Search results for: history of terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2839

Search results for: history of terrorism

2689 Islamophobia: A Study of Unfounded Fear of Islam in Nigeria

Authors: AbdulHameed Badmas Yusuf

Abstract:

Islamophobia is unfounded fear of Islam and, more accurately, of his adherents. This phenomenon has found a fertile terrain in Nigeria given her status as a multireligious society where Muslims and Christians co-exist. Over the years, Islamophobia has taken constitutional, diplomatic, educational, financial, and political dimensions in the country. Any move by Muslims to adhere to their religious dictates, within the constitutional framework, is misconstrued by Christians - their religious counterparts- as a systematic way of Islamizing the country. Against this backdrop, this paper casts a look at Islamophobia from the five dimensions mentioned above. It shall identify possible causes of Islamophobia and proffer solutions accordingly. Available resources as well as events in the recent past reveal that Islamophobia is not unconnected with orientalism and terrorism, which are informed by prejudice and ignorance respectively. As such, the paper suggests adequate knowledge and tolerance as inevitable tools to curtail the menace of Islamophobia. This will go a long way in enhancing mutual tolerance and peaceful co-existence among the adherents of Christianity, Islam, and other religions in Nigeria. Both historical and analytical methods are used in this paper.

Keywords: islamophobia, islam, Nigeria, orientalism, terrorism

Procedia PDF Downloads 400
2688 Dialogues of Medical Places and Health Care in Oporto City (20th Century)

Authors: Monique Palma, Isabel Amaral

Abstract:

This paper aims at mapping medical places in Oporto in the twentieth century in order to bring the urban history of medicine and healthcare in Portugal to a large audience, using Oporto as a case study. This analysis is consistent with the SDS's 2030 goals for policy guidance for heritage and development actors. As a result, it is critical to begin this research in order to place on the political agenda the preservation of Portuguese culture's history, memory, and heritage, particularly the medical culture, which is one of the most important drivers of civilizational development. To understand the evolution of medical care in urban history, we will conduct archive research (manuals, treatises, reports, periodic journals, newspapers, etc.) and interviews with key actors from medical institutions and medical museums. The findings of this study will be used to develop medical itineraries for inclusion in touristic agendas in Portugal and abroad, to include Portuguese medicine in global roadmaps, and to promote the preservation of the most iconic places of health care and medical heritage, as well as tools to promote social cohesion, dialogue among people, and "sense of place" globally.

Keywords: medical itineraries, history of medicine, urban history, Oporto

Procedia PDF Downloads 202
2687 Oral Sex Practice among Men Who Have Sex with Men: A Cross-Sectional Study in Indonesian Urban Settings

Authors: I Putu Yuda Hananta, Inke Kusumastuti

Abstract:

The latest Indonesian Biology and Behavior Surveillance (IBBS) conducted by Indonesian Ministry of Health reported a large proportion of men who have sex with men (MSM) engaging in oral sex in their recent sexual history. While it is considered as a pleasuring and safe, oral sex might facilitate the transmission of various sexually transmitted infection (STI) pathogens. This study was aimed to investigate the oral sex practice among MSM in Indonesian urban settings to help delineate demographic and behavior determinants of such practice. In 2014, 501 MSM in 8 clinic-based and outreach STI services were recruited in Jakarta, Yogyakarta and Denpasar, Indonesia. Respondents completed a self-administered questionnaire inquiring about their demographics and sexual history. Median age (interquartile range) of the respondents was 27 (24-30) years; most completed senior high school (54.3%), worked in informal jobs (57.9%), and single (60.9%); and 32.3% reported receiving money in exchange for sex. Oral sex was practiced by most respondents: insertive only (10.0%), receptive only (6.0%), and both (82.4%). A separate multivariable analysis was performed using logistic regression to identify the determinants for receptive and insertive oral sex. Factors associated with receptive oral sex were having more than 10 sex partner(s) in the preceding 6 months vs 1 partner, adjusted odds ratio (aOR) [95% CI]=3.40 [1.22-9.42], p=0.03; and history of receptive-insertive anal sex vs no history, aOR=4.37 [1.76-10.82], p=0.01. Factors associated with insertive oral sex were receiving money for sex vs. not receiving, aOR=2.98 [1.10-8.04], p=0.02; and history of receptive-insertive anal sex vs. no history, aOR=2.10 [0.51-8.74], p<0.001. Only a few respondents reported consistent condom use (11.6% and 12.0% for receptive and insertive oral sex, respectively). Our findings demonstrated that while oral sex is a common practice among MSM, the consistency of condom use in oral sex is very low. In addition, certain sex behavior (number of sex partners, sex work and history of anal sex) were associated with oral sex, and this might need to be addressed during health promotion efforts on STI prevention through oral-genital contact.

Keywords: behavior, Indonesia, men who have sex with men, oral sex

Procedia PDF Downloads 218
2686 People’s Perception towards the ASEAN Economic Community (AEC)

Authors: Nopadol Burananuth

Abstract:

The purposes of this research paper were to study the relationship between the economic factor and political factor, the relationship between political and economic factor and social factor, and the effects of economic factor, political factor, and social factor to the people’s perception about ASEAN Economic Community (AEC). A total of 400 samples were selected from four sub-districts from Arunyaprathet District, Srakaow Province. Data analysis method included multiple regression analysis. The findings revealed that political factor depended on trade cooperation, transportation cooperation, and communication cooperation. Social factor was depended on disaster protection, terrorism protection, and international relations. In addition, the people’s perception of the AEC depended on disaster perception, terrorism protection, international relations, transportation cooperation, communication cooperation, interdependence, and labor movement.

Keywords: economic factors, perception, political factors, social factors

Procedia PDF Downloads 558
2685 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements

Authors: John Hardy

Abstract:

The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.

Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism

Procedia PDF Downloads 153
2684 Augmenting History: Case Study Measuring Motivation of Students Using Augmented Reality Apps in History Classes

Authors: Kevin. S. Badni

Abstract:

Due to the rapid advances in the use of information technology and students’ familiarity with technology, learning styles in higher education are being reshaped. One of the technology developments that has gained considerable attention in recent years is Augmented Reality (AR), where technology is used to combine overlays of digital data on physical real-world settings. While AR is being heavily promoted for entertainment by mobile phone manufacturers, it has had little adoption in higher education due to the required upfront investment that an instructor needs to undertake in creating relevant AR applications. This paper discusses a case study that uses a low upfront development approach and examines the impact on generation-Z students’ motivation whilst studying design history over a four-semester period. Even though the upfront investment in creating the AR support was minimal, the results showed a noticeable increase in student motivation. The approach used in this paper can be easily transferred to other disciplines and other areas of design education.

Keywords: augmented reality, history, motivation, technology

Procedia PDF Downloads 141
2683 The Experiences of Secondary School Students in History Lessons in Distance and Formal Education

Authors: Osman Okumuş

Abstract:

The pandemic has significantly affected every aspect of life. Especially in recenttimes, as a result of this effect, we have come closer to technology. Distance education has taken the place of formal education rather than supporting formal education. Thiscreatednewexperiencesforbothteachersandstudents. This research focused on revealing the experiences of the same students in distance and formal education, especially in history lessons. In the study, which was designed as a case study, 20 students were interviewed through a semi-structured interview form prepared by the researcher. The results show that both learning environments provide students with important experiences. However, despite the fact that the students developed their digital competencies and experienced different learning environments, they focused on formal education in the name of socialization.

Keywords: history lessons, distance education, pandemic., formal education

Procedia PDF Downloads 78
2682 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 198
2681 Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques

Authors: Saima Nazir, Mustansar Ali Ghazanfar, Sanay Muhammad Umar Saeed, Muhammad Awais Azam, Saad Ali Alahmari

Abstract:

Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances.

Keywords: data mining, counter terrorism, machine learning, SVM

Procedia PDF Downloads 382
2680 Genres as Time Machines: Hong Kong Cinema's Ways of Historicizing

Authors: Chin Pang Lei

Abstract:

Colonized by the UK, handed over to China, and now as a global financial city, Hong Kong’s history is never easy to write under the dominant discourses of colonialism, nationalism and globalization. In this plight, cinema, regarded as Hong Kong’s most representative cultural form, is used for writing, exploring and questioning the local history of the city. In their writing of the past, Hong Kong directors such as Wong Kar-wai, Stanley Kwan and Tsui Hark have demonstrated alternative ways of historicizing Hong Kong. Despite their interests in different periods of time (Wong is obsessed with the 1960s; Kwan is attracted to the 1930s; Tsui often goes back to the early 20th century), all these directors use genres as their time machines to revisit the past. As a popular cultural form, genres always come with a series of ideologies which define our lives and explain the society. Hence, in a changing society, genres change and complicate themselves with different packages of meanings. Genres function as open-ended and corrigible schemata which can contain multiple themes and various meanings. In Hong Kong, genres, often seen as highly commercial and overly market-oriented, are opportunities for alternative history writing and the exploration of local identities. This paper examines how these Hong Kong directors use the popular forms of genres, such as melodrama, martial art and gangster films, to present the past, and how the stories of the fictional characters, such as prostitutes, martial artists and jobless hooligans mobilize imagination of history. These texts show that genre is a crucial platform for Hong Kong’s post-colonial self-writing. Via genres, history in these films is against official and canonical history as well as grand narrative. Genres as time machines articulate a voice for Hong Kong.

Keywords: Hong Kong cinema, genre, historicizing, local history, Wong Kar-Wai

Procedia PDF Downloads 338
2679 The Applicability of International Humanitarian Law to Non-State Actors

Authors: Yin Cheung Lam

Abstract:

In 1949, the ratification of the Geneva Conventions heralded the international community’s adoption of a new universal and non-discriminatory approach to human rights in situations of conflict. However, with the proliferation of international terrorism after the 9/11 attacks on the United States (U.S.), the international community’s uneven and contradictory implementations of international humanitarian law (IHL) questioned its agenda of universal human rights. Specifically, the derogation from IHL has never been so pronounced in the U.S. led ‘War on Terror’. While an extensive literature has ‘assessed the impact’ of the implementation of the Geneva Conventions, limited attention has been paid to interrogating the ways in which the Geneva Conventions and its resulting implementation have functioned to discursively reproduce certain understandings of human rights between states and non-state actors. Through a discursive analysis of the Geneva Conventions and the conceptualization of human rights in relation to terrorism, this thesis problematises the way in which the U.S. has understood and reproduced understandings of human rights. Using the U.S. ‘War on Terror’ as an example, it seeks to extend previous analyses of the U.S.’ practice of IHL through a qualitative discursive analysis of the human rights content that appears in the Geneva Conventions in addition to the speeches and policy documents on the ‘War on Terror’.

Keywords: discursive analysis, human rights, non-state actors, war on terror

Procedia PDF Downloads 582
2678 Clinical Characteristics of Children Presenting with History of Child Sexual Abuse to a Tertiary Care Centre in India

Authors: T. S. Sowmya Bhaskaran, Shekhar Seshadri

Abstract:

This study aims to study the clinical features of with a history of Child Sexual Abuse (CSA). A chart review of 40 children (<16 years) with history of CSA evaluated at the Department of Child and Adolescent Psychiatry of NIMHANS during a two year period was performed. Results:The most common form of abuse was contact penetrative abuse (65%) followed by non-contact penetrative abuse (32.5%). 75% (N=30) had a psychiatric diagnosis at baseline. 50% of these children had one or more psychiatric comorbidities. Anxiety disorder was the most common diagnosis (27.5%) which included PTSD (11%) followed by Depressive disorder (25.2%). Children abused by multiple perpetrators were found to be more likely to have depression, to having a comorbid psychiatric disorder and more prone to exhibit sexualized behaviour. Children who also experienced physical violence at home were more likely to develop psychiatric illness following child sexual abuse. Psychiatric morbidity is high in clinic population of children with history of CSA. It is important to increase the awareness regarding the consequences of CSA in order to increase help seeking.

Keywords: child sexual abuse, India, tertiary care centre, clinical characteristics

Procedia PDF Downloads 433
2677 An Australian Central Bank Digital Currency: Developing a Framework for Calibrating National Security and Privacy Considerations

Authors: Nancy Michail, Niloufer Selvadurai, Doron Goldbarsht

Abstract:

This study analyses the development of a central bank digital currency (CBDC) in Australia and the framework being developed to ensure that national security and privacy considerations are appropriately addressed. Through the use of doctrinal methodology, the research closely and critically examines current legislation and regulation on privacy federal laws and the need to comply with anti-money laundering and counter-terrorism financing laws (AML/CTF). It is argued that the introduction of CBDCs may lead to potential tension between the application of AML/CTF laws and the upholding of individuals’ fundamental and legislated rights to privacy; therefore, it emphasises the need for clear delineation of ambits and support between different laws and regulations to ensure they operate within their intended purposes and suggests that the calibration of potential tensions between AML/CTF and privacy laws may be achieved through the innovative application of the proportionality principle.

Keywords: anti-money laundering and counter terrorism financing, central bank digital currency, privacy, proportionality principle

Procedia PDF Downloads 30
2676 Reclaiming and Reconstructing the History of the Universal Declaration of Human Rights

Authors: Hamid Vahidkia

Abstract:

The origins of the Universal Declaration of Human Rights (UDHR) are not widely understood, leading to misconceptions that need to be examined. Recent research disputes the idea that the UDHR was exclusively backed and endorsed by Western countries and even raised doubts about powerful nations backing the creation of global human rights norms. This article examines four political misconceptions regarding the Universal Declaration, with each one having some truth to it but also being misleading. The significance of small states in promoting human rights norms has been underestimated, just as the importance of large states has been exaggerated in history. The Universal Declaration was created through negotiations with the involvement of numerous states. All states have a stake in small states reclaiming their portion of history due to the legitimacy it gained from the political process that formed it.

Keywords: declaration. law, rights, humanity, UDHR

Procedia PDF Downloads 7
2675 The Use of Mnemonic and Mathematical Mnemonic Method in Improving Historical Understanding

Authors: Lee Bih Ni, Nurul Asyikin Binti Hassan

Abstract:

This paper discusses the use of mnemonic and mathematical methods in enhancing the understanding of history. Mnemonics can help students from all levels including high school and in various disciplines including language, math and history. At the secondary level, students are exposed to various courses that require them to remember many facts that can be mastered through the application of mnemonic techniques. Researchers use narrative literature studies to illustrate the current state of art and science in the field of research focused. Researchers used narrative literature reviews to build a scientific base of knowledge. Researchers gather all the key points in the discussion, and put it here by referring to the specific field where the paper is essentially based. The findings suggest that the use of mnemonic techniques can improve the individual's memory by adding little effort. In implementing mnemonic techniques, it is important to integrate mathematics and history in the course as both are interconnected as mathematics has shaped our history and vice versa. This study shows that memory skills can actually be improved; the human mind can remember something more than expected.

Keywords: cognitive strategy, mnemonic technique, secondary school level study, mathematical mnemonic

Procedia PDF Downloads 110
2674 Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia

Authors: Daniel Alati

Abstract:

Recent high-profile terrorist events in Canada, the United Kingdom and Europe – the London Bridge attacks, the terrorist attacks in Nice, France and Barcelona, Spain, the 2014 Ottawa Parliament attacks and the 2017 attacks in Edmonton – have all raised levels of public and academic concern with so-called “lone-wolf” and “radicalized” terrorism. Similarly, several countries outside of the “Western” world have been dealing with radicalization to violent extremism for several years. Many South East Asian countries, including Indonesia, Malaysia, Singapore and the Philippines have all had experience with what might be described as ISIS or extremist-inspired acts of terrorism. Indeed, it appears the greatest strength of groups such as ISIS has been their ability to spread a global message of violent extremism that has led to radicalization in markedly different jurisdictions throughout the world. These markedly different jurisdictions have responded with counter-radicalization strategies that warrant further comparative analysis. This paper utilizes an inter-disciplinary legal methodology. In doing so, it compares legal, political, cultural and historical aspects of the counter-radicalization strategies employed by Canada, the United Kingdom and several South East Asian countries (Indonesia, Malaysia, Singapore and the Philippines). Whilst acknowledging significant legal and political differences between these jurisdictions, the paper engages in these analyses with an eye towards understanding which best practices might be shared between the jurisdictions. In doing so, it presents valuable findings of a comparative nature that are useful to both academic and practitioner audiences in several jurisdictions.

Keywords: Canada, United Kingdom and South East Asia, comparative law and politics, radicalization to violent extremism, terrorism

Procedia PDF Downloads 319
2673 Understanding the Roots of Third World Problems: A Historical and Philosophical Sociology

Authors: Yaser Riki

Abstract:

There are plenty of considerations about the Third World and developing countries, but one of the main issues regarding these areas is how we can study them. This article makes attention to a fundamental way of approaching this subject through the convergence of history, philosophy, and sociology in order to understand the complexity of the Third World countries. These three disciplines are naturally connected and integrated, but they have gradually separated. While sociology has originated from philosophy, this work is an attempt to generate a sociology that incorporates philosophy as well as history at its heart. This is descriptive-analytical research that searches the history of sociology to find works and theories that provide ideas for this purpose, including the sociology of knowledge and science, The German Ideology (Karl Marx and Friedrich Engels), The Protestant Ethic (Max Weber), Ideology and Utopia (Karl Mannheim) and Dialectic of Enlightenment (Horkheimer and Adorno) provide ideas needed for this purpose. The paper offers a methodological and theoretical vision (historical-philosophical sociology) to identify a few factors, such as the system of thought, that are usually invisible and cause problems in societies, especially third-world counties. This is similar to what some of the founders of sociology did in the first world.

Keywords: the third world, methodology, sociology, philosophy, history, social change, development, social movements

Procedia PDF Downloads 80
2672 Analysis of the Performance of State Institutions From 2008-2013 in Pakistan

Authors: Mahrukh Shehzadi

Abstract:

Pakistan is a democratic republic but has spent much time under military rulers; after a few years of independence, Pakistan faced three martial laws in 1958, 1969, and 1977, and the latest in 1999 by General Musharraf. The purpose of this thesis is to analyze the politics, policies and overall performance of Pakistan People’s Party Government from 2008-2013. PPP won a significant victory in the elections of 2008. The co-chairman, Mr. Asif Ali Zardari, announced the end of the fourth dictatorship. It was for the first time in Pakistan’s history that an elected government completed its term (2008-2013). While the completion of its term is an achievement, the performance of the democratically-elected government – federal, provincial and local does not inspire much confidence. Poor governance, persistent confrontational relations between the executive and the judiciary, charges of corruption, and the incompetence of the political leadership to build consensus to combat terrorism continue to cast criticisms on the democratic process and the civilian regime’s capability to sustain democracy. In the present study, the researcher will try to describe and explain the public thinking pattern regarding the policies opted for by the PPP-led government and their impact on the people’s minds of Pakistan.

Keywords: democracy, performance, policies, state, manifesto

Procedia PDF Downloads 29
2671 The Status of the Actio Popularis under International Environmental Law in Cases of Damage to Global Commons

Authors: Aimite Jorge, Leenekela Usebiu

Abstract:

In recent years the International Community has seen a rise of what can be termed as ‘actio popularis”;that is to say lawsuits brought by third parties in the interest of the public or the world community as a whole, such as in cases of genocide and terrorism prosecutions under international law. It is equally clear that under current globalized world the effect of multinational activities on the environment is often felt beyond the borders of the territories where they operate. Equally true is the fact that the correspondence of citizens self-determination with national government is increasingly upset by the increasing willingness of states to share some ‘sovereign powers’ in order to address new economic, environmental and security interdependencies. The ‘unbundling’ of functional governance from fixed territories sees continuously citizens give up their formal approval of key decisions in exchange for a more remote, indirect say in supra-national or international decision-making bodies. The efforts to address a growing transnational flow of ecological harm are at the forefront of such indirect transformations, as evidenced by a proliferation of multilateral environmental agreements (MEAs) over the past three decades. However, unlike the defence of the global commons in cases of terrorism and genocide, there is still to be a clear application of action popularis in the case of environment, despite acknowledgement that the effect of the activities of several multinationals on the environment is as destructive to the global commons as genocide or terrorism are. Thus, this paper looking at specific cases of harmful degradation of the environment by certain multinationals transcending national boundaries, argues that it is high-time for a serious consideration of the application of the actio-popularis to environmental concerns. Although it is acknowledged that in international environmental law the challenge to reach a “critical mass” of recognition and support for an ‘actio-popularis’ for environment damage is particularly demanding, it is worth the try.

Keywords: actio popularis in environment law, global commons, transnational environmental damage, law and environment

Procedia PDF Downloads 535
2670 History, Challenges and Solutions for Social Work Education and Recognition in Vietnam

Authors: Thuy Bui Anh, Ngan Nguyen Thi Thanh

Abstract:

Currently, social work in Vietnam is entering the first step in the development process to become a true profession with a strong position in society. However, Spirit of helping and sharing of social work has already existed in the daily life of Vietnamese people for a very long time, becoming a precious heritage passed down from ancestors to the next generations while expanding the territory, building and defending for the country. Following the stream of history, charity work in Vietnam has gradually transformed itself towards a more professional work, especially in the last 2 decades. Accordingly, more than 50 universities and educational institutions in Vietnam have been licensed to train social work, ensuring a stronger foundation on human resources working in this field. Despite the strong growth, social work profession, social work education and the recognition of the role of the social workers still need to be fueled to develop, responded to the increasing demand of Vietnam society.

Keywords: education, history, recognition, social work, Vietnam

Procedia PDF Downloads 299
2669 A Brief History of Kampo Extract Formulations for Prescription in Japan

Authors: Kazunari Ozaki, Mitsuru Kageyama, Kenki Miyazawa, Yoshio Nakamura

Abstract:

Background: Kampo (Japanese Traditional medicine) is a medicine traditionally practiced in Japan, based on ancient Chinese medicine. Most Kampo doctors have used decoction of crude drug pieces for treatment. 93% of the Kampo drugs sold in Japan are Kampo products nowadays. Of all Kampo products, 81% of them are Kampo extract formulations for prescription, which is prepared in powdered or granulated form from medicinal crude drug extracts mixed with appropriate excipient. Physicians with medical license for Western medicine prescribe these Kampo extract formulations for prescription in Japan. Objectives: Our study aims at presenting a brief history of Kampo extract formulations for prescription in Japan. Methods: Systematic searches for relevant studies were conducted using not only printed journals but also electronic journals from the bibliographic databases, such as PubMed/Medline, Ichushi-Web, and university/institutional websites, as well as search engines, such as Google and Google Scholar. Results: The first commercialization of Kampo extract formulations for general use (or OTC (over-the-counter) Kampo extract formulation) was achieved after 1957. The number of drugs has been subsequentially increased, reaching 148 Kampo extract formulation for prescription currently. Conclusion: We provide a history of Kampo extract formulations for prescription in Japan. The originality of this research is that it analyzes the background history of Kampo in parallel with relevant transitions in the government and insurance systems.

Keywords: health insurance system, history, Kampo, Kampo extract formulation for prescription, OTC Kampo extract formulation, pattern corresponding prescription (Ho-sho-so-tai) system

Procedia PDF Downloads 256
2668 Outcomes of Live Renal Donors with a History of Nephrolithiasis

Authors: Bin Mohamed Ebrahim, Aminesh Singla, Henry Pleass

Abstract:

Aim: There is an ongoing gap in renal transplantation between organs available for donation and recipients on the waiting list. Live donors with pre-existing or a history of renal calculi were thought to be a relative contraindication due to safety concerns for donors. We aim to review current literature assessing outcomes of donors who were found to have a history of renal calculi. Methods: Ovid and Embase were searched between 1960 to 2021 using key terms and Medical Subject Headings (MeSH) – nephrolithiasis, renal stones, renal transplantation and renal graft. Articles included conference proceedings and journal articles and were not excluded based on patient numbers. Studies were excluded if the specific organ was not identified, duplicated reports found or if post-transplant outcomes were not recorded. Outcomes were donor’s renal function or renal calculi recurrence postoperatively. Results: Upon reviewing 344 articles, 14 manuscripts met inclusion criteria. A total of 152 live donors were identified as having pre-existing or with a history of renal calculi at pre-operative workup. The mean stone size was 2.6 4mm (1 – 16) with a mean follow-up duration of 31.8 months (1 – 96). Seven studies had both outcomes. None showed renal complications or stone recurrence. The remaining studies contained 2 out of 84 patients having recurrent nephrolithiasis. Conclusion: Data suggests minimal morbidity involved for live renal donors with a history of nephrolithiasis. This should encourage surgeons to continue recruiting such donors for kidney transplantation.

Keywords: renal transplantation, renal graft, nephrolithiasis, renal calculi, live donor

Procedia PDF Downloads 161
2667 Russia's War Memory: How Tolstoy Uses Homeric Epic to Reconstruct History

Authors: Svetlana Yefimenko

Abstract:

Situated within the fields of Russian literature, Russian history, and classics, this paper investigates the early writing of Leo Tolstoy in terms of his reception and appropriation of Homeric epic for the purposes of reconstructing early 19th-century Russian history. The epic mode, specifically its Homeric variation, was deployed in Tolstoy’s writing on his military experience in the Crimean War to legitimize a version of historical events which positioned Russian soldiers as the inheritors of ancient Greek heroism. With reference to Tolstoy’s oft-neglected Sevastopol’ Sketches, and the short stories The Raid, The Wood-Felling, and Two Hussars, this paper examines how such narratives pass from communicative memory into collective memory both in the Homeric epics and in Tolstoy’s reworking of them, particularly on the literary effects produced when the distance between communicative and collective memory collapses. Within a song culture, epic song functions as memory, and this paper shows how, by modeling his early work on epic, Tolstoy produced texts which act as memory itself, thereby becoming the authoritative version of Russia’s past in the Crimea, often contradicting historical facts.

Keywords: classical reception, collective memory, Russian history, Russian literature

Procedia PDF Downloads 110
2666 Boko Haram Insurrection and Religious Revolt in Nigeria: An Impact Assessment-{2009-2015}

Authors: Edwin Dankano

Abstract:

Evident by incessant and sporadic attacks on Nigerians poise a serious threat to the unity of Nigeria, and secondly, the single biggest security nightmare to confront Nigeria since after amalgamation of the Southern and Northern protectorates by the British colonialist in 1914 is “Boko Haram” a terrorist organization also known as “Jama’atul Ahli Sunnah Lidda’wati wal Jihad”, or “people committed to the propagation of the Prophet’s teachings and jihad”. The sect also upholds an ideology translated as “Western Education is forbidden”, or rejection of Western civilization and institutions. By some estimates, more than 5,500 people were killed in Boko Haram attacks in 2014, and Boko Haram attacks have already claimed hundreds of lives and territories {caliphates}in early 2015. In total, the group may have killed more than 10,000 people since its emergence in the early 2000s. More than 1 million Nigerians have been displaced internally by the violence, and Nigerian refugee figures in neighboring countries continue to rise. This paper is predicated on secondary sources of data and anchored on the Huntington’s theory of clash of civilization. As such, the paper argued that the rise of Boko Haram with its violent disposition against Western values is a counter response to Western civilization that is fast eclipsing other civilizations. The paper posits that the Boko Haram insurrection going by its teachings, and destruction of churches is a validation of the propagation of the sect as a religious revolt which has resulted in dire humanitarian situation in Adamawa, Borno, Yobe, Bauchi, and Gombe states all in north eastern Nigeria as evident in human casualties, human right abuses, population displacement, refugee debacle, livelihood crisis, and public insecurity. The paper submits that the Nigerian state should muster the needed political will in terms of a viable anti-terrorism measures and build strong legitimate institutions that can adequately curb the menace of corruption that has engulfed the military hierarchy, respond proactively to the challenge of terrorism in Nigeria and should embrace a strategic paradigm shift from anti-terrorism to counter-terrorism as a strategy for containing the crisis that today threatens the secular status of Nigeria.

Keywords: Boko Haram, civilization, fundamentalism, Islam, religion revolt, terror

Procedia PDF Downloads 375
2665 Effects of Obesity and Family History of Diabetes on the Association of Cholesterol Ester Transfer Protein Gene with High-Density Lipoprotein Cholesterol Levels in Korean Population

Authors: Jae Woong Sull

Abstract:

Lipid levels are related to the risk of cardiovascular diseases. Cholesterol ester transfer protein (CETP) gene is one of the candidate genes of cardiovascular diseases. A total of 2,304 persons were chosen from a Hospital (N=4,294) in South Korea. Female subjects with the CG/GG genotype had a 2.03 -fold (p=0.0001) higher risk of having abnormal HDL cholesterol levels (<40 mg/dL) than subjects with the CC genotype. Male subjects with the CG/GG genotype had a 1.34 -fold (p=0.0019) higher risk than subjects with the CC genotype. When analyzed by body mass index, the association with CETP was much stronger in male subjects with BMI>=25.69 (OR=1.55, 95% CI: 1.15-2.07, P=0.0037) than in male lean subjects. When analyzed by family history of diabetes, the association with CETP was much stronger in male subjects with positive family history of low physical activity (OR=4.82, 95% CI: 1.86-12.5, P=0.0012) than in male subjects with negative family history of diabetes. This study clearly demonstrates that genetic variants in CETP influence HDL cholesterol levels in Korean adults.

Keywords: CETP, diabetes, obesity, polymorphisms

Procedia PDF Downloads 119
2664 Foucault and Governmentality: International Organizations and State Power

Authors: Sara Dragisic

Abstract:

Using the theoretical analysis of the birth of biopolitics that Foucault performed through the history of liberalism and neoliberalism, in this paper we will try to show how, precisely through problematizing the role of international institutions, the model of governance differs from previous ways of objectifying body and life. Are the state and its mechanisms still a Leviathan to fight against, or can it be even the driver of resistance against the proponents of modern governance and the biopolitical power? Do paradigmatic examples of biopolitics still appear through sovereignty and (international) law, or is it precisely this sphere that shows a significant dose of incompetence and powerlessness in relation to, not only the economic sphere (Foucault’s critique of neoliberalism) but also the new politics of freedom? Have the struggle for freedom and human rights, as well as the war on terrorism, opened a new spectrum of biopolitical processes, which are manifested precisely through new international institutions and humanitarian discourse? We will try to answer these questions, in the following way. On the one hand, we will show that the views of authors such as Agamben and Hardt and Negri, in whom the state and sovereignty are seen as enemies to be defeated or overcome, fail to see how such attempts could translate into the politicization of life like it is done in many examples through the doctrine of liberal interventionism and humanitarianism. On the other hand, we will point out that it is precisely the humanitarian discourse and the defense of the right to intervention that can be the incentive and basis for the politicization of the category of life and lead to the selective application of human rights. Zizek example of the killing of United Nations workers and doctors in a village during the Vietnam War, who were targeted even before police or soldiers, because they were precisely seen as a powerful instrument of American imperialism (as they were sincerely trying to help the population), will be focus of this part of the analysis. We’ll ask the question whether such interpretation is a kind of liquidation of the extreme left of the political (Laclau) or on this basis can be explained at least in part the need to review the functioning of international organizations, ranging from those dealing with humanitarian aid (and humanitarian military interventions) to those dealing with protection and the security of the population, primarily from growing terrorism. Based on the above examples, we will also explain how the discourse of terrorism itself plays a dual role: it can appear as a tool of liberal biopolitics, although, more superficially, it mostly appears as an enemy that wants to destroy the liberal system and its values. This brings us to the basic problem that this paper will tackle: do the mechanisms of institutional struggle for human rights and freedoms, which is often seen as opposed to the security mechanisms of the state, serve the governance of citizens in such a way that the latter themselves participate in producing biopolitical governmental practices? Is the freedom today "nothing but the correlative development of apparatuses of security" (Foucault)? Or, we can continue this line of Foucault’s argumentation and enhance the interpretation with the important question of what precisely today reflects the change in the rationality of governance in which society is transformed from a passive object into a subject of its own production. Finally, in order to understand the skills of biopolitical governance in modern civil society, it is necessary to pay attention to the status of international organizations, which seem to have become a significant place for the implementation of global governance. In this sense, the power of sovereignty can turn out to be an insufficiently strong power of security policy, which can go hand in hand with freedom policies, through neoliberal governmental techniques.

Keywords: neoliberalism, Foucault, sovereignty, biopolitics, international organizations, NGOs, Agamben, Hardt&Negri, Zizek, security, state power

Procedia PDF Downloads 179
2663 Cybercrimes in Nigeria: Its Causes, Effects and Solutions

Authors: Uzoma Igboji

Abstract:

Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.

Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria

Procedia PDF Downloads 501
2662 Seismic Analysis of Structurally Hybrid Wind Mill Tower

Authors: Atul K. Desai, Hemal J. Shah

Abstract:

The tall windmill towers are designed as monopole tower or lattice tower. In the present research, a 125-meter high hybrid tower which is a combination of lattice and monopole type is proposed. The response of hybrid tower is compared with conventional monopole tower. The towers were analyzed in finite element method software considering nonlinear seismic time history load. The synthetic seismic time history for different soil is derived using the SeismoARTIF software. From the present research, it is concluded that, in the hybrid tower, we are not getting resonance condition. The base shear is less in hybrid tower compared to monopole tower for different soil conditions.

Keywords: dynamic analysis, hybrid wind mill tower, resonance condition, synthetic time history

Procedia PDF Downloads 123
2661 Transformation of the Postindustrial City - The Conversion of a Smelter in Restaurant with a Panoramic Views

Authors: Martina Perinkova, Lenka Kolarcikova, Marketa Twrda

Abstract:

In Ostrava there are a lot of former post-industrial areas and areas that have gradually through conversions and their subsequent reuse. One of the largest is the national cultural monument Lower Vítkovice area where there is a large complex transformation of the former iron production. Industrial heritage today visited by tourists for entertainment, culture, history, sports and other activities. This is a unique example of reuse of technical monuments and introduction of new life into the historic area. The main task of not only find the right function and use, in terms of re integration into city life and finding a balance between history and current lifestyle, looking at the history of the area and its technical condition before reconstruction. It is not only very expensive but also time consuming. Transformations industrial monument is the result of a dialogue architect, the idea of the investor and expert opinion heritage institute.

Keywords: post-industrial area, cultural monument, conversions

Procedia PDF Downloads 318
2660 Prediction of Terrorist Activities in Nigeria using Bayesian Neural Network with Heterogeneous Transfer Functions

Authors: Tayo P. Ogundunmade, Adedayo A. Adepoju

Abstract:

Terrorist attacks in liberal democracies bring about a few pessimistic results, for example, sabotaged public support in the governments they target, disturbing the peace of a protected environment underwritten by the state, and a limitation of individuals from adding to the advancement of the country, among others. Hence, seeking for techniques to understand the different factors involved in terrorism and how to deal with those factors in order to completely stop or reduce terrorist activities is the topmost priority of the government in every country. This research aim is to develop an efficient deep learning-based predictive model for the prediction of future terrorist activities in Nigeria, addressing low-quality prediction accuracy problems associated with the existing solution methods. The proposed predictive AI-based model as a counterterrorism tool will be useful by governments and law enforcement agencies to protect the lives of individuals in society and to improve the quality of life in general. A Heterogeneous Bayesian Neural Network (HETBNN) model was derived with Gaussian error normal distribution. Three primary transfer functions (HOTTFs), as well as two derived transfer functions (HETTFs) arising from the convolution of the HOTTFs, are namely; Symmetric Saturated Linear transfer function (SATLINS ), Hyperbolic Tangent transfer function (TANH), Hyperbolic Tangent sigmoid transfer function (TANSIG), Symmetric Saturated Linear and Hyperbolic Tangent transfer function (SATLINS-TANH) and Symmetric Saturated Linear and Hyperbolic Tangent Sigmoid transfer function (SATLINS-TANSIG). Data on the Terrorist activities in Nigeria gathered through questionnaires for the purpose of this study were used. Mean Square Error (MSE), Mean Absolute Error (MAE) and Test Error are the forecast prediction criteria. The results showed that the HETFs performed better in terms of prediction and factors associated with terrorist activities in Nigeria were determined. The proposed predictive deep learning-based model will be useful to governments and law enforcement agencies as an effective counterterrorism mechanism to understand the parameters of terrorism and to design strategies to deal with terrorism before an incident actually happens and potentially causes the loss of precious lives. The proposed predictive AI-based model will reduce the chances of terrorist activities and is particularly helpful for security agencies to predict future terrorist activities.

Keywords: activation functions, Bayesian neural network, mean square error, test error, terrorism

Procedia PDF Downloads 138