Search results for: digital crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3202

Search results for: digital crime

3082 Organized Crime-A Social Challenge for Kosovo towards European Union Integration

Authors: Samedin Mehmeti

Abstract:

Very tens political and economic situation, in particular armed conflicts that followed at the time of the destruction of the former Yugoslavia, influenced migrations and displacement of population. Especially setting international sanctions and embargo influenced the creation of organized criminal groups. A lot of members of the former Yugoslav security apparatus in collaboration with ordinary criminal groups engaged in: smuggling of goods, petroleum and arms, sale and transport of drugs, payable murder, damage to public property, kidnappings, extortion, racketeering, etc. This tradition of criminality, of course in other forms and with other methods, has continued after conflicts and continues with a high intensity even in nowadays. One of the most delicate problems of organized crime activity is the impact on the economic sphere, where organized crime opposes and severely damages national security and economy to criminalize it in certain sectors and directions. Organized crime groups including who find Kosovo as a place to develop their criminal activities are characterized by: loyalty of many people especially through family connections and kinship in carrying out criminal activities and the existence of powerful hierarchy of leadership which in many cases include the corrupt officials of state apparatus. Groups have clear hierarchy and flexible structure of command, each member within the criminal group knows his duties concrete. According to statistics presented in police reports its notable that Kosovo has a large number of cases of organized crime, cultivation, trafficking and possession of narcotics. As already is very well known that one of the primary conditions that must be fulfilled on track toward integration in the European Union is precisely to prevent and combat organized crime. Kosovo has serious problems with prosecutorial and judicial system. But the misuse of public funds, even those coming directly from EU budget or the budget of the European Union member states, have a negative impact on this process. The economic crisis that has gripped some of the EU countries has led to the creation of an environment in which there are far fewer resources and opportunities to invest in preventing and combating organized crime within member states. This automatically reduces the level of financial support for other countries in the fight against organized crime. Kosovo as a poor country, now has less likely benefiting from the support tools that will be eventually offered by Europe set of in this area.

Keywords: police, european integration, organized crime, narcotics

Procedia PDF Downloads 440
3081 Role of Digital Economy in the Emerging Countries Like Nigeria

Authors: Aminu Fagge Muhammad

Abstract:

The digital economy is fast becoming the most innovative and widest reaching economy in the world, especially in developing countries. The paper aimed at examining role of digital economy in the emerging countries like Nigeria. The methodology used in the study is Business Model Perspective: lying between the process and structural perspectives, bring in the idea of the new business models that are being enabled e.g. e-business or e-commerce. The paper concluded that, the policy objectives and measures, and processes and structures necessary to enhance digital economy growth and its contribution to socio-economic development. The finding reveals that, digital infrastructure is in part incomplete, costly and poorly-performing in emerging economies like Nigeria. The wider digital ecosystem suffers a shortfall in human capabilities, weak financing, and poor governance. It is also found that, Growth in the digital economy is exacerbating digital exclusion, inequality, adverse incorporation and other digital harms. It is recommended that, government in partnership with private sector should build strong local infrastructure to enable broadband availability and accessibility and to create an enabling environment for strong competition in the telecom and technology ecosystem.

Keywords: Digital Economy, Emerging Countries, Business Model , Nigeria

Procedia PDF Downloads 127
3080 Refuge(e)s in Digital Diaspora: Reimagining and Reimaging ‘Ethnically Cleansed’ Villages as ‘Cyber Villages’

Authors: Hariz Halilovich

Abstract:

Based on conventional and digital ethnography, this paper discusses the ways Bosnian refugees utilise digital technologies and new media to recreate, synchronise and sustain their identities and memories in the aftermath of ‘ethnic cleansing’ and genocide and in the contexts of their new emplacements and home-making practices in diaspora. In addition to discussing representations of displacement and emplacement in the ‘digital age’, the paper also aims to make a contribution to the understanding and application of digital ethnography as an emerging method of inquiry in anthropology and related social science disciplines. While some researchers see digital ethnography as an exclusively online–based research, the author of this paper argues that it is critical to understand the online world in the context of the real world—made of real people, places, and social relations.

Keywords: Bosnia, cyber villages, digital diaspora, refugees

Procedia PDF Downloads 242
3079 Quantifying the Second-Level Digital Divide on Sub-National Level with a Composite Index

Authors: Vladimir Korovkin, Albert Park, Evgeny Kaganer

Abstract:

The paper studies the second-level digital divide (the one defined by the way how digital technology is used in everyday life) between regions of the Russian Federation. The paper offers a systemic review of literature on the measurement of the digital divide; based upon this it suggests a composite Digital Life Index, that captures the complex multi-dimensional character of the phenomenon. The model of the index studies separately the digital supply and demand across seven independent dimensions providing for 14 subindices. The Index is based on Internet-borne data, a distinction from traditional research approaches that rely on official statistics or surveys. Regression analysis is used to determine the relative importance of factors like income, human capital, and policy in determining the digital divide. The result of the analysis suggests that the digital divide is driven more by the differences in demand (defined by consumer competencies) than in supply; the role of income is insignificant, and the quality of human capital is the key determinant of the divide. The paper advances the existing methodological literature on the issue and can also inform practical decision-making regarding the strategies of national and regional digital development.

Keywords: digital transformation, second-level digital divide, composite index, digital policy, regional development, Russia

Procedia PDF Downloads 186
3078 Two-Dimensional Symmetric Half-Plane Recursive Doubly Complementary Digital Lattice Filters

Authors: Ju-Hong Lee, Chong-Jia Ciou, Yuan-Hau Yang

Abstract:

This paper deals with the problem of two-dimensional (2-D) recursive doubly complementary (DC) digital filter design. We present a structure of 2-D recursive DC filters by using 2-D symmetric half-plane (SHP) recursive digital all-pass lattice filters (DALFs). The novelty of using 2-D SHP recursive DALFs to construct a 2-D recursive DC digital lattice filter is that the resulting 2-D SHP recursive DC digital lattice filter provides better performance than the existing 2-D SHP recursive DC digital filter. Moreover, the proposed structure possesses a favorable 2-D DC half-band (DC-HB) property that allows about half of the 2-D SHP recursive DALF’s coefficients to be zero. This leads to considerable savings in computational burden for implementation. To ensure the stability of a designed 2-D SHP recursive DC digital lattice filter, some necessary constraints on the phase of the 2-D SHP recursive DALF during the design process are presented. Design of a 2-D diamond-shape decimation/interpolation filter is presented for illustration and comparison.

Keywords: all-pass digital filter, doubly complementary, lattice structure, symmetric half-plane digital filter, sampling rate conversion

Procedia PDF Downloads 437
3077 Investigating Homicide Offender Typologies Based on Their Clinical Histories and Crime Scene Behaviour Patterns

Authors: Valeria Abreu Minero, Edward Barker, Hannah Dickson, Francois Husson, Sandra Flynn, Jennifer Shaw

Abstract:

Purpose – The purpose of this paper is to identify offender typologies based on aspects of the offenders’ psychopathology and their associations with crime scene behaviours using data derived from the National Confidential Enquiry into Suicide and Safety in Mental Health concerning homicides in England and Wales committed by offenders in contact with mental health services in the year preceding the offence (n=759). Design/methodology/approach – The authors used multiple correspondence analysis to investigate the interrelationships between the variables and hierarchical agglomerative clustering to identify offender typologies. Variables describing: the offender’s mental health history; the offenders’ mental state at the time of offence; characteristics useful for police investigations; and patterns of crime scene behaviours were included. Findings – Results showed differences in the offender’s histories in relation to their crime scene behaviours. Further, analyses revealed three homicide typologies: externalising, psychosis and depression. Analyses revealed three homicide typologies: externalising, psychotic and depressive. Practical implications – These typologies may assist the police during homicide investigations by: furthering their understanding of the crime or likely suspect; offering insights into crime patterns; provide advice as to what an offender’s offence behaviour might signify about his/her mental health background; findings suggest information concerning offender psychopathology may be useful for offender profiling purposes in cases of homicide offenders with schizophrenia, depression and comorbid diagnosis of personality disorder and alcohol/drug dependence. Originality/value – Empirical studies with an emphasis on offender profiling have almost exclusively focussed on the inference of offender demographic characteristics. This study provides a first step in the exploration of offender psychopathology and its integration to the multivariate analysis of offence information for the purposes of investigative profiling of homicide by identifying the dominant patterns of mental illness within homicidal behaviour.

Keywords: offender profiling, mental illness, psychopathology, multivariate analysis, homicide, crime scene analysis, crime scene behviours, investigative advice

Procedia PDF Downloads 129
3076 The Active Subject and the Victim of Trafficking in Human Beings: Material and Procedural Criminal Law Approaches

Authors: Andrei Nastas, Sergiu Cernomopret

Abstract:

This research addresses trafficking in human beings, in terms of the active subject and the victim of this crime, through the prism of national and international regulations in material and procedural criminal matters. For the correlative approach of both mentioned aspects, the active subject and the victim of trafficking in human beings, the research addresses both its constituent elements and the way to prevent and combat this phenomenon through criminal proceedings. As follows, trafficking in human beings, from a material criminal point of view, involves two subjects of this crime (active subject - offender and passive subject - victim), while their procedural status differs depending on the case (victim or injured party). The result of the research highlights some clarifications, which find a theoretical-practical basis in the legal provisions, the specialized doctrine, and the judicial practice.

Keywords: victim, active subject, abuse, injured party, crime

Procedia PDF Downloads 130
3075 The Instrumentalization of Digital Media in the Context of Sexualized Violence

Authors: Katharina Kargel, Frederic Vobbe

Abstract:

Sexual online grooming is generally defined as digital interactions for the purpose of sexual exploitation of children or minors, i.e. as a process for preparing and framing sexual child abuse. Due to its conceptual history, sexual online grooming is often associated with perpetrators who are previously unknown to those affected. While the strategies of perpetrators and the perception of those affected are increasingly being investigated, the instrumentalisation of digital media has not yet been researched much. Therefore, the present paper aims at contributing to this research gap by examining in what kind of ways perpetrators instrumentalise digital media. Our analyses draw on 46 case documentations and 18 interviews with those affected. The cases and the partly narrative interviews were collected by ten cooperating specialist centers working on sexualized violence in childhood and youth. For this purpose, we designed a documentation grid allowing for a detailed case reconstruction i.e. including information on the violence, digital media use and those affected. By using Reflexive Grounded Theory, our analyses emphasize a) the subjective benchmark of professional practitioners as well as those affected and b) the interpretative implications resulting from our researchers’ subjective and emotional interaction with the data material. It should first be noted that sexualized online grooming can result in both online and offline sexualized violence as well as hybrid forms. Furthermore, the perpetrators either come from the immediate social environment of those affected or are unknown to them. The perpetrator-victim relationship plays a more important role with regard to the question of the instrumentalisation of digital media than the question of the space (on vs. off) in which the primary violence is committed. Perpetrators unknown to those affected instrumentalise digital media primarily to establish a sexualized system of norms, which is usually embedded in a supposed love relationship. In some cases, after an initial exchange of sexualized images or video recordings, a latent play on the position of power takes place. In the course of the grooming process, perpetrators from the immediate social environment increasingly instrumentalise digital media to establish an explicit relationship of power and dependence, which is directly determined by coercion, threats and blackmail. The knowledge of possible vulnerabilities is strategically used in the course of maintaining contact. The above explanations lead to the conclusion that the motive for the crime plays an essential role in the question of the instrumentalisation of digital media. It is therefore not surprising that it is mostly the near-field perpetrators without commercial motives who initiate a spiral of violence and stress by digitally distributing sexualized (violent) images and video recordings within the reference system of those affected.

Keywords: sexualized violence, children and youth, grooming, offender strategies, digital media

Procedia PDF Downloads 183
3074 Mapping the Potential and Development Strategy of Digital Economy in Indonesia

Authors: Jordan Putra Cahyono, Tiara Ayu Kusumaningtyas, Mohtar Rasyid

Abstract:

This article aims to map the potential and strategy of digital economy develop-ment in Indonesia by using literature study and secondary data analysis. In the Indonesian context, the digital economy is attracting attention, especially amid the COVID-19 pandemic, which has brought substantial changes in economic activi-ties. This research aims to provide new insights into the potential and develop-ment strategies of the digital economy in Indonesia. This article also evaluates the effectiveness and efficiency of digital economic development strategies imple-mented in Indonesia. A literature review concluded that Indonesia has great po-tential to develop the digital economy with favorable conditions, including a large population, improved ICT infrastructure, and relatively liberalized regulations. Using qualitative and quantitative approaches, this research covers the subject of the potential and strategies for developing a digital economy in Indonesia. This article presents the research results, which are then discussed in the context of the potential and strategy of digital economy development in Indonesia. This article is expected to contribute to understanding Indonesia's digital economy and stimulate further discussion to formulate a robust development strategy and appropriate regulatory framework.

Keywords: indonesia's digital economy, ICT infrastructure, development strategy, potential

Procedia PDF Downloads 60
3073 Mastering Digitization: A Quality-Adapted Digital Transformation Model

Authors: Franziska Schaefer, Marlene Kuhn, Heiner Otten

Abstract:

In the very near future, digitization will be the main challenge a company has to master to survive in a highly competitive market. Developing the right transformation strategy by considering all relevant aspects determines the success or failure of a company. Especially the digital focus on the customer plays a key role in creating sustainable competitive advantages, also leading to new tasks within the quality management. Therefore, quality management needs to be particularly addressed to support the upcoming digital change. In this paper, we present an analysis of existing digital transformation approaches and derive a transformation strategy from a quality management perspective. We identify and classify different transformation dimensions and assess their relevance to quality management tasks, resulting in a quality-adapted digital transformation model. Furthermore, we introduce applicable and customized quality management methods to support the presented digital transformation tasks. With our developed model we provide a digital transformation guideline from a quality perspective to master future disruptive changes.

Keywords: digital transformation, digitization, quality management, strategy

Procedia PDF Downloads 478
3072 Digital Activism and the Individual: A Utilitarian Perspective

Authors: Tania Mitra

Abstract:

Digital Activism or Cyber Activism uses digital media as a means to disseminate information and mobilize masses towards a specific goal. When digital activism was first born in the early 1990s, it was primarily used by groups of organized political activists. However, with the advent of social media, online activism has filtered down to the individual- one who does not necessarily belong to or identify with an agenda, group, or political party. A large part of digital activism today stems from the individual’s notion of what is right and wrong. This gives rise to a discourse around descriptive ethics and the implications of the independent digital activist. Although digital activism has paved the way for and bolstered support for causes like the MeToo Movement and Black Lives Matter, the lack of a unified, organized body has led to counterintuitive progressions and suspicions regarding the movements. The paper introduces the ideas of 'clout' culture, click baits, and clicktivism (the phenomenon where activism is reduced to a blind following of the online trends), to discuss the impacts of exclusive digital activism. By using Jeremy Bentham's utilitarian approach to ethics, that places emphasis on the best possible outcome for a society, the paper will show how individual online activism reaching for a larger, more common end can sometimes lead to an undermining of that end, not only in the online space but also how it manifests in the real world.

Keywords: digital activism, ethics, independent digital activist, utilitarianism

Procedia PDF Downloads 125
3071 Statistical Models and Time Series Forecasting on Crime Data in Nepal

Authors: Dila Ram Bhandari

Abstract:

Throughout the 20th century, new governments were created where identities such as ethnic, religious, linguistic, caste, communal, tribal, and others played a part in the development of constitutions and the legal system of victim and criminal justice. Acute issues with extremism, poverty, environmental degradation, cybercrimes, human rights violations, crime against, and victimization of both individuals and groups have recently plagued South Asian nations. Everyday massive number of crimes are steadfast, these frequent crimes have made the lives of common citizens restless. Crimes are one of the major threats to society and also for civilization. Crime is a bone of contention that can create a societal disturbance. The old-style crime solving practices are unable to live up to the requirement of existing crime situations. Crime analysis is one of the most important activities of the majority of intelligent and law enforcement organizations all over the world. The South Asia region lacks such a regional coordination mechanism, unlike central Asia of Asia Pacific regions, to facilitate criminal intelligence sharing and operational coordination related to organized crime, including illicit drug trafficking and money laundering. There have been numerous conversations in recent years about using data mining technology to combat crime and terrorism. The Data Detective program from Sentient as a software company, uses data mining techniques to support the police (Sentient, 2017). The goals of this internship are to test out several predictive model solutions and choose the most effective and promising one. First, extensive literature reviews on data mining, crime analysis, and crime data mining were conducted. Sentient offered a 7-year archive of crime statistics that were daily aggregated to produce a univariate dataset. Moreover, a daily incidence type aggregation was performed to produce a multivariate dataset. Each solution's forecast period lasted seven days. Statistical models and neural network models were the two main groups into which the experiments were split. For the crime data, neural networks fared better than statistical models. This study gives a general review of the applied statistics and neural network models. A detailed image of each model's performance on the available data and generalizability is provided by a comparative analysis of all the models on a comparable dataset. Obviously, the studies demonstrated that, in comparison to other models, Gated Recurrent Units (GRU) produced greater prediction. The crime records of 2005-2019 which was collected from Nepal Police headquarter and analysed by R programming. In conclusion, gated recurrent unit implementation could give benefit to police in predicting crime. Hence, time series analysis using GRU could be a prospective additional feature in Data Detective.

Keywords: time series analysis, forecasting, ARIMA, machine learning

Procedia PDF Downloads 164
3070 Development of a Tesla Music Coil from Signal Processing

Authors: Samaniego Campoverde José Enrique, Rosero Muñoz Jorge Enrique, Luzcando Narea Lorena Elizabeth

Abstract:

This paper presents a practical and theoretical model for the operation of the Tesla coil using digital signal processing. The research is based on the analysis of ten scientific papers exploring the development and operation of the Tesla coil. Starting from the Testa coil, several modifications were carried out on the Tesla coil, with the aim of amplifying the digital signal by making use of digital signal processing. To achieve this, an amplifier with a transistor and digital filters provided by MATLAB software were used, which were chosen according to the characteristics of the signals in question.

Keywords: tesla coil, digital signal process, equalizer, graphical environment

Procedia PDF Downloads 117
3069 Digital Innovation and Business Transformation

Authors: Bisola Stella Sonde

Abstract:

Digital innovation has emerged as a pivotal driver of business transformation in the contemporary landscape. This case study research explores the dynamic interplay between digital innovation and the profound metamorphosis of businesses across industries. It delves into the multifaceted dimensions of digital innovation, elucidating its impact on organizational structures, customer experiences, and operational paradigms. The study investigates real-world instances of businesses harnessing digital technologies to enhance their competitiveness, agility, and sustainability. It scrutinizes the strategic adoption of digital platforms, data analytics, artificial intelligence, and emerging technologies as catalysts for transformative change. The cases encompass a diverse spectrum of industries, spanning from traditional enterprises to disruptive startups, offering insights into the universal relevance of digital innovation. Moreover, the research scrutinizes the challenges and opportunities posed by the digital era, shedding light on the intricacies of managing cultural shifts, data privacy, and cybersecurity concerns in the pursuit of innovation. It unveils the strategies that organizations employ to adapt, thrive, and lead in the era of digital disruption. In summary, this case study research underscores the imperative of embracing digital innovation as a cornerstone of business transformation. It offers a comprehensive exploration of the contemporary digital landscape, offering valuable lessons for organizations striving to navigate the ever-evolving terrain of the digital age.

Keywords: business transformation, digital innovation, emerging technologies, organizational structures

Procedia PDF Downloads 60
3068 Male Versatile Sexual Offenders in Taiwan

Authors: Huang Yueh Chen, Sheng Ang Shen

Abstract:

Purpose: Sexual assault has always been a highly anticipated crime in Taiwan. People assume that the career of sexual offenders tends to be highly specialized. This study hopes to analyze the crime career and risk factors of offenders by means of another classification. Methods: A total of 145 sexual offenders were sentenced on the parole or expiration date from 2009 to 2011, through analysis of official existing documents such as ‘Re-infringement risk assessment report’ and ‘case assessment report’. Results: The section ‘Various Types of Crimes ‘ of criminal career is analyzed. The highest number of ‘ versatile sexual offender’ followed by ‘adult sexual offender’ is about 2.5, representing more than 1.5 kinds of non-sex crimes besides sexual crimes. Different specialized sexual offenders have had extensive experience in the ‘Sexual Assault Experiences in Children and School’, ‘Static 99 Levels’, ‘Pre-Commuted Substance Use’, ‘Excited Deviant Sexual Behavior’, ‘Various Types of Crimes,’ and ‘Sexual Crime in Forerunner’ , ‘Type of Index Crime’ and other projects to achieve significant differences. Conclusions: Resources continue to be devoted to specialized offenders, the character of first-time sexual offender depends on further research and makes the public aware of the different assumptions of diversified offenders from traditional professional offenses that reduce unnecessary panic in society.

Keywords: versatile sexual offender, specialized sexual offender, criminal career, risk factor

Procedia PDF Downloads 166
3067 Lifelong Learning and Digital Literacies in Language Learning

Authors: Selma Karabinar

Abstract:

Lifelong learning can be described as a system where learning takes place for a person over the course of a lifespan and comprises formal, non-formal and informal learning to achieve the maximum possible improvement in personal, social, and vocational life. 21st century is marked with the digital technologies and people need to learn and adapt to new literacies as part of their lifelong learning. Our current knowledge gap brings to mind several questions: Do people with digital mindsets have different assumptions about affordances of digital technologies? How do digital mindsets lead language learners use digital technologies within and beyond classrooms? Does digital literacies have different significance for the learners? The presentation is based on a study attempted to answer these questions and show the relationship between lifelong learning and digital literacies. The study was conducted with learners of English language at a state university in Istanbul. The quantitative data in terms of participants' lifelong learning perception was collected through a lifelong learning scale from 150 students. Then 5 students with high and 5 with low lifelong learning perception were interviewed. They were questioned about their personal sense of agency in lifelong learning and how they use digital technologies in their language learning. Therefore, the qualitative data was analyzed in terms of their knowledge about digital literacies and actual use of it in their personal and educational life. The results of the study suggest why teaching new literacies are important for lifelong learning and also suggests implications for language teachers' education and language pedagogy.

Keywords: digital mindsets, language learning, lifelong learning, new literacies

Procedia PDF Downloads 381
3066 A Closer Look on Economic and Fiscal Incentives for Digital TV Industry

Authors: Yunita Anwar, Maya Safira Dewi

Abstract:

With the increasing importance on digital TV industry, there must be several incentives given to support the growth of the industry. Prior research have found mixed findings of economic and fiscal incentives to economic growth, which means these incentives do not necessarily boost the economic growth while providing support to a particular industry. Focusing on a setting of digital TV transition in Indonesia, this research will conduct document analysis to analyze incentives have been given in other country and incentives currently available in Indonesia. Our results recommend that VAT exemption and local tax incentives could be considered to be added to the incentives list available for digital TV industry.

Keywords: Digital TV transition, Economic Incentives, Fiscal Incentives, Policy.

Procedia PDF Downloads 324
3065 Digital Literacy Landscape of Islamic Boarding Schools in Indonesia

Authors: Zainuddin Abuhamid Muhammad Ghozali, Andrew Whitworth

Abstract:

Islamic boarding school or pesantren is a distinctive education institution in Indonesia focusing on religious teachings. Its stance in restricting access to the internet raises a question about its students’ development of digital literacy. Inspired by Luckin’s ecology of resource model, this study aims to map out the digital literacy situation of the institution based on the availability of learning resources, such as digital facilities, digital accessibility, and digital competence. This study was carried out through a survey method involving 50 teachers from pesantrens across the nation. The result shows that pesantrens have provided students with digital facilities at a moderate level, yet the accessibility to using them is still limited. They also incorporated digital competencies into their curriculum, with an emphasis on digital ethics. The study also identifies different patterns of pesantrens’ behavior based on types and educational levels, where certain school types and educational levels tend to give a stricter policy compared to others or vice versa. The restriction of digital resources in pesantren indicated that they had done a filtration process to design their learning environment. The filtration was mainly motivated by sociocultural factors, where they drew concern for the negative impact of the internet. Notably, this restriction also contributes to students’ poor development of digital literacy.

Keywords: digital literacy, ecology of resources, Indonesia, Islamic boarding school

Procedia PDF Downloads 71
3064 Digital Recording System Identification Based on Audio File

Authors: Michel Kulhandjian, Dimitris A. Pados

Abstract:

The objective of this work is to develop a theoretical framework for reliable digital recording system identification from digital audio files alone, for forensic purposes. A digital recording system consists of a microphone and a digital sound processing card. We view the cascade as a system of unknown transfer function. We expect same manufacturer and model microphone-sound card combinations to have very similar/near identical transfer functions, bar any unique manufacturing defect. Input voice (or other) signals are modeled as non-stationary processes. The technical problem under consideration becomes blind deconvolution with non-stationary inputs as it manifests itself in the specific application of digital audio recording equipment classification.

Keywords: blind system identification, audio fingerprinting, blind deconvolution, blind dereverberation

Procedia PDF Downloads 304
3063 Filling the Gap of Extraction of Digital Evidence from Emerging Platforms Without Forensics Tools

Authors: Yi Anson Lam, Siu Ming Yiu, Kam Pui Chow

Abstract:

Digital evidence has been tendering to courts at an exponential rate in recent years. As an industrial practice, most digital evidence is extracted and preserved using specialized and well-accepted forensics tools. On the other hand, the advancement in technologies enables the creation of quite a few emerging platforms such as Telegram, Signal etc. Existing (well-accepted) forensics tools were not designed to extract evidence from these emerging platforms. While new forensics tools require a significant amount of time and effort to be developed and verified, this paper tries to address how to fill this gap using quick-fix alternative methods for digital evidence collection (e.g., based on APIs provided by Apps) and discuss issues related to the admissibility of this evidence to courts with support from international courts’ stance and the circumstances of accepting digital evidence using these proposed alternatives.

Keywords: extraction, digital evidence, laws, investigation

Procedia PDF Downloads 67
3062 Oath Taking-An Approach to Combating Criminality: Challenges and Implication to the Victim Centered Approach in Human Trafficking

Authors: Faith G. Ehiemua, Chandra E. Ulinfun

Abstract:

This work presents two approaches that use competing models to combat criminality in human trafficking. It argues that oath-taking is an approach used to combat and repress crime by natives of African descent. Therefore, certain value choices reflected explicitly or implicitly in its habitual functioning are features of crime control, a model of the criminal process used to repress and prevent crime. By pitting the approaches against each other, the work examines the utility of the purpose of each approach with the aim of assessing moral worthiness. The approaches adopted are descriptive, normative, and theoretical. The findings reveal that oath-taking is effective in human trafficking mainly because Africans believe that the African traditional system is efficient. However, the utilitarian ethical theory applied to the use of oath-taking in human trafficking shows oath-taking as protecting the interest of human traffickers against the general good of society.

Keywords: human rights, human trafficking, oath taking, utilitarianism, victim-centered approach

Procedia PDF Downloads 216
3061 Toward Digital Maturity : Empowering Small Medium Enterprise in Sleman Yogyakarta Indonesia toward Sustainable Tourism and Creative Economy Development

Authors: Cornellia Ayu, Putrianti Herni, Saptoto Robertus

Abstract:

In the context of global tourism and creative economies, digital maturity has become a crucial factor for the sustainable development of small and medium enterprises (SMEs). This paper explores the journey toward digital maturity among SMEs in Sleman, Yogyakarta, Indonesia, focusing on their empowerment to foster sustainable tourism and creative economy growth. The study adopts a mixed-methods approach, integrating qualitative interviews with SME owners and quantitative surveys to assess their digital capabilities and readiness. Data were collected from a diverse sample of SMEs engaged in various sectors, including crafts and culinary services. Findings reveal significant gaps in digital literacy and infrastructure, impeding the full realization of digital benefits. However, targeted interventions, such as digital training programs and the provision of affordable technology, have shown promise in bridging these gaps. The study concludes that enhancing digital maturity among SMEs is vital for their competitiveness and sustainability in the modern economy. The insights gained can inform policymakers and stakeholders aiming to bolster the digital transformation of SMEs in similar contexts.

Keywords: digital maturity, small medium enterprises, digital literacy, sustainable tourism, creative economy

Procedia PDF Downloads 48
3060 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom

Authors: Chih-Ping Chang

Abstract:

Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.

Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner

Procedia PDF Downloads 290
3059 Implementation of Invisible Digital Watermarking

Authors: V. Monisha, D. Sindhuja, M. Sowmiya

Abstract:

Over the decade, the applications about multimedia have been developed rapidly. The advancement in the communication field at the faster pace, it is necessary to protect the data during transmission. Thus, security of multimedia contents becomes a vital issue, and it is a need for protecting the digital content against malfunctions. Digital watermarking becomes the solution for the copyright protection and authentication of data in the network. In multimedia applications, embedded watermarks should be robust, and imperceptible. For improving robustness, the discrete wavelet transform is used. Both encoding and extraction algorithm can be done using MATLAB R2012a. In this Discrete wavelet transform (DWT) domain of digital image, watermarking algorithm is used, and hardware implementation can be done on Xilinx based FPGA.

Keywords: digital watermarking, DWT, robustness, FPGA

Procedia PDF Downloads 413
3058 Development of a Serial Signal Monitoring Program for Educational Purposes

Authors: Jungho Moon, Lae-Jeong Park

Abstract:

This paper introduces a signal monitoring program developed with a view to helping electrical engineering students get familiar with sensors with digital output. Because the output of digital sensors cannot be simply monitored by a measuring instrument such as an oscilloscope, students tend to have a hard time dealing with digital sensors. The monitoring program runs on a PC and communicates with an MCU that reads the output of digital sensors via an asynchronous communication interface. Receiving the sensor data from the MCU, the monitoring program shows time and/or frequency domain plots of the data in real time. In addition, the monitoring program provides a serial terminal that enables the user to exchange text information with the MCU while the received data is plotted. The user can easily observe the output of digital sensors and configure the digital sensors in real time, which helps students who do not have enough experiences with digital sensors. Though the monitoring program was programmed in the Matlab programming language, it runs without the Matlab since it was compiled as a standalone executable.

Keywords: digital sensor, MATLAB, MCU, signal monitoring program

Procedia PDF Downloads 496
3057 Towards an Analysis of Rhetoric of Digital Arabic Discourse

Authors: Gameel Abdelmageed

Abstract:

Arabs have a rhetorical heritage which has greatly contributed to the monitoring and analyzing of the rhetoric of the Holy Quran, Hadith, and Arabic texts on poetry and oratory. But Arab scholars - as far as the researcher knows – have not contributed to monitoring and analyzing the rhetoric of digital Arabic discourse although it has prominence, particularly in social media and has strong effectiveness in the political and social life of Arab society. This discourse has made its impact by using very new rhetorical techniques in language, voice, image, painting and video clips which are known as “Multimedia” and belong to “Digital Rhetoric”. This study suggests that it is time to draw the attention of Arab scholars and invite them to monitor and analyze the rhetoric of digital Arabic discourse.

Keywords: digital discourse, digital rhetoric, Facebook, social media

Procedia PDF Downloads 372
3056 Digital Self-Care Intervention Evaluation from the Perspective of Healthcare Users

Authors: Dina Ziadlou, Anthony Sunjaya, Joyzen Cortez Ramos, Romario Muñoz Ramos, Richard Dasselaar

Abstract:

This study aimed to evaluate the opinions of users using digital health technologies to prevent, promote, and maintain their health and well-being with or without the support of a healthcare provider to delineate an overview of the future patient journey while considering the strategic initiatives in the digital transformation era. This research collected the opinions of healthcare clients through a structural questionnaire to collect user accessibility, user knowledge, user experience, user engagement, and personalized medicine to investigate the mindset of the users and illustrate their opinions, expectations, needs, and voices about digital self-care expansion. In the realm of digital transformation, the accessibility of users to the internet, digital health platforms, tools, and mobile health applications have revolutionized the healthcare ecosystem toward nurturing informed and empowered patients who are tech-savvy and can take the initiative to be in charge of their health, involved in medical decision-making, and seek digital health innovations to prevent diseases and promote their healthy lifestyles. Therefore, the future of the patient journey is digital self-care intervention in a healthcare ecosystem where the partnership of patients in healthcare services is tied to their health information and action ownership.

Keywords: digital health, patient engagement, self-care intervention, digital self-care intervention, digital transformation

Procedia PDF Downloads 36
3055 Solving Crimes through DNA Methylation Analysis

Authors: Ajay Kumar Rana

Abstract:

Predicting human behaviour, discerning monozygotic twins or left over remnant tissues/fluids of a single human source remains a big challenge in forensic science. Recent advances in the field of DNA methylations which are broadly chemical hallmarks in response to environmental factors can certainly help to identify and discriminate various single-source DNA samples collected from the crime scenes. In this review, cytosine methylation of DNA has been methodologically discussed with its broad applications in many challenging forensic issues like body fluid identification, race/ethnicity identification, monozygotic twins dilemma, addiction or behavioural prediction, age prediction, or even authenticity of the human DNA. With the advent of next-generation sequencing techniques, blooming of DNA methylation datasets and together with standard molecular protocols, the prospect of investigating and solving the above issues and extracting the exact nature of the truth for reconstructing the crime scene events would be undoubtedly helpful in defending and solving the critical crime cases.

Keywords: DNA methylation, differentially methylated regions, human identification, forensics

Procedia PDF Downloads 320
3054 Hedonistic Utilitarianism: The Strategic Use of Digital Media along the Online-Offline Continuum of Sexualised Violence

Authors: Katharina Kargel, Frederic Vobbe

Abstract:

The present study examines how offenders targeting children and adolescents strategically use digital media when committing acts of sexualised violence along the online-offline continuum. Even offenders who are previously known to their victims use digital media extensively. The choice to instrumentalise digital media in order to initiate, threaten, exploit and humiliate victims demonstrates the rationale of offenders when committing acts of digitally supported violence. Through digital media, offenders can assume the power of interpretation over their victims’ situations. The ways in which digital media is used to commit violence along the online-offline continuum are a direct manifestation of the hedonistic utilitarianism demonstrated by offenders: a disposition characterised by the weighing of pleasures (“mental states”) and intrinsic value expected from using digital media against the risk of an outcome subjectively experienced as uncomfortable. Thus, sexualised violence using digital media goes beyond the traditional understanding of sexual online grooming.

Keywords: sexualized violence, offender strategy, grooming, children and adolescents, qualitative research, methodology

Procedia PDF Downloads 220
3053 Local Government Digital Attention and Green Technology Innovation: Analysis Based on Spatial Durbin Model

Authors: Xin Wang, Chaoqun Ma, Zheng Yao

Abstract:

Although green technology innovation faces new opportunities and challenges in the digital era, its theoretical research remains limited. Drawing on the attention-based view, this study employs the spatial Durbin model to investigate the impact of local government digital attention and digital industrial agglomeration on green technology innovation across 30 Chinese provinces from 2011 to 2021, as well as the spatial spillover effects present. The results suggest that both government digital attention and digital industrial agglomeration positively influence green technology innovation in local and neighboring provinces, with digital industrial agglomeration exhibiting a positive moderating effect on this direct local and indirect spatial spillover relationship. The findings of this study provide a new theoretical perspective for green technology innovation research and hold valuable implications for the advancement of the attention-based view and green technology innovation.

Keywords: local government digital attention, digital industrial agglomeration, green technology innovation, attention-based view

Procedia PDF Downloads 69