper sampling method is required. The most significant challenges for the crime scene officer would be deciding where to obtain samples, the best sampling method, and the sample sizes needed. Since there could be evidence in liquid, viscous, or powder shape at a crime scene, crime scene officers have difficulty determining which tools to use for sampling. To maximize sample collection, the appropriate tools for sampling methods are necessary. This study aims to assist the crime scene officer in collecting liquid, viscous, and powder biological samples in sufficient quantity while preserving sample quality. Observational tests on sample collection using liquid, viscous, and powder samples for adequate quantity and sample quality were performed using UV light in this research. The density of the light emission varies upon the method of collection and sample types. The best tools for collecting sufficient amounts of liquid, viscous, and powdered samples can be identified by observing UV light. Instead of active microorganisms, the invisible powder is used to assess sufficient sample collection during a crime scene investigation using various collection tools. The liquid, powdered and viscous samples collected using different tools were analyzed using Fourier transform infrared - attenuate total reflection (FTIR-ATR). FTIR spectroscopy is commonly used for rapid discrimination, classification, and identification of intact microbial cells. The liquid, viscous and powdered samples collected using various tools have been successfully observed using UV light. Furthermore, FTIR-ATR analysis showed that collected samples are sufficient in quantity while preserving their quality.

Keywords: biological sample, crime scene, collection tool, UV light, forensic

Procedia PDF Downloads 195
3116 Digital Marketing Maturity Models: Overview and Comparison

Authors: Elina Bakhtieva

Abstract:

The variety of available digital tools, strategies and activities might confuse and disorient even an experienced marketer. This applies in particular to B2B companies, which are usually less flexible in uptaking of digital technology than B2C companies. B2B companies are lacking a framework that corresponds to the specifics of the B2B business, and which helps to evaluate a company’s capabilities and to choose an appropriate path. A B2B digital marketing maturity model helps to fill this gap. However, modern marketing offers no widely approved digital marketing maturity model, and thus, some marketing institutions provide their own tools. The purpose of this paper is building an optimized B2B digital marketing maturity model based on a SWOT (strengths, weaknesses, opportunities, and threats) analysis of existing models. The current study provides an analytical review of the existing digital marketing maturity models with open access. The results of the research are twofold. First, the provided SWOT analysis outlines the main advantages and disadvantages of existing models. Secondly, the strengths of existing digital marketing maturity models, helps to identify the main characteristics and the structure of an optimized B2B digital marketing maturity model. The research findings indicate that only one out of three analyzed models could be used as a separate tool. This study is among the first examining the use of maturity models in digital marketing. It helps businesses to choose between the existing digital marketing models, the most effective one. Moreover, it creates a base for future research on digital marketing maturity models. This study contributes to the emerging B2B digital marketing literature by providing a SWOT analysis of the existing digital marketing maturity models and suggesting a structure and main characteristics of an optimized B2B digital marketing maturity model.

Keywords: B2B digital marketing strategy, digital marketing, digital marketing maturity model, SWOT analysis

Procedia PDF Downloads 345
3115 Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings

Authors: Vanda Božić, Željko Nikač

Abstract:

Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime.

Keywords: trafficking in children, trafficking in human beings, child as a victim of human trafficking, children’s rights

Procedia PDF Downloads 359
3114 The Evolution of Architecture through Digital: A Survey on Fashion Catwalk Becoming Digital

Authors: Valeria Minucciani, Maria Maddalena Margaria

Abstract:

While mathematical tools that make digital architecture possible are very sophisticated and advanced, theoretical development of digital architecture (intended as a discipline that integrates or replaces the real architecture) is not. The fashion show, that involves interiors architecture, exhibit design and scenography, has been exploiting for ten years the opportunities offered by digital technologies. To gain greater visibility and to reach a wider audience, high-level experimentations have been performed. The aim of this paper is in investigating, through the analysis of some cases of virtual fashion shows, the 'architectural' impact of the virtual conception of interior space.

Keywords: digital interiors, exhibit, fashion catwalk, architectural theory

Procedia PDF Downloads 427
3113 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 275
3112 Evaluation of Manual and Automatic Calibration Methods for Digital Tachographs

Authors: Sarp Erturk, Levent Eyigel, Cihat Celik, Muhammet Sahinoglu, Serdar Ay, Yasin Kaya, Hasan Kaya

Abstract:

This paper presents a quantitative analysis on the need for automotive calibration methods for digital tachographs. Digital tachographs are mandatory for vehicles used in people and goods transport and they are an important aspect for road safety and inspection. Digital tachographs need to be calibrated for workshops in order for the digital tachograph to display and record speed and odometer values correctly. Calibration of digital tachographs can be performed either manual or automatic. It is shown in this paper that manual calibration of digital tachographs is prone to errors and there can be differences between manual and automatic calibration parameters. Therefore automatic calibration methods are imperative for digital tachograph calibration. The presented experimental results and error analysis clearly support the claims of the paper by evaluating and statistically comparing manual and automatic calibration methods.

Keywords: digital tachograph, road safety, tachograph calibration, tachograph workshops

Procedia PDF Downloads 333
3111 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria

Authors: Auwal Nata'ala

Abstract:

The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.

Keywords: cyber crimes, e-banking, policies, ICT

Procedia PDF Downloads 407
3110 Generating Innovations in Established Banks through Digital Transformation

Authors: Wisu Suntoyo, Dedy Sushandoyo

Abstract:

Innovation and digital transformation are essential for firms’ competitiveness in the digital age. The competition in Indonesia’s banking industry provides an intriguing case study for understanding how digital transformation can generate innovation in established companies. The empirical evidence of this study is mainly based on interviews and annual reports examining four established banks in their various states of digital transformation. The findings of this study reveal that banks’ digital transformations that lead to innovations differ in terms of the activities undertaken and the outcomes achieved depending on the state of advancement in which they are. Digital transformation is a complex and challenging process, and this study finds that with this strategy, established banks have shown capable of generating innovation. Banks can choose types of transformation activities that generate radical, architectural, modular, or even incremental innovations.

Keywords: digital transformation, innovations, banking industry, established banks

Procedia PDF Downloads 99
3109 Testifying in Court as a Victim of Crime for Persons with Little or No Functional Speech: Vocabulary Implications

Authors: Robyn White, Juan Bornman, Ensa Johnson

Abstract:

People with disabilities are at a high risk of becoming victims of crime. Individuals with little or no functional speech (LNFS) face an even higher risk. One way of reducing the risk of remaining a victim of crime is to face the alleged perpetrator in court as a witness – therefore it is important for a person with LNFS who has been a victim of crime to have the required vocabulary to testify in court. The aim of this study was to identify and describe the core and fringe legal vocabulary required by illiterate victims of crime, who have little or no functional speech, to testify in court as witnesses. A mixed-method, the exploratory sequential design consisting of two distinct phases was used to address the aim of the research. The first phase was of a qualitative nature and included two different data sources, namely in-depth semi-structured interviews and focus group discussions. The overall aim of this phase was to identify and describe core and fringe legal vocabulary and to develop a measurement instrument based on these results. Results from Phase 1 were used in Phase 2, the quantitative phase, during which the measurement instrument (a custom-designed questionnaire) was socially validated. The results produced six distinct vocabulary categories that represent the legal core vocabulary and 99 words that represent the legal fringe vocabulary. The findings suggested that communication boards should be individualised to the individual and the specific crime. It is believed that the vocabulary lists developed in this study act as a valid and reliable springboard from which communication boards can be developed. Recommendations were therefore made to develop an Alternative and Augmentative Communication Resource Tool Kit to assist the legal justice system.

Keywords: augmentative and alternative communication, person with little or no functional speech, sexual crimes, testifying in court, victim of crime, witness competency

Procedia PDF Downloads 480
3108 Time of Week Intensity Estimation from Interval Censored Data with Application to Police Patrol Planning

Authors: Jiahao Tian, Michael D. Porter

Abstract:

Law enforcement agencies are tasked with crime prevention and crime reduction under limited resources. Having an accurate temporal estimate of the crime rate would be valuable to achieve such a goal. However, estimation is usually complicated by the interval-censored nature of crime data. We cast the problem of intensity estimation as a Poisson regression using an EM algorithm to estimate the parameters. Two special penalties are added that provide smoothness over the time of day and day of the week. This approach presented here provides accurate intensity estimates and can also uncover day-of-week clusters that share the same intensity patterns. Anticipating where and when crimes might occur is a key element to successful policing strategies. However, this task is complicated by the presence of interval-censored data. The censored data refers to the type of data that the event time is only known to lie within an interval instead of being observed exactly. This type of data is prevailing in the field of criminology because of the absence of victims for certain types of crime. Despite its importance, the research in temporal analysis of crime has lagged behind the spatial component. Inspired by the success of solving crime-related problems with a statistical approach, we propose a statistical model for the temporal intensity estimation of crime with censored data. The model is built on Poisson regression and has special penalty terms added to the likelihood. An EM algorithm was derived to obtain maximum likelihood estimates, and the resulting model shows superior performance to the competing model. Our research is in line with the smart policing initiative (SPI) proposed by the Bureau Justice of Assistance (BJA) as an effort to support law enforcement agencies in building evidence-based, data-driven law enforcement tactics. The goal is to identify strategic approaches that are effective in crime prevention and reduction. In our case, we allow agencies to deploy their resources for a relatively short period of time to achieve the maximum level of crime reduction. By analyzing a particular area within cities where data are available, our proposed approach could not only provide an accurate estimate of intensities for the time unit considered but a time-variation crime incidence pattern. Both will be helpful in the allocation of limited resources by either improving the existing patrol plan with the understanding of the discovery of the day of week cluster or supporting extra resources available.

Keywords: cluster detection, EM algorithm, interval censoring, intensity estimation

Procedia PDF Downloads 66
3107 The Use of Artificial Intelligence in Digital Forensics and Incident Response in a Constrained Environment

Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane

Abstract:

Digital investigators often have a hard time spotting evidence in digital information. It has become hard to determine which source of proof relates to a specific investigation. A growing concern is that the various processes, technology, and specific procedures used in the digital investigation are not keeping up with criminal developments. Therefore, criminals are taking advantage of these weaknesses to commit further crimes. In digital forensics investigations, artificial intelligence is invaluable in identifying crime. It has been observed that an algorithm based on artificial intelligence (AI) is highly effective in detecting risks, preventing criminal activity, and forecasting illegal activity. Providing objective data and conducting an assessment is the goal of digital forensics and digital investigation, which will assist in developing a plausible theory that can be presented as evidence in court. Researchers and other authorities have used the available data as evidence in court to convict a person. This research paper aims at developing a multiagent framework for digital investigations using specific intelligent software agents (ISA). The agents communicate to address particular tasks jointly and keep the same objectives in mind during each task. The rules and knowledge contained within each agent are dependent on the investigation type. A criminal investigation is classified quickly and efficiently using the case-based reasoning (CBR) technique. The MADIK is implemented using the Java Agent Development Framework and implemented using Eclipse, Postgres repository, and a rule engine for agent reasoning. The proposed framework was tested using the Lone Wolf image files and datasets. Experiments were conducted using various sets of ISA and VMs. There was a significant reduction in the time taken for the Hash Set Agent to execute. As a result of loading the agents, 5 percent of the time was lost, as the File Path Agent prescribed deleting 1,510, while the Timeline Agent found multiple executable files. In comparison, the integrity check carried out on the Lone Wolf image file using a digital forensic tool kit took approximately 48 minutes (2,880 ms), whereas the MADIK framework accomplished this in 16 minutes (960 ms). The framework is integrated with Python, allowing for further integration of other digital forensic tools, such as AccessData Forensic Toolkit (FTK), Wireshark, Volatility, and Scapy.

Keywords: artificial intelligence, computer science, criminal investigation, digital forensics

Procedia PDF Downloads 212
3106 The Impact of Work-Related Crime on the Work Environment

Authors: Monica Kaltenbrunner

Abstract:

Work-related crime has severe consequences for individual employees and society, and the problem has received widespread attention. For those who work where this type of criminality occurs, it can deteriorate the work environment. The purpose of the systematic literature review is to collate and enhance knowledge about work-related crime and its consequences for the work environment, primarily from an employee perspective. A comprehensive literature search was conducted in three databases, with the final search in May 2024. Grey literature was searched for on relevant websites. Only literature conducted in the EU, Norway, and Canada between 2013 and 2024 was included. Industries represented are land-based industry, hotel and restaurant, health and welfare/domestic work, construction, vehicles and transport, and cleaning. The literature review includes 39 publications, of which 33 are scientific studies. The results show that both men and women work in a work-related crime setting, most from Central and Eastern Europe, Asia, Africa, and South America. The results demonstrate that, regardless of workers’ gender or industry, workers are being exploited. Their work environment is characterized by high demand, low influence and low support. It is also common for the work environment to involve different risks, such as safety problems and risks of harassment and discrimination. This systematic literature review is one of few that focuses on the employee perspective on the work environment in workplaces where work-related crime occurs and collates existing research within the field.

Keywords: occupational safety and health, undeclared work, migrant, exploitation

Procedia PDF Downloads 7
3105 Ontologies for Social Media Digital Evidence

Authors: Edlira Kalemi, Sule Yildirim-Yayilgan

Abstract:

Online Social Networks (OSNs) are nowadays being used widely and intensively for crime investigation and prevention activities. As they provide a lot of information they are used by the law enforcement and intelligence. An extensive review on existing solutions and models for collecting intelligence from this source of information and making use of it for solving crimes has been presented in this article. The main focus is on smart solutions and models where ontologies have been used as the main approach for representing criminal domain knowledge. A framework for a prototype ontology named SC-Ont will be described. This defines terms of the criminal domain ontology and the relations between them. The terms and the relations are extracted during both this review and the discussions carried out with domain experts. The development of SC-Ont is still ongoing work, where in this paper, we report mainly on the motivation for using smart ontology models and the possible benefits of using them for solving crimes.

Keywords: criminal digital evidence, social media, ontologies, reasoning

Procedia PDF Downloads 388
3104 A Method to Enhance the Accuracy of Digital Forensic in the Absence of Sufficient Evidence in Saudi Arabia

Authors: Fahad Alanazi, Andrew Jones

Abstract:

Digital forensics seeks to achieve the successful investigation of digital crimes through obtaining acceptable evidence from digital devices that can be presented in a court of law. Thus, the digital forensics investigation is normally performed through a number of phases in order to achieve the required level of accuracy in the investigation processes. Since 1984 there have been a number of models and frameworks developed to support the digital investigation processes. In this paper, we review a number of the investigation processes that have been produced throughout the years and introduce a proposed digital forensic model which is based on the scope of the Saudi Arabia investigation process. The proposed model has been integrated with existing models for the investigation processes and produced a new phase to deal with a situation where there is initially insufficient evidence.

Keywords: digital forensics, process, metadata, Traceback, Sauid Arabia

Procedia PDF Downloads 359
3103 Establishing Digital Forensics Capability and Capacity among Malaysia's Law Enforcement Agencies: Issues, Challenges and Recommendations

Authors: Sarah Taylor, Nor Zarina Zainal Abidin, Mohd Zabri Adil Talib

Abstract:

Although cybercrime is on the rise, yet many Law Enforcement Agencies in Malaysia faces difficulty in establishing own digital forensics capability and capacity. The main reasons are undoubtedly because of the high cost and difficulty in convincing their management. A survey has been conducted among Malaysia’s Law Enforcement Agencies owning a digital forensics laboratory to understand their history of building digital forensics capacity and capability, the challenges and the impact of having own laboratory to their case investigation. The result of the study shall be used by other Law Enforcement Agencies in justifying to their management to establish own digital forensics capability and capacity.

Keywords: digital forensics, digital forensics capacity and capability, laboratory, law enforcement agency

Procedia PDF Downloads 251
3102 Spatial Scale of Clustering of Residential Burglary and Its Dependence on Temporal Scale

Authors: Mohammed A. Alazawi, Shiguo Jiang, Steven F. Messner

Abstract:

Research has long focused on two main spatial aspects of crime: spatial patterns and spatial processes. When analyzing these patterns and processes, a key issue has been to determine the proper spatial scale. In addition, it is important to consider the possibility that these patterns and processes might differ appreciably for different temporal scales and might vary across geographic units of analysis. We examine the spatial-temporal dependence of residential burglary. This dependence is tested at varying geographical scales and temporal aggregations. The analyses are based on recorded incidents of crime in Columbus, Ohio during the 1994-2002 period. We implement point pattern analysis on the crime points using Ripley’s K function. The results indicate that spatial point patterns of residential burglary reveal spatial scales of clustering relatively larger than the average size of census tracts of the study area. Also, spatial scale is independent of temporal scale. The results of our analyses concerning the geographic scale of spatial patterns and processes can inform the development of effective policies for crime control.

Keywords: inhomogeneous K function, residential burglary, spatial point pattern, spatial scale, temporal scale

Procedia PDF Downloads 346
3101 Infinite Impulse Response Digital Filters Design

Authors: Phuoc Si Nguyen

Abstract:

Infinite impulse response (IIR) filters can be designed from an analogue low pass prototype by using frequency transformation in the s-domain and bilinear z-transformation with pre-warping frequency; this method is known as frequency transformation from the s-domain to the z-domain. This paper will introduce a new method to transform an IIR digital filter to another type of IIR digital filter (low pass, high pass, band pass, band stop or narrow band) using a technique based on inverse bilinear z-transformation and inverse matrices. First, a matrix equation is derived from inverse bilinear z-transformation and Pascal’s triangle. This Low Pass Digital to Digital Filter Pascal Matrix Equation is used to transform a low pass digital filter to other digital filter types. From this equation and the inverse matrix, a Digital to Digital Filter Pascal Matrix Equation can be derived that is able to transform any IIR digital filter. This paper will also introduce some specific matrices to replace the inverse matrix, which is difficult to determine due to the larger size of the matrix in the current method. This will make computing and hand calculation easier when transforming from one IIR digital filter to another in the digital domain.

Keywords: bilinear z-transformation, frequency transformation, inverse bilinear z-transformation, IIR digital filters

Procedia PDF Downloads 423
3100 Digital Economy as an Alternative for Post-Pandemic Recovery in Latin America: A Literature Review

Authors: Armijos-Orellana Ana, González-Calle María, Maldonado-Matute Juan, Guerrero-Maxi Pedro

Abstract:

Nowadays, the digital economy represents a fundamental element to guarantee economic and social development, whose importance increased significantly with the arrival of the COVID-19 pandemic. However, despite the benefits it offers, it can also be detrimental to those developing countries characterized by a wide digital divide. It is for this reason that the objective of this research was to identify and describe the main characteristics, benefits, and obstacles of the digital economy for Latin American countries. Through a bibliographic review, using the analytical-synthetic method in the period 1995-2021, it was determined that the digital economy could give way to structural changes, reduce inequality, and promote processes of social inclusion, as well as promote the construction and participatory development of organizational structures and institutional capacities in Latin American countries. However, the results showed that the digital economy is still incipient in the region and at least three factors are needed to establish it: joint work between academia, the business sector and the State, greater emphasis on learning and application of digital transformation and the creation of policies that encourage the creation of digital organizations.

Keywords: developing countries, digital divide, digital economy, digital literacy, digital transformation

Procedia PDF Downloads 140
3099 Factors Underlying the Digital Divide for Disabled People: Focus on a Korean Case Study

Authors: Soungwan Kim

Abstract:

This study identifies factors underlying the digital divide that is faced by the disabled. The results of its analysis showed that the digital divide in PC use is affected by age, number of years of education, employment status, and household income of more than KRW 3 million. The digital divide in smart device use is affected by sex, age, number of years of education, time when disability struck, and household income of more than KRW 3 million. Based on these results, this study proposes methods for bridging the digital divide faced by the disabled.

Keywords: digital divide, digital divide for the disabled, information accessibility for PCs and smart devices, information accessibility

Procedia PDF Downloads 265
3098 Negative Self-Awareness and Its Effect on Crime

Authors: Guinevere Servis

Abstract:

This paper hypothesizes that withdrawal from positive self-awareness, and the increase of counterfactual-thinking and self-handicapping can help provide ample justification for an individual before, during and/or after committing a crime. The understanding of who someone is, one’s perspective on the world, and why they think the way they do is key to therapy in preventing recidivism. Developing habits to escape self-awareness, by using self-handicapping and counterfactual ideologies, may provide the necessary thinking patterns to decide disobeying the law is a worthy act to pursue. An increase in self-awareness is hypothesized to decrease the likelihood of recidivism, and ways of thinking that withdraw from self awareness can increase the likelihood of it. Especially for those who have been disadvantaged in life and disobeyed the law, self-handicapping and counterfactual thinking can also help to justify one's wrongdoing. The understanding of how a criminal views their disadvantages in the world, and one’s thinking patterns are hypothesized to help one better understand the entire scope on why a crime was committed and thus reduce the likelihood of recidivism. Utilizing therapy for prisoners to increase self-awareness of both thought and action can lead to a healthy, happier life and reduce the likelihood of reoffending. By discussing the terms associated with self-awareness theory and other psychological topics such as self-handicapping, counterfactual thinking, this paper argues the actions towards increasing positive self-awareness can help decrease likelihood of recidivism. Adversely, hypothesizing that increasing the ways of thinking that withdraw one from self-awareness, through counterfactual thinking and self-handicapping, can inherently increase the likelihood of recidivism. Evaluating these findings to further understand the needed changes in correctional institutions is fundamental to reducing crime, benefiting the criminal, the victim(s) and their family, and the state.

Keywords: crime, self-awareness theory, correctional institutions, self-regulate, counterfactual thinking, recidivism

Procedia PDF Downloads 99
3097 Unravelling the Knot: Towards a Definition of ‘Digital Labor’

Authors: Marta D'Onofrio

Abstract:

The debate on the digitalization of the economy has raised questions about how both labor and the regulation of work processes are changing due to the introduction of digital technologies in the productive system. Within the literature, the term ‘digital labor’ is commonly used to identify the impact of digitalization on labor. Despite the wide use of this term, it is still not available an unambiguous definition of it, and this could create confusion in the use of terminology and in the attempts of classification. As a consequence, the purpose of this paper is to provide for a definition and to propose a classification of ‘digital labor’, resorting to the theoretical approach of organizational studies.

Keywords: digital labor, digitalization, data-driven algorithms, big data, organizational studies

Procedia PDF Downloads 153
3096 Prediction of Bodyweight of Cattle by Artificial Neural Networks Using Digital Images

Authors: Yalçın Bozkurt

Abstract:

Prediction models were developed for accurate prediction of bodyweight (BW) by using Digital Images of beef cattle body dimensions by Artificial Neural Networks (ANN). For this purpose, the animal data were collected at a private slaughter house and the digital images and the weights of each live animal were taken just before they were slaughtered and the body dimensions such as digital wither height (DJWH), digital body length (DJBL), digital body depth (DJBD), digital hip width (DJHW), digital hip height (DJHH) and digital pin bone length (DJPL) were determined from the images, using the data with 1069 observations for each traits. Then, prediction models were developed by ANN. Digital body measurements were analysed by ANN for body prediction and R2 values of DJBL, DJWH, DJHW, DJBD, DJHH and DJPL were approximately 94.32, 91.31, 80.70, 83.61, 89.45 and 70.56 % respectively. It can be concluded that in management situations where BW cannot be measured it can be predicted accurately by measuring DJBL and DJWH alone or both DJBD and even DJHH and different models may be needed to predict BW in different feeding and environmental conditions and breeds

Keywords: artificial neural networks, bodyweight, cattle, digital body measurements

Procedia PDF Downloads 372
3095 The Value of Online News: Addressing the Problem of Online Investment Fraud Crimes in Thailand

Authors: Thapthep Paprach, Benya Lertsuwan

Abstract:

Investment fraud is not a new criminal, but there are still more victims during the Internet of Things era. This kind of criminal has been classified as a national and transnational financial crime problem all over the world. In Thailand, the country has also been attacked by this kind of crime. This research concerns whether the mass media that is supposed to cover news about online investment scams realized and warned Thais about this crime. Thus, this study explores the value of news about investment fraud in terms of frequency. The methodology uses web crawling from the top 5 news agency websites that have the most access. We pull out all information reporting about investment fraud. The findings revealed that the ‘Khaosod’ news agency was the first rank in reporting on investment crime. On the other hand, ‘Matichon’ was the least reported. Thairat news agencies frequently reported such criminals from midnight to very early in the morning, while other news agencies reported during the daytime. The results between the frequency of news reporting about investment fraud and the monthly number of victim reports are not correlated. Although the most cases reported to Thai police were in February 2023, but the most news reported was in January 2023. In conclusion, there might be a negative correlation between the amount of investment fraud news reported and the number of victims.

Keywords: investment fraud, news value, online news report, Ponzi schemes, Romance scam

Procedia PDF Downloads 77
3094 Theorizing Digital Transformation, Digitization and Digitalization in Africa Emerging Research in Digital Business: A Critical Review of the Current Scholarship

Authors: Ayanda Magida

Abstract:

The paper aims to provide a critical review of the current state-of-the-art literature on emerging digital business theories. They are specifically focusing on the emergent theories on digital transformation, digitization, and digitalization and their importance in the global south. Digital business is an emergent field that cuts across the different existing disciplines. The paper is threefold- to provide the conceptual and theoretical definition of the DT, digitization and digitization. There is a growing need to provide some of the differences between digitalization, digitization and digital transformation from a theoretical and conceptual basis. These tend to be confused and often use interchangeably the second aim is to focus on the emerging theories on digital transformation and digital business. Finally, the paper provides some critical review of the importance of scholarship in the field from the global south. The systematic review of the literature was conducted through the different research databases to provide some of the major theories in the field of digital business and critically argue for the global south stance. Much of the research on the development and adoption of digital technologies, specifically digital transformation, has been done in the west and developed countries. There is thus a dearth of research conducted in developing countries and the global south.

Keywords: digital transformation, digitization, digital business, digitalization

Procedia PDF Downloads 275
3093 The Role of Business Process Management in Driving Digital Transformation: Insurance Company Case Study

Authors: Dalia Suša Vugec, Ana-Marija Stjepić, Darija Ivandić Vidović

Abstract:

Digital transformation is one of the latest trends on the global market. In order to maintain the competitive advantage and sustainability, increasing number of organizations are conducting digital transformation processes. Those organizations are changing their business processes and creating new business models with the help of digital technologies. In that sense, one should also observe the role of business process management (BPM) and its maturity in driving digital transformation. Therefore, the goal of this paper is to investigate the role of BPM in digital transformation process within one organization. Since experiences from practice show that organizations from financial sector could be observed as leaders in digital transformation, an insurance company has been selected to participate in the study. That company has been selected due to the high level of its BPM maturity and the fact that it has previously been through a digital transformation process. In order to fulfill the goals of the paper, several interviews, as well as questionnaires, have been conducted within the selected company. The results are presented in a form of a case study. Results indicate that digital transformation process within the observed company has been successful, with special focus on the development of digital strategy, BPM and change management. The role of BPM in the digital transformation of the observed company is further discussed in the paper.

Keywords: business process management, case study, Croatia, digital transformation, insurance company

Procedia PDF Downloads 194
3092 The Impacts of Foreign Culture on Yoruba Crime Films

Authors: Alonge Isaac Olusola

Abstract:

This paper focuses on the evolution and development of Yoruba theatre during the pre-colonial, colonial and post-colonial years and how Yoruba crime films have been influenced by foreign culture. It emphasizes on the transition of theatre from the ground to the stage and from the stage to the screen with emphasis on the contribution of late Chief Hubert Ogunde who is regarded as the doyen of Yoruba and the entire Nigerian theatre. Using the Theory of Post-colonialism, two modern Yoruba crime films are carefully selected from the numerous available ones to highlight and explain the various aspects of Yoruba films that have been greatly influenced by the foreign cultural practices. The questions to be answered here include 'Which attitudes or cultural practices are widely believed to be that of Yoruba?', 'To what extent are they projected in the selected Yoruba crime films?', 'Which attitudes or cultural practices are widely believed to be foreign among the Yoruba people?', 'To what extent are they projected in the selected Yoruba crime films?'. Although, the British colonial masters granted political independence to Nigeria on October 1, 1960, but a seed of multi-culture and counterculture had been sown into the lives of the Yoruba people. Under the literature review, there is an intensive illumination on some scholars’ ideas and views on what constitutes Yoruba culture, the evolution and development of drama, theatre and films in the Yoruba society and the nature of criminals and criminalities in the Yoruba society and the western world in the pre-colonial and post-colonial times. Furthermore, the processes of interaction between man, his values and his thoughts are also highlighted – a situation that procreates criminal or benevolent acts. Consequently, the paper dwells on how colonialism, despite its so-called merits put the gradual process of urbanization and civilization among the originally rustic, cohesive and moralistic Yoruba society on a supersonic speed that culminated in acquisition of attitudes that are alien to the Yoruba culture. Since a drama is nothing but the theatrical replication of what occurs in the real life, the paper then focuses on the submission that Yoruba crime films have experienced a serious foreign influence in form and content as a result of this encounter. In conclusion, the findings of the impact of foreign cultural practices on Yoruba crime films are highlighted and expatiated with a view to recommending a few steps that could be taken to retain the projection of the original Yoruba cultural practices in Yoruba films, especially the ones that have crime as a theme.

Keywords: culture, films, theatre, Yoruba

Procedia PDF Downloads 303
3091 Evaluating Key Attributes of Effective Digital Games in Tertiary Education

Authors: Roopali Kulkarni, Yuliya Khrypko

Abstract:

A major problem in educational digital game design is that game developers are often focused on maintaining the fun and playability of an educational game, whereas educators are more concerned with the learning aspect of the game rather than its entertaining characteristics. There is a clear need to understand what key aspects of digital learning games make them an effective learning medium in tertiary education. Through a systematic literature review and content analysis, this paper identifies, evaluates, and summarizes twenty-three key attributes of digital games used in tertiary education and presents a summary digital game-based learning (DGBL) model for designing and evaluating an educational digital game of any genre that promotes effective learning in tertiary education. The proposed solution overcomes limitations of previously designed models for digital game evaluation, such as a small number of game attributes considered or applicability to a specific genre of digital games. The proposed DGBL model can be used to assist game designers and educators with creating effective and engaging educational digital games for the tertiary education curriculum.

Keywords: DGBL model, digital games, educational games, game-based learning, tertiary education

Procedia PDF Downloads 284
3090 The Dark Side of the Fight against Organised Crime

Authors: Ana M. Prieto del Pino

Abstract:

As is well known, UN Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances (1988) was a landmark regarding the seizure of proceeds of crime. Depriving criminals of the profits from their activity became a priority at an international level in the fight against organised crime. Enabling confiscation of proceeds of illicit traffic in narcotic drugs and psychotropic substances, criminalising money laundering and confiscating the proceeds thereof are the three measures taken in order to achieve that purpose. The beginning of 21st century brought the declaration of war on corruption and on the illicit enjoyment of the profits thereof onto the international scene. According to the UN Convention against Transnational Organised Crime (2000), States Parties should adopt the necessary measures to enable the confiscation of proceeds of crime derived from offences (or property of equivalent value) and property, equipment and other instrumentalities used in offences covered by that Convention. The UN Convention against Corruption (2003) states asset recovery explicitly as a fundamental principle and sets forth measures aiming at the direct recovery of property through international cooperation in confiscation. Furthermore, European legislation has made many significant strides forward in less than twenty years concerning money laundering, confiscation, and asset recovery. Crime does not pay, let there be no doubt about it. Nevertheless, we must be very careful not to sing out of tune with individual rights and legal guarantees. On the one hand, innocent individuals and businesses must be protected, since they should not pay for the guilty ones’ faults. On the other hand, the rule of law must be preserved and not be tossed aside regarding those who have carried out criminal activities. An in-depth analysis of judicial decisions on money laundering and confiscation of proceeds of crime issued by European national courts and by the European Court of Human Rights in the last decade has been carried out from a human rights, legal guarantees and criminal law basic principles’ perspective. The undertaken study has revealed the violation of the right to property, of the proportionality principle legal and the infringement of basic principles of states’ domestic substantive and procedural criminal law systems. The most relevant ones have to do with the punishment of money laundering committed through negligence, non-conviction based confiscation and a too-far reaching interpretation of the notion of ‘proceeds of crime’. Almost everything in life has a bright and a dark side. Confiscation of criminal proceeds and asset recovery are not an exception to this rule.

Keywords: confiscation, human rights, money laundering, organized crime

Procedia PDF Downloads 139