Search results for: Denial Sadighi
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 101

Search results for: Denial Sadighi

41 Managing Organizational Change for a Transformation Project: The Billing and Customer Relationship Management Journey

Authors: Sharifah I. N. A. Syed Azmi, Nazarina Mohd Nasir

Abstract:

The Billing & Customer Relationship Management (BCRM) project is an important enabler towards realizing customer experience transformation. It involves technological shifts for future scalability, revision of multiple business processes and adoption of change by the users and impacted employees. This massive transition, if not managed properly, may result in the decline of business performance due to productivity drop. Organizational change management is an essential element in BCRM project implementation to ensure the system is well understood and embraced by all stakeholders. In order to move impacted employees from unaware state or denial mode to full-acceptance mindset and committing themselves in using the new system, their involvement in the whole change process starting from the initial stage is imperative. Through the BCRM Change Management Plan, a holistic approach was taken whereby the strategy and program for five key components namely executive sponsorship, continuous communication, process change readiness, organizational readiness and individual readiness were all carefully established. Roles of the project sponsor, change agents, change ambassadors and community of practice (CoP) were clearly defined in gaining high commitment and support across the entire organization. Continuous communication and engagement initiatives throughout project implementation have been carried out to reach all stakeholders. The business readiness was constantly monitored and assessed including effectiveness of end-user training, thorough review of process documentation and completion of roles realignment exercise.

Keywords: BCRM, change management, organizational change, transformation project

Procedia PDF Downloads 106
40 A Discourse Analysis of Menopause for Thai Women

Authors: Prapaipan Phingchim

Abstract:

The number of women approaching menopausal age in Thailand is increasing, making menopause an important health topic. In order to understand Thai women's different ways of interpreting menopausal experiences and the way they construct meaning relating to menopause, it is necessary to include the context in which meaning is constructed as well as the background of cultural attitudes to menopause existing in the Thai society. The aim of this study was to describe different discourses on menopause in Thailand that present themselves to menopausal women through the use of language and to analyze linguistic strategies used to represent such identity. This study adopts discourse theory and a close pragmatic analysis to examine the discursive construction of menopause for Thai women. Two hundreds and fifteen pieces of text under the heading or subject of `menopause' or `becoming a middle-aged woman', published from 2010 to 2019, were included. All material was addressed to Thai women, and consisted of booklets and informational material, articles from newspapers and magazines and popular science books. Five different discourses on menopause were identified: the biomedical discourse; the health-promotion discourse; the consumer discourse; the alternative discourse; and the feminist/ critical discourse. The biomedical discourse on menopause was found to be dominant, but was expanded or challenged by other discourses by offering different scopes of action and/or resting on different fundamental values. The discourses constructed and positioned individual women differently; thus, the women's position varied noticeably from one discourse to another. There are seven major linguistic strategies used to construct those identities. That is, lexical selection, presupposition manipulation, presupposition denial, the use of implication, the use of passive construction, using the cause and effect sentence structure, and rhetoric questions.

Keywords: discourse analysis, discursive construction, menopause, Thai women

Procedia PDF Downloads 109
39 Re-Envisioning Modernity: Transformations of Postwar Suburban Landscapes

Authors: Shannon Clayton

Abstract:

In an effort to explore the potential transformation of North American postwar suburbs, this M.Arch thesis actively engages in the ongoing critique of modernism from the mid 20th century to the present. Contemporary urban design practice has emerged out of the reaction to orthodox modernism. Typically, new suburban development falls into one of two strategies; an attempt to replicate pre-war fabric that never existed, or a reliance on high-density to create instant urbanism. In both cases, the critical role of architecture has been grossly undervalued. Ironically, it is the denial of suburbia’s inherent modernity that has served to prevent genuine place-making. As history demonstrates, modernism is not antithetical to architecture and place. In the postwar years, a critical discussion emerged amongst architects, which sought to evolve modernism beyond functionalism. This was demonstrated through critical discussions on image, experience, and monumentality. As well as increased interest in civic space, and investigations into mat urbanism and the megastructure. The undercurrent within these explorations was a belief that the scale and complexity of modern development could become an opportunity to create urbanism, rather than squander it. This critical discourse has continued through architectural work in the Netherlands and Denmark since the early 1990s, where an emphasis on visual variety, human scale, and public interaction has been given high priority. This thesis applies principles from this ongoing dialogue, and identifies hidden potential within existing North American suburban networks. As a result, the project re-evaluates the legacy of the master plan from a contemporary perspective.

Keywords: urbanism, modernism, suburbia, place-making

Procedia PDF Downloads 215
38 Demonstration of Logical Inconsistency in the Discussion of the Problem of Evil

Authors: Mohammad Soltani Renani

Abstract:

The problem of evil is one of the heated battlegrounds of the idea of theism and its critics. Since time immemorial and in various philosophical schools and religions, the belief in an Omniscient, Omnipotent, and Absolutely Good God has been considered inconsistent with the existence of the evil in the universe. The theist thinkers have generally adopted one of the following four ways for answering this problem: denial of the existence of evil or considering it to be relative, privation theory of evil, attribution of evil to something other than God, and depiction of an alternative picture of God. Defense or criticism of these alternative answers have given rise to an extensive and unending dispute. However, evaluation of the presupposition and context upon/in which a question is raised precedes offering an answer to it. This point in the discussion of the problem of evil is of paramount importance for both parties, i.e., questioners and answerers, that the attributes of knowledge, power, love, good-will, among others, can be supposed to be infinite only in the essence of the attributed and the domain of potentiality but what can be realized in the domain of actuality is always finite. Therefore, infinite nature of Divine Attributes and realization of evil belong to two spheres. Divine Attributes are infinite (absolute) in Divine Essence, but when they are created, each one becomes bounded by the other. This boundedness is a result of the state of being surrounded of the attributes by each other in finite world of possibility. Evil also appears in this limited world. This inconsistency leads to the collapse of the problem of evil from within: the place of infinity of the Divine Attributes, in the words of Muslim mystics, lies in the Holiest Manifestation [Feyze Aqdas] while evil emerges in the Holy Manifestation where the Divine Attributes become bounded by each other. This idea is neither a new answer to the problem of evil nor a defense of theism; rather it reveals a logical inconsistency in the discussion of the problem of evil.

Keywords: problem of evil, infinity of divine attributes, boundedness of divine attributes, holiest manifestation, holy manifestation

Procedia PDF Downloads 115
37 The Copyright Eligibility of Sports Events and Performances

Authors: Emre Bayamlıoğlu

Abstract:

Apart from being the subject of neighboring rights when broadcasted on TV or of cinematographic work when fixed to a tangible medium including a hard drive, the copyright eligibility of a sports performance, and eventually the sporting event has once again given rise to controversy following the CJEU judgment in the Murphy case. Most of the arguments which deny copyright protection for sports performances focus on the fact that unlike movies, plays, television programs, or operas, athletic events are competitive and have no underlying script. The first part of the paper aims to explain that such rhetoric is rather weak simply for the fact that, several types of performances such as improvised musical or dramatic shows are still protected by copyright despite the fact that they are not based on a script. The second part argues that the core reason for the denial copyright protection was the functionality aiming certain practical results such as winning the game, scoring, eliminating an opponent, obstructing a shot and etc., but no scientific or artistic expression in whatsoever form. The paper further argues that expanding copyright protection to functional performances would give rise to unintended copyright claims by the athletes on tackles, shoots, passes, crosses etc. resulting with further restrictions on reporting and photographing of sporting events. The final part provides a policy analysis of the trend to broaden the scope of copyright to cover sports performances. It is argued that such expansion will clearly undermine the ratio legis of copyright laws since it will give rise to excessive commodification of information beyond the needs of a viable market economy. Therefore, remedies other than copyright protection such as unfair competition and unjust enrichment provides sufficient redress for the damages to be sustained by the investors of sporting events.

Keywords: copyright eligibility, idea-expression dichotomy, sports performance

Procedia PDF Downloads 447
36 Cyber Security and Risk Assessment of the e-Banking Services

Authors: Aisha F. Bushager

Abstract:

Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.

Keywords: cyber security, e-banking, risk assessment, threats identification

Procedia PDF Downloads 318
35 Analyzing Use of Figurativeness, Visual Elements, Allegory, Scenic Imagery as Support System in Punjabi Contemporary Theatre for Escaping Censorship

Authors: Shazia Anwer

Abstract:

This paper has discussed the unusual form of resistance in theatre against censorship board in Pakistan. The atypical approach of dramaturgy created massive space for performers and audiences to integrate and communicate. The social and religious absolutes creates suffocation in Pakistani society, strict control over all Fine and Performing Art has made art political, contemporary dramatics has started an amalgamated theatre to avoid censorship. Contemporary Punjabi theatre techniques are directly dependent on human cognition. The idea of indirect thought processing is not unique but dependent on spectators. The paper has provided an account of these techniques and their specific use for conveying specific messages across the audiences. For the Dramaturge of today, theatre space is an expression representing a linguistic formulation that includes qualities of experimental and non-traditional use of classical theatrical space in the context of fulfilling the concept of open theatre. Paper has explained the transformation of the theatrical experience into an event where the actor and the audience are co-existing and co-experiencing the dramatical experience. The denial of the existence of the 4th -Wall made two-way communication possible. This paper has elaborated that the previously marginalized genres such as naach, jugat, miras, are extensively included to counter the censorship board. Figurativeness, visual elements, allegory, scenic imagery are basic support system for contemporary Punjabi theatre. The body of the actor is used as a source for non-verbal communication, and for an escape from traditional theatrical space which by every means has every element that could be controlled and reprimanded by the controlling authority.

Keywords: communication, Punjabi theatre, figurativeness, censorship

Procedia PDF Downloads 102
34 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 60
33 A Study on How Insider Fraud Impacts FinTechs

Authors: Claire Norman-Maillet

Abstract:

Insider fraud is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including Board members and part-time staff. Insider fraud can take many forms, including an employee working alone or in collusion with others. Insider fraud has been on the rise since the Coronavirus pandemic and shows no signs of slowing. The objective of the research is to better understand how FinTechs are impacted by insider fraud and, therefore, how to stop it. This research will make an original contribution to the financial crime field, given the timing of this research being intertwined with the cost-of-living crisis in the UK and the global Coronavirus pandemic. This research focuses on insider fraud within FinTechs specifically, as they are arguably a modern phenomenon in the financial institutions space and have cutting-edge technology at their disposal. To achieve the research objective, the researcher held semi-structured interviews with over 20 individuals who deal with insider fraud perpetration in a practitioner, recruitment, or advisory capacity. The interviews were subsequently transcribed and analysed thematically. Main findings in the research suggest that FinTechs are arguably in the best position to combat insider fraud, given their focus on using recent technologies, as this can be used to combat the threat. However, insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer, as well as the idea that external fraud is the most important threat. The research concludes that, whilst the technology is understandably prioritised by FinTechs for providing an agreeable customer experience, insider fraud needs to be given a platform upon which to be recognised as a significant threat to any company. Moreover, insider fraud needs to be given the same level of weighting and attention by Executive Committees and Boards as the customer experience.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, Coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 28
32 The Human Right to a Safe, Clean and Healthy Environment in Corporate Social Responsibility's Strategies: An Approach to Understanding Mexico's Mining Sector

Authors: Thalia Viveros-Uehara

Abstract:

The virtues of Corporate Social Responsibility (CSR) are explored widely in the academic literature. However, few studies address its link to human rights, per se; specifically, the right to a safe, clean and healthy environment. Fewer still are the research works in this area that relate to developing countries, where a number of areas are biodiversity hotspots. In Mexico, despite the rise and evolution of CSR schemes, grave episodes of pollution persist, especially those caused by the mining industry. These cases set up the question of the correspondence between the current CSR practices of mining companies in the country and their responsibility to respect the right to a safe, clean and healthy environment. The present study approaches precisely such a bridge, which until now has not been fully tackled in light of Mexico's 2011 constitutional human rights amendment and the United Nation's Guiding Principles on Business and Human Rights (UN Guiding Principles), adopted by the Human Rights Council in 2011. To that aim, it initially presents a contextual framework; it then explores qualitatively the adoption of human rights’ language in the CSR strategies of the three main mining companies in Mexico, and finally, it examines their standing with respect to the UN Guiding Principles. The results reveal that human rights are included in the RSE strategies of the analysed businesses, at least at the rhetoric level; however, they do not embrace the right to a safe, clean and healthy environment as such. Moreover, we conclude that despite the finding that corporations publicly express their commitment to respect human rights, some operational weaknesses that hamper the exercise of such responsibility persist; for example, the systematic lack of human rights impact assessments per mining unit, the denial of actual and publicly-known negative episodes on the environment linked directly to their operations, and the absence of effective mechanisms to remediate adverse impacts.

Keywords: corporate social responsibility, environmental impacts, human rights, right to a safe, clean and healthy environment, mining industry

Procedia PDF Downloads 300
31 Women with Invisible Wounds: A Qualitative Exploration of Emotional Abuse

Authors: Mehar Pruthi, Manjula V.

Abstract:

For the longest time, Indian households have been hosts to a variety of domestic evils such as intimate partner violence, physical abuse, sexual assaults, and more commonly gender-based violence. The prevalence of such heinous acts against women is often swept under the carpet of patriarchy and leaves women scarred. Many times, these wounds are caused by more insidious and subtle acts of violence. For this study, the choice of term for these acts is Emotional Abuse. The ill effects of emotional abuse on the victim’s sense of self and psychological health have been widely established. The current study takes a qualitative approach to explore women’s experiences at the brunt of emotional abuse. To this end, six participants (N=6) were identified using purposive and snowball sampling which was followed by a pre-screening form to assess for the presence of emotional abuse. A semi-structured interview guide was employed to investigate the victim’s perception of emotional abuse, the manifestation of emotional abuse in a patriarchal society, and the reasons women remain in abusive relationships. Each interview lasted about 50-60 mins and was accompanied by extensive note-making. A preliminary analysis of the interviews was done using the Interpretative Phenomenological Approach. Initial findings reveal the emergence of themes such as feelings of loneliness, intergenerational transmission of violence, denial, justifying the partner’s behavior, staying because of children, hoping things would change, and faith in God. The study is instrumental in conceptualizing the patterns of emotional abuse keeping in mind the patriarchal context of the Indian society. It has implications for professionals in the mental health field who work with this population so they can better understand their plight. Future research could focus on rebuilding relationships for those partners who decide to sustain such relationships and focus on various coping mechanisms with special emphasis on religious beliefs.

Keywords: emotional abuse, gender-based violence, intimate partner violence, marriage, patriarchy

Procedia PDF Downloads 65
30 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 136
29 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 44
28 Psychosocial Experience of Parents of Children with Conduct Disorder in Thulamela, South Africa

Authors: Constance Singo, Choja Oduaran

Abstract:

Child mental disorders are strongly associated with different forms of challenges, including behavioural problems. The burden of care for children with a mental disorder is high and put primary caregivers, parents in particular, at risk of poor mental wellbeing. Understanding the experience of parents of children with mental disorders is crucial to developing a relevant intervention to assist them to attain optimal mental wellbeing. The aim of this study was to explore the experiences of parents of children with conduct disorder by focussing on the psychological and social stress experience of the parents in raising and caring for their children with conduct disorder. A qualitative research approach, using in-depth interview was utilized in this study. Purposive and snowballing sampling techniques were used to select 9 parents of children with conduct disorder in Thulamela Municipality, Limpopo Province of South Africa. Participants comprising of 2 males and 7 females aged between 30 years and 49 years were interviewed individually at scheduled appointment in-home setting. Interviews were conducted in both English and Setswana language. Data collected in Setswana language were translated to English by 'expert in language translation'. Ethical approval was obtained from appropriate authority before data collection. Thematic analysis was conducted to analyse the collected data. The findings identified anger, fear, depressive symptoms, denial, and suicidal ideation as predominant psychological experiences of the parents. Furthermore, deteriorated interpersonal relationships with family and community members, financial stress, and stigma emerged as social problems being the experience of the parents. It was concluded that parents of children with conduct disorder are highly traumatized by the challenges of caring for their children. We recommend professional engagement in terms of counselling service to support the parents. There is also a need for massive enlightenment programmes for members of the community in order to support the parents of children with child mental disorders.

Keywords: conduct disorder, parents, psychosocial experiences, South Africa

Procedia PDF Downloads 110
27 Towards a Deconstructive Text: Beyond Language and the Politics of Absences in Samuel Beckett’s Waiting for Godot

Authors: Afia Shahid

Abstract:

The writing of Samuel Beckett is associated with meaning in the meaninglessness and the production of what he calls ‘literature of unword’. The casual escape from the world of words in the form of silences and pauses, in his play Waiting for Godot, urges to ask question of their existence and ultimately leads to investigate the theory behind their use in the play. This paper proposes that these absences (silence and pause) in Beckett’s play force to think ‘beyond’ language. This paper asks how silence and pause in Beckett’s text speak for the emergence of poststructuralist text. It aims to identify the significant features of the philosophy of deconstruction in the play of Beckett to demystify the hostile complicity between literature and philosophy. With the interpretive paradigm of poststructuralism this research focuses on the text as a research data. It attempts to delineate the relationship between poststructuralist theoretical concerns and text of Beckett. Keeping in view the theoretical concerns of Poststructuralist theorist Jacques Derrida, the main concern of the discussion is directed towards the notion of ‘beyond’ language into the absences that are aimed at silencing the existing discourse with the ‘radical irony’ of this anti-formal art that contains its own denial and thus represents the idea of ceaseless questioning and radical contradiction in art and any text. This article asks how text of Beckett vibrates with loud silence and has disrupted language to demonstrate the emptiness of words and thus exploring the limitless void of absences. Beckett’s text resonates with silence and pause that is neither negation nor affirmation rather a poststructuralist’s suspension of reality that is ever changing with the undecidablity of all meanings. Within the theoretical notion of Derrida’s Différance this study interprets silence and pause in Beckett’s art. The silence and pause behave like Derrida’s Différance and have questioned their own existence in the text to deconstruct any definiteness and finality of reality to extend an undecidable threshold of poststructuralists that aims to evade the ‘labyrinth of language’.

Keywords: Différance, language, pause, poststructuralism, silence, text

Procedia PDF Downloads 174
26 The Needs of People with a Diagnosis of Dementia and Their Carers and Families

Authors: James Boag

Abstract:

The needs of people with a diagnosis of dementia and their carers and families are physical, psychosocial, and psychological and begin at the time of diagnosis. There is frequently a lack of emotional support and counselling. Care- giving support is required from the presentation of the first symptoms of dementia until death. Alzheimer's disease begins decades before the clinical symptoms begin to appear, and in many cases, it remains undiagnosed, or diagnosed too late for any possible interventions to have any effect. However, if an incorrect diagnosis is given, it may result in a person being treated, without effect, for a type of dementia they do not have and delaying the interventions they should have received. Being diagnosed with dementia can cause emotional distress to the person, and physical and emotional support is needed, which will become more important as the disease progresses. The severity of the patient's dementia and their symptoms has a bearing of the impact on the carer and the support needed. A lack of insight and /or a denial of the diagnosis, grief, reacting to anticipated future losses, and coping methods to maximise the disease outcome, are things that should be addressed. Because of the stigma, it is important for carers not to lose contact with family and others because social isolation leads to depression and burnout. The impact on a carer's well- being and quality of life can be influenced by the severity of the illness, its type of dementia, its symptoms, healthcare support, financial and social status, career, age, health, residential setting, and relationship to the patient. Carer burnout due to lack of support leads to people diagnosed with dementia being put into residential care prematurely. Often dementia is not recognised as a terminal illness, limiting the ability of the person diagnosed with dementia and their carers to work on advance care planning and getting access to palliative and other support. Many carers have been satisfied with the physical support they were given in their everyday life, however, it was agreed that there was an immense unmet need for psychosocial support, especially after diagnosis and approaching end of life. Providing continuity and coordination of care is important. Training is necessary for providers to understand that every case is different, and they should understand the complexities. Grief, the emotional response to loss, is suffered during the progression of the disease and long afterwards, and carers should continue to be supported after the death of the person they were caring for.

Keywords: dementia, caring, challenges, needs

Procedia PDF Downloads 57
25 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 99
24 A POX Controller Module to Collect Web Traffic Statistics in SDN Environment

Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin

Abstract:

Software Defined Networking (SDN) is a new norm of networks. It is designed to facilitate the way of managing, measuring, debugging and controlling the network dynamically, and to make it suitable for the modern applications. Generally, measurement methods can be divided into two categories: Active and passive methods. Active measurement method is employed to inject test packets into the network in order to monitor their behaviour (ping tool as an example). Meanwhile the passive measurement method is used to monitor the traffic for the purpose of deriving measurement values. The measurement methods, both active and passive, are useful for the collection of traffic statistics, and monitoring of the network traffic. Although there has been a work focusing on measuring traffic statistics in SDN environment, it was only meant for measuring packets and bytes rates for non-web traffic. In this study, a feasible method will be designed to measure the number of packets and bytes in a certain time, and facilitate obtaining statistics for both web traffic and non-web traffic. Web traffic refers to HTTP requests that use application layer; while non-web traffic refers to ICMP and TCP requests. Thus, this work is going to be more comprehensive than previous works. With a developed module on POX OpenFlow controller, information will be collected from each active flow in the OpenFlow switch, and presented on Command Line Interface (CLI) and wireshark interface. Obviously, statistics that will be displayed on CLI and on wireshark interfaces include type of protocol, number of bytes and number of packets, among others. Besides, this module will show the number of flows added to the switch whenever traffic is generated from and to hosts in the same statistics list. In order to carry out this work effectively, our Python module will send a statistics request message to the switch requesting its current ports and flows statistics in every five seconds; while the switch will reply with the required information in a message called statistics reply message. Thus, POX controller will be notified and updated with any changes could happen in the entire network in a very short time. Therefore, our aim of this study is to prepare a list for the important statistics elements that are collected from the whole network, to be used for any further researches; particularly, those that are dealing with the detection of the network attacks that cause a sudden rise in the number of packets and bytes like Distributed Denial of Service (DDoS).

Keywords: mininet, OpenFlow, POX controller, SDN

Procedia PDF Downloads 193
23 Prayer Therapy in a Case of Acute Myeloid Leukemia: The Good, the Bad and the Ugly

Authors: Rubai M. Ochieng

Abstract:

Cancer, which accounts for 7 percent of deaths per year in Kenya, is the third highest cause of death after infectious and cardiovascular diseases. Awareness Campaigns have tended to focus on leading cancers including breast and cervical for women as well as prostrate and Esophageal for men. Consequently, less common cancers such as Acute Myeloid Leukemia (AML) are rarely properly understood by the general population and a section of the medical fraternity. Diagnoses of AML in patients who may not have heard about it sometimes results in shock, denial and confusion not just to the diagnosed, but also to their family and friends. The diagnosed and caregivers are bound to receive a lot of contradicting information about prognosis, care and treatment of AML. This information, which often comes from diverse sources including doctors, friends, internet and social media platforms, causes further confusion and panic. The situation is handled differently by different people. Religious people sometimes resort to prayer. This paper, written from the perspective of a care giver, is based on data collected from a case of Acute Myeloid Leukemia diagnosed in a 32 year old male who lost his life within six weeks of diagnosis. The sample constitutes of 16 people who participated in prayers. Out of this total, 5 were males including the diagnosed and 11 were females. All the 16 were Christians of protestant orientation including Anglicans, Quakers and Church of God members. Data was collected by the researcher herself through participant of observation. Findings discuss how the 16 participants prayed individually at different times, together in an overnight prayer meeting and every morning through a group social media platform. They shared songs and words of encouragement from the bible. The group prayed for healing, peace and strength to the diagnosed and family, financial breakthrough and doctors’ work and decisions, among other challenges that came with the situation. The paper reveals the immense benefits of prayer to the diagnosed and his close relatives and friends. They include acceptance of the condition and a positive attitude in handling the challenges that arose from the disease and treatment processes. The challenges arising from the prayer approach of handling the situation are also discussed. The paper concludes that prayer as therapy goes a long way in cancer management.

Keywords: acute myeloid leukemia, Kenya, participant observation, prayer

Procedia PDF Downloads 125
22 'Sex, Work and Sex-Work': The Clandestine Tale of a Tabooed Industry in Bangladesh

Authors: Parvez Sattar

Abstract:

There are around 150,000 female sex workers in Bangladesh, and the country hosts one of the largest brothels in the world. There are 20 brothel-villages in the country, of which 14 are recognized to be ‘official’, and at least 11 are currently operational. Although the national Constitution adopts a preventive policy against prostitution, law does not, as such, prohibit commercial sex work by an adult woman working in a brothel having made an affidavit in this regard. But, at the same time, the law renders at least some forms of floating and hotel based sex work illegal, while sex between males has been termed as sodomy and made culpable offence even on its own. All forms of sex works by MSM and Hijra are thus branded as criminal acts. Observations and findings drawn in this article are based on both primary and secondary sources collecting data from a series of field-based empirical studies conducted by the author through questionnaire survey, FGDs, key informant consultations and other PRA/PLA tools. General and specific conclusions have been based on analysis guided by international standards of human and labour rights approaches. It has been noted that neither the community attitudes nor the cultural mind-sets, or the State's institutional set up is supportive of the causes of sex workers engaged in the most exploitative forms of labour. Lack of respect for fundamental rights continues to diminish any chances of sex workers' reintegration to the mainstream of the society, perpetuates poverty, and increases their vulnerability to HIV/AIDS. To aggravate the scenario, the endemic practice of a complex debt-bondage masked by the so-called 'entry-cost' and ‘legal license’ to the industry is considered to be a somewhat accepted 'open secret' and that the police and administration keep their eyes off from such practices treating these as 'their internal affairs'. Often these practices are used by the Sardarni/Khala (landlady) and other 'managing' actors as the tool for further exploitation of the sex workers as well as a 'control strategy'. The paper concludes with the observation that the tabooed truths of commercial sex and sex workers are inherently embedded in the very factors that compel them into this endemically ostracised profession itself. While denial of both recognition and enjoyment of the fundamental human rights of sex workers is widespread, it is the same cycle of social vulnerability and economic exclusion that often confines these people within a continuous process of servitude and modern day slavery.

Keywords: commercial sex work and human rights, Labor protection in sex industry, Prostitution Law in Bangladesh, Sex work as modern day slavery

Procedia PDF Downloads 82
21 Exploring Coping Strategies among Caregivers of Children Who Have Survived Cancer

Authors: Noor Ismael, Somaya Malkawi, Sherin Al Awady, Taleb Ismael

Abstract:

Background/Significance: Cancer is a serious health condition that affects individuals’ quality of life during and after the course of this condition. Children who have survived cancer and their caregivers may deal with residual physical, cognitive or social disabilities. There is little research on caregivers’ health and wellbeing after cancer. To the authors’ best knowledge; there is no specific research about how caregivers cope with everyday stressors after cancer. Therefore, this study aimed to explore the coping strategies that caregivers of children who have survived cancer utilize to overcome everyday stressors. Methods: This study utilized a descriptive survey design. The sample consisted of 103 caregivers, who visited the health and wellness clinic at a national cancer center (additional demographics are presented in the results). The sample included caregivers of children who were off cancer treatments for at least two years from the beginning of data collection. The institution’s internal review board approved this study. Caregivers who agreed to participate completed the survey. The survey collected caregiver reported demographic information and the Brief COPE which measures caregivers' frequency of engaging in certain coping strategies. The Brief COPE consisted of 14 coping sub-scales, which are self-distraction, active coping, denial, substance use, use of emotional support, use of instrumental support, behavioral disengagement, venting, positive reframing, planning, humor, acceptance, religion, and self-blame. Data analyses included calculating sub-scales’ scores for the fourteen coping strategies and analysis of frequencies of demographics and coping strategies. Results: The 103 caregivers who participated in this study were 62% mothers, 80% married, 45% finished high school, 50% do not work outside the house, and 60% have low family income. Result showed that religious coping (66%) and acceptance (60%) were the most utilized coping strategies, followed by positive reframing (45%), active coping (44%) and planning (43%). The least utilized coping strategies in our sample were humor (5%), behavioral disengagement (8%), and substance-use (10%). Conclusions: Caregivers of children who have survived cancer mostly utilize religious coping and acceptance in dealing with everyday stressors. Because these coping strategies do not directly solve stressors like active coping and planning coping strategies, it is important to support caregivers in choosing and implementing effective coping strategies. Knowing from our results that some caregivers may utilize substance use as a coping strategy, which has negative health effects on caregivers and their children, there must be direct interventions that target these caregivers and their families.

Keywords: caregivers, cancer, stress, coping

Procedia PDF Downloads 140
20 Rohingya Problem and the Impending Crisis: Outcome of Deliberate Denial of Citizenship Status and Prejudiced Refugee Laws in South East Asia

Authors: Priyal Sepaha

Abstract:

A refugee crisis is manifested by challenges, both for the refugees and the asylum giving state. The situation turns into a mega-crisis when the situation is prejudicially handled by the home state, inappropriate refugee laws, exploding refugee population, and above all, no hope of any foreseeable solution or remedy. This paper studies the impact on the capability of stateless Rohingyas to migrate and seek refuge due to the enforcement of rigid criteria of movement imposed both by Myanmar as well as the adjoining countries in the name of national security. This theoretical study identifies the issues and the key factors and players which have precipitated the crisis. It further discusses the possible ramifications in the home, asylum giving, and the adjoining countries for not discharging their roles aptly. Additionally, an attempt has been made to understand the scarce response given to the impending crisis by the regional organizations like SAARC, ASEAN and CHOGAM as well as international organizations like United Nations Human Rights Council, Security Council, Office of High Commissioner for Refugees and so on, in the name of inadequacy of monetary funds and physical resources. Based on the refugee laws and practices pertaining to the case of Rohingyas, this paper analyses that the Rohingya Crisis is in dire need of an effective action plan to curb and resolve the biggest humanitarian crisis situation of the century. This mounting human tragedy can be mitigated permanently, by strengthening existing and creating new interdependencies among all stakeholders, as further ignorance can drive the countries of the Indian Sub-continent, in particular, and South East Asia, by and large into a violent civil war for seizing long-awaited civil rights by the marginalized Rohingyas. To curb this mass crisis, it will require the application of coercive pressure and diplomatic pursuance on the home country to acknowledge the rights of its fleeing citizens. This further necessitates mustering adequate monetary funds and physical resources for the asylum providing state. Additional challenges such as devising mechanisms for the refugee’s safe return, comprehensive planning for their holistic economic development and rehabilitation plan are needed. These, however, can only come into effect with a conscious strive by the regional and international community to fulfil their assigned role.

Keywords: asylum, citizenship, crisis, humanitarian, human rights, refugee, rohingya

Procedia PDF Downloads 104
19 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 198
18 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 40
17 Access to Education and Adopted Identity of the Rohingya Amid Government Restrictions in Bangladesh

Authors: Ishrat Zakia Sultana

Abstract:

The consistent persecution, ethnic cleansing, and genocide against the Rohingya in Burma resulted four major influxes of the Rohingya people to the neighboring country Bangladesh. After the latest influx of October 2016 and August 2017, the total number of Rohingya in Bangladesh stands somewhere between 900,000 to over one million, placing Bangladesh much ahead with the number of refugees compared to Dadaab and Kakuma in Kenya, Bidibidi in Uganda and Zaatari in Jordan. While Bangladesh received recognition and appreciation for receiving a huge number of the Rohingya, one of the fundamental human rights of the Rohingya – education – has never been fulfilled in Bangladesh. The Ministry of Disaster Management and Relief of the government of Bangladesh has been looking after the Rohingya and managing various programs for the Rohingya. On its website, the Ministry claims that it provides the basic supports/services to the Rohingya, including providing education. In practice, however, education for the Rohingya include only the provisions for registered Rohingya refugees – who are a very small number of populations among the entire Rohingya hosted in Bangladesh – and that is only up to grade 7 within the registered camps at Teknaf and Ukhia of Cox’s Bazar district of the country. There is no answer of the question, ‘What’s next’? Although refugees in Canada, Sudan, Turkey and other countries have been allowed to go to mainstream schools, Rohingya refugees in Bangladesh are not allowed to do so legally. Due to the lack of proof of nationality of the Rohingya, the government of Bangladesh imposes restrictions on their access to Bangladeshi schools. However, despite their vulnerability and statelessness, many Rohingyas are desperate to pursue education outside the camps and find their own way not only within Cox’s Bazar but also even in the capital city of the country. But they must hide their refugee identity to accomplish this. My research aims to explore how they manage to get admission amid government restrictions on their access to education in the mainstream institutions in Bangladesh. It will reveal how Rohingya people use adopted identity to get access to education in Bangladesh, and how they apply their own techniques to achieve their goals without having government approved identity. This research examined the strategies the Rohingya applied to manage documents related to their identity to ensure their admission to Bangladeshi education institutions – in schools, colleges, and universities. The research employed a qualitative approach. It used semi structured individual interviews and Focused Group Discussions (FGDs) with 20 male and female Rohingya refugees who are 18 years old and above, and have enrolled in Bangladeshi education institutions with adopted identity. Also I interviewed 5 local community members and policy makers to understand their perceptions and roles in this process. The findings of this research will allow the policy makers to rethink the outcomes of the restrictions on Rohingya’s education in Bangladesh, the ramifications of the denial of Rohingya’s access to education, and initiate policy dialogues on how to allow Rohingya refugees to pursue education in Bangladesh in legal way.

Keywords: Rohingya, Refugee, Bangladesh, Education

Procedia PDF Downloads 29
16 Violence against Women: A Study on the Aggressors' Profile

Authors: Giovana Privatte Maciera, Jair Izaías Kappann

Abstract:

Introduction: The violence against woman is a complex phenomenon that accompanies the woman throughout her life and is a result of a social, cultural, political and religious construction, based on the differences among the genders. Those differences are felt, mainly, because of the patriarchal system that is still present which just naturalize and legitimate the asymmetry of power. As consequence of the women’s lasting historical and collective effort for a legislation against the impunity of violence against women in the national scenery, it was ordained, in 2006, a law known as Maria da Penha. The law was created as a protective measure for women that were victims of violence and consequently for the punishment of the aggressor. Methodology: Analysis of police inquiries is established by the Police Station of Defense of the Woman of Assis city, by formal authorization of the justice, in the period of 2013 to 2015. For the evaluating of the results will be used the content analysis and the theoretical referential of Psychoanalysis. Results and Discussion: The final analysis of the inquiries demonstrated that the violence against women is reproduced by the society and the aggressor, in most cases it is a member of their own family, mainly the current or former-spouse. The most common kinds of aggression were: the threat bodily harm, and the physical violence, that normally happens accompanied by psychological violence, being the most painful for the victims. The biggest part of the aggressors was white, older than the victim, worker and had primary school. But, unlike the expected, the minority of the aggressors were users of alcohol and/or drugs and possessed children in common with the victim. There is a contrast among the number of victims who already admitted have suffered some type of violence earlier by the same aggressor and the number of victims who has registered the occurrence before. The aggressors often use the discourse of denial in their testimony or try to justify their act like the blame was of the victim. It is believed in the interaction of several factors that can influence the aggressor to commit the abuse, including psychological, personal and sociocultural factors. One hypothesis is that the aggressor has a violence history in the family origin. After the aggressor being judged, condemned or not, usually there is no rehabilitation plan or supervision that enable his change. Conclusions: It has noticed the importance of studying the aggressor’s characteristics and the reasons that took him to commit such violence, making possible the implementation of an appropriate treatment to prevent and reduce the aggressions, as well the creation of programs and actions that enable communication and understanding concerning the theme. This is because the recurrence is still high, since the punitive system is not enough and the law is still ineffective and inefficient in certain aspects and in its own functioning. It is perceived a compulsion in repeat so much for the victims as for the aggressors, because they end involving, almost always, in disturbed and violent relationships, with the relation of subordination-dominance as characteristic.

Keywords: aggressors' profile, gender equality, Maria da Penha law, violence against women

Procedia PDF Downloads 303
15 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.

Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19

Procedia PDF Downloads 36
14 State Violence: The Brazilian Amnesty Law and the Fight Against Impunity

Authors: Flavia Kroetz

Abstract:

From 1964 to 1985, Brazil was ruled by a dictatorial regime that, under the discourse of fight against terrorism and subversion, implemented cruel and atrocious practices against anyone who opposed the State ideology. At the same time, several Latin American countries faced dictatorial periods and experienced State repression through apparatuses of violence institutionalized in the very governmental structure. Despite the correspondence between repressive methods adopted by authoritarian regimes in States such as Argentina, Chile, El Salvador, Peru and Uruguay, the mechanisms of democratic transition adopted with the end of each dictatorship were significantly different. While some States have found ways to deal with past atrocities through serious and transparent investigations of the crimes perpetrated in the name of repression, in others, as in Brazil, a culture of impunity remains rooted in society, manifesting itself in the widespread disbelief of the population in governmental and democratic institutions. While Argentina, Chile, Peru and Uruguay are convincing examples of the possibility and importance of the prosecution of crimes such as torture, forced disappearance and murder committed by the State, El Salvador demonstrates the complete failure to punish or at least remove from power the perpetrators of serious crimes against civilians and political opponents. In a scenario of widespread violations of human rights, State violence becomes entrenched within society as a daily and even necessary practice. In Brazil, a lack of political and judicial will withstands the impunity of those who, during the military regime, committed serious crimes against human rights under the authority of the State. If the reproduction of violence is a direct consequence of the culture of denial and the rejection of everyone considered to be different, ‘the other’, then the adoption of transitional mechanisms that underpin the historical and political contexts of the time seems essential. Such mechanisms must strengthen democracy through the effective implementation of the rights to memory and to truth, the right to justice and reparations for victims and their families, as well as institutional changes in order to remove from power those who, when in power, could not distinguish between legality and authoritarianism. Against this background, this research analyses the importance of transitional justice for the restoration of democracy, considering the adoption of amnesty laws as a strategy to preclude criminal prosecution of offenses committed during dictatorial regimes. The study investigates the scope of Law No 6.683/79, the Brazilian amnesty law, which, according to a 2010 decision of the Brazilian Constitutional Supreme Court, granted amnesty to those responsible for political crimes and related crimes, committed between September 2, 1961 and August 15, 1979. Was the purpose of this Law to grant amnesty to violent crimes committed by the State? If so, is it possible to recognize the legitimacy of a Congress composed of indirectly elected politicians controlled by the dictatorship?

Keywords: amnesty law, criminal justice, dictatorship, state violence

Procedia PDF Downloads 418
13 Domestic Violence Indictors and Coping Styles among Iranian, Pakistan and Turkish Married Women: A Cultural Study

Authors: Afsaneh Ghanbari Panah, Elyaz Bornak, Shiva Ghadiri Karizi, Amna Ahmad, Burcu Yildirim

Abstract:

This study explores domestic violence (DV) and coping strategies among married women in Iran, Pakistan, and Turkey. DV is a universal issue characterized by physical, psychological, or economic abuse by male family members towards female partners. The study aims to examine the prevalence of DV and the coping mechanisms employed by women in these three countries. The research highlights the significant impact of DV globally, transcending cultural, social, and economic boundaries. Despite the lack of comprehensive state-sponsored reports on Violence Against Women (VAW) in South Asia, fragmented reports by non-governmental agencies indicate high rates of self-reported intimate partner violence (IPV), including sexual violence, across these regions. The study emphasizes the urgent need for effective measures to address VAW, as existing laws often exclude unregistered and unmarried intimate partners. Coping mechanisms play a crucial role in responding to and managing the consequences of DV. The study defines coping as cognitive and behavioral responses to environmental stressors. Common coping strategies identified in the literature include spirituality, temporary or permanent separation, silence, submission, minimizing violence, denial, and seeking external support. Understanding these coping mechanisms is crucial for developing effective prevention and management strategies. The study presents findings from Iran, Pakistan, and Turkey, indicating varying prevalence rates of different forms of violence. Turkish respondents reported higher rates of emotional, physical, economic, and sexual violence, while Iranian respondents reported high levels of psychological, physical, and sexual violence. In Karachi, Pakistan, physical, sexual, and psychological violence were prevalent among women. The study highlights the importance of cross-cultural research and the need to consider individual and collective coping mechanisms in different societal contexts. Factors such as personal ideologies, political agendas, and economic stability influence societal support and cultural acceptance of IPV. To develop sustainable strategies, an in-depth exploration of coping mechanisms is necessary. In conclusion, this comparative study provides insights into DV and coping strategies among married women in Iran, Pakistan, and Turkey. The findings underscore the urgent need for comprehensive measures to address VAW, considering cultural, social, and economic factors. By understanding the prevalence and coping mechanisms employed by women, policymakers can develop effective interventions to support DV survivors and prevent further violence.

Keywords: domestic violence, coping styles, cultural study, violence against women

Procedia PDF Downloads 26
12 Islam and Democracy: A Paradoxical Study of Syed Maududi and Javed Ghamidi

Authors: Waseem Makai

Abstract:

The term ‘political Islam’ now seem to have gained the centre stage in every discourse pertaining to Islamic legitimacy and compatibility in modern civilisations. A never ceasing tradition of the philosophy of caliphate that has kept overriding the options of any alternate political institution in the Muslim world still permeates a huge faction of believers. Fully accustomed with the proliferation of changes and developments in individual, social and natural dispositions of the world, Islamic theologians retaliated to this flux through both conventional and modernist approaches. The so-called conventional approach was quintessential of the interpretations put forth by Syed Maududi, with new comprehensive, academic and powerful vigour, as never seen before. He generated the avant-garde scholarship which would bear testimony to his statements, made to uphold the political institution of Islam as supreme and noble. However, it was not his trait to challenge the established views but to codify them in such a bracket which a man of the 20th century would find captivating to his heart and satisfactory to his rationale. The delicate microcosms like selection of a caliph, implementation of Islamic commandments (Sharia), interest free banking sectors, imposing tax (Jazyah) on non-believers, waging the holy crusade (Jihad) for the expansion of Islamic boundaries, stoning for committing adulteration and capital punishment for apostates were all there in his scholarship which he spent whole of his life defending in the best possible manner. What and where did he went wrong with all this, was supposedly to be notified later, by his once been disciple, Javed Ahmad Ghamidi. Ghamidi is being accused of struggling between Scylla and Charybdis as he tries to remain steadfast to his basic Islamic tenets while modernising their interpretations to bring them in harmony with the Western ideals of democracy and liberty. His blatant acknowledgement of putting democracy at a high pedestal, calling the implementation of Sharia a non-mandatory task and denial to bracket people in the categories of Zimmi and Kaafir fully vindicates his stance against conventional narratives like that of Syed Maududi. Ghamidi goes to the extent of attributing current forms of radicalism and extremism, as exemplified in the operations of organisations like ISIS in Iraq and Syria and Tehreek-e-Taliban in Pakistan, to such a version of political Islam as upheld not only by Syed Maududi but by other prominent theologians like Ibn-Timyah, Syed Qutub and Dr. Israr Ahmad also. Ghamidi is wretched, in a way that his allegedly insubstantial claims gained him enough hostilities to leave his homeland when two of his close allies were brutally murdered. Syed Maududi and Javed Ghamidi, both stand poles apart in their understanding of Islam and its political domain. Who has the appropriate methodology, scholarship and execution in his mode of comprehension, is an intriguing task, worth carrying out in detail.

Keywords: caliphate, democracy, ghamidi, maududi

Procedia PDF Downloads 165