Search results for: violent victim
244 The Nexus between Climate Change and Criminality: The Nigerian Experience
Authors: Dagaci Aliyu Manbe, Anthony Abah Ebonyi
Abstract:
The increase in global temperatures is worsened by frequent natural events and human activities. Climate change has taken a prominent space in the global discourse on crime and criminality. Compared to when the subject centred around the discussion on the depletion of the ozone layer and global warming, today, the narrative revolves around the implications of changes in weather and climatic conditions in relations to violent crimes or conflict that traverse vast social, economic, and political spaces in different countries. Global warming and climate change refer to an increase in average global temperatures in the Earth’s near-surface air and oceans, which occurs due to human activities such as deforestation and the burning of fossil fuel such as gas flaring. The trend is projected to continue, if unchecked. This paper seeks to explore the nexus between climate change and criminality in Nigeria. It further examines the main ecological changes that predispose conflict dynamics of security threats factored by climate change to peaceful co-existence in Nigeria. It concludes with some recommendations on the way forward.Keywords: conflict, climate change, criminality, global warning, peace
Procedia PDF Downloads 171243 Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings
Authors: Vanda Božić, Željko Nikač
Abstract:
Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime.Keywords: trafficking in children, trafficking in human beings, child as a victim of human trafficking, children’s rights
Procedia PDF Downloads 358242 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment
Authors: Manas Tripathi, Arunabha Mukhopadhyay
Abstract:
In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security
Procedia PDF Downloads 277241 Manipulation of the Public Sphere to Win Cultural Hegemony: The Process by Which Islamic State Uses the Principles of the Overton Window to Engineer Extremism
Authors: A. Brigitte Coles
Abstract:
In order to be successful in a campaign against terror and maintain a favorable world order, we must recognize the effects of priming, framing, and agenda setting on the public sphere, and address how terrorist organizations are able to manipulate language and symbols to shift public opinion and increase recruitment success. Because of their unprecedented activity in the region and foreign recruitment success, this study specifically addresses how the Islamic State (IS/ISIS/ISIL) manipulates the public sphere to amplify support and increase western recruitment. By following a grounded theory methodology and coding triangulated data from IS propaganda, a model for the process of terrorist recruitment has emerged, concerning both environments and personalities susceptible to recruitment, and the steps by which an extremist can be created. This has resulted in the ability to reverse engineer a method by which counter recruitment operations can be facilitated in an effort to lessen the vulnerability of areas and individuals, as well as create dissent among current extremists.Keywords: countering violent extremism, counter-terrorism, recruitment, overton window
Procedia PDF Downloads 343240 Preference for Housing Services and Rational House Price Bubbles
Authors: Stefanie Jeanette Huber
Abstract:
This paper explores the relevance and implications of preferences for housing services on house price fluctuations through the lens of an overlapping generation’s model. The model implies that an economy whose agents have lower preferences for housing services is characterized with lower expenditure shares on housing services and will tend to experience more frequent and more volatile housing bubbles. These model predictions are tested empirically in the companion paper Housing Booms and Busts - Convergences and Divergences across OECD countries. Between 1970 - 2013, countries who spend less on housing services as a share of total income experienced significantly more housing cycles and the associated housing boom-bust cycles were more violent. Finally, the model is used to study the impact of rental subsidies and help-to-buy schemes on rational housing bubbles. Rental subsidies are found to contribute to the control of housing bubbles, whereas help-to- buy scheme makes the economy more bubble-prone.Keywords: housing bubbles, housing booms and busts, preference for housing services, expenditure shares for housing services, rental and purchase subsidies
Procedia PDF Downloads 299239 High Temperature Behaviour of Various Limestone Used in Heritage Buildings at Material and Block Scales
Authors: Ayoub Daoudi, Javad Eslami, Anne-Lise Beaucour, Martin Vigroux, Albert Noumowé
Abstract:
As a fact, many cultural heritage masonry buildings have undergone violent fires during their history. In order to investigate the high temperature behaviour of stone masonry, six French limestones were heated to 600 °C at a rate of 9 °C/min. The main focus is the comparison between the high temperature behaviour of stones at the material and at the structural scale. In order to evaluate the risk of spalling, the tests have been carried out on the stone blocks (12x30x30 cm) instrumented with thermocouples and subjected to an unidirectional heating on one face. Thereafter, visual assessments and non-destructive measurements (dynamic elastic modulus) performed on blocks demonstrate a different behaviour from what was observed at the material scale. Finally, a series of thermo-mechanical computations, using finite element method, allowed us to highlight the difference between the behaviour of stones at material and block scales.Keywords: limestones, hight temperature behaviour, damage, thermo-mechanical modeling, material and blocks scales, color change
Procedia PDF Downloads 109238 Numerical Evaluation of the Degradation of Shear Modulus and Damping Evolution of Soils in the Eastern Region of Algiers Using Geophysical and Geotechnical Tests
Authors: Mohamed Khiatine, Ramdane Bahar
Abstract:
The research performed during the last years has revealed that the seismic response of the soilis significantly non linear and hysteresis to the deformationsitundergoes during earthquakes and notably during violent shaking. This nonlinear behavior of soils can be characterized by curves showing the evolution of shearmodulus and damping versus distortion. Also, in this context, geotechnical seismic engineering problems often require the characterization of dynamic soil properties over a wide range of deformation. This determination of dynamic soil properties is key to predict the seismic response of soils for important civil engineering structures. This communication discusses a numerical analysis method for evaluating the nonlinear dynamic properties of soils in Algeriausing the FLAC2D software and the database resulting from geophysical and geotechnical studies when laboratory dynamic tests are not available. The nonlinear model proposed by Ramberg-Osgood and limited by the Mohr-coulomb criterion is used.Keywords: degradation, shear modulus, damping, ramberg-osgood, numerical analysis.
Procedia PDF Downloads 106237 Where Is the Sultan of Aceh? Reconsidering the Return of the Aceh Sultanate
Authors: Muhammad Harya Ramdhoni, Nidzam Sulaiman, Muhammad Ridwan
Abstract:
The Helsinki Agreement between the Indonesian Government (RI) and the Aceh Liberation Movement (GAM) on 15th Aug. 2005 fails to reconcile social and political turmoil in Aceh Darussalam (NAD). The political powers that were once unified in their struggle against Indonesian Government prior to this agreement have now become divided due to differences in political and economic interests. Using descriptive analysis and intellectual discourse, this paper proposes that the Aceh Sultanate be revived as an attempt to unite these divided political powers and to curtail potential conflicts in the area. This proposal is based on three assumptions. First, the Aceh Sultanate is the only Sultanate in Sumatera that did not fall victim to the social revolution post 1945 proclamation of independence. Second, the Acehnese still acknowledge the Sultanate as a sovereign political power even though it was defeated by the Dutch in 1904. Third, there are emotional, historical and cultural ties between the Acehnese and the Sultanate as they still perceived them to be their patron. Consequently, the Sultanate is the unifying element of all political powers in the area. This, however, is not an attempt to reinstate feudalism in Aceh. It only seeks to facilitate the political reconciliation process in Aceh Darussalam founded on sociological and historical background of locals.Keywords: Sultanate Aceh, political reconciliation, political power, patron-client
Procedia PDF Downloads 264236 Understanding Racial Disparate Treatment of Juvenile Interpersonal Violent Offenders in the Juvenile Justice System Using Focal Concerns Theory
Authors: Suzanne Overstreet-Juenke
Abstract:
Disproportionate minority contact (DMC) is a salient issue that has been found at every stage of the decision-making process in the juvenile justice system. Existing research indicates that DMC influences adjudication for drug, property, and personal crimes. Because intimate partner violence (IPV) is a major public health problem and global concern, the current study examines DMC at adjudication among youth charged for crimes of interpersonal violence. This research uses administrative, Court Designated Worker (CDW) data collected from 2014 to 2016. The results are contextualized using Steffensmeier’s version of focal concerns theory of judicial decision-making. This study assesses race and two seriousness of offense measures to establish whether a link exists between race and adjudication. The results of the study is similar to prior research on the topic. These results are discussed in terms of policy implications, limitations, and future research.Keywords: race, disproportionate minority contact, focal concerns theory, juvenile
Procedia PDF Downloads 76235 The Conflict between Empowerment and Exploitation: The Hypersexualization of Women in the Media
Authors: Seung Won Park
Abstract:
Pornographic images are becoming increasingly normalized as innovations in media technology arise, the porn industry explosively grows, and transnational capitalism spreads due to government deregulation and privatization of media. As the media evolves, pornography has become more and more violent and non-consensual; this growth of ‘raunch culture’ reifies the traditional power balance between men and women in which men are dominant, and women are submissive. This male domination objectifies and commodifies women, reducing them to merely sexual objects for the gratification of men. Women are exposed to pornographic images at younger and younger ages, providing unhealthy sexual role models and teaching them lessons on sexual behavior before the onset of puberty. The increasingly sexualized depiction of women in particular positions them as appropriately desirable and available to men. As a result, women are not only viewed as sexual prey but also end up treating themselves primarily as sexual objects, basing their worth off of their sexuality alone. Although many scholars are aware of and have written on the great lack of agency exercised by women in these representations, the general public tends to view some of these women as being empowered, rather than exploited. Scholarly discourse is constrained by the popular misconception that the construction of women’s sexuality in the media is controlled by women themselves.Keywords: construction of gender, hypersexualization, media, objectification
Procedia PDF Downloads 296234 Sudden Death of a Cocaine Body Packer: An Autopsy Examination Findings
Authors: Parthasarathi Pramanik
Abstract:
Body packing is a way of transfer drugs across the international border or any drug prohibited area. The drugs are usually hidden in body packets inside the anatomical body cavities like mouth, intestines, rectum, ear, vagina etc. Cocaine is a very common drug for body packing across the world. A 48 year old male was reported dead in his hotel after complaining of chest pain and vomiting. At autopsy, there were eighty-two white cylindrical body packs in the stomach, small and large intestines. Seals of few of the packets were opened. Toxicological examination revealed presence of cocaine in the stomach, liver, kidney and hair samples. Microscopically, presence of myocardial necrosis with interstitial oedema along with hypertrophy and fibrosis of the myocardial fibre suggested heart failure due to cocaine cardio toxicity. However, focal lymphocyte infiltration and perivascular fibrosis in the myocardium also indicated chronic cocaine toxicity of the deceased. After careful autopsy examination it was considered the victim was died due congestive heart failure secondary to acute and chronic cocaine poisoning.Keywords: cardiac failure, cocaine, body packer, sudden death
Procedia PDF Downloads 318233 The Incesant Subversion of Judiciary by African Political Leaders
Authors: Joy Olayemi Gbala, Fatai Olatokunbo, Philip Cloud
Abstract:
Catastrophic dictatorship has been discovered to be the major leadership challenge that orchestrates stagnated and contrasted economy with dysfunctional democracy in Africa through willful misappropriation of resources and egregious subversion of the rule of law. Almost invariably, most African leaders inexplicably often become power drunk and addicted which usually leads to abuse of state power, abdication of constitutional duties, unjustly withdrawal of business license of operation, human right violation, election malpractices, financial corruption, disruptions of policies of democratic government transition, annulment of free and fair election, and disruptions of legal electoral procedures and unachievable dividends of democracy and many more. Owing to this, most African nations have gone and still go through political unrest and insurgencies leading to loss of lives and property, violent protests, detention of detractors and political activists and massive human displacement. This research work is concerned with, and investigates the causes, menace, consequences and impacts of subverting the rule of law in Africa on the economy and the development of the continent with a suggested practical solution to the plights.Keywords: corruption, law, leadership, violation
Procedia PDF Downloads 155232 Measures for Limiting Corruption upon Migration Wave in Europe
Authors: Jordan Georgiev Deliversky
Abstract:
Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.Keywords: corruption, influence, human smuggling, legislation, migration
Procedia PDF Downloads 351231 Violence and Aggression of Women in Native Canada: A Postcolonial Feminist Study of The Rez Sisters and Rose by Tomson Highway
Authors: Sonia Sharma
Abstract:
In a multicultural country like Canada, Colonialism is still maintained in the form of Violence and Oppression. The Aboriginals are persistently facing Oppression and Marginalization in their own land owing to Colonial presence. Women in particular are getting most affected. They are facing double burden of patriarchy and their being Native. Tomson Highway, the Cree Canadian playwright has deftly exposed the theme of women violence and empowerment. In his plays (The Rez Sisters and Rose) taken from his Rez Septology, he has depicted Aboriginal women’s predicaments and sufferings. But simultaneously also talks about their empowerment and aggression refuting and fighting back to patriarchy and oppression. The Rez Sisters portrays women with shattering images and as a victim of both the male dominating society and the system. It represents the painful odyssey of the seven women facing several hardships. Rose represents women in entirely different light. They are shown more assertive and empowered raising their voice against the Violence and Discrimination meted out to them. The Aboriginal women in Canada are facing dual burden of Colonialism and Patriarchy which indeed is a Colonial construct. This paper is an attempt to explore the above facets Tomson Highway’s The Rez Sisters and Rose.Keywords: violence, racism, discrimination, postcolonialism feminism
Procedia PDF Downloads 627230 Enhancing Strategic Counter-Terrorism: Understanding How Familial Leadership Influences the Resilience of Terrorist and Insurgent Organizations in Asia
Authors: Andrew D. Henshaw
Abstract:
The research examines the influence of familial and kinship based leadership on the resilience of politically violent organizations. Organizations of this type frequently fight in the same conflicts though are called 'terrorist' or 'insurgent' depending on political foci of the time, and thus different approaches are used to combat them. The research considers them correlated phenomena with significant overlap and identifies strengths and vulnerabilities in resilience processes. The research employs paired case studies to examine resilience in organizations under significant external pressure, and achieves this by measuring three variables. 1: Organizational robustness in terms of leadership and governance. 2. Bounce-back response efficiency to external pressures and adaptation to endogenous and exogenous shock. 3. Perpetuity of operational and attack capability, and political legitimacy. The research makes three hypotheses. First, familial/kinship leadership groups have a significant effect on organizational resilience in terms of informal operations. Second, non-familial/kinship organizations suffer in terms of heightened security transaction costs and social economics surrounding recruitment, retention, and replacement. Third, resilience in non-familial organizations likely stems from critical external supports like state sponsorship or powerful patrons, rather than organic resilience dynamics. The case studies pair familial organizations with non-familial organizations. Set 1: The Haqqani Network (HQN) - Pair: Lashkar-e-Toiba (LeT). Set 2: Jemaah Islamiyah (JI) - Pair: The Abu Sayyaf Group (ASG). Case studies were selected based on three requirements, being: contrasting governance types, exposure to significant external pressures and, geographical similarity. The case study sets were examined over 24 months following periods of significantly heightened operational activities. This enabled empirical measurement of the variables as substantial external pressures came into force. The rationale for the research is obvious. Nearly all organizations have some nexus of familial interconnectedness. Examining familial leadership networks does not provide further understanding of how terrorism and insurgency originate, however, the central focus of the research does address how they persist. The sparse attention to this in existing literature presents an unexplored yet important area of security studies. Furthermore, social capital in familial systems is largely automatic and organic, given at birth or through kinship. It reduces security vetting cost for recruits, fighters and supporters which lowers liabilities and entry costs, while raising organizational efficiency and exit costs. Better understanding of these process is needed to exploit strengths into weaknesses. Outcomes and implications of the research have critical relevance to future operational policy development. Increased clarity of internal trust dynamics, social capital and power flows are essential to fracturing and manipulating kinship nexus. This is highly valuable to external pressure mechanisms such as counter-terrorism, counterinsurgency, and strategic intelligence methods to penetrate, manipulate, degrade or destroy the resilience of politically violent organizations.Keywords: Counterinsurgency (COIN), counter-terrorism, familial influence, insurgency, intelligence, kinship, resilience, terrorism
Procedia PDF Downloads 313229 Community Based Disaster Risk Reduction in Mizoram, India
Authors: Lalrokima Chenkual
Abstract:
Legal provision and various guidelines issued by the National Disaster Management Authority in India strives for setting up of disaster management authority from the central government to the district level. Community-Based Disaster Risk Reduction practice is still relevant as the communities are the victim as well as the first responder in any incidents. The primary goal of Community Based Disaster Risk Reduction is to reduce vulnerability of the concerned community and strengthen its existing capacity to cope with disaster. By involving the community in the preparedness phase, it not only increases the likelihood of coordinated action by the communities to help in mitigating disasters and lessening the impact of disaster but also brings the community together to address the issue collectively. Community participation ensures local ownership, addresses local needs, and promotes volunteerism and mutual help to prevent and minimise damage. Community-Based Disaster Risk Reduction is very much relevant for Mizoram as the society is closed knit, population is very less, religion homogeneity i.e Christianity, very active and widespread community-based organization viz, Young Mizo Association, MHIP (Women Federation), MUP (Elders Clubs which are guided together by Mizo code of morals conduct termed as Tlawmngaihna.Keywords: community, close-knit, first responder, Tlawmngaihna
Procedia PDF Downloads 142228 The Social Construction of the Family among the Survivors of Sex Trafficking
Authors: Nisha James, Shubha Ranganathan
Abstract:
Sex trafficking is a traumatic ongoing process which includes human rights violations against the victims. Majority of the trafficked individuals in India are from families with low socioeconomic status, from rural areas, unmarried or married off at a very young age. Many of the sex trafficked feel that it is necessary to make sacrifices, for the benefit of their families. The combination of these cultural family values with the stigma of rape and prostitution are manipulated and used as a tool in the abuse of power against the sex trafficked. The rescue, rehabilitation and reintegration of these individuals are usually difficult due to the stigma and social exclusion that they face. In these circumstances, social support is very effective in social inclusion of these individuals. The present study was a qualitative one, using semi-structured interviews with 29 Indian survivors of sex trafficking and a few sex workers. Thematic analysis was done on the data derived from the semi-structured interviews. The major findings indicate that the family can be seen as both the ‘cause’ for being sex trafficked, and the factor in victim continuing to be sex trafficked. At the same time, it can also become a driver for getting rescued, rehabilitated and reintegrated. The study also explores the social construction about ‘family’ among the survivors of sex trafficking, reflecting on who they refer to as ‘family’, what they mean by the term ‘family’ and how these families emerge. Therefore the analytic concept of ‘family’ is a crucial element in sex trafficking and cannot be defined only in terms of its conventional definition of a basic unit of society.Keywords: sex-trafficking, survivor, family, social construction
Procedia PDF Downloads 591227 Cybercrimes in Nigeria: Its Causes, Effects and Solutions
Authors: Uzoma Igboji
Abstract:
Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria
Procedia PDF Downloads 535226 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method
Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López
Abstract:
The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people
Procedia PDF Downloads 128225 The Access to the City in the Medellín Urban Experience
Authors: Mansilla, Juan Camilo
Abstract:
According to many studies, public space in the cities of Global South is constantly morcellated and captured by a multiplicity of actors in a permanent struggle for power. This imposed public space restricts the access to services and political actions to many inhabitants. The author has conducted several focus group sessions using video in a reflective mode with low-income communities in Medellín, Colombia in order to study how people in this city are shift from a physical public space to a hybrid public space shaped by internet. Beyond the fragmented city and the violent urban context manifested by participants, these activities have highlighted how the access to the city is currently going through a dialectic movement between the physical and the digital space. The purpose of this article is to make explicit the link between this hybrid public space and the boundaries of exclusion in the city. Urban marginality is closely related with the idea of access and space. Low-income communities in Medellín assume the digital realm like a “not controlled space” of resistance, where alternative ways of expression like hip hop movement, graffiti, dance, video and virtual communities produce effective changes in the physical realm.Keywords: access to the city, hybrid public space, low-income communities, Medellín, urban marginality
Procedia PDF Downloads 492224 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria
Authors: Anyaogu Paul
Abstract:
The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.Keywords: child labour, family income, national security, survey research
Procedia PDF Downloads 424223 Dramatic US Television in the 21st Century: Articulating the Human through Expressions of Violence
Authors: Peter Ellis
Abstract:
United States dramatic television in the 21st century is inarguably violent. This violence can be as physical as the gruesome viscera spilled in AMC’s The Walking Dead; it can be as psychological as the suppressive dominance of Tony Soprano over his wife Carmella in HBO’s The Sopranos; and it can sit like shares on the stock market, where investment in violence sits as an economic choice, as with AMC’s Breaking Bad. Violence permeates these narratives, simultaneously threatening and defining the lives of their characters through its use in their relationships. What propels this exploration of humanity through violence is the use of language: the dictation of interaction in an economy in which characters negotiate successful acts of violence, or how they meet with the successful violence of others. Language is the defining force which separates and elucidates characters through conflict, as Slavoj Žižek writes, “it is because of language that we and our neighbours (can) “live in different worlds” even when we live on the same street.” This paper examines three different manifestations that violence takes in US television, specifically through the examples of The Walking Dead, The Sopranos, and Breaking Bad. Through the prism of Žižek’s conception of language as the uniquely human vehicle of violence, I aim to display how these shows sit as expressions of a neo-humanism, in which the complexities of language manipulate violence and define character in the process.Keywords: violence, humanism, neoliberalism, American television
Procedia PDF Downloads 438222 The Value of Online News: Addressing the Problem of Online Investment Fraud Crimes in Thailand
Authors: Thapthep Paprach, Benya Lertsuwan
Abstract:
Investment fraud is not a new criminal, but there are still more victims during the Internet of Things era. This kind of criminal has been classified as a national and transnational financial crime problem all over the world. In Thailand, the country has also been attacked by this kind of crime. This research concerns whether the mass media that is supposed to cover news about online investment scams realized and warned Thais about this crime. Thus, this study explores the value of news about investment fraud in terms of frequency. The methodology uses web crawling from the top 5 news agency websites that have the most access. We pull out all information reporting about investment fraud. The findings revealed that the ‘Khaosod’ news agency was the first rank in reporting on investment crime. On the other hand, ‘Matichon’ was the least reported. Thairat news agencies frequently reported such criminals from midnight to very early in the morning, while other news agencies reported during the daytime. The results between the frequency of news reporting about investment fraud and the monthly number of victim reports are not correlated. Although the most cases reported to Thai police were in February 2023, but the most news reported was in January 2023. In conclusion, there might be a negative correlation between the amount of investment fraud news reported and the number of victims.Keywords: investment fraud, news value, online news report, Ponzi schemes, Romance scam
Procedia PDF Downloads 76221 Shared Beliefs and Behavioral Labels in Bullying among Middle Schoolers: Qualitative Analysis of Peer Group Dynamics
Authors: Malgorzata Wojcik
Abstract:
Groups are a powerful and significant part of human development. They serve as major emergent microsocial structures in children’s and youth’s ecological system. During middle and secondary school, peer groups become a particularly salient influence. While they promote a range of prosocial and positive emotional and behavioral attributes, they can also elicit negative or antisocial attributes, effectively “bringing out the worst” in some individuals. The grounded theory approach was employed to guide data collection and analysis, as it allows for a deeper understanding of the group processes and students’ perspectives on complex intragroup relations. Students’ perspectives on bullying cases were investigated by observing daily interactions among those involved and interviewing 47 students. The results complement theories of labeling in bullying by showing that all students self-label themselves and find it difficult to break patterns of behaviors related to bullying, such as supporting the bully or not defending the victim. In terms of the practical implications, the findings indicate that it could be beneficial to use non-punitive, restorative anti-bullying interventions that implement peer influence to transform bullying relations by removing behavioral labels.Keywords: bullying, peer group, victimization, class reputation
Procedia PDF Downloads 117220 'Violence Is Bad, but It's Just a Game': The Glorification of Violence from Roman Antiquity to Popular Culture
Authors: M. C. Steyn
Abstract:
Violence and entertainment are not mutually exclusive subjects in the Ancient Roman world, in reality they are closely knit together. Their world is permeated by repeated and continuous episodes of violence in its many manifestations, both sanctioned and spontaneous, most of which is considered as some form of entertainment, from plays and writings through the spectrum to the gladiatorial arena. In the 21st century this socio-psychological dynamic is manifested through the stage provided by the screen and what we watch in terms of TV, movies and games. This glorification of violence in a modern world is not out of place as seen in contemporary post apocalyptical/ dystopian literature, film and computer games where the act of violence, frowned upon by social norms and values, becomes sanctioned by the (un)real nature of the game: ‘I am not a violent person, violence is bad, this is just a game’. This paper will examine how violence is framed in the Ancient World and subsequently how it is received by popular culture to represent a world in which the maintenance of stability can only be achieved through officially sanctioned violence, whether sanctioned by the State or the gaming community. This argument will examine both ancient and modern critics of violence such as Senecca, Coleman and Foucault and framed by Baudrillard’s commentary on the post-modern conceptualization of reality.Keywords: entertainment, violence, gladiatorial games, gaming
Procedia PDF Downloads 490219 Edward Bond's Questioning of Existence in His Play 'Have I None?'
Authors: Aycan Gurluyer
Abstract:
21st-century theatre has been shaped by lots of world-changing forces devastating human psychology and existence. Accepted as the greatest living English playwright, it is post-war British dramatist Edward Bond who uses a late-21st-century apocalyptic landscape as a weapon to question the human existence in his play 'Have I None?'. In this play, he tries to underline the degenerating and destructive effects of the society and environment on a couple whose lives are changed by an unexpected and annoying stranger. As victim of the society and the cultural corruption, the three vulnerable Bondian characters struggle for their expectations to find a place in this fictional world by sacrificing their own lives. Set in the 2077’s world, the play depicts that rigidly formed rules of the system/authority eliminates the existence of humans. According to Bond, the fascist practices of the governments/systems make people paralyzed in any way, so they choose to deny all realities by becoming biological beings or they gather to commit to suicide as troops. Our main aim is to underscore the questioning of the human existence by drawing the socio-political framework of the era, the capitalist system’s dehumanized individuals and their defence to survive, and what reality is in the 21st century, by focusing on Bond’s hallucinatory and tragic vision of the future in 'Have I None?'.Keywords: Edward Bond, apocalyptic, existence, Have I None?
Procedia PDF Downloads 142218 Carthage-Burned and Rome-Reiterative: Mirrored Distortions of Imperial Trauma and Historiography
Authors: Sarah H. Davies
Abstract:
In the year 146 BCE, the Roman general Scipio Aemilianus – soon to be ‘anointed,’ via mass-spilling of blood-on-land, as “(‘triumphal’) Africanus” – stood atop a hill, overlooking the city of Carthage, as its urban-scape was burned and people killed, violated, captured… ‘poetically’ consumed. From an ineffable-seeming distance – constructed, in imperial fascination – the scene was (and is, apparently) painted in a disturbingly ‘romantic’ light. Such a snap-shot vista, projected before a mind’s-eye in panorama, and in (ongoing) construction, has seeped across ancient and modern lines, with multiple, interwoven iterations. This study conducts a reading, both ‘postcolonial’ and anti-imperial, in interruption of an ongoing (re)iteration of imperial violence, mirrored in distortion between “ancient” and “modern” forms that are physical, ideological, and ontological. Using an analysis of ancient literary works, from the historiographical (Polybius’ Histories) to the epic-poetic (Vergil’s Aeneid), placed in juxtaposition with a range of modern material, both literary-historical (e.g., Gibbon’s Decline & Fall of the Roman Empire) and visual (Cole’s The Course of Empire), this study destabilizes ongoing formations. Such formations attempt to inflict ‘an assumed’ repetition, engaged in normalizing a city violently destroyed as somehow ‘natural’ and/or ‘inevitable,’ and by extension, ‘tragically necessary.’ The reiterations – across media and contexts – create a distorted aesthetic (itself an act of profound violence) that fetishizes and even produces sensory, illusory pleasures (of co-complicit harm, within and across communities) regarding ‘period-shifting events’ of mass-murder and cultural erasure. ‘The vista over Carthage burning’ was/is (but does not ever have to be) thereby a manufactured stage-set, a commodity for imperial reproduction. Such a projection frames an overly-simplistic, ‘safe’-seeming (and yet incredibly dangerous) binary regarding (caricatured) “victims” and “victors.” At the same time, the projection renders an epistemological frame whereby ‘The One’ and ‘The Other’ are asserted as inherently antagonistic categories of being, in which One ‘must’ replace Other – the latter portrayed in gendered, exoticized, and time-distorted ways, as a scripted-object. All the while, a very particular subset of narrative is woven, whereby Carthage (elided in ‘victim’ status) specifically is/was Troy (again, elided), is/was every ‘destroyed city’ (also elided), and is/was yet another essential marking-point of “History,” twisted into ‘becoming’ a ‘reset’ point in a ‘cyclical pattern,’ inscribed as a tragic plot or lifetime repeated. The script itself entails pervasive violence. And yet, there always remains a trip-wire written into the constructed-cyclical. In part, this realization comes from a deconstruction of the tiered violences of an over-worn trope. The realization then also comes from a revelation of erased realities of human-experiences, in which ‘victim’ and ‘victor’ suffer, in fractured differences of ongoing, system(at)ic (re)trauma. The contours and silences of the historical records contain all the ongoing scars. This study therefore unravels the intersectional tableaux of ‘Carthage-burning’ and ‘Rome-reiterative,’ providing a collective investigation into conceptual formations, fractured across millennia. Ultimately, perhaps, such a re-reading – occurring via a commodified past will echo words from the Aeneid: “perhaps, once upon a time, to have remembered even these things, it will have been healing.Keywords: antiquity, carthage, empire, historiography, rome, ruination
Procedia PDF Downloads 17217 'Spare the Rod and Spoil the Child': The Criminal Career of an Armed Robber
Authors: Mahlogonolo Stephina Thobane
Abstract:
The aim of the study upon which this article is based was “to evaluate the possibility of using criminal career research in the development and evaluation of crime control strategies, particularly for armed robberies.” The research employed a concurrent triangulation mixed-method approach where quantitative and qualitative data were collected concurrently but analysed separately through the use of SPSS and Atlas.ti respectively. Forty offenders incarcerated at six correctional centres around the Gauteng province of South Africa for robbery with aggravating circumstances were interviewed as research participants. Since the researcher had no prior information on the total number of the population, purposive sampling (i.e. snowballing) was executed to draw the sample. This research found that offenders launched their criminal career at a very young age of, 11 years, by committing petty crimes such as theft and then, as they grew older, they progressed to more serious and violent crimes such as vehicle hijacking and Cash-in-Transit (CIT) robberies. Thus, it is pivotal that those responsible for developing crime prevention policies focus on interrupting the root causes of crime in the early stages of one’s life in order to prevent continuation of delinquent behaviour from childhood to adolescence and adulthood.Keywords: criminal career, robbery with aggravating circumstances, cash-in-transit robbery, criminal career research
Procedia PDF Downloads 444216 "Black Book": Dutch Prototype or Jewish Outsider
Authors: Eyal Boers
Abstract:
This paper shall demonstrate how films can offer a valuable and innovative approach to the study of images, stereotypes, and national identity. "Black Book" ("Zwartboek", 2006), a World War Two film directed by Paul Verhoeven, tells the story of Rachel Stein, a young Jewish woman who becomes a member of a resistance group in the Netherlands. The main hypothesis in this paper maintains that Rachel's character possesses both features of the Dutch prototype (a white, secular, sexual, freedom-loving individualist who seems "Dutch" enough to be accepted into a Dutch resistance group and even infiltrate the local Nazi headquarters) and features which can be defined as specifically Jewish (a black-haired victim persecuted by the Nazis, transforming herself into a gentile, while remaining loyal to her fellow Jews and ultimately immigrating to Israel and becoming a Hebrew teacher in a Kibbutz). Finally, this paper claims that Rachel's "Dutchness" is symptomatic of Dutch nostalgia in the 21st century for the Jews as "others" who blend into dominant Dutch culture, while Rachel's "Jewish Otherness" reflects a transnational identity – one that is always shifting and traverses cultural and national boundaries. In this sense, a film about Dutch Jews in the Second World War reflects on issues of identity in the 21st Century.Keywords: Dutch, film, stereotypes, identity
Procedia PDF Downloads 125215 An Empirical Assessment of the Effect of War Exposure on the Attitudes towards Violence
Authors: Anastasiia Kuptsevych, Robert J. Johnson, Olena Antonaccio, Ekaterina V. Botchkovar
Abstract:
Ukraine has recently experienced one of the bloodiest conflicts taking place on the European continent. Many active duty personnel and civilians have died, and millions of people have been displaced. This situation can lead to disorder in the country characterized by acceptance of violence and crime. There is a gap in the literature addressing the issues related to attitudes towards violence resulting from war, as well as focusing on the world’s more vulnerable civilian populations – those that live in lower and middle-income countries, such as Ukraine. Using a random sample of 1200 adults from two major Ukrainian cities, this study explores the relationship between different types of war exposure (direct and vicarious) and attitudes to violence. Multivariate models reveal that multiple types of war exposure (e.g., being injured, being a witness of death, watching war events on TV) are significantly associated with the attitudes to political and interpersonal violence. In addition, the KHB decomposition procedure showed that experiencing certain mental illnesses serve as important mediating mechanisms between war exposure and attitudes towards violence. Finally, in order to prevent society from disorder and high levels of violence, future studies need to pay more attention to exploring how vital and traumatic life events can lead a population to find violent acts acceptable.Keywords: attitudes, Ukraine, violence, war
Procedia PDF Downloads 262