Search results for: electoral fraud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 227

Search results for: electoral fraud

77 Precarious ID Cards - Studying Documentary Practices in India through the Lens of Internal Migration

Authors: Ambuja Raj

Abstract:

This research will attempt to understand how documents are materially indispensable civic artifacts for migrants in their encounters with the state. Documents such as ID cards are sites of mediation and bureaucratic manifestation which reveal the inherent dynamics of power between the state and a delocalized people. While ID cards allow the holder to retain a different identity and articulate their demands as a citizen, they at the same time transform subjects into ‘objects’ in the exercise of governmental power. The research is based on the study of internal migrants in India, who are ‘visible’ to the state through its host of ID documents such as the ‘Aadhaar card’, electoral IDs, Ration cards, and a variety of region-specific documents, without the possession of which, not only are they unable to access jobs, public goods and services, and accommodation, but are liable to exploitation from state forces and mediators. Through semi-structured interviews with social actors in the processes of documentation and welfare of migrants, as well as with settlements of migrants themselves located in the state of Kerala in India, the thesis will attempt to understand the salience of documentary practices in the lives of inter-state migrants who move within Indian states in the hope of bettering their economic conditions. The research will trace the material and evolving significance of ID cards in the tenacity of states dealing with these ‘illegible’ populations. It will try to bring theories of governmentality, biopolitics and Weberian bureaucracy into the migrant issue while critically grounding itself on secondary literature by scholars who have worked on South Asian ‘governments of paper’.

Keywords: migration, historiography of documents, anthropology of state, documentary practices

Procedia PDF Downloads 181
76 Public Perception of Energy Security in Lithuania: Between Material Interest and Energy Independence

Authors: Dainius Genys, Vylius Leonavicius, Ricardas Krikstolaitis

Abstract:

Energy security problems in Lithuania are analyzed on a regular basis; however, there is no comprehensive research on the very issue of the concept of public energy security. There is a lack of attention not only to social determinants of perception of energy security, but also a lack of a deeper analysis of the public opinion. This article aims to research the Lithuanian public perception of energy security. Complex tasks were set during the sociological study. Survey questionnaire consisted of different sets of questions: view of energy security (risk perception, political orientation, and energy security; comprehensiveness and energy security); view of energy risks and threats (perception of energy safety factors; individual dependence and burden; disobedience and risk); view of the activity of responsible institutions (energy policy assessment; confidence in institutions and energy security), demographic issues. In this article, we will focus on two aspects: a) We will analyze public opinion on the most important aspects of energy security and social factors influencing them; The hypothesis is made that public perception of energy security is related to value orientations: b) We will analyze how public opinion on energy policy executed by the government and confidence in the government are intertwined with the concept of energy security. Data of the survey, conducted on May 10-19 and June 7-17, 2013, when Seimas and the government consisted of the coalition dominated by Social Democrats with Labor, Order and Justice Parties and the Electoral Action of Poles, were used in this article. It is important to note that the survey was conducted prior to Russia’s occupation of the Crimea.

Keywords: energy security, public opinion, risk, energy threat, energy security policy

Procedia PDF Downloads 500
75 Co-Creating Value between Public Financial Management Institutions: An Integrated Approach towards Financial Sustainability

Authors: Pascal Horni, Sandro Fuchs

Abstract:

In presence of increasing deficits and public debt among OECD countries, the debate on fiscal disciple and mechanisms to constrain public spending policy heated up and gave rise to the institutionalization of fiscal rules. Considering the notions from political economy literature and the therein advocated axiom of maximization of votes, introduction of institutional mechanisms and rules to govern public spending is likely to be coined by electoral motives. While there exists a series of research concerned with the rise of creative accounting in the presence fiscal rules, implementation of accrual government accounting and its impact on the biting of fiscal rules has to authors’ best knowledge never been explored. This paper serves the illumination of the connection between debt break mechanisms and the adoption of accrual public sector accounting standards such as the IPSAS in the interface of political economy in the Swiss context. By explicitly considering the technical accounting dimension, this paper develops an integrated conceptual view on well-established Public Financial Management (PFM) institutions and elaborates how their interdependencies can co-create value with regard to the contemporary challenge of fiscal sustainability. Derivation of this integrated view follows an explorative approach, taking into account expert interviews with director level staff from cantonal finance administrations and policy documents, as well as literature from both research areas – public sector accounting and political economy.

Keywords: accounting, fiscal rules, International Public Sector Accounting Standards (IPSAS), public financial management

Procedia PDF Downloads 151
74 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 208
73 Interrogating Economic Growth and Development in Nigeria: The Challenges

Authors: Enojo Kennie Enojo

Abstract:

The paper focuses on the contradictions of economic growth and development in Nigeria with specific reference to the plethora issues and challenges associated with the sordid situation. The broad objective is to investigate the major causes of agitation for restructuring the entire political spectrum that promote and guarantee economic growth and development with empirical intellectual standpoint. The specific aim is to surgically examine the organic linkage between weaker institutions, lack of vibrant civil society, poor governance and the agitation for restructuring. The paper adopts the secondary source of data collection as its methodological strategy. Our findings reveals that most urban and rural dwellers where goods and services are either extracted, produced, or manufactured lack infrastructural facilities, preventing economic growth and development, which has been the consequence of poverty, inequality and unemployment. There is equally the issue of disconnection of the political class from the electorate, this is evident in lack of political power base not located in the society but rather with either the elites or godfathers this and many factors are responsible for flawed electoral system from 1999 to 2023 general elections. These egregious factors and others have resulted in the subscription of religion and ethnicity thereby the devaluation of national norms, identities and values. We adopt the combination of structural-functional approach, relative deprivation; rising expectation, frustration and aggression model to enable us critically interrogate these contradictions as subterfuge with both the centrifugal and centripetal forces constantly in fatality. We recommend among others that, there should be development across the federating units without prejudice.

Keywords: restructuring, infrastructure, economic development, governance

Procedia PDF Downloads 23
72 Studying the Effects of Conditional Conservatism and Lack of Information Asymmetry on the Cost of Capital of the Accepted Companies in Tehran Stock Exchange

Authors: Fayaz Moosavi, Saeid Moradyfard

Abstract:

One of the methods in avoiding management fraud and increasing the quality of financial information, is the notification of qualitative features of financial information, including conservatism characteristic. Although taking a conservatism approach, while boosting the quality of financial information, is able to reduce the informational risk and the cost of capital stock of commercial department, by presenting an improper image about the situation of the commercial department, raises the risk of failure in returning the main and capital interest, and consequently the cost of capital of the commercial department. In order to know if conservatism finally leads to the increase or decrease of the cost of capital or does not have any influence on it, information regarding accepted companies in Tehran stock exchange is utilized by application of pooling method from 2007 to 2012 and it included 124 companies. The results of the study revealed that there is an opposite and meaningful relationship between conditional conservatism and the cost of capital of the company. In other words, if bad and unsuitable news and signs are reflected sooner than good news in accounting profit, the cost of capital of the company increases. In addition, there is a positive and meaningful relationship between the cost of capital and lack of information asymmetry.

Keywords: conditional conservatism, lack of information asymmetry, the cost of capital, stock exchange

Procedia PDF Downloads 257
71 Blockchain for Transport: Performance Simulations of Blockchain Network for Emission Monitoring Scenario

Authors: Dermot O'Brien, Vasileios Christaras, Georgios Fontaras, Igor Nai Fovino, Ioannis Kounelis

Abstract:

With the rise of the Internet of Things (IoT), 5G, and blockchain (BC) technologies, vehicles are becoming ever increasingly connected and are already transmitting substantial amounts of data to the original equipment manufacturers (OEMs) servers. This data could be used to help detect mileage fraud and enable more accurate vehicle emissions monitoring. This would not only help regulators but could enable applications such as permitting efficient drivers to pay less tax, geofencing for air quality improvement, as well as pollution tolling and trading platforms for transport-related businesses and EU citizens. Other applications could include traffic management and shared mobility systems. BC enables the transmission of data with additional security and removes single points of failure while maintaining data provenance, identity ownership, and the possibility to retain varying levels of privacy depending on the requirements of the applied use case. This research performs simulations of vehicles interacting with European member state authorities and European Commission BC nodes that are running hyperleger fabric and explores whether the technology is currently feasible for transport applications such as the emission monitoring use-case.

Keywords: future transportation systems, technological innovations, policy approaches for transportation future, economic and regulatory trends, blockchain

Procedia PDF Downloads 163
70 Judicial Analysis of the Burden of Proof on the Perpetrator of Corruption Criminal Act

Authors: Rahmayanti, Theresia Simatupang, Ronald H. Sianturi

Abstract:

Corruption criminal act develops rapidly since in the transition era there is weakness in law. Consequently, there is an opportunity for a few people to do fraud and illegal acts and to misuse their positions and formal functions in order to make them rich, and the criminal acts are done systematically and sophisticatedly. Some people believe that legal provisions which specifically regulate the corruption criminal act; namely, Law No. 31/1999 in conjunction with Law No. 20/2001 on the Eradication of Corruption Criminal Act are not effective any more, especially in onus probandi (the burden of proof) on corruptors. The research was a descriptive analysis, a research method which is used to obtain description on a certain situation or condition by explaining the data, and the conclusion is drawn through some analyses. The research used judicial normative approach since it used secondary data as the main data by conducting library research. The system of the burden of proof, which follows the principles of reversal of the burden of proof stipulated in Article 12B, paragraph 1 a and b, Article 37A, and Article 38B of Law No. 20/2001 on the Amendment of Law No. 31/1999, is used only as supporting evidence when the principal case is proved. Meanwhile, how to maximize the implementation of the burden of proof on the perpetrators of corruption criminal act in which the public prosecutor brings a corruption case to Court, depends upon the nature of the case and the type of indictment. The system of burden of proof can be used to eradicate corruption in the Court if some policies and general principles of justice such as independency, impartiality, and legal certainty, are applied.

Keywords: burden of proof, perpetrator, corruption criminal act

Procedia PDF Downloads 315
69 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script

Authors: Yash Goyal, Manish Korde, Juned Siddiqui

Abstract:

Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.

Keywords: responsive, accessible, attractive, interface, objective, security.

Procedia PDF Downloads 95
68 Media Representation of Romanian Migrants in the Italian Media: A Comparative Study

Authors: Paula-Catalina Meirosu

Abstract:

The economic migration (intra-EU) is a topic of debate in the public space in both countries of origin and countries of destination. Since the 1990s, after the collapse of communist regimes and then the accession of some former communist countries to the EU, the migratory flows of migrants (including Romanian migrants) to EU countries has been increased constantly. Italy is one of the main countries of destination among Romanians since at the moment Italy hosts more than one million Romanian migrants. Based on an interdisciplinary analytical framework focused on the theories in the field of transnationalism, media and migration studies and critical media analysis, this paper investigates the media construction of intra-EU economic migration in the Italian press from two main perspectives. The first point of view is the media representation of Romanian migrants in the Italian press in a specific context: the EU elections in 2014. The second one explores the way in which Romanian journalists use the media in the destinations countries (such as Italy) as a source to address the issue of migration. In this context, the paper focuses on online articles related to the Romanian migrants’ representation in the media before and during the EU elections in two newspapers (La Repubblica from Italy and Adevarul from Romania), published during January-May 2014. The methodology is based on a social-constructivist approach, predominantly discursive and includes elements of critical discourse analysis (CDA) to identify the patterns of Romanian migrants in the Italian press as well as strategies for building categories, identities, and roles of migrants. The aim of such an approach is to find out the dynamic of the media discourse on migration from a destination country in the light of a European electoral context (EU elections) and based on the results, to propose scenarios for the elections to be held this year.

Keywords: migration, media discourse, Romanian migrants, transnationalism

Procedia PDF Downloads 118
67 Detection and Quantification of Active Pharmaceutical Ingredients as Adulterants in Garcinia cambogia Slimming Preparations Using NIR Spectroscopy Combined with Chemometrics

Authors: Dina Ahmed Selim, Eman Shawky Anwar, Rasha Mohamed Abu El-Khair

Abstract:

A rapid, simple and efficient method with minimal sample treatment was developed for authentication of Garcinia cambogia fruit peel powder, along with determining undeclared active pharmaceutical ingredients (APIs) in its herbal slimming dietary supplements using near infrared spectroscopy combined with chemometrics. Five featured adulterants, including sibutramine, metformin, orlistat, ephedrine, and theophylline are selected as target compounds. The Near infrared spectral data matrix of authentic Garcinia cambogia fruit peel and specimens degraded by intentional contamination with the five selected APIs was subjected to hierarchical clustering analysis to investigate their bundling figure. SIMCA models were established to ensure the genuiness of Garcinia cambogia fruit peel which resulted in perfect classification of all tested specimens. Adulterated samples were utilized for construction of PLSR models based on different APIs contents at minute levels of fraud practices (LOQ < 0.2% w/w).The suggested approach can be applied to enhance and guarantee the safety and quality of Garcinia fruit peel powder as raw material and in dietary supplements.

Keywords: Garcinia cambogia, Quality control, NIR spectroscopy, Chemometrics

Procedia PDF Downloads 71
66 Polygamy in the Jewish and Western Tradition - Religion, Class and Tolerance

Authors: S. Zev Kalifon

Abstract:

The question of polygamy for Moslem minorities in Western nations has often been raised in the political and social discourse. Can polygamy be tolerated as a religious or human right in the West. For example, before the 2015 election in Israel, changes were made in the electoral system, which encouraged three small Arab parties to merge into one list. This “Unity List” included the socially liberal Communist list and a socially conservative Islamist list. Two members of the Islamist list were polygamists. Some rival politicians called for the election board to disqualify these men (and even the whole list) from the election process. This request was denied by the courts, and the men were elected to the parliament. Their subsequent seating in the parliament was questioned by many on both the liberal and conservative sides of the political spectrum. Some political commentators went so far as to describe polygamy as a “mark of disgrace” (a term usually reserved for people convicted on corruption charges). There are also problems in other areas of society; these include the rights of these families for welfare and social services (public policy issues) and residence in Israel. Using qualitative methods (primarily historical and archival data), this paper will analyze at the historic and cultural processes which created the intense opposition to polygamy in Judaism (for Israel) and Christianity (for the Western world). It will look at the debate over the "religious right" of polygamy for Moslem citizens in Israel and other Western cultures. Finally, it will examine the political, cultural, and demographic pressures which encourage polygamy in these minorities. This paper will demonstrate that the debate over polygamy is more than a question of religious freedom or human rights or multi-culturalism. It is a central symbol of modernity and the Western worldview.

Keywords: human rights, Judaism, multi-culturalism, polygamy, western values

Procedia PDF Downloads 112
65 Women in Malaysia: Exploring the Democratic Space in Politics

Authors: Garima Sarkar

Abstract:

The main purpose of the present paper is to investigate the development and progress achieved by women in the decision-making sphere and to access the level of their political-participation in Parliamentary Elections of Malaysia and their status in overall Malaysian political domain. The paper also focuses on the role and status of women in the major political parties of the state both the parties in power as well as the parties in opposition. The primary objective of the study is to focus on the major hindrances and social malpractices faced by women and also Muslim women’s access to justice in Malaysia. It also demonstrates the linkages between national policy initiatives and the advancement of women in various areas, such as economics, health, employment, politics, power-sharing, social development and law and most importantly evaluating their status in the dominant religion of the nation. In Malaysia, women’s political participation is being challenged from every nook and corner of the society. A high percentage of women are getting educated, forming a significant labor force in present day Malaysia, who can be employed in the manufacturing sector, retail trade, hotels and restaurant, agriculture etc. Women today consist of almost half of the population and exceed boys in the tertiary sector by a ratio of 80:20. Despite these achievements, however, women’s labor force engagement remains confined to ‘ traditional women’s occupations’, such as those of primary school teachers, data entry clerks and organizing polls during elections and motivating other less enlightened women to cast their votes. In the political arena, the past few General Elections of Malaysia clearly exhibited a slight change in the number of women Members of Parliament from 10.6% (20 out of 193 Parliamentary seats in 1999) to 10.5% (23 out of 219 Parliamentary seats in 2004). Amidst the political posturing for the recent General Election in 2013 of Malaysia, women’s political participation remains a prime concern in Malaysia. It is evident that while much of the attention of women revolves around charitable assistance, they are much less likely to be portrayed as active participants in electoral politics and governance. According to the electoral roll for the third quarter of 2012, 6,578,916 women are registered as voters. They represent 50.2% of the total number of the registered voters. However, this parity in terms of voter registration is not reflected in the number of elected representatives at the Parliamentary level. Only 10.4% of sitting Members of Parliament are women. The women’s participation in the legislature and executive branches are important since their presence brings the spotlight squarely on issues that have been historically neglected and overlooked. In the recent 2013 General Elections in Malaysia out of 35 full ministerial position only two, or 5.7% have been filled by women. In each of the 2009, 2010, and in the present 2013 Cabinet members, there have only been two women ministers, with this number reduced to one briefly when the Prime Minister appointed himself placeholder in the Ministry of Women, Family and Community Development. In the recent past, in its Election Manifesto, Barisan Nasional made a pledge of ‘increasing the number of women participating in national decision-making processes’. Even after such pledges, the Malaysian leadership has failed to mirror the strong presence of women in leadership positions of public life which primarily includes politics, the judiciary and in business. There has been a strong urge to political parties by various gender-sensitive groups to nominate more women as candidates for contesting elections at the Parliamentary as well as at the State level. The democratization process will never be truly democratic without a proper gender agenda and representation. Although Malaysia signed the Beijing Platform for Action document in 1995, the state has a long way to go in enhancing the participation of women in every segment of Malaysian political, economic and cultural. There has been a small percentage of women representation in decision-making bodies compared to the 30% targeted by the Beijing Platform for Action. Thus, democratization in terms of representation of women in leadership positions and decision-making positions or bodies is essential since it’s a move towards a qualitative transformation of women in shaping national decision-making processes. The democratization process has to ensure women’s full participation and their goals of development and their full participation has to be included in the process of formulating and shaping the developmental goals.

Keywords: women, gender equality, Islam, democratization, political representation, Parliament

Procedia PDF Downloads 245
64 Assets Misappropriation in the Malaysian Public and Private Sectors

Authors: I. K. Norziaton, M. D. Ridhuan, A. N. Nur Adura

Abstract:

Assets misappropriation is becoming a major concern in organizations. Over the years, the Malaysian Auditor General has reported high occurrences of assets misappropriation at the federal, state and even local governments. It is surprising that assets misappropriation is not the only major concern in the public sector but it has also indicates a common sight in private sector. The current situation is rather disconcerting because employees are accountable to perform their jobs at the interest of the organizations. Various researches in the past has found that the incidence of assets misappropriation occurs when employees used the official vehicles, internet connection, computers, stationery and facilities for personal and family benefits. The issue of assets misappropriation has continue to be a major concern for organizations and its impact on the reputation and financial health can be enormous. Even though the issue seems to be trivial, yet, if it is left untreated, the symptoms will become an incurable disease that it will cause major leakages to the organizations. Hence, this paper highlights the common practices of assets misappropriation in public and private sectors. It also discusses why the acts of assets misappropriation occurs. Using the data through questionnaire survey, a total of 250 questionnaires were distributed to the private and public sectors employees. However 173 (69.2%) were returned and usable. This paper concludes that it is vital to promote awareness to the public and private sectors employees on issues of assets misappropriation. Assets misappropriation could have been avoided provided that the officers in charge are more vigilant, competent and practice high level of integrity in discharging their responsibilities towards the organizations.

Keywords: assets misappropriation, fraud, public sector, private sector

Procedia PDF Downloads 183
63 Federalism and Good Governance in Nigeria: A Study of the Federal Capital Territory, Abuja, Nigeria

Authors: David C. Nwogbo

Abstract:

Examining the impact of federalism on good governance is crucial for enhancing governance in Nigeria. This study focuses on the Federal Capital Territory (FCT), Abuja, as a case study. Employing a descriptive survey design, data was collected to explore the relationship between federalism and good governance in Abuja, Nigeria. A stratified random sampling method was used to select 289 respondents from the population of Abuja. The sample size was determined using a formula based on precision and population size. A survey questionnaire was employed to gather information on respondents' demographics, perceptions, and experiences concerning federalism and good governance in the FCT. Descriptive statistics, such as percentages and means, were utilized to analyze the study's findings. The findings provided insights into the perceptions and experiences of residents of the FCT with regard to the relationship between federalism and good governance. The results of this study will be useful for policy and decision-making related to the implementation of these concepts in Nigeria and, more specifically, in the FCT, Abuja. The study found that the majority of respondents believe that the federal system of government has not been effective in promoting accountability, transparency, and reducing corruption in Nigeria. There is a need for reforms to improve the effectiveness of the federal system in promoting good governance. These reforms include strengthening institutions, reallocation of resources, reform of the electoral system, decentralization of power, strengthening the role of the judiciary, capacity building, promoting transparency, and engagement of civil society. The findings also highlight the need for significant reforms to address these challenges and promote good governance in the country. The results of this study can be used to inform policy decisions and guide future research on the subject.

Keywords: accountability, federalism, good, governance

Procedia PDF Downloads 92
62 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 64
61 Inappropriate Job Behaviour and Performance of Employees

Authors: Prakash Singh

Abstract:

The focus of this paper is on the impact of internal organizational factors on the inappropriate job performance and behaviour of employees. The Buffalo City Metropolitan Municipality (BCMM) in South Africa has been experiencing inappropriate job behaviour and performance of some of its workers. They include misappropriation of resources, maladministration, mismanagement, lack of service delivery, fraud, and corruption. Since many workers in this organization have various levels of formal education, such practices are not expected, because the structural-functionalist assumption is that formal education is a solution to societal challenges. Since inappropriate job behaviour and performance continue to be reported in spite of the formal education of BCMM workers, this study seeks to investigate how the two phenomena co-exist. It thus seeks to put into perspective the paradoxical co-existence of formal education with inappropriate job behaviour and performance, by focusing on the BCMM as a case-study. For data collection, this study used the mixed method approach; that is, a combination of qualitative and quantitative methods. The findings revealed structural, systemic and human impediments to labour productivity in the organization. By and large, the unquestioning acceptance of the assumption that the skills shortage is responsible for inappropriate workers’ job performance and behaviour is discredited by the evidence of skilled personnel who exercise their responsibilities in a manner that undermines their occupational requirements. Therefore, this exploratory study affirms that the narrow conception of skills, that privileges job-specific capabilities, is not enough for cultivating a workforce with appropriate job behaviour and performance practices.

Keywords: inappropriate job behaviour, labour productivity, mismanagement, skills shortage

Procedia PDF Downloads 361
60 Employee Whistleblower Protection: An Analysis of Malaysian Law and Islamic Law

Authors: Ashgar Ali Ali Mohamed, Farheen Baig Sardar Baig

Abstract:

In Malaysia, the Whistle-blower Protection Act 2010 provides protection to a person in an organization who exposes misconduct, alleged dishonest or illegal activity that violates the existing laws, among others. For example, alleged fraud, health and safety violations, and corruption, to name but a few. Undeniable, most whistle-blowers are internal to an organisation who report misconduct of a fellow employee or superior within their company and they frequently face reprisal at the hands of the organisation which they have accused. In fact, many people do not consider blowing the whistle because of fear of retaliation and losing their relationships at workplace. Although whistle-blowers are protected under law from employer retaliation, there have been many cases where punishment for whistleblowing has occurred, such as suspension, demotion, termination, or harsh mistreatment by other employees. Hence, this paper will analyse the adequacy of the legal protection available to employees who whistle-blow on their employers with reference to the Whistle-blower Protection Act 2010. Reference will also be made to the approach taken in other selected jurisdiction with a view of highlighting the adequacy of the Malaysian legislation on this subject besides strengthen employee whistle-blower protection. Further, reference is also made to the Islamic approach on this subject with particular reference to the concept of amr-bil-Ma’roof (ordering for acknowledged virtues) and nahi anil munkar (forbidding from sin). Allah (SWT) says: “And there should be a group amongst you who invite towards good, order for acknowledged virtues, forbid from sin and these it is that are the successful ones” (Al Imran(Chp 3), verse 104).

Keywords: whistleblower protection, employee whistleblower, detrimental and reprisal, Malaysian law

Procedia PDF Downloads 545
59 Comparative Study on Inhibiting Factors of Cost and Time Control in Nigerian Construction Practice

Authors: S. Abdulkadir, I. Y. Moh’d, S. U. Kunya, U. Nuruddeen

Abstract:

The basis of any contract formation between the client and contractor is the budgeted cost and the estimated duration of projects. These variables are paramount important to project's sponsor in a construction projects and in assessing the success or viability of construction projects. Despite the availability of various techniques of cost and time control, many projects failed to achieve their initial estimated cost and time. The paper evaluate the inhibiting factors of cost and time control in Nigerian construction practice and comparing the result with the United Kingdom practice as identified by one researcher. The populations of the study are construction professionals within Bauchi and Gombe state, Nigeria, a judgmental sampling employed in determining the size of respondents. Descriptive statistics used in analyzing the data in SPSS. Design change, project fraud and corruption, financing and payment of completed work found to be common among the top five inhibiting factors of cost and time control in the study area. Furthermore, the result had shown some comprising with slight contrast as in the case of United Kingdom practice. Study recommend the adaptation of mitigation measures developed in the UK prior to assessing its effectiveness and so also developing a mitigating measure for other top factors that are not within the one developed in United Kingdom practice. Also, it recommends a wider assessing comparison on the modify inhibiting factors of cost and time control as revealed by the study to cover almost all part of Nigeria.

Keywords: comparison, cost, inhibiting factor, United Kingdom, time

Procedia PDF Downloads 432
58 Improved Classification Procedure for Imbalanced and Overlapped Situations

Authors: Hankyu Lee, Seoung Bum Kim

Abstract:

The issue with imbalance and overlapping in the class distribution becomes important in various applications of data mining. The imbalanced dataset is a special case in classification problems in which the number of observations of one class (i.e., major class) heavily exceeds the number of observations of the other class (i.e., minor class). Overlapped dataset is the case where many observations are shared together between the two classes. Imbalanced and overlapped data can be frequently found in many real examples including fraud and abuse patients in healthcare, quality prediction in manufacturing, text classification, oil spill detection, remote sensing, and so on. The class imbalance and overlap problem is the challenging issue because this situation degrades the performance of most of the standard classification algorithms. In this study, we propose a classification procedure that can effectively handle imbalanced and overlapped datasets by splitting data space into three parts: nonoverlapping, light overlapping, and severe overlapping and applying the classification algorithm in each part. These three parts were determined based on the Hausdorff distance and the margin of the modified support vector machine. An experiments study was conducted to examine the properties of the proposed method and compared it with other classification algorithms. The results showed that the proposed method outperformed the competitors under various imbalanced and overlapped situations. Moreover, the applicability of the proposed method was demonstrated through the experiment with real data.

Keywords: classification, imbalanced data with class overlap, split data space, support vector machine

Procedia PDF Downloads 302
57 Adoption and Use of an Electronic Voting System in Ghana

Authors: Isaac Kofi Mensah

Abstract:

The manual system of voting has been the most widely used system of electing representatives around the globe, particularly in Africa. Due to the known numerous problems and challenges associated with the manual system of voting, many countries are migrating to the electronic voting system as a suitable and credible means of electing representatives over the manual paper-based system. This research paper therefore investigated the factors influencing adoption and use of an electronic voting system in Ghana. A total of 400 Questionnaire Instruments (QI) were administered to potential respondents in Ghana, of which 387 responded representing a response rate of 96.75%. The Technology Acceptance Model was used as the theoretical framework for the study. The research model was tested using a simple linear regression analysis with SPSS. A little of over 71.1% of the respondents recommended the Electoral Commission (EC) of Ghana to adopt an electronic voting system in the conduct of public elections in Ghana. The results indicated that all the six predictors such as perceived usefulness (PU), perceived ease of use (PEOU), perceived free and fair elections (PFFF), perceived credible elections (PCE), perceived system integrity (PSI) and citizens trust in the election management body (CTEM) were all positively significant in predicting the readiness of citizens to adopt and use an electronic voting system in Ghana. However, jointly, the hypotheses tested revealed that apart from Perceived Free and Fair Elections and Perceived Credible and Transparent Elections, all the other factors such as PU, Perceived System Integrity and Security and Citizen Trust in the Election Management Body were found to be significant predictors of the Willingness of Ghanaians to use an electronic voting system. All the six factors considered in this study jointly account for about 53.1% of the reasons determining the readiness to adopt and use an electronic voting system in Ghana. The implications of this research finding on elections in Ghana are discussed.

Keywords: credible elections, Election Management Body (EMB), electronic voting, Ghana, Technology Acceptance Model (TAM)

Procedia PDF Downloads 383
56 Alternate Methods to Visualize 2016 U.S. Presidential Election Result

Authors: Hong Beom Hur

Abstract:

Politics in America is polarized. The best illustration of this is the 2016 presidential election result map. States with megacities like California, New York, Illinois, Virginia, and others are marked blue to signify the color of the Democratic party. States located in inland and south like Texas, Florida, Tennesse, Kansas and others are marked red to signify the color of the Republican party. Such a stark difference between two colors, red and blue, combined with geolocations of each state with their borderline remarks one central message; America is divided into two colors between urban Democrats and rural Republicans. This paper seeks to defy the visualization by pointing out its limitations and search for alternative ways to visualize the 2016 election result. One such limitation is that geolocations of each state and state borderlines limit the visualization of population density. As a result, the election result map does not convey the fact that Clinton won the popular vote and only accentuates the voting patterns of urban and rural states. The paper seeks whether an alternative narrative can be observed by factoring in the population number into the size of each state and manipulating the state borderline according to the normalization. Yet another alternative narrative may be reached by factoring the size of each state by the number of the electoral college of each state by voting and visualize the number. Other alternatives will be discussed but are not implemented in visualization. Such methods include dividing the land of America into about 120 million cubes each representing a voter or by the number of whole population 300 million cubes. By exploring these alternative methods to visualize the politics of the 2016 election map, the public may be able to question whether it is possible to be free from the narrative of the divide-conquer when interpreting the election map and to look at both parties as a story of the United States of America.

Keywords: 2016 U.S. presidential election, data visualization, population scale, geo-political

Procedia PDF Downloads 114
55 Quality Management in Spice Paprika Production as a Synergy of Internal and External Quality Measures

Authors: É. Kónya, E. Szabó, I. Bata-Vidács, T. Deák, M. Ottucsák, N. Adányi, A. Székács

Abstract:

Spice paprika is a major spice commodity in the European Union (EU), produced locally and imported from non-EU countries, reported not only for chemical and microbiological contamination, but also for fraud. The effective interaction between producers’ quality management practices and government and EU activities is described on the example of spice paprika production and control in Hungary, a country of leading spice paprika producer and per capita consumer in Europe. To demonstrate the importance of various contamination factors in the Hungarian production and EU trade of spice paprika, several aspects concerning food safety of this commodity are presented. Alerts in the Rapid Alert System for Food and Feed (RASFF) of the EU between 2005 and 2013, as well as Hungarian state inspection results on spice paprika in 2004 are discussed, and quality non-compliance claims regarding spice paprika among EU member states are summarized in by means of network analysis. Quality assurance measures established along the spice paprika production technology chain at the leading Hungarian spice paprika manufacturer, Kalocsai Fűszerpaprika Zrt. are surveyed with main critical control points identified. The structure and operation of the Hungarian state food safety inspection system is described. Concerted performance of the latter two quality management systems illustrates the effective interaction between internal (manufacturer) and external (state) quality control measures.

Keywords: spice paprika, quality control, reporting mechanisms, RASFF, vulnerable points, HACCP

Procedia PDF Downloads 281
54 Agency Cost, Firm Performance, Corporate Governance: Evidence from Indonesia

Authors: Arnold Sanda Layuk

Abstract:

Fraud in the disclosure of financial statements by management shows that agency conflict is an important issue in the company. The conflict has consequences for the agency costs that must be borne and has an impact on the firm's performance. The effect of agency costs on firm performance is investigated in this study, as well as whether several variables such as corporate governance mechanisms can positively moderate the agency cost and firm performance relationship. The agency cost is measured by the asset utilization ratio and discretionary expenditure ratio. The firm's performance is represented by the return on equity. Data was collected from the manufacturing companies listed on the Indonesia Stock Exchange from 2015 to 2019, then regressed on the panel data using the panel corrected standard error model (PCSE). According to the findings, agency costs are negatively related to firm performance, which supports previous empirical research findings. It also found that the agency cost and firm performance relationship is significantly moderated by board size and ownership concentration as the representatives of corporate governance mechanisms. It suggests that corporate governance can become tools to reduce agency costs and increase firm performance as well. The empirical evidence adds to previous research on agency conflict, particularly in emerging markets. These findings are expected to supplement previous research and provide additional information to shareholders in order to control opportunistic management decisions that affect their investments and discretionary operational expenses.

Keywords: agency cost, corporate governance, asset utilization ratio, firm performance

Procedia PDF Downloads 184
53 The Qualitative and Quantitative Detection of Pistachio in Processed Food Products Using Florescence Dye Based PCR

Authors: Ergün Şakalar, Şeyma Özçirak Ergün

Abstract:

Pistachio nuts, the fruits of the pistachio tree (Pistacia vera), are edible tree nuts highly valued for their organoleptic properties. Pistachio nuts used in snack foods, chocolates, baklava, meat products, ice-cream industries and other gourmet products as ingredients. Undeclared pistachios may be present in food products as a consequence of fraudulent substitution. Control of food samples is very important for safety and fraud. Mix of pistachio, peanut (Arachis hypogaea), pea (Pisum sativum L.) used instead of pistachio in food products, because pistachio is a considerably expensive nut. To solve this problem, a sensitive polymerase chain reaction PCR has been developed. A real-time PCR assay for the detection of pea, peanut and pistachio in baklava was designed by using EvaGreen fluorescence dye. Primers were selected from powerful regions for identification of pea, peanut and pistachio. DNA from reference samples and industrial products were successfully extracted with the GIDAGEN® Multi-Fast DNA Isolation Kit. Genomes were identified based on their specific melting peaks (Mp) which are 77°C, 85.5°C and 82.5°C for pea, peanut and pistachio, respectively. Homogenized mixtures of raw pistachio, pea and peanut were prepared with the ratio of 0.01%, 0.1%, 1%, 10%, 40% and 70% of pistachio. Quantitative detection limit of assay was 0.1% for pistachio. Also, real-time PCR technique used in this study allowed the qualitative detection of as little as 0.001% level of peanut DNA, 0,000001% level of pistachio DNA and 0.000001% level of pea DNA in the experimental admixtures. This assay represents a potentially valuable diagnostic method for detection of nut species adulterated with pistachio as well as for highly specific and relatively rapid detection of small amounts of pistachio in food samples.

Keywords: pea, peanut, pistachio, real-time PCR

Procedia PDF Downloads 259
52 Service Delivery Disparity Conundrum at Winnie Madikizela Mandela Local Municipality: Exploration of the Enhanced Future

Authors: Mandisi Matyana

Abstract:

Although the South African local government is doing all the best in ensuring improved service delivery for the citizens, service delivery disparity still remains the real challenge for other municipalities. The unequal distribution of services within municipal wards is causing unequal happiness among the citizens; hence others do enjoy different provided municipal services, while others do not. It is acknowledged that less access to municipal services infringes one’s rights, such as the right to human dignity and the right to life. Some of the municipal services are basic services and they are the mainstay of human survival, such as water, housing, etc. It is quite evident that the service delivery disparity could be caused by the various factors within the local municipality affairs, including both administrative and political factors. Therefore, this study is undertaken to check and evaluate the main foundations of service delivery disparity in ensuring equal development of the state, particularly for local communities. The study used the qualitative method to collect the data from the citizens of Winnie Madikizela Mandela Local Municipality. An extensive literature was also conducted in understanding the causes of service delivery disparity. Study findings prove that the service delivery disparity could be caused by factors such as political interference in administration, corruption and fraud, elevated unemployment levels, inadequate institutional capacity, etc. Therefore, the study recommends strong community participation and constant external supervision in the local government so as to encourage openness in local government to ensure fair administration towards services to be provided.

Keywords: administration, development, municipal services, service delivery disparity, Winnie Madikizela Mandela local municipality

Procedia PDF Downloads 105
51 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 37
50 Navigating the Cacophony of Human Rights Claims and Chains of Fraud in Nigeria: The Anti-Corruption War Perspective

Authors: Mike Omilusi

Abstract:

Since the Buhari administration came to power, it has gained the people’s confidence with its anti-corruption efforts. Making culprits account for their past unlawful deeds, in a very determined and aggressive manner ever witnessed in the nation’s political history, generates different reactions among Nigerians. However, some questions remain pertinent to this study: Are Nigerians really advocating persecution or prosecution in respect of the graft suspects? Do they want conviction without being convinced? Is their outburst propelled by emotions and revengeful anticipation of having suspected looters of the nation’s commonwealth behind bars? Can the war be successfully fought without resorting to impunity? Relying extensively on secondary sources with the aid of descriptive and narrative tools, this study seeks to interrogate the claim of fundamental human rights in the face of wanton looting of the nation’s resources. If, as opined by President Buhari, corruption is a crime against humanity, then it is argued that those who commit such crime should be subjected to penalties prescribed by law. Such crime -as corruption in this study- deprives the citizens of welfare, social amenities and good things of life. In this instance, it also poses threats to national security, having misappropriated funds meant for the war against the Boko Haram terrorism as revealed by the anti-corruption agency in the country. A theoretically-driven investigation, this essay raises some expectations within the context of good governance-propelled anti-corruption crusade, making modest recommendations as to how corruption should be prevented and combated within the confine of rule of law.

Keywords: corruption, rule of law, human rights, prosecution, commonwealth

Procedia PDF Downloads 188
49 Commercial Automobile Insurance: A Practical Approach of the Generalized Additive Model

Authors: Nicolas Plamondon, Stuart Atkinson, Shuzi Zhou

Abstract:

The insurance industry is usually not the first topic one has in mind when thinking about applications of data science. However, the use of data science in the finance and insurance industry is growing quickly for several reasons, including an abundance of reliable customer data, ferocious competition requiring more accurate pricing, etc. Among the top use cases of data science, we find pricing optimization, customer segmentation, customer risk assessment, fraud detection, marketing, and triage analytics. The objective of this paper is to present an application of the generalized additive model (GAM) on a commercial automobile insurance product: an individually rated commercial automobile. These are vehicles used for commercial purposes, but for which there is not enough volume to apply pricing to several vehicles at the same time. The GAM model was selected as an improvement over GLM for its ease of use and its wide range of applications. The model was trained using the largest split of the data to determine model parameters. The remaining part of the data was used as testing data to verify the quality of the modeling activity. We used the Gini coefficient to evaluate the performance of the model. For long-term monitoring, commonly used metrics such as RMSE and MAE will be used. Another topic of interest in the insurance industry is to process of producing the model. We will discuss at a high level the interactions between the different teams with an insurance company that needs to work together to produce a model and then monitor the performance of the model over time. Moreover, we will discuss the regulations in place in the insurance industry. Finally, we will discuss the maintenance of the model and the fact that new data does not come constantly and that some metrics can take a long time to become meaningful.

Keywords: insurance, data science, modeling, monitoring, regulation, processes

Procedia PDF Downloads 71
48 Cybersecurity Challenges in Africa

Authors: Chimmoe Fomo Michelle Larissa

Abstract:

The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.

Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime

Procedia PDF Downloads 28