Search results for: marriage fraud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 410

Search results for: marriage fraud

320 The Role of Technology in Managing Election Logistics and Preventing Fraud in Nigeria and Uganda: A Comparative Analysis

Authors: Sifiso Vilakazi, Lerato Mzenzi

Abstract:

The incorporation of technology has brought about a considerable evolution in election management, providing answers to persistent issues with fraud, inefficiency, and logistical complexity. The paper offers a comparative review of the effects of technology advancements on election logistics and fraud prevention in Uganda and Nigeria. Both nations have embraced technology such as digital fraud prevention systems, biometric voter registration, and electronic results transmission while having different political environments and electoral problems. Nevertheless, these innovations' varied results raise important concerns about how technology can enhance vote integrity. For improved transparency and lower voter fraud, the Independent National Electoral Commission (INEC) of Nigeria has deployed electronic voting machines, biometric voter identification, and the INEC Result Viewing (IReV) portal. Despite these developments, technological setbacks and logistical difficulties, particularly during the 2023 elections, uncovered weaknesses that stoked distrust and electoral conflicts by exposing flaws, including device breakdowns, insufficient cybersecurity protections, and transmission delays in results. Comparably, Uganda has used electronic result transmission technologies and biometric voter verification since 2016 to increase election efficiency and combat ballot stuffing and impersonation. Nevertheless, problems, including remote logistical challenges and internet outages during the 2021 elections, have reduced the efficacy of these tools. This paper maintains that while technology might reduce election-related stress and potentially reduce fraud, its efficacy depends on several variables, such as political will, public confidence, and infrastructure. Furthermore, it draws attention to the necessity of more robust legislative frameworks, ongoing investments in cybersecurity, and implementation plans that are customized to the particular difficulties presented by each nation's voting system locally. The results imply that although technology can help Ugandan and Nigerian election management, it cannot guarantee electoral integrity and must be used in conjunction with more extensive institutional changes. Through providing insights into how African nations might use technological advancements to improve democratic governance while addressing context-specific problems, the research adds to the expanding body of literature on the use of technology in election management.

Keywords: elections, Nigeria, Uganda, Africa, management, innovation

Procedia PDF Downloads 10
319 "Advancing Gender Equity: Addressing Child Marriage And Mental Health Challenges In Zambia"

Authors: Akekelwa Catherine Chitonka

Abstract:

Child marriage remains a critical issue in Zambia, with particularly high rates in Chipata, Eastern Province. This paper examines the intersection of gender equity, mental health, and child protection, focusing on the impact of child marriage on young girls in the region. The study highlights the socio-economic and cultural factors driving child marriage, including poverty, entrenched cultural norms, and limited access to education. These factors often result in girls being married at a young age, severely limiting their personal and educational development. This practice jeopardizes their mental well-being, with many facing depression, anxiety, and other mental health challenges. Data from Lifeline/Childline Zambia’s toll-free helpline reveals the rising prevalence of child marriage, particularly in rural areas. Girls married before 18 are at higher risk of experiencing gender-based violence, psychological trauma, and restricted access to resources such as education and healthcare. These girls often exhibit mental health issues, including post-traumatic stress disorder (PTSD), depression, and suicidal thoughts. However, mental health remains an often-overlooked aspect in the response to child marriage, with stigma and lack of awareness preventing proper care and intervention. The research employs a mixed-methods approach, utilizing both quantitative data from Lifeline/Childline Zambia’s helpline records and qualitative data from community focus groups and key informant interviews. The findings underscore the drivers of child marriage in Chipata—poverty, cultural expectations, and limited educational opportunities—while also highlighting the severe mental health consequences for child brides. Girls who have experienced early marriage report higher instances of depression, anxiety, and suicidal tendencies compared to their unmarried peers. The paper proposes several community-based interventions to address both child marriage and the mental health challenges aced by young girls. First, it recommends culturally sensitive workshops aimed at challenging harmful norms that perpetuate early marriage and promoting gender equity. Engaging community leaders and using local languages will be essential for these interventions to succeed. Secondly, it advocates for strengthening legal frameworks and enforcing laws against child marriage. Despite existing legal provisions, enforcement is weak, and further advocacy is necessary to ensure that girls' rights are protected. In addition to these interventions, the paper highlights the need for improved mental health services tailored to the needs of child brides. Establishing accessible, community-based mental health support systems will help address the psychological toll of early marriage. Furthermore, providing scholarships and vocational training will empower girls economically and reduce the financial pressures that often lead to early marriages. This study contributes to the global discourse on gender equity and mental health by offering a detailed analysis of the situation in Zambia, suggesting targeted, culturally sensitive interventions that can be adapted to other regions facing similar challenges. The findings emphasize the importance of a holistic approach that integrates mental health, education, and legal advocacy to combat child marriage and promote gender equity.

Keywords: child marriage, gender equity, mental health, poverty

Procedia PDF Downloads 11
318 Exploring the Prevailing Unfairness in Muslim Marriage and Divorce Laws in Singapore's Dual Court System

Authors: J. Jayaletchmi

Abstract:

In seeking to manage a multiracial and multi-religious society, Singapore provides a unique solution – a dual court system whereby a common law system co-exists with a Syariah law system that administers Syariah law for the Muslim population. In this respect, Singapore seems to provide a feasible example of legal pluralism to countries grappling with a burgeoning Muslim population. However, problems have arisen regarding this peaceful coexistence of secular and religious laws that seek to balance the rights of women and religious freedom. Singapore’s interpretation of Syariah law in the context of marriage and divorce has resulted in certain inequalities for Muslim women, which are exemplified in light of the Women’s Charter, a landmark piece of legislation which provides the legal basis for equity between husband and wife, but excludes Muslims from its ambit. The success of Singapore’s dual court system has largely been at the expense of Muslim women’s rights, and, as a result, the Muslim community as a whole has begun trailing behind the progressive society it forms a part of. This paper explores the prevailing unfairness of rules governing Muslim marriage and divorce in Singapore, and puts forth bold reforms.

Keywords: legal pluralism, Singapore, Syariah law, women’s rights

Procedia PDF Downloads 254
317 First Digit Lucas, Fibonacci and Benford Number in Financial Statement

Authors: Teguh Sugiarto, Amir Mohamadian Amiri

Abstract:

Background: This study aims to explore if there is fraud in the company's financial report distribution using the number first digit Lucas, Fibonacci and Benford. Research methods: In this study, the author uses a number model contained in the first digit of the model Lucas, Fibonacci and Benford, to make a distinction between implementation by using the scale above and below 5%, the rate of occurrence of a difference against the digit number contained on Lucas, Fibonacci and Benford. If there is a significant difference above and below 5%, then the process of follow-up and detection of occurrence of fraud against the financial statements can be made. Findings: From research that has been done can be concluded that the number of frequency levels contained in the financial statements of PT Bank BRI Tbk in a year in the same conscientious results for model Lucas, Fibonacci and Benford.

Keywords: Lucas, Fibonacci, Benford, first digit

Procedia PDF Downloads 274
316 Fraud in the Higher Educational Institutions in Assam, India: Issues and Challenges

Authors: Kalidas Sarma

Abstract:

Fraud is a social problem changing with social change and it has a regional and global impact. Introduction of private domain in higher education along with public institutions has led to commercialization of higher education which encourages unprecedented mushrooming of private institutions resulting in fraudulent activities in higher educational institutions in Assam, India. Presently, fraud has been noticed in in-service promotion, fake entry qualification by teachers in different levels of work-place by using fake master degrees, master of philosophy and doctor of philosophy degree certificates. The aim and objective of the study are to identify grey areas in maintenance of quality in higher educational institutions in Assam and also to draw the contour for planning and implementation. This study is based on both primary and secondary data collected through questionnaire and seeking information through Right to Information Act 2005. In Assam, there are 301 undergraduate and graduate colleges distributed in 27 (Twenty seven) administrative districts with 11000 (Eleven thousand) college teachers. Total 421 (Four hundred twenty one) college teachers from the 14 respondent colleges have been taken for analysis. Data collected has been analyzed by using 'Hypertext Pre-processor' (PhP) application with My Sequel Structure Query Language (MySQL) and Google Map Application Programming Interface (APIs). Graph has been generated by using open source tool Chart.js. Spatial distribution maps have been generated with the help of geo-references of the colleges. The result shows: (i) the violation of University Grants Commission's (UGCs) Regulation for the awards of M. Phil/Ph.D. clearly exhibits. (ii) There is a gap between apex regulatory bodies of higher education at national and as well as state level to check fraud. (iii) Mala fide 'No Objection Certificate' (NOC) issued by the Government of Assam have played pivotal role in the occurrence of fraudulent practices in higher educational institutions of Assam. (iv) Violation of verdict of the Hon'ble Supreme Court of India regarding territorial jurisdiction of Universities for the awards of Ph.D. and M. Phil degrees in distance mode/study centre is also a responsible factor for the spread of these academic frauds in Assam and other states. The challenges and mitigation of these issues have been discussed.

Keywords: Assam, fraud, higher education, mitigation

Procedia PDF Downloads 169
315 Social Workers' Perspectives on Muslim Parents with Intellectual Disabilities

Authors: Ayelet Gur

Abstract:

Background: Parents with intellectual disability are of great interest to social service professionals. Article 23 of the United Nations Convention on the Rights of Persons with Disabilities aims to ensure that persons with disabilities can create a family by providing adequate supports. The aim of the current investigation was to portray families with parents with intellectual disabilities within Muslim- Arab society in Israel. Method: Qualitative method using semi-structured interviews with nine-teen Muslim Israeli social workers was employed. Thematic analysis was used to identify major themes. Results: Families with parents with intellectual disability are not a rare phenomenon in the Arab society. The common type is of marriage between a man with intellectual disability and a woman without disability. Findings indicated two main motives for the arranged marriage of a man with intellectual disability: the extended family's concerns about his future and their desire for the family continuity. The non-disabled wives' motives for marrying men with intellectual disabilities revolved around their lack of other opportunities to create a family and their desire to leave their parents' household and live independently. Those women were described as partly or fully aware of their husbands' disability prior to the marriage. The family life of those families were described in relation to the fathers' involvement in family life and relation to the wives' high burden and in many cases, acceptance of their life situation. Conclusions: Findings are discussed with respect to religious values on disability, arranged marriage and the status of Muslim women. Services and supports for parents with intellectual disabilities should be developed with respect to the cultural values and norms.

Keywords: Arab society in Israel, intellectual and developmental disability, parents with intellectual disability, social work

Procedia PDF Downloads 157
314 Perceived Seriousness of Cybercrime Types: A Comparison across Gender

Authors: Suleman Ibrahim

Abstract:

Purpose: The research is seeking people's perceptions on cybercrime issues, rather than their knowledge of the facts. Unlike the Tripartite Cybercrime Framework (TCF), the binary models are ill-equipped to differentiate between cyber fraud (a socioeconomic crime) and cyber bullying or cyber stalking (psychosocial cybercrimes). Whilst the binary categories suggested that digital crimes are dichotomized: (i.e. cyber-enabled and cyber-dependent), the TCF, recently proposed, argued that cybercrimes can be conceptualized into three groups: socioeconomic, psychosocial and geopolitical. Concomitantly, as regards to the experience/perceptions of cybercrime, the TCF’s claim requires substantiation beyond its theoretical realm. Approach/Methodology: This scholar endeavor framed with the TCF, deploys a survey method to explore the experience of cybercrime across gender. Drawing from over 400 participants in the UK, this study aimed to contrast the differential perceptions/experiences of socioeconomic cybercrime (e.g. cyber fraud) and psychological cybercrime (e.g. cyber bullying and cyber stalking) across gender. Findings: The results revealed that cyber stalking was rated as least serious of the different digital crime categories. Further revealed that female participants judged all types of cybercrimes as more serious than male participants, with the exception of socioeconomic cybercrime – cyber fraud. This distinction helps to emphasize that gender cultures and nuances not only apply both online and offline, it emphasized the utilitarian value of the TCF. Originality: Unlike existing data, this study has contrasted the differential perceptions and experience of socioeconomic and psychosocial cybercrimes with more refined variables.

Keywords: gender variations, psychosocial cybercrime, socioeconomic cybercrime, tripartite cybercrime framework

Procedia PDF Downloads 390
313 The Social Structuring of Mate Selection: Assortative Marriage Patterns in the Israeli Jewish Population

Authors: Naava Dihi, Jon Anson

Abstract:

Love, so it appears, is not socially blind. We show that partner selection is socially constrained, and the freedom to choose is limited by at least two major factors or capitals: on the one hand, material resources and education, locating the partners on a scale of personal achievement and economic independence. On the other, the partners' ascriptive belonging to particular ethnic, or origin, groups, differentiated by the groups' social prestige, as well as by their culture, history and even physical characteristics. However, the relative importance of achievement and ascriptive factors, as well as the overlap between them, varies from society to society, depending on the society's structure and the factors shaping it. Israeli social structure has been shaped by the waves of new immigrants who arrived over the years. The timing of their arrival, their patterns of physical settlement and their occupational inclusion or exclusion have together created a mosaic of social groups whose principal common feature has been the country of origin from which they arrived. The analysis of marriage patterns helps illuminate the social meanings of the groups and their borders. To the extent that ethnic group membership has meaning for individuals and influences their life choices, the ascriptive factor will gain in importance relative to the achievement factor in their choice of marriage partner. In this research, we examine Jewish Israeli marriage patterns by looking at the marriage choices of 5,041 women aged 15 to 49 who were single at the census in 1983, and who were married at the time of the 1995 census, 12 years later. The database for this study was a file linking respondents from the 1983 and the 1995 censuses. In both cases, 5 percent of household were randomly chosen, so that our sample includes about 4 percent of women in Israel in 1983. We present three basic analyses: (1) Who was still single in 1983, using personal and household data from the 1983 census (binomial model), (2) Who married between 1983 and a1995, using personal and household data from the 1983 census (binomial model), (3) What were the personal characteristics of the womens’ partners in 1995, using data from the 1995 census (loglinear model). We show (i) that material and cultural capital both operate to delay marriage and to increase the probability of remaining single; and (ii) while there is a clear association between ethnic group membership and education, endogamy and homogamy both operate as separate forces which constraint (but do not determine) the choice of marriage partner, and thus both serve to reproduce the current pattern of relationships, as well as identifying patterns of proximity and distance between the different groups.

Keywords: Israel, nuptiality, ascription, achievement

Procedia PDF Downloads 117
312 Basics for Corruption Reduction and Fraud Prevention in Industrial/Humanitarian Organizations through Supplier Management in Supply Chain Systems

Authors: Ibrahim Burki

Abstract:

Unfortunately, all organizations (Industrial and Humanitarian/ Non-governmental organizations) are prone to fraud and corruption in their supply chain management routines. The reputational and financial fallout can be disastrous. With the growing number of companies using suppliers based in the local market has certainly increased the threat of fraud as well as corruption. There are various potential threats like, poor or non-existent record keeping, purchasing of lower quality goods at higher price, excessive entertainment of staff by suppliers, deviations in communications between procurement staff and suppliers, such as calls or text messaging to mobile phones, staff demanding extended periods of notice before they allow an audit to take place, inexperienced buyers and more. But despite all the above-mentioned threats, this research paper emphasize upon the effectiveness of well-maintained vendor/s records and sorting/filtration of vendor/s to cut down the possible threats of corruption and fraud. This exercise is applied in a humanitarian organization of Pakistan but it is applicable to whole South Asia region due to the similarity of culture and contexts. In that firm, there were more than 550 (five hundred and fifty) registered vendors. As during the disasters or emergency phases requirements are met on urgent basis thus, providing golden opportunities for the fake companies or for the brother/sister companies of the already registered companies to be involved in the tendering process without declaration or even under some different (new) company’s name. Therefore, a list of required documents (along with checklist) was developed and sent to all of the vendor(s) in the current database and based upon the receipt of the requested documents vendors were sorted out. Furthermore, these vendors were divided into active (meeting the entire set criterion) and non-active groups. This initial filtration stage allowed the firm to continue its work without a complete shutdown that is only vendors falling in the active group shall be allowed to participate in the tenders by the time whole process is completed. Likewise only those companies or firms meeting the set criterion (active category) shall be allowed to get registered in the future along with a dedicated filing system (soft and hard shall be maintained), and all of the companies/firms in the active group shall be physically verified (visited) by the Committee comprising of senior members of at least Finance department, Supply Chain (other than procurement) and Security department.

Keywords: corruption reduction, fraud prevention, supplier management, industrial/humanitarian organizations

Procedia PDF Downloads 540
311 Civil Liability for Digital Crimes

Authors: Pál Mészáros

Abstract:

The aim of this research topic is to examine civil law consequences caused by crimes committed in the digital space. During the commission of certain crimes, not only the rights of one person are violated, but also the rights of an entire institution, for example, if the information system of a university is attacked. The consequences of these crimes committed in the digital space may also be that the victim himself is liable to other third parties, for example, in the event that health data comes into the possession of unauthorized persons, and it can be proved that the service provider's IT system was inadequate. An interesting question may also be the civil liability of credit institutions if someone becomes a victim of fraud but is not expected from him/her to notice the fraud. In such a case, the liability of the credit institution may arise if they do not respond in time in the case of unauthorized bank transactions. Based on the above, the main topic of the research is the civil liability of the victim, or another person or company related to the victim in the case of damages caused by crimes.

Keywords: civil liability, digital crimes, transfer of responsibility, civil law

Procedia PDF Downloads 64
310 An Assessment of Impact of Financial Statement Fraud on Profit Performance of Manufacturing Firms in Nigeria: A Study of Food and Beverage Firms in Nigeria

Authors: Wale Agbaje

Abstract:

The aim of this research study is to assess the impact of financial statement fraud on profitability of some selected Nigerian manufacturing firms covering (2002-2016). The specific objectives focused on to ascertain the effect of incorrect asset valuation on return on assets (ROA) and to ascertain the relationship between improper expense recognition and return on assets (ROA). To achieve these objectives, descriptive research design was used for the study while secondary data were collected from the financial reports of the selected firms and website of security and exchange commission. The analysis of covariance (ANCOVA) was used and STATA II econometric method was used in the analysis of the data. Altman model and operating expenses ratio was adopted in the analysis of the financial reports to create a dummy variable for the selected firms from 2002-2016 and validation of the parameters were ascertained using various statistical techniques such as t-test, co-efficient of determination (R2), F-statistics and Wald chi-square. Two hypotheses were formulated and tested using the t-statistics at 5% level of significance. The findings of the analysis revealed that there is a significant relationship between financial statement fraud and profitability in Nigerian manufacturing industry. It was revealed that incorrect assets valuation has a significant positive relationship and so also is the improper expense recognition on return on assets (ROA) which serves as a proxy for profitability. The implication of this is that distortion of asset valuation and expense recognition leads to decreasing profit in the long run in the manufacturing industry. The study therefore recommended that pragmatic policy options need to be taken in the manufacturing industry to effectively manage incorrect asset valuation and improper expense recognition in order to enhance manufacturing industry performance in the country and also stemming of financial statement fraud should be adequately inculcated into the internal control system of manufacturing firms for the effective running of the manufacturing industry in Nigeria.

Keywords: Althman's Model, improper expense recognition, incorrect asset valuation, return on assets

Procedia PDF Downloads 161
309 AI Applications in Accounting: Transforming Finance with Technology

Authors: Alireza Karimi

Abstract:

Artificial Intelligence (AI) is reshaping various industries, and accounting is no exception. With the ability to process vast amounts of data quickly and accurately, AI is revolutionizing how financial professionals manage, analyze, and report financial information. In this article, we will explore the diverse applications of AI in accounting and its profound impact on the field. Automation of Repetitive Tasks: One of the most significant contributions of AI in accounting is automating repetitive tasks. AI-powered software can handle data entry, invoice processing, and reconciliation with minimal human intervention. This not only saves time but also reduces the risk of errors, leading to more accurate financial records. Pattern Recognition and Anomaly Detection: AI algorithms excel at pattern recognition. In accounting, this capability is leveraged to identify unusual patterns in financial data that might indicate fraud or errors. AI can swiftly detect discrepancies, enabling auditors and accountants to focus on resolving issues rather than hunting for them. Real-Time Financial Insights: AI-driven tools, using natural language processing and computer vision, can process documents faster than ever. This enables organizations to have real-time insights into their financial status, empowering decision-makers with up-to-date information for strategic planning. Fraud Detection and Prevention: AI is a powerful tool in the fight against financial fraud. It can analyze vast transaction datasets, flagging suspicious activities and reducing the likelihood of financial misconduct going unnoticed. This proactive approach safeguards a company's financial integrity. Enhanced Data Analysis and Forecasting: Machine learning, a subset of AI, is used for data analysis and forecasting. By examining historical financial data, AI models can provide forecasts and insights, aiding businesses in making informed financial decisions and optimizing their financial strategies. Artificial Intelligence is fundamentally transforming the accounting profession. From automating mundane tasks to enhancing data analysis and fraud detection, AI is making financial processes more efficient, accurate, and insightful. As AI continues to evolve, its role in accounting will only become more significant, offering accountants and finance professionals powerful tools to navigate the complexities of modern finance. Embracing AI in accounting is not just a trend; it's a necessity for staying competitive in the evolving financial landscape.

Keywords: artificial intelligence, accounting automation, financial analysis, fraud detection, machine learning in finance

Procedia PDF Downloads 63
308 Exploration of Professional Skepticism among Entry-level Auditors in China from Psychological and Cultural Perspectives

Authors: Sammy Xiaoyan Ying

Abstract:

Professional skepticism remains one of the most important and controversial topics in auditing. This study examines the influence of client cooperativeness and fraud risk on judgments of professional skepticism among Chinese entry-level auditors in the context of evaluation of client-provided audit evidence. Given that the essence of auditors’ PS rests on distrust of clients, this study invokes trust-related theories from psychological and cultural perspectives. Specifically, invoking psychology theories of trust concerning positive relationship between risk and distrust, this study hypothesizes that professional skepticism is likely to be positively associated with client fraud risk. The results support the hypothesis and show that lower (higher) levels of client fraud risk lead to lower (higher) levels of professional skepticism. Furthermore, drawing on analysis of relationship between cooperation and trust, with particular reference to guanxi dynamics in the Chinese culture, this study hypothesizes that professional skepticism is likely to be negatively associated with client cooperativeness. The results support the hypothesis and show that higher (lower) levels of client cooperativeness lead to lower (higher) levels of professional skepticism. The findings may assist audit firms and auditing educators in improving training and education programs and enhancing entry-level auditors’ abilities to maintain professional skepticism. Also, practitioners and regulators may benefit from increasing awareness of psychological factors in influencing professional skepticism.

Keywords: audit judgment, Chinese culture, entry-level auditor, professional skepticism

Procedia PDF Downloads 292
307 Implementation of a Quality Management Approach in the Laboratory of Quality Control and the Repression of Fraud (CACQE) of the Wilaya of Bechar

Authors: Khadidja Mebarki, Naceur Boussouar, Nabila Ihaddadene, M. Akermi

Abstract:

Food products are particularly sensitive, since they concern the health of the consumer, whether it’s be from the health point of view or commercial, this kind of product must be subjected to rigorous controls, in order to prevent any fraud. Quality and safety are essential for food security, public health and economic development. The strengthening of food security is essential to increase food security which is considered reached when all individuals can at any time access safe and nutritious food they need to lead healthy and active lives. The objective of this project is to initiate a quality approach in the laboratories of the quality control and the repression of fraud. It will be directed towards the application of good laboratory practices, traceability, management of quality documents (quality, procedures and specification manual) and quality audits. And to prepare the ground for a possible accreditation by ISO 17025 standard of BECHAR laboratory’s. The project will take place in four main stages: 1- Preparation of an audit grid; 2- Realization of a quality audit according to the method of 5 M completed by a section on quality documentation; 3- Drafting of an audit report and proposal for recommendations; 4- Implementation of corrective actions on the ground. This last step consisted in the formalization of the cleaning disinfection plan; work on good hygiene practices, establishment of a mapping of processes and flow charts of the different processes of the laboratory, classifying quality documents and formalizing the process of document management. During the period of the study within the laboratory, all facets of the work were almost appreciated, as we participated in the expertise performed in within it.

Keywords: quality, management, ISO 17025 accreditation, GLP

Procedia PDF Downloads 519
306 Displaced People in International Marriage Law: Choice of Law and the 1951 Convention Relating to the Status of Refugees

Authors: Rorick Daniel Tovar Galvan

Abstract:

The 1951 Convention relating to the status of refugees contains a conflict of law rule for the determination of the applicable law to marriage. The wording of this provision leaves much to be desired as it uses the domicile and the residence of the spouses as single main and subsidiary connecting factors. In cases where couples live in different countries, the law applicable to the case is unclear. The same problem arises when refugees are married to individuals outside of the convention’s scope of application. Different interpretations of this legal provision have arisen to solve this problem. Courts in a number of European countries apply the so-called modification doctrine: states should apply their domestic private international rules in all cases involving refugees. Courts shall, however, replace the national connecting factor by the domicile or residence in situations where nationality is used to determine the applicable law. The internal conflict of law rule will then be slightly modified in order to be applied according to the convention. However, this approach excludes these people from using their national law if they so desire. As nationality is, in all cases, replaced by domicile or residence as connecting factor, refugees are automatically deprived of the possibility to choose this law in jurisdictions that include the party autonomy in international marriage law. This contribution aims to shed light on the international legal framework applicable to marriages celebrated by refugees and the unnecessary restrictions to the exercise of the party autonomy these individuals are subjected to. The interest is motivated by the increasing number of displaced people, the significant number of states party to the Refugee Convention – approximately 150 – and the fact that more and more countries allow choice of law agreements in marriage law. Based on a study of German, Spanish and Swiss case law, the current practices in Europe, as well as some incoherencies derived from the current interpretation of the convention, will be discussed. The main objective is showing that there is neither an economic nor a legal basis to deny refugees the right to choose the law of their country of origin in those jurisdictions providing for this possibility to other foreigners. Quite the contrary, after analyzing other provisions contained in the conventions, this restriction would mean a contravention of other obligations included in the text.

Keywords: choice of law, conflict of laws, international marriage law, refugees

Procedia PDF Downloads 146
305 The Conundrum of Marital Rape in Malawi: The Past, the Present and the Future

Authors: Esther Gumboh

Abstract:

While the definition of rape has evolved over the years and now differs from one jurisdiction to another, at the heart of the offence remains the absence of consent on the part of the victim. In simple terms, rape consists in non-consensual sexual intercourse. Therefore, the core issue is whether the accused acted with the consent of the victim. Once it is established that the act was consensual, a conviction of rape cannot be secured. Traditionally, rape within marriage was impossible because it was understood that a woman gave irrevocable consent to sex with her husband throughout the duration of the marriage. This position has since changed in most jurisdictions. Indeed, Malawian law now recognises the offence of marital rape. This is a victory for women’s rights and gender equality. Curiously, however, the definition of marital rape endorsed differs from the standard understanding of rape as non-consensual sex. Instead, the law has introduced the concept of unreasonableness of the refusal to engage in sex as a defence to an accused. This is an alarming position that undermines the protection sought to be derived from the criminalisation of rape within marriage. Moreover, in the Malawian context where rape remains an offence only men can commit against women, the current legal framework for marital rape perpetuates the societal misnomer that a married woman gives a once-off consent to sexual intercourse by virtue of marriage. This takes us back to the old common law position which many countries have moved away from. The present definition of marital rape under Malawian law also sits at odd with the nature of rape that is applicable to all other instances of non-consensual sexual intercourse. Consequently, the law fails to protect married women from unwanted sexual relations at the hands of their husbands. This paper critically examines the criminalisation of marital rape in Malawi. It commences with a historical account of the conceptualisation of rape and then looks at judgments that rejected the validity of marital rape. The discussion then moves to the debates that preceded the criminalisation of marital rape in Malawi and how the Law Commission reasoned to finally make a recommendation in its favour. Against this background, the paper analyses the legal framework for marital rape and what this means for the elements of the offence and defences that may be raised by an accused. In the final analysis, this contribution recommends that there is need to amend the definition of marital rape. Better still, the law should simply state that the fact of marriage is not a defence to a charge of rape, or, in other words, that there is no marital rape exemption. This would automatically mean that husbands are subjected to the same criminal law principles as their unmarried counterparts when it comes to non-consensual sexual intercourse with their wives.

Keywords: criminal law, gender, Malawi, marital rape, rape, sexual intercourse

Procedia PDF Downloads 364
304 Understanding the Life Experience of Middle Class Married Women Betrayal

Authors: Sara Sharifi Yazdi

Abstract:

The main purpose of this study is to find out about the reasons and the ways of middle-class married women betrayal via their living world. This is qualitative research, so deep semi-structured, episodic interview techniques and observation techniques were used to collect data; meanwhile, the basic theory method was used to analyze the data. The sample in this research includes 34 women with emotional and sexual relationships out of marriage. The results indicate that some set of conditions created the first spark of change in their opinions. These changes are empowered through both experiences of tolerance and exclusion, so strategies such as distance, compulsive tolerance, counteract, etc. have been used for reacting by the people in this study; besides some of the other consequences of betrayal which can be named are lack of comfort, feeling of deprivation, violence, labeling, guilty feelings of grief, and so on.

Keywords: living world, rejection, admission, betrayal, sexual relationship, marriage

Procedia PDF Downloads 147
303 Coping Resource Triad, Experiences of Filipina Wives in Japan

Authors: Maria Luisa T. Uayan

Abstract:

This study aims to describe the lived experiences of Filipina migrants married to Japanese and to discuss coping strategies that facilitates positive migration events. It utilizes a qualitative study design with focus group discussion which allows clear details on insights and perspectives based on migration process. The grounding of the coping resource triad is the unique finding of this study. It defines coping resource triad as a set of complex factors that relieves Filipina migrants of the stresses associated in migration and cross-cultural marriage. The results of the stress-coping experiences of Filipina migrants in Japan serves as basis for future studies on cross-cultural marriages and other deeper concerns associated with migration as well as in the formulation of relevant programs on acculturation.

Keywords: coping resource triad, migration, Filipina, cross-cultural marriage

Procedia PDF Downloads 474
302 Nurses as Being Participants of Sexual Health of Women

Authors: Malika Turganova, Aigul Abduldayeva

Abstract:

Modern conditions require nursing innovations at the primary ambulatory stage in the health system of Kazakhstan. There is a growing need for nurses involved in before-doctor attendance for preventive interview with a female population about reproductive health. We conducted questionnaire survey of the population of Astana in 2015. Questionnaires were drawn up according to the criteria of sexual health of World Health Organization. 3593 respondents out of 8000 questionnaires agreed to answer the questions anonymously, mM=±2,1. The average age of women comprised 37,4±11,2, Ме=31,7 years of age. Analysis of awareness about marriage hygiene revealed that 72,7% of respondents did not receive information about marriage hygiene and 89,1% respondents consider it more advisable before marriage. 45,9% of respondents specified the internet as a source of information on marriage hygiene issues, 24,5% of respondents pointed out friends, and 21,5% specified doctor. Comparing female age groups under and after 40 years old we see that proportion of cases when parents provide information about marriage hygiene issues comprises 4.3% (χ2 =9.8, p<0.05). The most important factor of preservation of women reproductive health is handling a problem of unwanted pregnancy. The responsibility lies equally in men and women. Data analysis of contraceptive methods by ranking showed three most frequently used methods: contraception sheath – 29.3%, then coitus interruptus – 18.7% and hormonal preparations – 16.9%. The most important factor of women's reproductive health preservation is a solving of the problem of unwanted pregnancy, and in this respect, the responsibility lies equally in men and women. Analyzing obtained data on contraceptive methods by ranking three of the most frequently used methods are condoms – 29,3%, then coitus interruptus – 18,7% and hormonal preparations – 16,9%. Additional oral survey of the population showed a low level of informational support of female population by family physicians, health care professionals of educational organizations (schools, universities, and colleges) about hormonal contraceptive. Females of both age groups used to think that hormonal contraceptives cause collateral damage such as blastoma, cancer, increased body weight, varix dilatation of lower limbs. Satisfaction with the frequency of sexual relations of the respondents comprised 57,6%. At that, women under 40 years of age are the most satisfied women among age groups (χ2 =5,8, p<0,05).

Keywords: nurse, public health service of Kazakhstan, reproductive and sexual health, trust of population

Procedia PDF Downloads 275
301 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning

Authors: Ali Kazemi

Abstract:

The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.

Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis

Procedia PDF Downloads 59
300 Power Relation, Symbolic Rules and the Position of Belis in the Habitus of the East Nusa Tenggara Society’s Customary Marriage

Authors: Siti Rodliyah, Andrik Purwasito, Bani Sudardi, Abdullah Wakit

Abstract:

This study employs sociological-ethnographic basic method and the cultural studies paradigm as the approach in understanding the habitus within the customary marriage of the East Nusa Tenggara society who require belis as a bride-price. The conceptual basis underlying the application of habitus theory and symbolic power in East Nusa Tenggara (NTT) society refers to the Bourdieu’s framework. This study is a result of participatory observation on habitus of a marital system using belis observed by the NTT society as a cognitive structure which connects individuals to the social activities of the customary marriage and makes it unquestionable habits. Knowledge of the social world under the pretext of prosperity for the recipients (family) of a bride-price can be a political instrument for the sustainability of power relations. The ritual-mythical system in the society has never been fully present as a neutral habit. The habitus reflected in the marital relationship among the NTT society enables the men to obtain and exercise their power relations. The sustainability of power relations can be seen from the representation of the social status of a girl and the properties attached to her. This is what gave birth to a symbolic rule, in which the social rules about bride-price or belis eventually will serve the interests of those who occupy a dominant position in the social structure, namely the rich men.

Keywords: belis, habitus, East Nusa Tenggara, marital system, power, symbolic

Procedia PDF Downloads 246
299 The Relationships Between Citizenship Acquisition and Ethnic Identity of Immigrant Women in Taiwan

Authors: Yuan-Yu Chiang, Yu-Han Tseng, Chin-Chen Wen

Abstract:

Many southeast-Asia women migrate to Taiwan by marriage, and it usually takes 4 to 8 years for them to acquire Taiwanese citizenship. This study investigates the relationships between their citizenship acquisition and whether they develop Taiwanese identities. One hundred and ninety-two immigrant women were measured using Multigroup Ethnic Identity Measure-Revised and a global 10-point ethnic identity question. Correlation tests and hierarchical regression were performed to explore whether acquiring citizenship would help immigrant women to develop Taiwanese identities. The results revealed that citizenship acquisition does help immigrant women to identify with Taiwanese society symbolically. However, the results also indicated that acquiring citizenship would not help these immigrant women become involved in deeper cultural exploration of Taiwan nor would it encourage them to make commitments to the host society.

Keywords: immigrants, international marriage, ethnic identity, Taiwan

Procedia PDF Downloads 418
298 IIROC's Enforcement Performance: Funnel in, Funnel out, and Funnel away

Authors: Mark Lokanan

Abstract:

The paper analyzes the processing of complaints against investment brokers and dealer members through the Investment Industry Regulatory Organization of Canada (IIROC) from 2008 to 2017. IIROC is the self-regulatory organization (SRO) that is responsible for policing investment dealers and brokerage firms that trade in Canada’s securities market. Data from the study came from IIROC's enforcement annual reports for the years examined. The case processing is evaluated base on the misconduct funnel that was originally designed for street crime and applies to the enforcement of investment fraud. The misconduct funnel is used as a framework to examine IIROC’s claim that it brought in more complaints (funnel in) than government regulators and shows how these complaints are funneled out and funneled away as they are processed through IIROC’s enforcement system. The results indicate that IIROC is ineffective in disciplining its members and is unable to handle the more serious quasi-criminal and improper sales practices offenses. It is hard not to see the results of the paper being used by the legislator in Ottawa to show the importance of a federal securities regulatory agency such as the Securities and Exchange Commission (SEC) in the United States.

Keywords: investment fraud, securities regulation, compliance, enforcement

Procedia PDF Downloads 161
297 O.MG- It’s a Cyber-Enabled Fraud

Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt

Abstract:

This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.

Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud

Procedia PDF Downloads 162
296 The 'Toshi-No-Sakon' Phenomenon: A Trend in Japanese Family Formations

Authors: Franco Lorenzo D. Morales

Abstract:

‘Toshi-no-sakon,’ which translates to as ‘age gap marriage,’ is a term that has been popularized by celebrity couples in the Japanese entertainment industry. Japan is distinct for a developed nation for its rapidly aging population, declining marital and fertility rates, and the reinforcement of traditional gender roles. Statistical data has shown that the average age of marriage in Japan is increasing every year, showing a growing tendency for late marriage. As a result, the government has been trying to curb the declining trends by encouraging marriage and childbirth among the populace. This graduate thesis seeks to analyze the ‘toshi-no-sakon’ phenomenon in lieu of Japan’s current economic and social situation, and to see what the implications are for these kinds of married couples. This research also seeks to expound more on age gaps within married couples, which is a factor rarely-touched upon in Japanese family studies. A literature review was first performed in order to provide a framework to study ‘toshi-no-sakon’ from the perspective of four fields of study—marriage, family, aging, and gender. Numerous anonymous online statements by ‘toshi-no-sakon’ couples were then collected and analyzed, which brought to light a number of concerns. Couples wherein the husband is the older partner were prioritized in order to narrow down the focus of the research, and ‘toshi-no-sakon’ is only considered when the couple’s age gap is ten years or more. Current findings suggest that one of the perceived merits for a woman to marry an older man is that financial security would be guaranteed. However, this has been shown to be untrue as a number of couples express concern regarding their financial situation, which could be attributed to their husband’s socio-economic status. Having an older husband who is approaching the age of retirement presents another dilemma as the wife would be more obliged to provide care for her aging husband. This notion of the wife being a caregiver likely stems from an arrangement once common in Japanese families in which the wife must primarily care for her husband’s elderly parents. Childbearing is another concern as couples would be pressured to have a child right away due to the age of the husband, in addition to limiting the couple’s ideal number of children. This is another problematic aspect as the husband would have to provide income until his child has finished their education, implying that retirement would have to be delayed indefinitely. It is highly recommended that future studies conduct face-to-face interviews with couples and families who fall under the category of ‘toshi-no-sakon’ in order to gain a more in-depth perspective into the phenomenon and to reveal any undiscovered trends. Cases wherein the wife is the older partner in the relationship should also be given focus in future studies involving ‘toshi-no-sakon’.

Keywords: age gap, family structure, gender roles, marriage trends

Procedia PDF Downloads 364
295 Dowry System and Gender Discrimination

Authors: Vanitha Dapparabail

Abstract:

Dowry is a system attached to Indian marriage system, it is practice of exchanging the goods and articles in a majority of Indian weddings. Although its practice became illegal in 1961, dowry flourishes among all social classes. Families of the bride and groom negotiate transfer of assets to the groom and his family in exchange for marrying the bride, often within the context of an arranged marriage. Dissatisfaction with the amount of dowry may result in abuse of the bride. In extreme cases “dowry deaths” or the murder of the bride by her husband and his family take place. This article conducts a feminist psychological analysis of the dowry phenomenon, its link to domestic violence against women, and the role of the perpetrators. Existing and new explanations of the dowry system and its ramifications are explored. Psychologically dowry system is greater mental stress for the Indian women and it is a really a part of gender discrimination. This part of the study can explore the amount of gender discrimination in Indian society.

Keywords: Dowry system, violence, gender discrimination, India

Procedia PDF Downloads 489
294 The Investigation on the Role of Colonial Judges in Protecting the Rights of Muslim Women to Dower and Divorce in British India: From the Period between 1800-1939

Authors: Sunil Tirkey

Abstract:

The colonial court records between 1800 to 1939 in India show the existence of excessive dower, which were usually paid at the dissolution of marriage to discourage divorce. Supporting this view of excessive dower as a useful device, Mitra Sharafi (legal historian of modern South Asia) argues that inflated dower and divorce law protected Muslim women against instant divorce, making it too expensive for husbands to use it. Further, according to her, British judges enhanced women’s rights to dower and divorce by pronouncing rulings in favour of a high amount of dower to protect the women against the one-sided authority of men to divorce. Contrary to the view of Sharafi, this paper will argue that inflated dower did not protect the rights of women against instant divorce and undesirable marriage, and British judges did not really work to better the lives of Muslim women. To prove so, we shall firstly argue from the court cases that it was challenging for women to prove divorce on the husbands’ denial of divorce in order to avoid the payment of dower. Secondly, it was almost impossible for women to get rid of their undesirable marriage, as divorce was impartially dependent on their husbands. Thirdly, Muslim women were often deprived of their unpaid prompt dower due to the rigorous application of colonial law of limitation by British judges. Furthermore, the abolition of the office of Muslim legal experts from the colonial courts in 1864 deprived Muslim women not only to avail the interpretation of Islamic law but to benefit from the diversity and flexibility of Islamic law in obtaining their right to dower and divorce.

Keywords: courts, divorce, inflated dower, Islamic law, women’s rights

Procedia PDF Downloads 123
293 Practical Survival Strategies among Undocumented and Documented Brazilian Immigrants in Europe: A Comparative Study in Milan and London

Authors: Edmar Jose da Rocha

Abstract:

This paper is a study on Brazilian irregular migrants living and working in two global cities in Europe, Milan and London. The aim of the journal is to show out why Brazilian choose irregular migration to Milan and London as a strategy. Few studies in Europe have focused on groups coming from the same place of origin and residing in different cities in comparative studies. It is this international comparison that makes this research original. Both in London and Milan there is an economic migration. The reasons showed to migrate to Milan were marriage, citizenship and work. The reasons indicated to migrate to London were work, studies and a better life. In London marriage is a channel for regularisation and citizenship. In both countries, fake documents is a channel for undocumented people to get a job and health care.

Keywords: border, immigration, integration, survival strategies, undocumented, regularisation

Procedia PDF Downloads 319
292 Adjustment of Parents of Children with Autism: A Multivariate Model

Authors: Ayelet Siman-Tov, Shlomo Kaniel

Abstract:

Objectives: The research validates a multivariate model that predicts parental adjustment to coping successfully with an autistic child. The model comprises four elements: parental stress, parental resources, parental adjustment and the child's autism symptoms. Background and aims: The purpose of the current study is the construction and validation of a model for the adjustment of parents and a child with autism. The suggested model is based on theoretical views on stress and links personal resources, stress, perception, parental mental health and quality of marriage and child adjustment with autism. The family stress approach focuses on the family as a system made up of a dynamic interaction between its members, who constitute interdependent parts of the system, and thus, a change in one family member brings about changes in the processes of the entire family system. From this perspective, a rise of new demands in the family and stress in the role of one family member affects the family system as a whole. Materials and methods: 176 parents of children aged between 6 to 16 diagnosed with ASD answered several questionnaires measuring parental stress, personal resources (sense of coherence, locus of control, social support), adjustment (mental health and marriage quality) and the child's autism symptoms. Results: Path analysis showed that a sense of coherence, internal locus of control, social support and quality of marriage increase the ability to cope with the stress of parenting an autistic child. Directions for further research are suggested.

Keywords: stress, adjustment, resources, Autism, parents, coherence

Procedia PDF Downloads 140
291 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 366