Search results for: criminal digital evidence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6824

Search results for: criminal digital evidence

6614 The Consequence of Being Perceived as An 'Immodest Woman': The Kuwaiti Criminal Justice System’s Response to Allegations of Sexual Violence

Authors: Eiman Alqattan

Abstract:

Kuwaiti criminal justice system’s responses to allegations of sexual violence against women during the pre-trial process, suggesting that the system in Kuwait is affected by an ethos that is male dominated and patriarchal, and which results in prejudicial, unfair, and unequal treatment of female victims of serious sexual offenses. Data derived from qualitative semi-structured face-to-face interviews with four main groups of criminal justice system personnel in Kuwait (prosecutors, police investigators, police officers, and investigators) reveal the characteristics of a complaint of sexual violence that contribute to cases being either sent to court or dismissed. This proposed paper will suggest that Arab cultural views of women appear to influence and even shape the views, perceptions, and conduct of the interviewed Kuwaiti criminal justice system personnel regarding complaints of sexual violence made by citizens. Data from the interviews show how the image of the ‘modest woman’ that exists within Arabic cultural views and norms greatly contributes to shaping the characteristics of what the majority of the interviewed officials considered to be a ‘credible’ allegation of sexual violence. In addition, it is clear that the interviewees’ definitions of ‘modesty’ varied. Yet the problem is not only about the stereotypical perceptions of complainants or the consequences of those perceptions on the decision to send the case to court. These perceptions also affected the behaviours of criminal justice system personnel towards citizen complainants. When complainants’ allegations were questioned, investigators went as far as abusing the women verbally or physically, often in order to force them to withdraw the so-called ‘false’ complaint in order to protect the ‘real’ victim: the ‘innocent defendant’. The proposed presentation will discuss these police approaches to women and the techniques used in assessing the credibility of their accusations, including how they differ depending on whether the complainant was under or over 21 years old.

Keywords: criminal justice system, law and Arab culture, modest woman, sexual violence

Procedia PDF Downloads 295
6613 User Acceptance Criteria for Digital Libraries

Authors: Yu-Ming Wang, Jia-Hong Jian

Abstract:

The Internet and digital publication technologies have brought dramatic impacts on how people collect, organize, disseminate, access, store, and use information. More and more governments, schools, and organizations spent huge funds to develop digital libraries. A digital library can be regarded as a web extension of traditional physically libraries. People can search diverse publications, find out the position of knowledge resources, and borrow or buy publications through digital libraries. People can gain knowledge and students or employees can finish their reports by using digital libraries. Since the considerable funds and energy have been invested in implementing digital libraries, it is important to understand the evaluative criteria from the users’ viewpoint in order to enhance user acceptance. This study develops a list of user acceptance criteria for digital libraries. An initial criteria list was developed based on some previously validated instruments related to digital libraries. Data were collected from user experiences of digital libraries. The exploratory factor analysis and confirmatory factor analysis were adopted to purify the criteria list. The reliabilities and validities were tested. After validating the criteria list, a user survey was conducted to collect the comparative importance of criteria. The analytic hierarchy process (AHP) method was utilized to derive the importance of each criterion. The results of this study contribute to an e understanding of the criteria and relative importance that users evaluate for digital libraries.

Keywords: digital library, user acceptance, analytic hierarchy process, factor analysis

Procedia PDF Downloads 253
6612 Forensic Nursing in the Emergency Department: The Overlooked Roles

Authors: E. Tugba Topcu

Abstract:

The emergency services are usually the first places to encounter forensic cases. Hence, it is important to consider forensics from the perspective of the emergency services staff and the physiological and psychological consequences that may arise as a result of behaviour by itself or another person. Accurate and detailed documentation of the situation in which the patient first arrives at the emergency service and preservation of the forensic findings is pivotal for the subsequent forensic investigation. The first step in determining whether or not a forensic case exists is to perform a medical examination of the patient. For each individual suspected to be part of a forensic case, police officers should be informed at the same time as the medical examination is being conducted. Violent events are increasing every year and with an increase in the number of forensic cases, emergency service workers have increasing responsibility and consequently play a key role in protecting, collecting and arranging the forensic evidence. In addition, because the emergency service workers involved in forensic events typically have information about the accused and/or victim, as well as evidence related to the events and the cause of injuries, police officers often require their testimony. However, both nurses and other health care personnel do not typically have adequate expertise in forensic medicine. Emergency nurses should take an active role for determining that whether any patient admitted to the emergency services is a clinical forensic patient the emergency service with injury and requiring possible punishment and knowing of their roles and responsibilities in this area provides legal protection as well as the protection of the judicial affair. Particularly, in emergency services, where rapid patient turnover and high workload exists, patient registration and case reporting may not exist. In such instances, the witnesses, typically the nurses, are often consulted for information. Knowledge of forensic medical matters plays a vital role in achieving justice. According to the Criminal Procedure Law, Article 75, Paragraph 3, ‘an internal body examination or the taking of blood or other biological samples from the body can be performed only by a doctor or other health professional member’. In favour of this item, the clinic nurse and doctor are mainly responsible for evaluating forensic cases in emergency departments, performing the examination, collecting evidence, and storing and reporting data. The courts place considerable importance on determining whether a suspect is the victim or accused and, thus, in terms of illuminating events, it is crucial that any evidence is gathered carefully and appropriately. All the evidence related to the forensic case including the forensic report should be handed over to the police officers. In instances where forensic evidence cannot be collected and the only way to obtain the evidence is the hospital environment, health care personnel in emergency services need to have knowledge about the diagnosis of forensic evidence, the collection of evidence, hiding evidence and provision of the evidence delivery chain.

Keywords: emergency department, emergency nursing, forensic cases, forensic nursing

Procedia PDF Downloads 250
6611 Emerging Challenges Related to Digital Pedagogy: A Practitioners’ Case

Authors: Petronella Jonck, Martin Chanza, Anna-Marie Pelser

Abstract:

Ascribed to the global pandemic most higher education institutions responded by relocating content presented by means of contact sessions to an online platform giving rise to digital pedagogy. The purpose of the research reported on was to explore emerging challenges linked to digital pedagogy from a practitioner stance. Digital pedagogy has emerged as a powerful tool to compliment traditional methods. However, stumbling blocks should be identified and addressed for future utilization. A qualitative research design was implemented by means of a semi-structured interview schedule distributed to practitioners during the COVID-19 pandemic. Results revealed that institutional type influenced the implementation of digital pedagogy. Other challenges relate to the increased cost of education, decreased access, limited knowledge about digital pedagogy, behavioral intent to adopt a multi-modal approach, lack of ICT infrastructure to mention a few. Higher education institutions should address challenges towards the optimal use of digital pedagogy in future.

Keywords: COVID-19, digital pedagogy, higher education institutions, information communication technology

Procedia PDF Downloads 129
6610 The Effectiveness of Exchange of Tacit and Explicit Knowledge Using Digital and Face to Face Sharing

Authors: Delio I. Castaneda, Paul Toulson

Abstract:

The purpose of this study was to investigate the knowledge sharing effectiveness of two types of knowledge, tacit and explicit, depending on two channels: face to face or digital. Participants were 217 knowledge workers in New Zealand and researchers who attended a knowledge management conference in the United Kingdom. In the study, it was found that digital tools are effective to share explicit knowledge. In addition, digital tools that facilitated dialogue were effective to share tacit knowledge. It was also found that face to face communication was an effective way to share tacit and explicit knowledge. Results of this study contribute to clarify in what cases digital tools are effective to share tacit knowledge. Additionally, even though explicit knowledge can be easily shared using digital tools, this type of knowledge is also possible to be shared through dialogue. Result of this study may support practitioners to redesign programs and activities based on knowledge sharing to make strategies more effective.

Keywords: digital knowledge, explicit knowledge, knowledge sharing, tacit knowledge

Procedia PDF Downloads 253
6609 Emerging Film Makers in Tamil Cinema Liberated by Digital Media

Authors: Valarmathi Subramaniam

Abstract:

Ever since the first Indian feature film was produced and released by Shri Dada Saheb Phalke in the year 1931, the Indian Film Industry has grown leaps and bounds. The Indian Film Industry stands as the largest film industry in the world, and it produces more than a thousand films every year with investments and revenues worth several billion rupees. As per the official report published by UNESCO in the year 2017 on their website, it states that in the year 2015, India has produced one thousand nine hundred and seven feature films using digital technology. Not only is the cinema adapted to digital technologies, but the digital technologies also opened up avenues for talents to enter the cinema industry. This paper explores such talents who have emerged in the film industry without any background, neither academic nor from their family background, but holding digital media as their weapon. The research involves two variants of filmmaking technology – Celluloid and Digital. The study used a selective sampling of films that were released from the year 2020-to 2022. The sample has been organized, resulting in popular and fresh talents in the editing phase of filmmaking. There were 48 editors, of which 12 editors were not popular and 6 of them were fresh into the film without any background. Interview methods were used to collect data on what helped them to get into the industry straight. The study found that the digital medium and the digital technology enabled them to get into the film industry.

Keywords: digital media, digital in cinema, digital era talents, emerging new talents

Procedia PDF Downloads 116
6608 Virtualization of Production Using Digital Twin Technology

Authors: Bohuslava Juhasova, Igor Halenar, Martin Juhas

Abstract:

The contribution deals with the current situation in modern manufacturing enterprises, which is affected by digital virtualization of different parts of the production process. The overview part of this article points to the fact, that wide informatization of all areas causes substitution of real elements and relationships between them with their digital, often virtual images, in real practice. Key characteristics of the systems implemented using digital twin technology along with essential conditions for intelligent products deployment were identified across many published studies. The goal was to propose a template for the production system realization using digital twin technology as a supplement to standardized concepts for Industry 4.0. The main resulting idea leads to the statement that the current trend of implementation of the new technologies and ways of communication between industrial facilities erases the boundaries between the real environment and the virtual world.

Keywords: communication, digital twin, Industry 4.0, simulation, virtualization

Procedia PDF Downloads 246
6607 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 161
6606 Modern Scotland Yard: Improving Surveillance Policies Using Adversarial Agent-Based Modelling and Reinforcement Learning

Authors: Olaf Visker, Arnout De Vries, Lambert Schomaker

Abstract:

Predictive policing refers to the usage of analytical techniques to identify potential criminal activity. It has been widely implemented by various police departments. Being a relatively new area of research, there are, to the author’s knowledge, no absolute tried, and true methods and they still exhibit a variety of potential problems. One of those problems is closely related to the lack of understanding of how acting on these prediction influence crime itself. The goal of law enforcement is ultimately crime reduction. As such, a policy needs to be established that best facilitates this goal. This research aims to find such a policy by using adversarial agent-based modeling in combination with modern reinforcement learning techniques. It is presented here that a baseline model for both law enforcement and criminal agents and compare their performance to their respective reinforcement models. The experiments show that our smart law enforcement model is capable of reducing crime by making more deliberate choices regarding the locations of potential criminal activity. Furthermore, it is shown that the smart criminal model presents behavior consistent with popular crime theories and outperforms the baseline model in terms of crimes committed and time to capture. It does, however, still suffer from the difficulties of capturing long term rewards and learning how to handle multiple opposing goals.

Keywords: adversarial, agent based modelling, predictive policing, reinforcement learning

Procedia PDF Downloads 147
6605 An Examination of the Powers of the Executive to Continued Detention of Suspects in Disobedience to Court Orders

Authors: Chukwuemeka Castro Nwabuzor

Abstract:

The 2015 Administration of Criminal Justice Act in Nigeria clearly sets out conditions for bail for felonies, lesser offenses and capital offenses. Even where the conditions for bail are met, granting an application for bail is not automatic as it is subject to the discretion of the court. Where the court, however, grants bail to an accused, the detaining authority which usually is the executive arm of government is bound to comply with the order of the court. This paper discusses the constitutionality of the continued detention of criminal suspects in disobedience to an order of the court and in the absence of an appeal. Particularly, the paper looks at the rights to personal liberty, the dignity of the human person and also the presumption of innocence which remains one of the crucial pillars of our criminal jurisprudence. The paper analyses the reasons posed by the executive for the continued detention of a suspect including State security and security of the suspect and questions whether the reasons are reasonable justifiable in a constitutional democratic society and whether they breach the principles of separation of powers. The paper concludes that the continued detention criminal of suspects in disobedience to court orders constitutes contempt of court and dishonours the principles of separation of powers enshrined in the Nigerian Constitution. This paper makes a strong case for the donation of more enforceable powers to the judiciary particularly with regards to the granting of compensation orders against the executive and ensuring compliance by the executive to bail orders.

Keywords: breach of fundamental rights, contempt of court, discretion of court, right to bail, separation of powers

Procedia PDF Downloads 163
6604 Digital Humanities in The US/Mexico Borderlands: Activism, Literature, and Border Crossers

Authors: Martin Camps

Abstract:

The two-thousand-mile border that divides the United States and Mexico is a “contact zone” of cultural friction and unbalanced power relations as defined by Mary Louise Pratt. The interest of this paper is to analyze digital platforms created to address the study and comprehension of the borderlands with pedagogical and research reasons. The paper explores ways to engage students in archival and analytical practices to build a repository of resources, links, and digital tools and consider how to adapt them to the study of the borderlands. Sites such as “Torn Apart / Separados,” “Digital Borderlands,” “Borderlands Archives Cartography,” and “Juaritos Literario” show visualizations, mapping, and access to materials and marginal literature on the border phenomenon. Analyzing these projects contributes to highlighting digital projects and the study of the border and how to engage in activism via the study of literature and the representation of a human tragedy that underscores the divisions and biopolitics imposed on the Global South and imagine the digital border futures.

Keywords: borderlands, digital humanities, activism, border literature

Procedia PDF Downloads 75
6603 Comparison of Breast Surface Doses for Full-Field Digital Mammography and Digital Breast Tomosynthesis Using Breast Phantoms

Authors: Chia-Hui Chen, Chien-Kuo Wang

Abstract:

Background: Full field digital mammography (FFDM) is widely used in diagnosis of breast cancer. Digital breast tomosynthesis (DBT) has recently been introduced into the clinic and is being used for screening for breast cancer in the general population. Hence, the radiation dose delivered to the patients involved in an imaging protocol is of utmost concern. Aim: To compare the surface radiation dose (ESD) of digital breast tomosynthesis (DBT) and full-field digital mammography (FFDM) by using breast phantoms. Method: We analyzed the average entrance surface dose (ESD) of FFDM and DBT by using breast phantoms. Optically Stimulated luminescent Dosimeters (OSLD) were placed in a tissue-equivalent Breast phantom at difference sites of interest. Absorbed dose measurements were obtained after digital breast tomosynthesis (DBT) and full-field digital mammography (FFDM) exposures. Results: An automatic exposure control (AEC) is proposed for surface dose measurement during DBT and FFDM. The mean ESD values for DBT and FFDM were 6.37 mGy and 3.51mGy, respectively. Using of OSLD measured for surface dose during DBT and FFDM. There were 19.87 mGy and 11.36 mGy, respectively. The surface exposure dose of DBT could possibly be increased by two times with FFDM. Conclusion: The radiation dose from DBT was higher than that of FFDM and the difference in dose between AEC and OSLD measurements at phantom surface.

Keywords: full-field digital mammography, digital breast tomosynthesis, optically stimulated luminescent dosimeters, surface dose

Procedia PDF Downloads 419
6602 Designing the Maturity Model of Smart Digital Transformation through the Foundation Data Method

Authors: Mohammad Reza Fazeli

Abstract:

Nowadays, the fourth industry, known as the digital transformation of industries, is seen as one of the top subjects in the history of structural revolution, which has led to the high-tech and tactical dominance of the organization. In the face of these profits, the undefined and non-transparent nature of the after-effects of investing in digital transformation has hindered many organizations from attempting this area of this industry. One of the important frameworks in the field of understanding digital transformation in all organizations is the maturity model of digital transformation. This model includes two main parts of digital transformation maturity dimensions and digital transformation maturity stages. Mediating factors of digital maturity and organizational performance at the individual (e.g., motivations, attitudes) and at the organizational level (e.g., organizational culture) should be considered. For successful technology adoption processes, organizational development and human resources must go hand in hand and be supported by a sound communication strategy. Maturity models are developed to help organizations by providing broad guidance and a roadmap for improvement. However, as a result of a systematic review of the literature and its analysis, it was observed that none of the 18 maturity models in the field of digital transformation fully meet all the criteria of appropriateness, completeness, clarity, and objectivity. A maturity assessment framework potentially helps systematize assessment processes that create opportunities for change in processes and organizations enabled by digital initiatives and long-term improvements at the project portfolio level. Cultural characteristics reflecting digital culture are not systematically integrated, and specific digital maturity models for the service sector are less clearly presented. It is also clearly evident that research on the maturity of digital transformation as a holistic concept is scarce and needs more attention in future research.

Keywords: digital transformation, organizational performance, maturity models, maturity assessment

Procedia PDF Downloads 105
6601 Victims and Violators: Open Source Information, Admissibility Standards, and War Crimes Investigations in Iraq and Syria

Authors: Genevieve Zingg

Abstract:

Modern technology and social media platforms have fundamentally altered the nature of war crimes investigations by providing new forms of data, evidence, and documentation, and pose a unique opportunity to expand the efficacy of international law. However, much of the open source information available is deemed inadmissible in subsequent legal proceedings and fails to function as evidence largely due to issues of reliability and verifiability. Focusing on current judicial investigations related to ongoing conflicts in Syria and Iraq, this paper will examine key challenges and opportunities for the effective use of open source information in securing justice. This paper will consider strategies and approaches that can be used to ensure that information collected by affected populations meets basic admissibility standards. This paper argues that the critical failure to equip civilian populations in conflict zones with knowledge and information regarding established admissibility standards and guidelines both jeopardizes the potential of open source information and compromises the ability of victims to participate effectively in justice and accountability processes. The ultimate purpose of this paper is, therefore, to examine how to maximize the value of open source information based on the rules of evidence in international, regional, and national courts, and how to maximize the participation of affected populations in holding their abusers to account.

Keywords: human rights, international criminal law, international justice, international law, Iraq, open source information, social media, Syria, transitional justice, war crimes

Procedia PDF Downloads 332
6600 Nigcomsat-1r and Planned HTS Communication Satellite Critical Pillars for Nigeria’s National Digital Economy Policy and Strategy

Authors: Ibrahim Isa Ali (Pantami), Abdu Jaafaru Bambale, Abimbola Alale, Danjuma Ibrahim Ndihgihdah, Muhammad Alkali, Adamu Idris Umar, Moshood Kareem, Samson Olufunmilayo Abodunrin, Muhammad Dokko Zubairu

Abstract:

The National Digital Economy Policy and Strategy, NDEPS document developed by Nigeria’s Federal Ministry of Communications & Digital Economy (FMoCDE) is anchored on 8 pillars for the acceleration of the National Digital Economy for a Digital Nigeria. NIGCOMSAT-1R and the planned HTS communication Satellite are critical assets for supporting the pillars in the drive for sustainable growth and development. This paper discusses on the gains and contribution of the strategy as a solid infrastructure. The paper also highlights these assets’ contribution as platform for Indigenous Content Development & Adoption, Digital Literacy & Skills, and Digital Services Development & Promotion.

Keywords: FMoCDE, HTS, NDEPS, nigcomsat!R, pillars

Procedia PDF Downloads 111
6599 Constitutional Transition and Criminal Justice: Proposals for Reform of Kenya’s Youth Justice System Based on Restorative Justice Principles

Authors: M. Wangai

Abstract:

Following the promulgation of a new Constitution of Kenya in 2010, wide-ranging proposals for reform of the criminal justice system have been made. Proposed measures include a clear and separate system of dealing with juvenile offenders with a greater focus on rehabilitation and reintegration. As part of a broader constitutional transition, this article considers the contribution of restorative justice to reforming the youth justice system. The paper analyses Kenya’s juvenile justice legal framework measured against current international trends in youth justice. It identifies the first post-independence juvenile justice system as a remnant of the colonial period and notes that the post-2001 system is a marked improvement. More recent legal and institutional efforts to incorporate restorative justice are also examined. The paper advocates further development of the juvenile justice system by mainstreaming of restorative justice principles through national level legislative amendments. International and comparative perspectives are used to inform a diversion centered model of restorative justice. In addition, a case is made for the use of existing forms of alternative dispute resolution. Conscious of a tense political climate, the paper also proposes strategies to address challenges posed by a punitive penal environment, chiefly the linking of restorative justice to wider democratic goals and community spirit. The article concludes that restorative justice led juvenile justice reform will contribute to better treatment of young offenders under the criminal justice system and has the potential to set a new precedent for fair, sustainable and effective justice. Further, as part of far-reaching criminal justice reform, the proposed efforts may strengthen democratic progress in Kenya’s ensuing phase of political transition.

Keywords: constitutional transition, criminal justice, restorative justice, young offenders

Procedia PDF Downloads 146
6598 Economic Characteristics of Bitcoin: "An Analytical Study"

Authors: Abdelhalem Shahen

Abstract:

The world is now experiencing a digital revolution and greatly accelerated technological developments, in addition to the transition from the economy in its traditional form to the digital economy, which has resulted in the emergence of new tools that are appropriate to those developments, and from this, this paper attempts to explore the economic characteristics of the bitcoin currency that circulated recently. Due to the many advantages that distinguish it from money in its traditional forms, which have a range of economic effects. The study found that Bitcoin is among the technological innovations, which contain a set of characteristics that are worth studying, those that make it the focus of attention, such as the digital currency, the peer-to-peer property, Lower and Faster Transaction Costs, transparency, decentralized control, privacy, and Double-Spending, as well as security and Cryptographic, and finally mining.

Keywords: Digital Economics, Digital Currencies, Bitcoin, Features of Bitcoin

Procedia PDF Downloads 137
6597 A Regulatory Analysis on Legal Problems of BitCoin

Authors: Fady Tawakol

Abstract:

BitCoin is a decentralized cryptocurrency that can be used without the need of traditional central banks to accomplish any e-commerce trade. The use of such currency could facilitate new economic interactions and linkages. However, without effective and efficient regulations, cryptocurrency transactions are mostly used by criminals to commit crimes such as money laundering, theft, and blackmailing. And because law is one step behind technological developments, this paper discusses the importance of regulations and supervision for the BitCoin-system, to provide unified regulatory solutions for our digital future in the Middle East. It will provide a detailed analysis of the legal nature of BitCoin along with, its regulation with respect to criminal and civil law.

Keywords: BitCoin, financial protection, crypto currency, money laundering

Procedia PDF Downloads 207
6596 The Impact of the COVID-19 on the Cybercrimes in Hungary and the Possible Solutions for Prevention

Authors: László Schmidt

Abstract:

Technological and digital innovation is constantly and dynamically evolving, which poses an enormous challenge to both lawmaking and law enforcement. To legislation because artificial intelligence permeates many areas of people’s daily lives that the legislator must regulate. it can see how challenging it is to regulate e.g. self-driving cars/taxis/camions etc. Not to mention cryptocurrencies and Chat GPT, the use of which also requires legislative intervention. Artificial intelligence also poses an extraordinary challenge to law enforcement. In criminal cases, police and prosecutors can make great use of AI in investigations, e.g. in forensics, DNA samples, reconstruction, identification, etc. But it can also be of great help in the detection of crimes committed in cyberspace. In the case of cybercrime, on the one hand, it can be viewed as a new type of crime that can only be committed with the help of information systems, and that has a specific protected legal object, such as an information system or data. On the other hand, it also includes traditional crimes that are much easier to commit with the help of new tools. According to Hungarian Criminal Code section 375 (1), any person who, for unlawful financial gain, introduces data into an information system, or alters or deletes data processed therein, or renders data inaccessible, or otherwise interferes with the functioning of the information system, and thereby causes damage, is guilty of a felony punishable by imprisonment not exceeding three years. The Covid-19 coronavirus epidemic has had a significant impact on our lives and our daily lives. It was no different in the world of crime. With people staying at home for months, schools, restaurants, theatres, cinemas closed, and no travel, criminals have had to change their ways. Criminals were committing crimes online in even greater numbers than before. These crimes were very diverse, ranging from false fundraising, the collection and misuse of personal data, extortion to fraud on various online marketplaces. The most vulnerable age groups (minors and elderly) could be made more aware and prevented from becoming victims of this type of crime through targeted programmes. The aim of the study is to show the Hungarian judicial practice in relation to cybercrime and possible preventive solutions.

Keywords: cybercrime, COVID-19, Hungary, criminal law

Procedia PDF Downloads 57
6595 Evaluating the Use of Digital Art Tools for Drawing to Enhance Artistic Ability and Improve Digital Skill among Junior School Students

Authors: Aber Salem Aboalgasm, Rupert Ward

Abstract:

This study investigated some results of the use of digital art tools by junior school children in order to discover if these tools could promote artistic ability and creativity. The study considers the ease of use and usefulness of the tools as well as how to assess artwork produced by digital means. As the use of these tools is a relatively new development in Art education, this study may help educators in their choice of which tools to use and when to use them. The study also aims to present a model for the assessment of students’ artistic development and creativity by studying their artistic activity. This model can help in determining differences in students’ creative ability and could be useful both for teachers, as a means of assessing digital artwork, and for students, by providing the motivation to use the tools to their fullest extent. Sixteen students aged nine to ten years old were observed and recorded while they used the digital drawing tools. The study found that, according to the students’ own statements, it was not the ease of use but the successful effects the tools provided which motivated the children to use them.

Keywords: artistic ability, creativity, drawing digital tool, TAM model, psychomotor domain

Procedia PDF Downloads 328
6594 The Role of the Accused’s Attorney in the Criminal Justice System of Iran, Mashhad 2014

Authors: Mahdi Karimi

Abstract:

One of the most basic standards of fair trial is the right to defense, hire an attorney and its presence in the hearing stages. On the one hand, based on the reason and justice, as the legal issues, particularly criminal affairs, become complicated, the accused must benefit from an attorney in the court in order to defend itself which requires legal knowledge. On the other hand, as the judicial system has jurists such as investigation judges at its disposal, the accused must enjoy the same right to defend itself and reject allegations so that the balance is maintained between the litigating parties based on the principle of "equality of arms". The right to adequate time and facilities for defense is cited among the principles and rights relevant to the proceedings in international regulations such as the International Covenant on Civil and Political Rights. The innovations made in the Code of Criminal Procedure in 2013 guaranteed the presence of the accused’s attorney in the proceedings. The present study aims at assessing the result of the aforementioned guarantee in practice and made attempts to investigate the effect of the presence of accused’s attorney on reducing the punishment by asking the question and addressing the statistical population of this study including 48 judges of lower courts and courts of appeal. It seems that in despite of guarantees provided in the new Code of Criminal Procedure, Iran's penal system, does not tolerate the presence of an attorney in practice.

Keywords: defense attorney, equality of arms, fair trial, reducing the penalty, right to defense

Procedia PDF Downloads 333
6593 The Effects of a Digital Dialogue Game on Higher Education Students’ Argumentation-Based Learning

Authors: Omid Noroozi

Abstract:

Digital dialogue games have opened up opportunities for learning skills by engaging students in complex problem solving that mimic real world situations, without importing unwanted constraints and risks of the real world. Digital dialogue games can be motivating and engaging to students for fun, creative thinking, and learning. This study explored how undergraduate students engage with argumentative discourse activities which have been designed to intensify debate. A pre-test, post-test design was used with students who were assigned to groups of four and asked to debate a controversial topic with the aim of exploring various 'pros and cons' on the 'Genetically Modified Organisms (GMOs)'. Findings reveal that the Digital dialogue game can facilitate argumentation-based learning. The digital Dialogue game was also evaluated positively in terms of students’ satisfaction and learning experiences.

Keywords: argumentation, dialogue, digital game, learning, motivation

Procedia PDF Downloads 318
6592 Managing Business Processes in the Age of Digital Transformation: A Literature Review

Authors: Ana-Marija Stjepić, Dalia Suša Vugec

Abstract:

Today, digital transformation is one of the leading topics that occupy the attention of scientific circles and business experts. Organizational success is most often reflected through the successful managing of business processes. Given the growing market for digital innovations and its ever-increasing impact on business, organizations need to be prepared for organizational changes that come with the digital era. In order to maintain their competitive advantage in the global market, organizations must adapt their processes to new digitalization conditions. The main goal of this study is to point out the link between the digital transformation and the business process management concept. Therefore, in order to contribute to the scientific field that explores the potential relation between business process management concept and digital transformation, a literature review has been conducted. Papers have been searched within the Business Process Management Journal by keywords related to the term digital transformation. Selected papers have been analyzed according to the topic, type of publication, year of publication, keywords, etc. The results reveal a growing number of papers published on the topic of digital transformation to the Business Process Management Journal, but the lack of case studies. This paper contributes to the extension of academic literature in this important, yet insufficiently researched, scientific field that creates the bond between two strong concepts of digital transformation and business process management.

Keywords: business process management, digital transformation, digitalization, process change

Procedia PDF Downloads 171
6591 Teaching Techno-Criticism to Digital Natives: Participatory Journalism as Pedagogical Practice

Authors: Stephen D. Caldes

Abstract:

Teaching media and digital literacy to “digital natives” presents a unique set of pedagogical obstacles, especially when critique is involved, as these early-adopters tend to deify most technological and/or digital advancements and inventions. Knowing no other way of being, these natives are often reluctant to hear criticisms of the way they receive information, educate themselves, communicate with others, and even become enculturated because critique often connotes generational gaps and/or clandestine efforts to produce neo-Luddites. To digital natives, techno-criticism is more the result of an antiquated, out-of-touch agenda rather than a constructive, progressive praxis. However, the need to cultivate a techno-critical perspective among technology’s premier users has, perhaps, never been more pressing. In an effort to sidestep reluctance and encourage critical thought about where we are in terms of digital technology and where exactly it may be taking us, this essay outlines a new model for teaching techno-criticism to digital natives. Specifically, it recasts the techniques of participatory journalism—helping writers and readers understand subjects outside of their specific historical context—as progressive, interdisciplinary pedagogy. The model arises out of a review of relevant literature and data gathered via literary analysis and participant observation. Given the tenuous relationships between novel digital advancements, individual identity, collective engagement, and, indeed, Truth/fact, shepherding digital natives toward routine practice of “techno-realism” seems of utter importance.

Keywords: digital natives, journalism education, media literacy, techno-criticism

Procedia PDF Downloads 318
6590 Evidence Based Practice for Oral Care in Children

Authors: T. Turan, Ç. Erdoğan

Abstract:

As far as is known, general nursing care practices do not include specific evidence-based practices related to oral care in children. This study aimed to evaluate the evidence based nursing practice for oral care in children. This article is planned as a review article by searching the literature in this field. According to all age groups and the oral care in various specific situations located evidence in the literature were examined. It has been determined that the methods and frequency used in oral care practices performed by nurses in clinics differ from one hospital to another. In addition, it is seen that different solutions are used in basic oral care, oral care practices to prevent ventilator-associated pneumonia and evidence-based practice in mucositis management in children. As a result, a standard should be established in oral care practices for children and education for children is recommended.

Keywords: evidence-based practice, oral care, nursing, children

Procedia PDF Downloads 292
6589 Gender Identification Using Digital Forensics

Authors: Vinod C. Nayak

Abstract:

In day-to-day forensic practice, identification is always a difficult task. Availability of anti-mortem and postmortem records plays a major rule in facilitating this tough task. However, the advent of digital forensic is a boon for forensic experts. This study has made use of digital forensics to establish identity by radiological dimensions of maxillary sinus using workstation software. The findings suggest a significant association between maxillary sinus dimensions and human gender. The author will be discussing the methods and results of the study in this e-poster.

Keywords: digital forensics, identification, maxillary sinus, radiology

Procedia PDF Downloads 417
6588 Crime Prevention with Artificial Intelligence

Authors: Mehrnoosh Abouzari, Shahrokh Sahraei

Abstract:

Today, with the increase in quantity and quality and variety of crimes, the discussion of crime prevention has faced a serious challenge that human resources alone and with traditional methods will not be effective. One of the developments in the modern world is the presence of artificial intelligence in various fields, including criminal law. In fact, the use of artificial intelligence in criminal investigations and fighting crime is a necessity in today's world. The use of artificial intelligence is far beyond and even separate from other technologies in the struggle against crime. Second, its application in criminal science is different from the discussion of prevention and it comes to the prediction of crime. Crime prevention in terms of the three factors of the offender, the offender and the victim, following a change in the conditions of the three factors, based on the perception of the criminal being wise, and therefore increasing the cost and risk of crime for him in order to desist from delinquency or to make the victim aware of self-care and possibility of exposing him to danger or making it difficult to commit crimes. While the presence of artificial intelligence in the field of combating crime and social damage and dangers, like an all-seeing eye, regardless of time and place, it sees the future and predicts the occurrence of a possible crime, thus prevent the occurrence of crimes. The purpose of this article is to collect and analyze the studies conducted on the use of artificial intelligence in predicting and preventing crime. How capable is this technology in predicting crime and preventing it? The results have shown that the artificial intelligence technologies in use are capable of predicting and preventing crime and can find patterns in the data set. find large ones in a much more efficient way than humans. In crime prediction and prevention, the term artificial intelligence can be used to refer to the increasing use of technologies that apply algorithms to large sets of data to assist or replace police. The use of artificial intelligence in our debate is in predicting and preventing crime, including predicting the time and place of future criminal activities, effective identification of patterns and accurate prediction of future behavior through data mining, machine learning and deep learning, and data analysis, and also the use of neural networks. Because the knowledge of criminologists can provide insight into risk factors for criminal behavior, among other issues, computer scientists can match this knowledge with the datasets that artificial intelligence uses to inform them.

Keywords: artificial intelligence, criminology, crime, prevention, prediction

Procedia PDF Downloads 75
6587 The Application of Article 111 of the Constitution of Bangladesh in the Criminal Justice System as a Sentencing Guideline

Authors: Sadiya S. Silvee

Abstract:

Generally, the decision of the higher court is binding on its subordinate courts. As provided in Article 111 of the Constitution, 'the law declared by the Appellate Division (AD) shall be binding on the High Court Division (HCD) and the law declared by either division of the Supreme Court shall be binding on all courts subordinate to it.' This means the judicial discipline requires the HCD to follow the decision of the AD and that it is necessary for the lower tiers of courts to accept the decision of the higher tiers as a binding precedent. Analyzing the application of Article 111 of the Constitution in the criminal justice system as a sentencing guideline, the paper, by examining whether there is any consistency in decision between one HC Bench and another HC Bench, explores whether HCD can per incuriam its previous decision. In doing so, the Death Reference (DR) Cases are contemplated. Furthermore, the paper shall examine whether the Court of Session follows the decision of the HCD while using their discretion to make the choice between death and imprisonment for life under section 302 of PC. The paper argues due to the absence of any specific direction for sentencing and inconsistency in jurisprudence among the HCD; the subordinate courts are in a dilemma.

Keywords: death reference, sentencing factor, sentencing guideline, criminal justice system and constitution

Procedia PDF Downloads 175
6586 Legal Study about Flagellation Punishment of Qanun Jinayah in Aceh Province

Authors: Yuyun Sri Wahyuni, Fathih Misbahuddin Islam

Abstract:

Nanggroe Aceh Darussalam is the special district with its long conflict history. The long conflict history started from The Free Aceh Movement’s intentions to implement Islamic principles in Aceh Province, it was actually contradicted with the principles of state. This long conflict was finally ended on 2005. Then, since 2005 Aceh had special authority to administer its local government affairs by applying Islamic principles (syariah), included criminal law matters. To administer it, Aceh Government enacted Law Number 6 of 2014 on the Jinayah. This law consists the criminal act (jarimah) and the punishment (uqubat). Khamr, maisir, khalwat, ikhtilath, zina, sexual harrasment, rape, qadzaf, liwath, and musahaqah are the kinds of the criminal act which are ruled within. Meanwhile, Hudud and Takdzir as the kinds of punishment (uqubat). After 2 years of the issuance of this law inflicting controversy from any sides and being discussed not only locally but also globally. The objectives of this paper are to analyze the fundamental value of the flagellation punishment within this law and Aceh Government review in formulating the law.

Keywords: Aceh province, flagellation punishment, Islamic Principle, Qanun Jinayah

Procedia PDF Downloads 227
6585 Organizational Decision to Adopt Digital Forensics: An Empirical Investigation in the Case of Malaysian Law Enforcement Agencies

Authors: Siti N. I. Mat Kamal, Othman Ibrahim, Mehrbakhsh Nilashi, Jafalizan M. Jali

Abstract:

The use of digital forensics (DF) is nowadays essential for law enforcement agencies to identify analysis and interpret the digital information derived from digital sources. In Malaysia, the engagement of Malaysian Law Enforcement Agencies (MLEA) with this new technology is not evenly distributed. To investigate the factors influencing the adoption of DF in Malaysia law enforcement agencies’ operational environment, this study proposed the initial theoretical framework based on the integration of technology organization environment (TOE), institutional theory, and human organization technology (HOT) fit model. A questionnaire survey was conducted on selected law enforcement agencies in Malaysia to verify the validity of the initial integrated framework. Relative advantage, compatibility, coercive pressure, normative pressure, vendor support and perceived technical competence of technical staff were found as the influential factors on digital forensics adoption. In addition to the only moderator of this study (agency size), any significant moderating effect on the perceived technical competence and the decision to adopt digital forensics by Malaysian law enforcement agencies was found insignificant. Thus, these results indicated that the developed integrated framework provides an effective prediction of the digital forensics adoption by Malaysian law enforcement agencies.

Keywords: digital forensics, digital forensics adoption, digital information, law enforcement agency

Procedia PDF Downloads 151