Search results for: war victims
190 Identification Strategies for Unknown Victims from Mass Disasters and Unknown Perpetrators from Violent Crime or Terrorist Attacks
Authors: Michael Josef Schwerer
Abstract:
Background: The identification of unknown victims from mass disasters, violent crimes, or terrorist attacks is frequently facilitated through information from missing persons lists, portrait photos, old or recent pictures showing unique characteristics of a person such as scars or tattoos, or simply reference samples from blood relatives for DNA analysis. In contrast, the identification or at least the characterization of an unknown perpetrator from criminal or terrorist actions remains challenging, particularly in the absence of material or data for comparison, such as fingerprints, which had been previously stored in criminal records. In scenarios that result in high levels of destruction of the perpetrator’s corpse, for instance, blast or fire events, the chance for a positive identification using standard techniques is further impaired. Objectives: This study shows the forensic genetic procedures in the Legal Medicine Service of the German Air Force for the identification of unknown individuals, including such cases in which reference samples are not available. Scenarios requiring such efforts predominantly involve aircraft crash investigations, which are routinely carried out by the German Air Force Centre of Aerospace Medicine as one of the Institution’s essential missions. Further, casework by military police or military intelligence is supported based on administrative cooperation. In the talk, data from study projects, as well as examples from real casework, will be demonstrated and discussed with the audience. Methods: Forensic genetic identification in our laboratories involves the analysis of Short Tandem Repeats and Single Nucleotide Polymorphisms in nuclear DNA along with mitochondrial DNA haplotyping. Extended DNA analysis involves phenotypic markers for skin, hair, and eye color together with the investigation of a person’s biogeographic ancestry. Assessment of the biological age of an individual employs CpG-island methylation analysis using bisulfite-converted DNA. Forensic Investigative Genealogy assessment allows the detection of an unknown person’s blood relatives in reference databases. Technically, end-point-PCR, real-time PCR, capillary electrophoresis, pyrosequencing as well as next generation sequencing using flow-cell-based and chip-based systems are used. Results and Discussion: Optimization of DNA extraction from various sources, including difficult matrixes like formalin-fixed, paraffin-embedded tissues, degraded specimens from decomposed bodies or from decedents exposed to blast or fire events, provides soil for successful PCR amplification and subsequent genetic profiling. For cases with extremely low yields of extracted DNA, whole genome preamplification protocols are successfully used, particularly regarding genetic phenotyping. Improved primer design for CpG-methylation analysis, together with validated sampling strategies for the analyzed substrates from, e.g., lymphocyte-rich organs, allows successful biological age estimation even in bodies with highly degraded tissue material. Conclusions: Successful identification of unknown individuals or at least their phenotypic characterization using pigmentation markers together with age-informative methylation profiles, possibly supplemented by family tree search employing Forensic Investigative Genealogy, can be provided in specialized laboratories. However, standard laboratory procedures must be adapted to work with difficult and highly degraded sample materials.Keywords: identification, forensic genetics, phenotypic markers, CPG methylation, biological age estimation, forensic investigative genealogy
Procedia PDF Downloads 51189 Armed Groups and Intra State Conflict: A Study on the Egyptian Case
Authors: Ghzlan Mahmoud Abdel Aziz
Abstract:
This case study aims to identify the intrastate conflicts between the nation state and armed groups. Nowadays, most wars weaken states against armed groups. Thus, it is very important to negotiate with such groups in order to reinforce the law for the protection of victims. These armed groups are the cause of conflicts and they are related with many of humanitarian issues that result out of conflicts. In this age of rivalry; terrorists, insurgents, or transnational criminal parties have surfaced to the top as a reaction to these armed groups in an effort to set up a new world order. Moreover, the intra state conflicts became increasingly treacherous than the interstate conflicts, particularly when nation state systems deal with armed groups which try to influence the state. The unexpected upraising of the Arab Spring during 2011 in parts of the Middle East and North Africa formed various patterns of conflicts. The events of the Arab Spring resulted in current and long term change across the region. Significant modifications in the level, strength and period of armed conflict around the world have been made. Egypt was in the center of these events. It has fought back the armed groups under the name of terrorism and spread common disorder and violence among civilians. On this note, this study focuses on the problem of the transformation in the methods of organized violence within one state rather than between two state or more and analyzes the objectives, strategies, and internal composition of armed groups and the environments that foster them, with a focus on the Egyptian case.Keywords: armed groups, conflicts, Egyptian armed forces, intrastate conflicts
Procedia PDF Downloads 459188 Analysis and Evaluation of the Water Catch Basins of the Erosive-Mudflow Rivers of Georgia on the Example of the River Vere
Authors: Natia Gavardashvili
Abstract:
On June 13-14 of 2015, a landslide in village Akhaldaba was formed as a result of the intense rains in the water catch basin of the river Vere. As a result of the landslide movement, freshets and mudflows originated, and unfortunately, there were victims: zoo animals and birds were drawn in the flood and 12 people died due to the flooded motor road. The goal of the study is to give the analysis of the results of the field and scientific research held in 2015-2017 and to generalize them to the water catch basins of the erosive-mudflow rivers of other mountain landscapes of Georgia. By considering the field and scientific works, the main geographic, geological, climatic, hydrological and hydraulic properties of the erosive-mudflow tributaries of the water catch basin of the river Vere were evaluated and the probabilities of mudflow formation by considering relevant risk-factors were identified. The typology of the water catch basins of erosive-mudflow rivers of Georgia was identified on the example of the river Vere based on the field and scientific study, and their genesis, frequency of mudflow formation and volume of the drift material was identified. By using the empirical and theoretical dependencies, the amount of solid admixtures in the mudflow formed in the gorge of the river Jokhona, the right tributary of the river Vere was identified by considering the shape of the stones.Keywords: water catchment basin, erosion, mudflow, typology
Procedia PDF Downloads 276187 Innovative Tool for Improving Teaching and Learning
Authors: Izharul Haq
Abstract:
Every one of us seek to aspire to gain quality education. The biggest stake holders are students who labor through years acquiring knowledge and skill to help them prepare for their career. Parents spend a fortune on their children’s education. Companies spend billions of dollars to enhance standards by developing new education products and services. Quality education is the golden key to a long lasting prosperity for the individual and the nation. But unfortunately, education standards are continuously deteriorating and it has become a global phenomenon. Unfortunately, teaching is often described as a ‘popularity contest’ and those teachers who are usually popular with students are often those who compromise teaching to appease students. Such teachers also ‘teach-to-the-test’ ensuring high test scores. Such teachers, hence, receive good student rating. Teachers who are conscientious, rigorous and thorough are often the victims of good appraisal. Government and private organizations are spending billions of dollars trying to capture the characteristics of a good teacher. But the results are still vague and inconclusive. At present there is no objective way to measure teaching effectiveness. In this paper we present an innovative method to objectively measure teaching effectiveness using a new teaching tool (TSquare). The TSquare tool used in the study is practical, easy to use, cost effective and requires no special equipment to implement. Hence it has a global appeal for poor and the rich countries alike.Keywords: measuring teaching effectiveness, quality in education, student learning, teaching styles
Procedia PDF Downloads 296186 Does Citizens’ Involvement Always Improve Outcomes: Procedures, Incentives and Comparative Advantages of Public and Private Law Enforcement
Authors: Avdasheva Svetlanaa, Kryuchkova Polinab
Abstract:
Comparative social efficiency of private and public enforcement of law is debated. This question is not of academic interest only, it is also important for the development of the legal system and regulations. Generally, involvement of ‘common citizens’ in public law enforcement is considered to be beneficial, while involvement of interest groups representatives is not. Institutional economics as well as law and economics consider the difference between public and private enforcement to be rather mechanical. Actions of bureaucrats in government agencies are assumed to be driven by the incentives linked to social welfare (or other indicator of public interest) and their own benefits. In contrast, actions of participants in private enforcement are driven by their private benefits. However administrative law enforcement may be designed in such a way that it would become driven mainly by individual incentives of alleged victims. We refer to this system as reactive public enforcement. Citizens may prefer using reactive public enforcement even if private enforcement is available. However replacement of public enforcement by reactive version of public enforcement negatively affects deterrence and reduces social welfare. We illustrate the problem of private vs pure public and private vs reactive public enforcement models with the examples of three legislation subsystems in Russia – labor law, consumer protection law and competition law. While development of private enforcement instead of public (especially in reactive public model) is desirable, replacement of both public and private enforcement by reactive model is definitely not.Keywords: public enforcement, private complaints, legal errors, competition protection, labor law, competition law, russia
Procedia PDF Downloads 494185 Police Mothers at Home: Police Work and Danger-Protection Parenting Practices
Authors: Tricia Agocs, Debra Langan, Carrie B. Sanders
Abstract:
Studies of the challenges faced by women in policing have paid little attention to the specific experiences of Policewomen who are mothers. Guided by critical theorizing on the gendered nature of the police culture and domestic labor, 16 police officer mothers in Ontario, Canada, were interviewed. Our qualitative analyses explore their experiences of the “lion’s share” of domestic labor; the organizational, cultural, and operational features of policing; and the challenges of child care, and examine how these combine to foster particular stresses. In contrast to intensive mothering approaches that rely on the advice of external experts, our participants work to protect children by carefully constructing stories and asking questions that are based on their own on-the-job experiences with dangerous and/or abhorrent situations. As such, they engage in danger-protection parenting practices to prevent their children from becoming victims or offenders. Our research extends the theorizing on intensive/extensive mothering practices, builds on the scholarship on policing, and adds to the literature on women in nonstandard occupations. This sociological analysis of police mothers’ experiences and practices underscores the importance of understanding and working to change the social contexts, at work and at home, that compromise the well-being of police mothers and other emergency-response workers.Keywords: policewomen, mothers, parenting, danger, qualitative research
Procedia PDF Downloads 555184 Proposition on Improving Environmental Forensic System in China
Authors: Huilei Wang, Yuanfeng Wang
Abstract:
In the early period of China, economy developed rapidly at the cost of environment. Recently, it is generally recognized that the heavily polluted environment not only puts a brake on economic development but also paces negative impact on people’ health as well as probably next decades of generations. Accordingly, the latest Environmental Protection Law revised in 2014 makes a clear-cut division of environmental responsibility and regulates stricter penalties of breaching law. As the new environmental law is enforced gradually, environmental forensic is increasingly required in the process of ascertaining facts in judicial proceedings of environmental cases. Based on the outcomes of documentary analysis for all environmental cases judged on the basis of new environmental law, it is concluded that there still exists problems in present system of environmental forensic. Thus, this paper is aimed to make proposition on improving Chinese environmental forensic system, which involves: (i) promoting capability of environmental forensic system (EFS) to handle professional questions; (ii) develop price mechanism; (iii) multi-departments cooperate to establish unifying and complete EFS system;(iv) enhance the probative value of results of EFS. Such protocol for amending present regulation on environmental forensic is of significant importance because a quality report of environmental forensic will contributes to providing strong probative evidence of culprits’ activity of releasing contaminant into environment, degree of damages for victims and above all, causality between the behavior of public nuisance and damages.Keywords: China, environmental cases, environmental forensic system, proposition
Procedia PDF Downloads 378183 Locating the Best Place for Earthquake Refugee Camps by OpenSource Software: A Case Study for Tehran, Iran
Authors: Reyhaneh Saeedi
Abstract:
Iran is one of the regions which are most prone for earthquakes annually having a large number of financial and mortality and financial losses. Every year around the world, a large number of people lose their home and life due to natural disasters such as earthquakes. It is necessary to provide and specify some suitable places for settling the homeless people before the occurrence of the earthquake, one of the most important factors in crisis planning and management. Some of the natural disasters can be Modeling and shown by Geospatial Information System (GIS). By using GIS, it would be possible to manage the spatial data and reach several goals by making use of the analyses existing in it. GIS has a determining role in disaster management because it can determine the best places for temporary resettling after such a disaster. In this research QuantumGIS software is used that It is an OpenSource software so that easy to access codes and It is also free. In this system, AHP method is used as decision model and to locate the best places for temporary resettling, is done based on the related organizations criteria with their weights and buffers. Also in this research are made the buffer layers of criteria and change them to the raster layers. Later on, the raster layers are multiplied on desired weights then, the results are added together. Eventually, there are suitable places for resettling of victims by desired criteria by different colors with their optimum rate in QuantumGIS platform.Keywords: disaster management, temporary resettlement, earthquake, QuantumGIS
Procedia PDF Downloads 398182 Soft Computing Approach for Diagnosis of Lassa Fever
Authors: Roseline Oghogho Osaseri, Osaseri E. I.
Abstract:
Lassa fever is an epidemic hemorrhagic fever caused by the Lassa virus, an extremely virulent arena virus. This highly fatal disorder kills 10% to 50% of its victims, but those who survive its early stages usually recover and acquire immunity to secondary attacks. One of the major challenges in giving proper treatment is lack of fast and accurate diagnosis of the disease due to multiplicity of symptoms associated with the disease which could be similar to other clinical conditions and makes it difficult to diagnose early. This paper proposed an Adaptive Neuro Fuzzy Inference System (ANFIS) for the prediction of Lass Fever. In the design of the diagnostic system, four main attributes were considered as the input parameters and one output parameter for the system. The input parameters are Temperature on admission (TA), White Blood Count (WBC), Proteinuria (P) and Abdominal Pain (AP). Sixty-one percent of the datasets were used in training the system while fifty-nine used in testing. Experimental results from this study gave a reliable and accurate prediction of Lassa fever when compared with clinically confirmed cases. In this study, we have proposed Lassa fever diagnostic system to aid surgeons and medical healthcare practictionals in health care facilities who do not have ready access to Polymerase Chain Reaction (PCR) diagnosis to predict possible Lassa fever infection.Keywords: anfis, lassa fever, medical diagnosis, soft computing
Procedia PDF Downloads 269181 Discursive Construction of Barren women in the Bible and Traditional African Society
Authors: Vicky Khasandi-Telewa, Sinfree Makoni
Abstract:
Barrenness is a fundamentally agonizing condition that leads to identity disruption in its victims. In Africa, women are usually referred to as ‘Mother of X,’ and this causes grief to one who does not have a child to be identified with. This paper is an examination and critical appraisal of the impact of barrenness on the self-perception of women and the underlying power relations in how they are discursively constructed in the Bible and Traditional African Society (TAS). It is an analysis of expressive practices to examine how barrenness is constructed in Christianity and TAS with the aim of understanding the intersecting power systems. We approach this from an integrationism and Critical Discourse Analysis perspective that takes seriously both the radical harassment of barren women and the possibilities offered by the ensuing desperation calling for inclusive reinterpretation. We also seek to understand barren women’s coping mechanisms and suggestions on how best to improve their lives. The purpose of this study is to explain how discursive construction of barrenness affects the fundamental rights and freedoms of women and what linguistic strategies they adopt to navigate through the maze of stigma. It seeks to illustrate a more nuanced complexity of barren women's lives through women's own exegesis of the Biblical accounts of barrenness and their traditions and to explore alternative narratives. We explore the linguistic strategies the barren women employ to communicate their coping with limitations imposed upon their rights by the negative constructions.Keywords: integrationism, critical discourse analysis, barrenness, communication strategies
Procedia PDF Downloads 78180 Formulation and in Vitro Characterization of Bioactives Loaded Polymeric Nanoparticle Incorporated into Multiphase Hydrogel System for the Treatment of Infected Burn Wound
Authors: Rajni Kant Panik, Deependra Singh, Manju Singh
Abstract:
Despite significant advances in the treatment of severe burn injury, infection and sepsis persist as frequent causes of morbidity and mortality for burn victims due to extensive compromise of the skin and contiguous tissue that serve as a protective barrier against microbial invasion. In the setting of a burn wound infection, Staphylococcus aureus is the most commonly isolated pathogens from bloodstream infections in burn care hospitals. We aimed to develop a biocompatible system of Poly vinyl alcohol (PVA)-sodium alginate hydrogel carrying multiple drugs- catalase and mupirocin in controlled manner for effective and complete burn wound healing. PLGA nanoparticles of Catalase and mupirocin were prepared by homogenization method and optimized system was incorporated in PVA-sodium alginate slurry. PVA-sodium alginate hydrogels were prepared by freeze thaw method. The prepared dispersion was casted into films to prepare multiphase hydrogel system and characterized by in vitro and in vivo studies. The study clearly showed the beneficial effect of antioxidant enzyme and antibiotic in the treatment of infected burn wound, as evidenced by the reduced incidence of wound infection and the shortening of healing time.Keywords: burn wound, catalase, mupirocin, wound healing
Procedia PDF Downloads 503179 Agony and Agency: Discursive Construction of Barren women in the Bible and Traditional African Society
Authors: Vicky Khasandi-Telewa, Sinfree Makoni
Abstract:
Barrenness is a fundamentally agonizing condition that leads to identity disruption in its victims. In Africa, women are usually referred to as ‘Mother of X,’ and this causes grief to one who does not have a child to be identified with. This paper is an examination and critical appraisal of the impact of barrenness on the self-perception of women and the underlying power relations in how they are discursively constructed in the Bible and Traditional African Society (TAS). It is an analysis of expressive practices to examine how barrenness is constructed in Christianity and TAS with the aim of understanding the intersecting power systems. We approach this from an integrationism and Critical Discourse Analysis perspective that takes seriously both the radical harassment of barren women and the possibilities offered by the ensuing desperation calling for inclusive reinterpretation. We also seek to understand barren women’s coping mechanisms and suggestions on how best to improve their lives. The purpose of this study is to explain how discursive construction of barrenness affects the fundamental rights and freedoms of women and what linguistic strategies they adopt to navigate through the maze of stigma. It seeks to illustrate a more nuanced complexity of barren women's lives through women's own exegesis of the Biblical accounts of barrenness and their traditions and to explore alternative narratives. We explore the linguistic strategies the barren women employ to communicate their coping with limitations imposed upon their rights by the negative constructions.Keywords: integrationism, critical discourse analysis, barrenness, communication strategies, women rights
Procedia PDF Downloads 69178 The Challenges Involved in Investigating and Prosecuting Hate Crime Online
Authors: Mark Williams
Abstract:
The digital revolution has radically transformed our social environment creating vast opportunities for interconnectivity and social interaction. This revolution, however, has also changed the reach and impact of hate crime, with social media providing a new platform to victimize and harass users in their homes. In this way, developments in the information and communication technologies have exacerbated and facilitated the commission of hate crime, increasing its prevalence and impact. Unfortunately, legislators, policymakers and criminal justice professionals have struggled to keep pace with these technological developments, reducing their ability to intervene in, regulate and govern the commission of hate crimes online. This work is further complicated by the global nature of this crime due to the tendency for offenders and victims to reside in multiple different jurisdictions, as well as the need for criminal justice professionals to obtain the cooperation of private companies to access information required for prosecution. Drawing on in-depth interviews with key criminal justice professionals and policymakers with detailed knowledge in this area, this paper examines the specific challenges the police and prosecution services face as they attempt to intervene in and prosecute the commission of hate crimes online. It is argued that any attempt to reduce online othering, such as the commission of hate crimes online, must be multifaceted, collaborative and involve both innovative technological solutions as well as internationally agreed ethical and legal frameworks.Keywords: cybercrime, digital policing, hate crime, social media
Procedia PDF Downloads 227177 Victims of Imprisonment: Incarceration and Post-Release Effects of Confinement with Women with a Mental Illness
Authors: Anat Yaron Antar, Tomer Einat
Abstract:
This study explores the effects of the imprisonment of women together with females with mental disorders on the well-being of the former both during imprisonment and after their release from prison. Based on in-depth interviews with 22 women ex-prisoners who had been imprisoned for a period of at least two years in the single Israeli female correctional facility, Neve Tirza Prison, and released one to three months before the initiation of the study to a community-based agency managed by the Israeli Prisoner Rehabilitation Authority, and based on a qualitative, constructive strategy. We found that: (i) mentally ill prisoners’ conduct creates severe feelings of stress and discomfort among many of the prisoners without a mental disorder prisoners; (ii) The intimate and often long-term encounters with prisoners with a mental illness lead to increased feelings of distress, helplessness, fear, and frustration among many of the women prisoners; (iii) the damaging encounters between women prisoners and mentally-ill prisoners harmed the reintegration of the formers into society after release, and (iv) The women ex-prisoners lacked the basic mental, cognitive, and social tools necessary for dealing with female inmates with a mental illness and had received no psychological or emotional support from the prison personnel. Consequently, they suffered – and still suffer – from traumatic and upsetting memories Our findings led us to conclude that women prisoners should be imprisoned separately from female prisoners with mental disorders or be offered a wide range of psychological and emotional coping tools as well as various rehabilitative treatment programs.Keywords: women, prisoners, mentally ill, health
Procedia PDF Downloads 127176 Inclusion of Children with Disabilities in Early Childhood Development Programs in Nepal: Construction of a Stakeholder Informed Framework
Authors: Divya Dawadi, Kerry Bissaker
Abstract:
Inclusion of children with a disability (CwD) in Early Childhood Education and Development (ECED) programs in Nepal while viewed as desirable is not widespread. Even though the ECED program is currently providing access to ECED services for one million young children, with the aim to improve children's school readiness by equipping them with the necessary knowledge and skills to succeed more effectively in their primary schooling, access to early year's education in inclusive settings for CwD is challenging. Using a heuristic qualitative design, this research aims to construct a framework by analyzing the perspectives of parents and professionals through interviews and focus group discussions, with a view to recommending a new policy to address the rights of CwD and their families. Several school-based and/or organizational and contextual factors interact to contribute to CwD becoming victims of multiple layers of exclusion. The school-based factors include policy, attitudes, teacher efficacy, resources, coordination and parental engagement. The contextual factors are spirituality, caste ethnicity, language, economic status, and geographic location. However, there is a varied effect of the interaction between school-based and contextual factors on different groups of CwD. A policy needs to recognize the multiplicity of the interactions between these factors that inhibit the inclusion of varied groups of CwD in ECED programs and address them separately.Keywords: children with a disability, early childhood education and development, framework, inclusion
Procedia PDF Downloads 359175 The Analyses of July 15 Coup Attempt through the Turkish Press
Authors: Yasemin Gülşen Yılmaz, Süleyman Hakan Yılmaz, Muhammet Erbay
Abstract:
Military interventions have an important place in the Turkish Political History. Military interventions are commonly called coup in the society. By coup we mean that the armed forces seize political power either by a group of officer in the army or by chain of command. Coups not only weaken but also suspend the democracy in a country. All periods of coup created its own victims. Two military coups which took place in May 27, 1960 and September 12, 1980 are the most important ones in terms of political and social effect in the Turkish Political History. Apart these, March 12, 1971, February 28, 1997 and April 27, 2007 e-memorandum are the periods when Army submitted a memorandum and intervened the political government indirectly. Beside the memorandums and coups there were also many coup attempts that have been experienced in the Turkish Political History. In this study, we examined the coup attempted by FETO’s military members in the evening of July 15, 2016 from the point of the Turkish Press. Cumhuriyet, Haber Türk, Hürriyet, Milliyet, Sabah, Star, Yeni Akit and Yeni Şafak Newspapers which have different publication policies were examined within the scope of the study. The first pages of the newspapers dated July 16, 2016 were examined using content analysis method. The headlines, news, news headlines and the visual materials used for news were examined and the collected data were analysed.Keywords: July 15, news, military coup, press
Procedia PDF Downloads 261174 A Retrospective Study of Suicidal Deaths in Madinah for Ten Years
Authors: Radah Yousuf, Ashraf Shebl
Abstract:
Suicide is a tragic event with strong emotional repercussions for its survivors and for families of its victims. There were thousands of cases all over the world. There are many risk factors include mental disorders such as depression, and substance abuse, including alcoholism and use of benzodiazepines. Other suicides are impulsive acts due to stress such as from financial difficulties, troubles with relationships, or from bullying. The aim of work in this study is making a survey from archives of the suicidal cases, which had a medicolegal examination, in forensic medicine center in Al Madinah Almunawarah-KSA, for ten years in the period between 1428-1438h. In each case, some data are collected such as age, sex, time and place of an act, method of suicide, the presence of the witness, medical history. This study demonstrates that suicide is more common in male than female, and the 4th decade was the most period of age. The most common method of suicide was hanging followed by falling from the height. These results indicated that cultural and religious beliefs that discourage suicide and support self-preservation instinct, and suicide education programs provide information to students in high school, builds awareness, one of the most important issues in solving that problem. From the forensic view, circumstantial evidence of every forensic case must take and record, full history about the social, medical and psychological problems, attend the scene of death is a very important, complete medicolegal investigation for every case, and full autopsy with very skilled techniques and facilities can help in diagnosing what type of crimes.Keywords: suicide, age, sex, hanging
Procedia PDF Downloads 148173 R-Killer: An Email-Based Ransomware Protection Tool
Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena
Abstract:
Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine
Procedia PDF Downloads 215172 Still a Man’s World? Rape Myth Acceptance, Attitudes Towards Women and Traditional Male Gender Role Beliefs in a Sample of British Military Veterans
Authors: Jessica Beck
Abstract:
Despite efforts to address the issue through prevention and education, sexual assault remains an issue within the military. Rape supportive beliefs have been identified as a risk factor linked to sexually aggressive and coercive behaviours. Rape myth acceptance is part of a wider cognitive framework of attitudes which perpetuate negative sociocultural norms about the male role. Notwithstanding the established links between rape myth acceptance, attitudinal variables, and rape proclivity, relatively little research has been conducted with military samples. In this study, 151 British military veterans completed an online survey measuring their rape myth acceptance, attitudes towards women, belief in male role norms and basic personality traits. Consistent with previous research, male veterans had higher levels of rape myth acceptance, more negative attitudes towards women, and subscribed to more traditional notions of masculinity. The types of myths endorsed also varied by gender, with male veterans significantly more likely to blame rape victims or believe women regularly lie about being raped. A relationship between rape myth acceptance, negative attitudes towards women, and adherence to male norms was found, which explained a significant proportion of the variance in rape myth acceptance. Implications for sexual assault prevention programmes are discussed.Keywords: rape myths, rape myth acceptance, military sexual assault, sexual assault beliefs
Procedia PDF Downloads 87171 The Limits to Self-Defense Claims in Case of Domestic Violence Homicides
Authors: Maria Elisabete Costa Ferreira
Abstract:
Domestic violence is a serious social issue in which victims are mostly women. Domestic violence develops in cycles, starting with the building of tension, passing through the incident of abuse and ending with reconciliation, also known as honeymoon. As time goes by, the shorter these phases become, and the greater and more severe the attacks, rarely leading to the death of the victim of abuse. Sometimes, the victim stops the abuse by killing the aggressor, usually after the immediate aggression has taken place. This poses an important obstacle to the claim of self-defense by the victim of domestic violence pending trial for the homicide of her long-time abuser. The main problem with self-defense claims in such cases is that the law requires the act of aggression to be present or imminent (imminent threat or immediate danger) so that it permits the victim to take her defense into her own hands. If the episode of aggression has already taken place, this general requirement for the admissibility of self-defense is not satisfied. This paper sheds new light on the concept of the actuality of the aggression, understanding that, since domestic violence is a permanent offense, for as long as the victim stays under the domain of the aggressor, imminent threat will be present, allowing the self-defense claim of a woman who kills her abuser in such circumstances to be admissible. An actualist interpretation of the requirement of the necessity of the means used in self-defense will be satisfied when evaluated from the subjective perspective of the intimate partner victim. Necessity will be satisfied if it is reasonable for the victim to perceive the use of lethal force as the only means to release herself from the abuser.Keywords: domestic violence, homicide, self-defense, imminent threat, necessity of lethal force
Procedia PDF Downloads 65170 Impact of Socio-Cultural Attributes of Imo Communities on Widowhood Practice in Imo State, Nigeria
Authors: Otuu O. Obasi, Jude C. Ajaraogu, Happiness C. Anthony-Ikpe
Abstract:
Women in Igbo land generally experience culture-related mistreatment in the event of the death of their husbands. The mistreatment ranges from scraping of widows’ hair to denial of the right to see their husbands’ corpses. The objectives of the study were to determine the forms and prevalence of widowhood practice in the studied communities, the effects of the socio-cultural attributes of the people on the practice, and the perceived effect of the practice on the victims. Data for the study were collected from 64 randomly selected communities out of 640 communities in Imo State, Nigeria. 450 copies of the researcher-made-questionnaire were distributed across the three senatorial zones of the State. A total of 418 or 92.8% were completely filled and returned. The result of the study showed, among other things, that the majority of males and females recognized widowhood practice as dehumanizing, but opined that it cannot be stopped because it is rooted in culture. However, 30.2% of the female population did not agree that the practice is dehumanizing to women since it was their cultural practice. The study also revealed that scrapping of widows’ hair was the commonest practice while sleeping alone with the husband’s corpse was the least practice. Regarding the effect which this practice has on widows, emotional trauma topped the list; and was followed by economic hardship and health deterioration. Also shown by the study was that the level of education and religion did not have a notable effect on widowhood practice. With regard to possible stoppage measures, greater number of the respondents (38%) indicated that a synergy of efforts was needed to curb the social scourge.Keywords: widowhood practice, socio-cultural attributes, violence, impact
Procedia PDF Downloads 133169 Association of Extremity Injuries with Safety Gear and Clothing of Hospitalized Motorcycle Riders: A Prospective Study
Authors: Sanjaya N. Munasinghe, R. Gnanasekeram, Dimuthu Tennakoon
Abstract:
During the last few years there has been a dramatic increase in the number of motorcyclists in Sri Lankan roads and thus an increase of motorcycle accidents (MCAs) with a heavy death and casualty toll. Extremity injuries due to MCAs cause a heavy burden on government hospitals. However, data on MCA injuries are limited. This study tries to determine the relationship between extremity injuries with protective gears and clothing motorcycle riders were wearing at the time of the accident. Data were collected from 410 motorcycle riders and passengers involved with MCAs and admitted to orthopedic and emergency observation wards in Teaching Hospital Kurunegala with extremity injuries between 1st February 2015 and 31st July 2015 using an interviewer administered questioner. Data were analyzed using SPSS version 17.0. Distal radial fracture is the most common upper extremity injury (12%), and Tibial fracture is the most common and severe lower extremity injury (23%). Very few participants were wearing safety gloves (2%) and jackets (10%). Most of the participants were wearing slippers (66%), short sleeved upper clothing (96%) and light cloth trousers (49%). According to Chi-square test associations were found between footwear and foot injuries (p-value - 0.001, Cramer's v-value - 0.203) and safety jacket and upper extremity injuries (p-value - 0.002, Cramer's v-value - 0.177). The results indicate that using safety gear can minimize the number of injuries in MCA victims. Thus it is necessary to ensure that motorcycle riders and pillion riders use proper safety gear.Keywords: extremity injuries, fractures, motorcycle accidents, safety gear
Procedia PDF Downloads 294168 The Role of Asset Recovery in Combatting Organized Crime
Authors: Tamas Bezsenyi, Noemi Katona
Abstract:
Fighting Human Trafficking is a highly important issue worldwide that states need to deal with in international politics. In the EU combatting human trafficking is emphasized in international policy making and also in the work of international law enforcement, thus in the work of the EUROPOL. While the EU Directive against Human Trafficking prescribes how states should fight this transnational crime and also how victims should be assisted, the EUROPOL focuses on the effective cooperation between national law enforcement agencies. However, despite the aims of the common fight, human trafficking is regulated differently in the punitive law of various nation states. This deeply defines the work and possibilities of national law enforcement organizations. Among the manifold differences in this paper, we focus on the role of regulating asset recovery. We highlight that money, and the regulation and practice how the law enforcement deals with income gained from criminal activities, play essential role in combatting human trafficking. While doing research on the investigation of transnational human trafficking by the Hungarian Law Enforcement Agencies, we have found that the unfortunate regulation of asset recovery determines the lower effectiveness of eliminating criminal organizations. While i.e. in the Netherlands confiscation of property takes place in an early stage of the criminal procedure, in Hungary it can be conducted only if money laundering is also assumed. Our presentation builds on the comparison of criminal procedures which we analyse based on criminal files and interviews with coworkers of the National Bureau of Investigation.Keywords: human trafficking, law enforcement, asset recovery, organized crime
Procedia PDF Downloads 283167 Optimal 3D Deployment and Path Planning of Multiple Uavs for Maximum Coverage and Autonomy
Authors: Indu Chandran, Shubham Sharma, Rohan Mehta, Vipin Kizheppatt
Abstract:
Unmanned aerial vehicles are increasingly being explored as the most promising solution to disaster monitoring, assessment, and recovery. Current relief operations heavily rely on intelligent robot swarms to capture the damage caused, provide timely rescue, and create road maps for the victims. To perform these time-critical missions, efficient path planning that ensures quick coverage of the area is vital. This study aims to develop a technically balanced approach to provide maximum coverage of the affected area in a minimum time using the optimal number of UAVs. A coverage trajectory is designed through area decomposition and task assignment. To perform efficient and autonomous coverage mission, solution to a TSP-based optimization problem using meta-heuristic approaches is designed to allocate waypoints to the UAVs of different flight capacities. The study exploits multi-agent simulations like PX4-SITL and QGroundcontrol through the ROS framework and visualizes the dynamics of UAV deployment to different search paths in a 3D Gazebo environment. Through detailed theoretical analysis and simulation tests, we illustrate the optimality and efficiency of the proposed methodologies.Keywords: area coverage, coverage path planning, heuristic algorithm, mission monitoring, optimization, task assignment, unmanned aerial vehicles
Procedia PDF Downloads 215166 Web Proxy Detection via Bipartite Graphs and One-Mode Projections
Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo
Abstract:
With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.Keywords: bipartite graph, one-mode projection, clustering, web proxy detection
Procedia PDF Downloads 245165 Fear of Crime Among Females on University Campuses
Authors: Shahed, Tala, Ahlam, Marah, Sara, Shaden
Abstract:
Research on fear of crime has shown that there are many influences on it, including gender, age, and geographic location. For example, women are more afraid of crime than men. The campus has a high crime rate and fear of crime due to many hiding places and blind spots; women are more likely than men to be victims of certain types of crime, such as rape and verbal and sexual harassment. And it became clear that older female students have a different perception of the place over time and other knowledge and fear of it, another study at Hashemite University. This study aims to understand better how the environment affects the negative experiences of female students and how their age and familiarity environment affects their sense of safety. This study also examines whether CPTED can be used to help prevent crime. The Broken Windows Theory also states that crime occurs in areas with overt indications of criminal activity, antisocial behavior, and civil unrest. This is related to the principle of CPTED maintenance and monitoring, activity support, regional development, and access control. Given their increased vulnerability to harassment, “sexual harassment” can refer to different behaviors. On campuses, harassment was happening everywhere, but it was most prevalent in "blind spots" that were out of sight and deserted. This study uses a methodology based on quantitative data that depends on putting a number on the amount of a particular phenomenon that exists in the world. The main finding shows how CPTED works in an academic context and what adjustments need to be made.Keywords: Hashmite University, CPTED, crime prevention, university campus, fear of crime, female faer, broken window theory
Procedia PDF Downloads 79164 Trafficking of Women in International Migration: Issues and Major Challenges in Present Scenario
Authors: Neha Singh, Anshuman Rana
Abstract:
Gender-Based Violence (GBV) is a violation of human rights and a form of discrimination which reinforces inequalities between men and women. It is defined as violence that is directed against a person on the basis of gender. There has been increased attention to human trafficking that has exposed to illegal migration. Trafficking is complex, but it generally takes place due to “push and pull factors”. India is both a source as well as a transit country for trafficking. Women are bought and sold with impunity and trafficked to other countries. They are forced to work as sex worker, forced labour and other practices of slavery. Trafficked victims often suffer from serious abuse and physical exhaustion. The effects of violence on women vary widely. GBV typically has physical, psychological and social effects. They face unwanted pregnancies, miscarriages, high rate of infertility and sexually transmitted disease. The social exclusion of women is so great that it constitutes a new form of apartheid. Women are considered as lesser value and deprived of their fundamental rights. Violation of human rights and fundamental freedom such as- trafficking of women, girls for sex trade, forced prostitution and sex tourism have become the focus of internationally organized crimes. My paper will analyse the impact of violence on society as well. Law alone cannot change the scenario and problem of gender-biasness. The whole issue of gender violence needs social awakening and change in attitude of masses, so that due respect and equal status is given to women.Keywords: gender-based violence, trafficking, migration, violence impact, social exclusion, law enforcement
Procedia PDF Downloads 283163 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities
Authors: Eugenio Ferrer Santiago
Abstract:
The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.Keywords: data privacy, data protection, urban planning, research ethics
Procedia PDF Downloads 59162 Understanding Gender-Based Violence through an Adolescent Lens: Qualitative Findings from Delhi, India
Authors: Pratishtha Singh
Abstract:
Gender-based violence (GBV) or gendered violence refers to violence inflicted on a person because of their gender. Majority of men who perpetrate gender-based violence, first do so during their teenage years. Further, the first sexual experience of most girls is coerced. In order to reduce the widespread occurrence of GBV, it is vital to intervene and reach people, especially boys, when their attitudes and beliefs about sexuality and gender are developing. This study aims to understand GBV through an adolescent lens, focusing on their knowledge, attitudes and experiences regarding gendered abuse. This is a cross-sectional, qualitative study. The respondents are Delhi based students in grades 11th and 12th, recruited via snowball sampling. Sixteen in-depth, telephonic interviews were carried out in the month of April, 2020. The data was transcribed verbatim into MS Word and qualitative coding was undertaken in Atlas.ti 8. Twelve out of sixteen respondents admitted experiencing sexual GBV. Out of these, a little more than half of the victims reported it to somebody. Thematic analysis revealed key themes of: (i) Introduction and reinforcement of a patriarchal structure (ii) Violence in teen dating (iii) Acceptability and normalization of violence and (iv) Justice System. Findings reflect a process wherein GBV becomes an intricate part of adolescents’ lives. Participants showed a moderately well-informed understanding of gendered abuse whereas attitudes reflected a complex combination of internalized patriarchy and a desire to bring positive societal reform. The results of this study highlight a need for health promoting, gender-equitable interventions.Keywords: adolescents, gender, health, violence
Procedia PDF Downloads 128161 The Relevance of Family Involvement in the Journey of Dementia Patients
Authors: Akankunda Veronicah Karuhanga
Abstract:
Dementia is an age mental disorder that makes victims lose normal functionality that needs delicate attention. It has been technically defined as a clinical syndrome that presents a number of difficulties in speech and other cognitive functions that change someone’s behaviors and can also cause impairments in activities of daily living, not forgetting a range of neurological disorders that bring memory loss and cognitive impairment. Family members are the primary healthcare givers and therefore, the way how they handle the situation in its early stages determines future deterioration syndromes like total memory loss. Unfortunately, most family members are ignorant about this condition and in most cases, the patients are brought to our facilities when their condition was already mismanaged by family members and we thus cannot do much. For example, incontinence can be managed at early stages through potty training or toilet scheduling before resorting to 24/7 diapers which are also not good. Professional Elderly care should be understood and practiced as an extension of homes, not a dumping place for people considered “abnormal” on account of ignorance. Immediate relatives should therefore be sensitized concerning the normalcy of dementia in the context of old age so that they can be understanding and supportive of dementia patients rather than discriminating against them as present-day lepers. There is a need to skill home-based caregivers on how to handle dementia in its early stages. Unless this is done, many of our elderly homes shall be filled with patients who should have been treated and supported from their homes. This skilling of home-based caregivers is a vital intervention because until elderly care is appreciated as a human moral obligation, many transactional rehabilitation centers will crop up and this shall be one of the worst moral decadences of our times.Keywords: dementia, family, Alzheimers, relevancy
Procedia PDF Downloads 97