Search results for: Chinese and Polynesian organized crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1999

Search results for: Chinese and Polynesian organized crime

1849 Community Policing: Exploring the Police and Community Participation for Crime Control in Bia West of Ghana

Authors: Bertha Korang Gyimah, Obed Asamoah, Kenross, T. Asamoah

Abstract:

In every human community, crimes or offenses cannot be eliminated, but as crimes are expected, there should be bodies that will control and prevent the crimes. There has been an increasing rate of crime, such as armed robbery, kidnapping, murder, and other forms of violence in the country. Community participation in crime control cannot be left out in Ghana. Several works have been conducted to deal with the importance of community participation in policing, but the causes of communities not fully participating in community policing have been left out. The main aim of the research was to assess the impact of community policing and why the communities are reluctant to partake in community policing to help control crime in Bia West. There have been perceptions about Police that, they expose informant after they give the police tip-off which put the whistleblower life in danger. This has made the community not to get involved in security issues in the community they live in. This situation has posed a serious threat to the Ghana Police Service and its ability to position itself strategically in order to carry out a perfect investigation to bring the perpetrators into custody and to protect their lives and property, as well as the maintenance of law and order. Due to less data on community participation in the Ghana Police Service, the research adopted an interpretative framework to assess the meaning connoted to community policing from the perspectives of the stakeholders themselves. The qualitative research method was used. There was an engagement of the police and community where focus group discussions and individual in-depth interviews were organized in the randomly selected communities in the district. Key informant interviews were used to solicit views of the people why they are reluctant to give information to the police to help them take the perpetrators to book. In the data collected, it was observed that most of the people have been under threats of offenders after they come back from the prisons, it was also observed that some of the unprofessional police personnel’s expose the whistleblowers who put their lives in danger. The data obtained were analyzed using simple Analytical tool SPSS and Excel. Based on the analysis, it was observed that a high number of people in the communities contacted had not made their mind to participate in any security issues. Based on the views of the community, there should be a high level of professionalism in the recruitment system of the Ghana police service to come out with professional police officers who can abide by the rules and regulations governing the profession.

Keywords: community, bia west, Ghana, participation, police

Procedia PDF Downloads 109
1848 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 406
1847 The Social Impact of Religion on New Immigrants: A Case Study of Christianity Among Chinese Immigrants in New Zealand

Authors: Ziwen Wang

Abstract:

There are close links between religion and migration. As newcomers to a foreign nation, new immigrants endured many pressures and challenges. Religion can be an important part of a migrant’s personal identity, and religious communities can offer valued connections and relationships. During the migration process, religion can undergo significant changes as migrants travel across geographical and cultural gaps and as they face new opportunities or new constraints. For those migrants who are not religious, during this unsettling time, people might become sensitive to the "sacredness", accepting its guidance, and occasionally contemplating religious conversion. This research examines the role of faith and the church in supporting new Chinese immigrants from the perspective of the social function of Christianity, utilizing Chinese immigrants in New Zealand as a case study. Through participant observation in four Chinese churches and over seventy semi-structured interviews, this research illustrates how religion has provided them with a haven and how the church provides indispensable material, spiritual, and informational resources essential for their adaptation to life in New Zealand.

Keywords: migration and religion, overseas chinese, religious capital, christianity

Procedia PDF Downloads 41
1846 Sororicide in the Forbidden City: Women Oppressing Each Other in the Chinese TV Drama “The Legend of Zhen Huan”

Authors: Muriel Canas-Walker

Abstract:

The 2012 TV series "The Legend of Zhen Huan" is one of the most popular and influential historical dramas on Chinese television and is regularly discussed on Chinese social media such as Weibo. Set in the Qing dynasty, the 76 episodes series features palace intrigues focused on female characters. In the Forbidden City, concubines must survive the cruelty of an extreme polygamy system, constantly competing against each other. The patriarchal oppression of the women sequestred in the harem relies on fierce female competition and does not leave much room for compassion. Using Michel Foucault’s theory of power, feminist theories, and visual anthropology, this paper analyzes the complex relationships between the female characters, from their rise to power to their fall from grace, from alliances to betrayals, from sorority to sororicide. This analysis aims to understand what makes this series particularly popular with young female audiences in China and explain its importance in Chinese media.

Keywords: Chinese TV Drama, feminism, popular culture, Theory of Power

Procedia PDF Downloads 135
1845 Teachers’ Involvement in their Designed Play Activities in a Chinese Context

Authors: Shu-Chen Wu

Abstract:

This paper will present a study by the author which investigates Chinese teachers’ perspectives on learning at play and their teaching activities in the designed play activities. It asks the question of how Chinese teachers understand learning at play and how they design play activities in the classroom. Six kindergarten teachers in Hong Kong were invited to select and record exemplary play episodes which contain the largest amount of learning elements in their own classrooms. Applying video-stimulated interview, eight teachers in two focus groups were interviewed to elicit their perspectives on designing play activity and their teaching activities. The findings reveal that Chinese teachers have a very structured representation of learning at play, and the phenomenon of uniformity of teachers’ act was found. The contributions of which are important and useful for professional practices and curricular policies.

Keywords: learning at play, teacher involvement, video-stimulated interview, uniformity

Procedia PDF Downloads 111
1844 Another Justice: Litigation Masters in Chinese Legal Story

Authors: Lung-Lung Hu

Abstract:

Ronald Dworkin offered a legal theory of ‘chain enterprise’ that all the judges in legal history altogether create a ‘law’ aiming a specific purpose. Those judges are like co-writers of a chain-story who not only create freely but also are constrained by the story made by the judges before them. The law created by Chinese traditional judges is another case, they, compared with the judges mentioned by Ronald Dworkin, have relatively narrower space of making a legal sentence according to their own discretions because the statutes in Chinese traditional law at the very beginning have been designed as panel code that leaves small room to judge’s discretion. Furthermore, because law is a representative of the authority of the government, i.e. the emperor, any misjudges and misuses deviated from the law will be considered as a challenge to the supreme power. However, different from judges as the defenders of law, Chinese litigation masters who want to win legal cases have to be offenders challenging the verdict that does not favor his or his client’s interest. Besides, litigation master as an illegal or non-authorized profession does not belong to any legal system, therefore, they are relatively freer to ‘create’ the law. According to Stanley Fish’s articles that question Ronald Dworkin and Owen Fiss’ ideas about law, he construes that, since law is made of language, law is open to interpretations that cannot be constrained by any rules or any particular legal purposes. Stanley Fish’s idea can also be applied on the analysis about the stories of Chinese litigation masters in traditional Chinese literature. These Chinese litigation masters’ legal opinions in the so-called chain enterprise are like an unexpected episode that tries to revise the fixed story told by law. Although they are not welcome to the officials and also to the society, their existence is still a phenomenon representing another version of justice different from the official’s and can be seen as a de-structural power to the government. Hence, in this present paper the language and strategy applied by Chinese litigation masters in Chinese legal stories will be analysed to see how they refute made legal judgments and challenge the official standard of justice.

Keywords: Chinese legal stories, interdisciplinary, litigation master, post-structuralism

Procedia PDF Downloads 359
1843 Influence of Socio-Economic Factors on Crime Perpetuation Among Inmates of Correctional Facilities in South-West Nigeria

Authors: Ebenezer Bayode Agboola

Abstract:

The study investigated the influence of socioeconomic factors on crime perpetuation among inmates of correctional facilities in South West Nigeria. A sample size of two hundred and forty-four inmates was drawn from Ado, Akure and Ilesha correctional facilities. The sample size consisted of both male and female inmates. Individual inmate was drawn through systematic sampling with the use of inmates’ register at the correctional facilities. The study employed a mixed design, which allowed the blend of both quantitative and qualitative methods. For the quantitative method, data was collected through the use of a questionnaire and for the qualitative method; data was collected with the aid of an in-depth interview (ID. Four research questions were raised for the study and analysed descriptively using simple frequency count and percentage. Five research hypotheses were formulated for the study and tested using Analysis of Variance (ANOVA) and Multiple Regressions. Based on the data analysis, findings revealed that there was a significant relationship between family history and perpetuation of crime among inmates. Though no significant relationship was found between employment and the perpetuation of crime, however, the rate of crime perpetuation by individuals was significantly found to be related to peer pressure. Also, the study further found that there was a significant relationship between the use of substances and perpetuation of crime. Lastly, it was found that there was a significant relationship between family history, employment, and peer pressure. The study recommended that Parents should pay adequate attention to their children, especially during the adolescent stage and that the Government should enact relevant laws that will checkmate the rising involvement of young people in cybercrime or internet fraud.

Keywords: crime, socio economic factor, inmates, correctional facilities, Southwest

Procedia PDF Downloads 48
1842 Preparedness for Microbial Forensics Evidence Collection on Best Practice

Authors: Victor Ananth Paramananth, Rashid Muniginin, Mahaya Abd Rahman, Siti Afifah Ismail

Abstract:

Safety issues, scene protection, and appropriate evidence collection must be handled in any bio crime scene. There will be a scene or multi-scene to be cordoned for investigation in any bio-incident or bio crime event. Evidence collection is critical in determining the type of microbial or toxin, its lethality, and its source. As a consequence, from the start of the investigation, a proper sampling method is required. The most significant challenges for the crime scene officer would be deciding where to obtain samples, the best sampling method, and the sample sizes needed. Since there could be evidence in liquid, viscous, or powder shape at a crime scene, crime scene officers have difficulty determining which tools to use for sampling. To maximize sample collection, the appropriate tools for sampling methods are necessary. This study aims to assist the crime scene officer in collecting liquid, viscous, and powder biological samples in sufficient quantity while preserving sample quality. Observational tests on sample collection using liquid, viscous, and powder samples for adequate quantity and sample quality were performed using UV light in this research. The density of the light emission varies upon the method of collection and sample types. The best tools for collecting sufficient amounts of liquid, viscous, and powdered samples can be identified by observing UV light. Instead of active microorganisms, the invisible powder is used to assess sufficient sample collection during a crime scene investigation using various collection tools. The liquid, powdered and viscous samples collected using different tools were analyzed using Fourier transform infrared - attenuate total reflection (FTIR-ATR). FTIR spectroscopy is commonly used for rapid discrimination, classification, and identification of intact microbial cells. The liquid, viscous and powdered samples collected using various tools have been successfully observed using UV light. Furthermore, FTIR-ATR analysis showed that collected samples are sufficient in quantity while preserving their quality.

Keywords: biological sample, crime scene, collection tool, UV light, forensic

Procedia PDF Downloads 170
1841 Participatory Culture and Value Perception Amongst the Korean and Chinese Drama International Fandom

Authors: Patricia P. M. C. Lourenco, Javier Bringué Sala, Anaisa D. A. de Sena

Abstract:

Almost everyone in Dramaland knows the names of big Korean stars that grace their computer screens on a roll through social media and video streaming platforms that enable awareness of Korean dramas and lifestyle at a click. A surface culture instilled with notions of belonging has redefined the meaning of friendship and challenged deep inner values. Not everyone, however, knows Chinese Dramas or their stars, which is a consequence of Dramaland's focus on Korean dramas and promoting the Korean experience. Despite a parity in terms of production quality, star power, scripts and compelling visual settings, Chinese Dramas have been playing catch up to their famous counterparts. While they might have a strong competitive soft power for international drama fans, the soft power of Korean dramas is imbued with substantial societal values that they want to share with others. Those values are portrayed in an artistic way that connects with audiences who experience loneliness in the non-virtual world contrary to the way Chinese Dramas are perceived.

Keywords: Chinese dramas, fandom, Korean dramas, participatory culture, value perception, soft power, surface culture

Procedia PDF Downloads 139
1840 Thailand and Sino-Japanese Relations in the Early Twentieth Century

Authors: Mizuno Norihito

Abstract:

This study attempts to examine Japanese views of Thailand primarily in the 1920s and 1930s through the analysis of documents published by the Office of Governor-General of Taiwan (Taiwan Sotokufu) and its affiliated organizations. Japan regarded Taiwan, under its control since 1895, as a foothold to making inroads into the South, and The governor-general office was active in investigations and intelligence gathering in Southeast Asia, as well as the southern part of the Chinese continent. Documents published by the governor-general office and its related organizations, especially those in a couple of decades following the First World War, reveal that the Japanese paid attention to the presence of the-Thai-Chinese during the time period. It would not be surprising that the desiring to penetrating into the Thai market, as well as the markets of the rest of Southeast Asia, the Japanese could not ignore the presence of the Thai-Chinese because of their local economic influences. The increased Japanese concern about the Thai-Chinese toward the end of the 1920s and throughout the 1930s was, moreover, intertwined with the increased tension between China and Japan. In other words, Thailand, as well as the rest of Southeast Asia, became another arena of Sino-Japanese confrontation. The rise of nationalism against Japan in China infected the Thai-Chinese communities and threatened Japanese economic activities in the country. However, the Japanese simultaneously found out that Thai-Chinese concert with anti-Japanese in China did not necessarily match their business interests and that the Thai government’s efforts to assimilate the Thai-Chinese into the Thais society and strategic approach to Japan in the late 1930s hampered their anti-Japanese actions.

Keywords: Japanese-Thai Relations, Sino-Japanese relations, Thai Chinese, Overseas Japanese

Procedia PDF Downloads 307
1839 Theater Metaphor in Event Quantification: A Corpus Study

Authors: Zhuo Jing-Schmidt, Jun Lang

Abstract:

Numeral classifiers are common in Asian languages. Research on numeral classifiers primarily focuses on noun classifiers that quantify and individuate nominal referents. There is a scarcity of research on event quantification using verb classifiers. This study aims to understand the semantic and conceptual basis of event quantification in Chinese. From a usage-based Construction Grammar perspective, this study presents a corpus analysis of event quantification in Chinese. Drawing on a large balanced corpus of contemporary Chinese, we analyze 667 NOUN col-lexemes totaling 31136 tokens of a productive numeral classifier construction in Chinese. Using collostructional analysis of the collexemes, the results show that the construction quantifies and classifies dramatic events using a theater-based conceptual metaphor. We argue that the usage patterns reflect the cultural entrenchment of theater as in Chinese conceptualization and the construal of theatricality in linguistic expression. The study has implications for cognitive semantics and construction grammar.

Keywords: event quantification, classifier, corpus, metaphor

Procedia PDF Downloads 45
1838 The Meaningful Pixel and Texture: Exploring Digital Vision and Art Practice Based on Chinese Cosmotechnics

Authors: Xingdu Wang, Charlie Gere, Emma Rose, Yuxuan Zhao

Abstract:

The study introduces a fresh perspective on the digital realm through an examination of the Chinese concept of Xiang, elucidating how it can build an understanding of pixels and textures on screens as digital trigrams. This concept attempts to offer an outlook on the intersection of digital technology and the natural world, thereby contributing to discussions about the harmonious relationship between humans and technology. The study looks for the ancient Chinese theory of Xiang as a key to establishing the theories and practices to respond to the problem of Contemporary Chinese technics. Xiang is a Chinese method of understanding the essentials of things through appearances, which differs from the method of science in the Westen. Xiang, the basement of Chinese visual art, is rooted in ancient Chinese philosophy and connected to the eight trigrams. The discussion of Xiang connects art, philosophy, and technology. This paper connects the meaning of Xiang with the 'truth appearing' philosophically through the analysis of the concepts of phenomenon and noumenon and the unique Chinese way of observing. Hereafter, the historical interconnection between ancient painting and writing in China emphasizes their relationship between technical craftsmanship and artistic expression. In digital, the paper blurs the traditional boundaries between images and text on digital screens in theory. Lastly, this study identified an ensemble concept relating to pixels and textures in computer vision, drawing inspiration from AI image recognition in Chinese paintings. In art practice, by presenting a fluid visual experience in the form of pixels, which mimics the flow of lines in traditional calligraphy and painting, it is hoped that the viewer will be brought back to the process of the truth appearing as defined by the 'Xiang’.

Keywords: Chinese cosmotechnics, computer vision, contemporary Neo-Confucianism, texture and pixel, Xiang

Procedia PDF Downloads 33
1837 BERT-Based Chinese Coreference Resolution

Authors: Li Xiaoge, Wang Chaodong

Abstract:

We introduce the first Chinese Coreference Resolution Model based on BERT (CCRM-BERT) and show that it significantly outperforms all previous work. The key idea is to consider the features of the mention, such as part of speech, width of spans, distance between spans, etc. And the influence of each features on the model is analyzed. The model computes mention embeddings that combine BERT with features. Compared to the existing state-of-the-art span-ranking approach, our model significantly improves accuracy on the Chinese OntoNotes benchmark.

Keywords: BERT, coreference resolution, deep learning, nature language processing

Procedia PDF Downloads 172
1836 Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings

Authors: Vanda Božić, Željko Nikač

Abstract:

Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime.

Keywords: trafficking in children, trafficking in human beings, child as a victim of human trafficking, children’s rights

Procedia PDF Downloads 334
1835 Chinese Leaders Abroad: Case in the Netherlands

Authors: Li Lin, Hein Roelfsema

Abstract:

To achieve aggressive expansion goals, many Chinese companies are seeking resources and market around the world. To an increasing extent, Chinese enterprises recognized the Netherlands as their gateway to Europe Market. Yet, large cultural gaps (e.g. individualism/collectivism, power distance) may influence expat leaders’ influencing process, in turn affect intercultural teamwork. Lessons and suggestions from Chinese expat leaders could provide profound knowledge for managerial practice and future research. The current research focuses on the cultural difference between China and the Netherlands, along with leadership tactics for coping and handling differences occurring in the international business work. Exclusive 47 in-depth interviews with Chinese expat leaders were conducted. Within each interview, respondents were asked what were the main issues when working with Dutch employees, and what they believed as the keys to successful leadership in Dutch-Chinese cross-cultural workplaces. Consistent with previous research, the findings highlight the need to consider the cultural context within which leadership adapts. In addition, the findings indicated the importance of recognizing and applying the cultural advantages from which leadership originates. The results address observation ability as a crucial key for Chinese managers to lead Dutch/international teams. Moreover, setting a common goal help a leader to overcome the challenges due to cultural differences. Based on the analysis, we develop a process model to illustrate the dynamic mechanisms. Our study contributes to the better understanding of transference of management practices, and has important practical implications for managing Dutch employees.

Keywords: Chinese managers, Dutch employees, leadership, interviews

Procedia PDF Downloads 318
1834 Cultural Tourism in Mexico as a Strategy to Attract Chinese Tourists

Authors: Ruben Molina, Melissa Ochoa

Abstract:

The rapid expansion and facilities that the Chinese government has granted to its inhabitants to travel abroad has brought benefits to the economies of the countries where these tourists travel. Due to the great economic spill that these tourists make in their travels and the great potential they possess, they become one of the most attractive segments in the world, causing countries to seek to attract them for the profits. The Chinese tourist is a tourist who seeks to know the culture, culinary experiences, traditions and folklore of the place where they travel, more than seeking sun and beach. Mexico is a country that has a great mix of tourist products and services, which favors that the tourism offer focuses on the satisfaction of the needs and preferences of the different segments of international tourists who arrive in Mexico: sun and beach tourism and also cultural tourism. Mexico has 51 sites inscribed on the World Heritage List, of which 12 are natural, 37 are cultural and 2 are mixed. Despite the great tourist attraction of the country and the strategic importance of the sector for the economy, Mexico has not managed to have a large number of tourists or income from international tourism for 15 years. One way to increase the travel industry is to attract the Chinese tourist to Mexico, which is considered a priority by countries like the United States, France and Spain due to the advantages they entail. Therefore, this article will describe the tastes, preferences and habits of Chinese tourists coming to the most popular destinations in Mexico through a Likert scale and it will be described which are the most attractive cultural factors in Mexico for the Chinese tourists and will be proposing strategies of attraction for Mexico and its destinations.

Keywords: attraction, Chinese tourist, cultural tourism, strategic, Mexico

Procedia PDF Downloads 394
1833 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 241
1832 Thinking for Writing: Evidence of Language Transfer in Chinese ESL Learners’ Written Narratives

Authors: Nan Yang, Hye Pae

Abstract:

English as a second language (ESL) learners are often observed to have transferred traits of their first languages (L1) and habits of using their L1s to their use of English (second language, L2), and this phenomenon is coined as language transfer. In addition to the transfer of linguistic features (e.g., grammar, vocabulary, etc.), which are relatively easy to observe and quantify, many cross-cultural theorists emphasized on a much subtle and fundamental transfer existing on a higher conceptual level that is referred to as conceptual transfer. Although a growing body of literature in linguistics has demonstrated evidence of L1 transfer in various discourse genres, very limited studies address the underlying conceptual transfer that is happening along with the language transfer, especially with the extended form of spontaneous discourses such as personal narrative. To address this issue, this study situates itself in the context of Chinese ESL learners’ written narratives, examines evidence of L1 conceptual transfer in comparison with native English speakers’ narratives, and provides discussion from the perspective of the conceptual transfer. It is hypothesized that Chinese ESL learners’ English narrative strategies are heavily influenced by the strategies that they use in Chinese as a result of the conceptual transfer. Understanding language transfer cognitively is of great significance in the realm of SLA, as it helps address challenges that ESL learners around the world are facing; allow native English speakers to develop a better understanding about how and why learners’ English is different; and also shed light in ESL pedagogy by providing linguistic and cultural expectations in native English-speaking countries. To achieve the goals, 40 college students were recruited (20 Chinese ESL learners and 20 native English speakers) in the United States, and their written narratives on the prompt 'The most frightening experience' were collected for quantitative discourse analysis. 40 written narratives (20 in Chinese and 20 in English) were collected from Chinese ESL learners, and 20 written narratives were collected from native English speakers. All written narratives were coded according to the coding scheme developed by the authors prior to data collection. Statistical descriptive analyses were conducted, and the preliminary results revealed that native English speakers included more narrative elements such as events and explicit evaluation comparing to Chinese ESL students’ both English and Chinese writings; the English group also utilized more evaluation device (i.e., physical state expressions, indirectly reported speeches, delineation) than Chinese ESL students’ both English and Chinese writings. It was also observed that Chinese ESL students included more orientation elements (i.e., the introduction of time/place, the introduction of character) in their Chinese and English writings than the native English-speaking participants. The findings suggest that a similar narrative strategy was observed in Chinese ESL learners’ Chinese narratives and English narratives, which is considered as the evidence of conceptual transfer from Chinese (L1) to English (L2). The results also indicate that distinct narrative strategies were used by Chinese ESL learners and native English speakers as a result of cross-cultural differences.

Keywords: Chinese ESL learners, language transfer, thinking-for-speaking, written narratives

Procedia PDF Downloads 93
1831 The Precarious Chinese Ecology of Financial Expertise: Discontent in the Mix

Authors: Giulia Dal Maso

Abstract:

Within the contemporary financial capitalist configuration, the interplay of Chinese statecraft and financialization has shaped a new ‘ecology of financial expertise.’ This indicates the emergence of a new financial technocratic governance; that is increasingly changing the Chinese economy, reducing the state’s administrative and fiscal functions and increasing state assets in accordance with a new shareholder logic. In this shift, the creation of the stock market by the state was conceived not only as a new redistributor of wealth but as a ‘clearing house’ for social discontent resulting from work casualization, wage repression and a lack of social welfare. Since its inception in the wake of Deng Xiaoping’s reforms, the Chinese state has used the stock market as a means of securing social legitimation by providing a prearranged space where the disaggregated and vulnerable subjects left behind by the dismantlement of the collective work units of the Maoist period (danwei) can congregate. However, fieldwork which included both participant observation as well as interviews with investors in brokerage rooms in Shanghai (where one of only two mainland Chinese stock exchanges is situated) reveals that both new formal and informal financial experts—namely the haigui (Chinese returnees with a financial degree abroad) and sanhu (individual Chinese scattered players), are equally dissatisfied with their investing activities. They express discontent with the state, which they hold responsible for the summer 2015 financial crisis and for the financial turmoil that jeopardizes China’s financial and political project. What the investors want is a state that will guarantee the continuation of the current gupiaore ‘stock fever’. This paper holds that, by embracing financialization, the state is undermining the contract at the base of its legitimacy.

Keywords: Chinese state, Deng Xiaoping, financial capitalism, individual investors

Procedia PDF Downloads 417
1830 Chinese Doctoral Students in Canada: The Influence of Financial Status and Cultural Cognition on Academic Performance

Authors: Xuefan Li

Abstract:

Parts of Chinese doctoral students in Canada are facing significant academic pressure. The factors contributing to such pressure are diverse, including financial conditions and cultural differences. Students from various academic disciplines have been interviewed to investigate the factors that Chinese students consider when selecting Canada as a destination for doctoral studies, as well as to identify the challenges they face during their academic pursuits and the associated factors influencing their performance. The findings indicate that their motivations to pursue doctoral study in Canada are concluded as both push and pull factors. Financial conditions and cultural differences are critical factors affecting academic performance, with disciplinary variations in the degree of influence observed.

Keywords: Chinese doctoral students, financial status, cultural cognition, academic performance

Procedia PDF Downloads 49
1829 Machine Translation Analysis of Chinese Dish Names

Authors: Xinyu Zhang, Olga Torres-Hostench

Abstract:

This article presents a comparative study evaluating and comparing the quality of machine translation (MT) output of Chinese gastronomy nomenclature. Chinese gastronomic culture is experiencing an increased international acknowledgment nowadays. The nomenclature of Chinese gastronomy not only reflects a specific aspect of culture, but it is related to other areas of society such as philosophy, traditional medicine, etc. Chinese dish names are composed of several types of cultural references, such as ingredients, colors, flavors, culinary techniques, cooking utensils, toponyms, anthroponyms, metaphors, historical tales, among others. These cultural references act as one of the biggest difficulties in translation, in which the use of translation techniques is usually required. Regarding the lack of Chinese food-related translation studies, especially in Chinese-Spanish translation, and the current massive use of MT, the quality of the MT output of Chinese dish names is questioned. Fifty Chinese dish names with different types of cultural components were selected in order to complete this study. First, all of these dish names were translated by three different MT tools (Google Translate, Baidu Translate and Bing Translator). Second, a questionnaire was designed and completed by 12 Chinese online users (Chinese graduates of a Hispanic Philology major) in order to find out user preferences regarding the collected MT output. Finally, human translation techniques were observed and analyzed to identify what translation techniques would be observed more often in the preferred MT proposals. The result reveals that the MT output of the Chinese gastronomy nomenclature is not of high quality. It would be recommended not to trust the MT in occasions like restaurant menus, TV culinary shows, etc. However, the MT output could be used as an aid for tourists to have a general idea of a dish (the main ingredients, for example). Literal translation turned out to be the most observed technique, followed by borrowing, generalization and adaptation, while amplification, particularization and transposition were infrequently observed. Possibly because that the MT engines at present are limited to relate equivalent terms and offer literal translations without taking into account the whole context meaning of the dish name, which is essential to the application of those less observed techniques. This could give insight into the post-editing of the Chinese dish name translation. By observing and analyzing translation techniques in the proposals of the machine translators, the post-editors could better decide which techniques to apply in each case so as to correct mistakes and improve the quality of the translation.

Keywords: Chinese dish names, cultural references, machine translation, translation techniques

Procedia PDF Downloads 115
1828 Recurrent Neural Networks with Deep Hierarchical Mixed Structures for Chinese Document Classification

Authors: Zhaoxin Luo, Michael Zhu

Abstract:

In natural languages, there are always complex semantic hierarchies. Obtaining the feature representation based on these complex semantic hierarchies becomes the key to the success of the model. Several RNN models have recently been proposed to use latent indicators to obtain the hierarchical structure of documents. However, the model that only uses a single-layer latent indicator cannot achieve the true hierarchical structure of the language, especially a complex language like Chinese. In this paper, we propose a deep layered model that stacks arbitrarily many RNN layers equipped with latent indicators. After using EM and training it hierarchically, our model solves the computational problem of stacking RNN layers and makes it possible to stack arbitrarily many RNN layers. Our deep hierarchical model not only achieves comparable results to large pre-trained models on the Chinese short text classification problem but also achieves state of art results on the Chinese long text classification problem.

Keywords: nature language processing, recurrent neural network, hierarchical structure, document classification, Chinese

Procedia PDF Downloads 37
1827 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria

Authors: Auwal Nata'ala

Abstract:

The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.

Keywords: cyber crimes, e-banking, policies, ICT

Procedia PDF Downloads 389
1826 Testifying in Court as a Victim of Crime for Persons with Little or No Functional Speech: Vocabulary Implications

Authors: Robyn White, Juan Bornman, Ensa Johnson

Abstract:

People with disabilities are at a high risk of becoming victims of crime. Individuals with little or no functional speech (LNFS) face an even higher risk. One way of reducing the risk of remaining a victim of crime is to face the alleged perpetrator in court as a witness – therefore it is important for a person with LNFS who has been a victim of crime to have the required vocabulary to testify in court. The aim of this study was to identify and describe the core and fringe legal vocabulary required by illiterate victims of crime, who have little or no functional speech, to testify in court as witnesses. A mixed-method, the exploratory sequential design consisting of two distinct phases was used to address the aim of the research. The first phase was of a qualitative nature and included two different data sources, namely in-depth semi-structured interviews and focus group discussions. The overall aim of this phase was to identify and describe core and fringe legal vocabulary and to develop a measurement instrument based on these results. Results from Phase 1 were used in Phase 2, the quantitative phase, during which the measurement instrument (a custom-designed questionnaire) was socially validated. The results produced six distinct vocabulary categories that represent the legal core vocabulary and 99 words that represent the legal fringe vocabulary. The findings suggested that communication boards should be individualised to the individual and the specific crime. It is believed that the vocabulary lists developed in this study act as a valid and reliable springboard from which communication boards can be developed. Recommendations were therefore made to develop an Alternative and Augmentative Communication Resource Tool Kit to assist the legal justice system.

Keywords: augmentative and alternative communication, person with little or no functional speech, sexual crimes, testifying in court, victim of crime, witness competency

Procedia PDF Downloads 453
1825 Transformational Leadership and Its Effect on Teacher Job Satisfaction

Authors: Shujie Liu

Abstract:

This study aimed to investigate the relationship between teachers’ perceived transformational leadership behaviors and their job satisfaction in China after controlling for teacher self-efficacy. Hierarchical regression analysis (HRA) technique was employed to examine factors’ contributions to teacher job satisfaction with a sample of Chinese high school teachers. The finding of this study provided evidence that teachers’ perceived transformational leadership behaviors accounted for a large percentage (44.9%) of the variance in Chinese teachers’ job satisfaction. Uniquely, school principals’ sense of power was a negative significant predictor of teacher job satisfaction, meaning that the more teachers perceived their principals’ sense of power, the lower of their job satisfaction. Furthermore, this study provided evidence that teacher self-efficacy significantly contributes to teacher job satisfaction. Specifically, teachers’ self-efficacy on student engagement was found to be a significant predictor of teacher job satisfaction. The conclusions were discussed in terms of Chinese cultures. The authors pointed out that how to make teachers involved in school policy making is a challenge for China and that more shared leadership is needed in Chinese schools.

Keywords: Chinese teachers, teacher job satisfaction, teacher self-efficacy, transformational leadership

Procedia PDF Downloads 459
1824 Time of Week Intensity Estimation from Interval Censored Data with Application to Police Patrol Planning

Authors: Jiahao Tian, Michael D. Porter

Abstract:

Law enforcement agencies are tasked with crime prevention and crime reduction under limited resources. Having an accurate temporal estimate of the crime rate would be valuable to achieve such a goal. However, estimation is usually complicated by the interval-censored nature of crime data. We cast the problem of intensity estimation as a Poisson regression using an EM algorithm to estimate the parameters. Two special penalties are added that provide smoothness over the time of day and day of the week. This approach presented here provides accurate intensity estimates and can also uncover day-of-week clusters that share the same intensity patterns. Anticipating where and when crimes might occur is a key element to successful policing strategies. However, this task is complicated by the presence of interval-censored data. The censored data refers to the type of data that the event time is only known to lie within an interval instead of being observed exactly. This type of data is prevailing in the field of criminology because of the absence of victims for certain types of crime. Despite its importance, the research in temporal analysis of crime has lagged behind the spatial component. Inspired by the success of solving crime-related problems with a statistical approach, we propose a statistical model for the temporal intensity estimation of crime with censored data. The model is built on Poisson regression and has special penalty terms added to the likelihood. An EM algorithm was derived to obtain maximum likelihood estimates, and the resulting model shows superior performance to the competing model. Our research is in line with the smart policing initiative (SPI) proposed by the Bureau Justice of Assistance (BJA) as an effort to support law enforcement agencies in building evidence-based, data-driven law enforcement tactics. The goal is to identify strategic approaches that are effective in crime prevention and reduction. In our case, we allow agencies to deploy their resources for a relatively short period of time to achieve the maximum level of crime reduction. By analyzing a particular area within cities where data are available, our proposed approach could not only provide an accurate estimate of intensities for the time unit considered but a time-variation crime incidence pattern. Both will be helpful in the allocation of limited resources by either improving the existing patrol plan with the understanding of the discovery of the day of week cluster or supporting extra resources available.

Keywords: cluster detection, EM algorithm, interval censoring, intensity estimation

Procedia PDF Downloads 43
1823 L2 Acquisition of Tense and Aspect by Cantonese and Mandarin ESL Learners of Different Proficiency Levels

Authors: Mable Chan

Abstract:

The present study about the acquisition of tense and aspect by Cantonese and Mandarin ESL learners aims to investigate the relationship between knowledge, the role that classroom input plays in the development of that knowledge, and learners' use of the L2 knowledge they acquire (i.e. their performance). Chinese has been argued as a tenseless language and Chinese ESL learners have to acquire the property from scratch. The study of acquisition of tense and aspect is a very fruitful research area in second language acquisition for a number of reasons. First, tense and aspect are notorious for being difficult for Chinese ESL learners. Second, to our knowledge, no studies have been done to compare Cantonese and Mandarin ESL learners and age effects in one single study. Data are now being collected and the findings from this comparison study of tense-aspect acquisition will shed light on both theoretical and pedagogical issues in second language acquisition, and contribute to a better understanding of both theoretical aspect concerning L2 acquisition of tense and aspect, and pedagogy of tense for L2 Chinese ESL learners.

Keywords: aspect, second language acquisition, tense, universal grammar

Procedia PDF Downloads 319
1822 Number Variation of the Personal Pronoun we Used by Chinese English Learners

Authors: Qiong Hu, Ming Yue

Abstract:

Language variation signals the newest usage of language community, which might become the developmental trend of that language. However, language textbooks cannot keep up with these emergent usages. Most Chinese English learners nowadays are still exposed to traditional grammar prescribed in the textbook so that some variational usages cannot be acquired. The personal pronoun we is prescribed as a plural pronoun in the textbook grammar, but its number value is more flexible in actual use. Based on the Chinese Learner English Corpus (CLEC), and with the homemade Friends corpus as reference, the present research explores the number value of the first person pronoun we used by Chinese English learners. With consideration of the subjectivity of we, this paper annotated the number value of all the wes in “we+ PCU (Perception-cognation-utterance) verbs” collocations. Results show that though exposed to traditional textbooks which prescribe the plural reference of we, there still exists some unconventional usage (singular or vague in reference) in the writings of Chinese English learners, which is less frequent than that of the native speeches. Corpus data and results from manual semantic annotation show that this could be due to the impact of formulaic sequence on the learners and the positive transfer from their native language. An improved SLA model of native language, target language and interlanguage is put forward to recognize the existence of variation in second language acquisition, which should be given more attention during teaching.

Keywords: Chinese English learners, number, PCU verbs, Personal pronoun we

Procedia PDF Downloads 330
1821 Different Perceptions of Distance and Full-time Teaching Depending on Different Cultural Backgrounds: A Comparative Study

Authors: Daniel Ecler

Abstract:

This paper aims to compare the data obtained using semi-structured questionnaires and find some connections between them, which could help to understand what factors affect the perception of the advantages and disadvantages of distance learning compared to conventional education. The data collected came from respondents from Czech and Chinese university students, and expectations were such that the different cultural environments from which the two groups come would have an impact on different experiences of distance education. With the help of variation-finding comparison, it turned out that Chinese students did not have such difficulties with the transition to distance learning as students from the Czech Republic, as most of them came into contact with some form of distance education in the past. In addition, it has also been shown that Chinese students use modern technology to a much greater extent, which has also made it easier for them to become accustomed to another form of teaching. In conclusion, Chinese students have greater preconditions for easier management of distance learning, while Czech students prefer more personal contact, and thus full-time teaching. It is obvious that both approaches have their pros and cons; now, it is necessary to find out how to use them for maximum efficiency of the educational process.

Keywords: Chinese college students, cultural background, Czech college students, distance learning, full-time teaching

Procedia PDF Downloads 123
1820 The Challenges Involved in Investigating and Prosecuting Hate Crime Online

Authors: Mark Williams

Abstract:

The digital revolution has radically transformed our social environment creating vast opportunities for interconnectivity and social interaction. This revolution, however, has also changed the reach and impact of hate crime, with social media providing a new platform to victimize and harass users in their homes. In this way, developments in the information and communication technologies have exacerbated and facilitated the commission of hate crime, increasing its prevalence and impact. Unfortunately, legislators, policymakers and criminal justice professionals have struggled to keep pace with these technological developments, reducing their ability to intervene in, regulate and govern the commission of hate crimes online. This work is further complicated by the global nature of this crime due to the tendency for offenders and victims to reside in multiple different jurisdictions, as well as the need for criminal justice professionals to obtain the cooperation of private companies to access information required for prosecution. Drawing on in-depth interviews with key criminal justice professionals and policymakers with detailed knowledge in this area, this paper examines the specific challenges the police and prosecution services face as they attempt to intervene in and prosecute the commission of hate crimes online. It is argued that any attempt to reduce online othering, such as the commission of hate crimes online, must be multifaceted, collaborative and involve both innovative technological solutions as well as internationally agreed ethical and legal frameworks.

Keywords: cybercrime, digital policing, hate crime, social media

Procedia PDF Downloads 187