Search results for: London knife crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 607

Search results for: London knife crime

517 Role of Vigilante in Crime Control in Bodija Market

Authors: Obadiah Nwabueze

Abstract:

Bodija market is classified as Central Business District (CBD) of Ibadan North Local Government Area of Oyo State (Nigeria) because of socio economic activities, so Crime is a peculiar social issue that causes insecurity. The law enforcement agencies tasked with crime prevention and control such as the Nigerian Police have insufficient manpower, and a resultant effect is the emergence of Vigilante groups as citizen’s response to crime control and prevention (self-help). The research design adopted for this study is a case study design exploring Vigilante activities in Bodija Market. The study utilizes both quantitative and qualitative approach, sources of data includes primary and secondary sources. A sample of 127 respondents randomly picked from the 4 sections of Bodija Market through questionnaire, comprising of 50 male and 77 females which alienates issues of gender bias in addition to the 4 in-depth interview, making a total of 131 respondents. Statistical package for Social Sciences (SPSS) was used. The descriptive statistics of simple frequency, percentage, charts and graphs were computed for the analysis. Finding in the study shows that the market vigilante is able to deter and disrupt criminal activities through strategic spiritual intelligence (SSI), use of charm and juju, physical presence in strategic locations vulnerable to crime occurrence. Findings in the study also show that vigilantes collaborate with the police by assisting them in surveillance, tracking down criminals, identifying black spots, acting as informants to the police, arrest and handover criminal to police. Their challenges include poor equipment, motivation, unhealthy rivalry between the vigilante and the police. The study recommends that the government should support vigilantes with logistics and training, including patrol vehicle and radio communication. The study also recommends the integration of the informal mechanism (juju and charm) of crime detection and prevention into the formal policing strategy, an office should be created in the force commands for use of SSI.

Keywords: central business district, CBD, charm, Juju, strategic spiritual intelligence, SSI

Procedia PDF Downloads 211
516 Personal and Social Factors as Barriers to Leisure Walking in Residential Neighborhoods

Authors: Zeinab Aliyas, Diba Mahboubi

Abstract:

Leisure walking is known as one of the most common types of physical activity that perform in purpose of recreation or health, which in turn may affect resident’s health. In the recent years, promoting leisure walking activity in neighborhood areas become as one of the important issues regarding promoting mental and physical health, however; the level of physical inactivity is rising in many societies including Iran. As it was proven that the tendency to walk out of choice is not encouraging among Iranian people. Hence; understanding the main concern of residents regarding walking activity in their neighborhoods can help in increasing the tendency to do leisure activity among residents. Built environment, social and individual factors are known as the main factors that affect decision to walk, in this regard, the study aimed to investigate the influence of personal and social factors that prevent residents to walk for recreation or exercise in their neighborhoods. Hence the fear of crime and personal barriers were examined in the current research as social and personal factors respectively. To collect the required data, 500 questionnaires by using systematic sampling were distributed from March to May 2016 in four residential neighborhoods of Bandar Abbas in Iran out which 411 questionnaire turned out to be qualified to be used in the study. The Smart-PLS was used to analyze the data. The findings of the study revealed that personal and fear of crime both have significant influence on the level of recreation and exercise walking in the neighborhood areas. The study found that fear of crime has the higher influence on exercise and recreational walking behavior in comparison to individual factors. It was revealed that social factors such as fear of crime in the neighborhoods might be more important than the personal reason for walking optionally in the surrounding environment. The finding of this study can help urban and health researcher to know the significant influence of fear of crime and individual attitudes on the level of leisure walking activity, in addition, the findings of the study suggest that urban planners and designers, as well as public health promoters, need to highly consider the contribution of neighborhoods' social environment variables as well as individual variables to promote walking behavior changes among adult population.

Keywords: exercise walking, fear of crime, neighborhood, personal barriers, recreation walking

Procedia PDF Downloads 165
515 Using Discriminant Analysis to Forecast Crime Rate in Nigeria

Authors: O. P. Popoola, O. A. Alawode, M. O. Olayiwola, A. M. Oladele

Abstract:

This research work is based on using discriminant analysis to forecast crime rate in Nigeria between 1996 and 2008. The work is interested in how gender (male and female) relates to offences committed against the government, against other properties, disturbance in public places, murder/robbery offences and other offences. The data used was collected from the National Bureau of Statistics (NBS). SPSS, the statistical package was used to analyse the data. Time plot was plotted on all the 29 offences gotten from the raw data. Eigenvalues and Multivariate tests, Wilks’ Lambda, standardized canonical discriminant function coefficients and the predicted classifications were estimated. The research shows that the distribution of the scores from each function is standardized to have a mean O and a standard deviation of 1. The magnitudes of the coefficients indicate how strongly the discriminating variable affects the score. In the predicted group membership, 172 cases that were predicted to commit crime against Government group, 66 were correctly predicted and 106 were incorrectly predicted. After going through the predicted classifications, we found out that most groups numbers that were correctly predicted were less than those that were incorrectly predicted.

Keywords: discriminant analysis, DA, multivariate analysis of variance, MANOVA, canonical correlation, and Wilks’ Lambda

Procedia PDF Downloads 439
514 Current Judicial Discourse Regarding the Impact of Alcohol Use Disorders on Crime in Canada

Authors: Ellen McClure

Abstract:

It is generally well-known that a number of inmates suffer from some form of substance or alcohol use disorder. This study identifies, analyses, classifies and codifies the most recent Canadian criminal judgments involving an accused diagnosed with an alcohol use disorder specifically. From this research, patterns in judicial discourse and sentencing norms can be established, and these findings can be juxtaposed with existing relevant academic literature, particular attention will be given to this discussion at the sentencing stage, and the subsequent incarceration of those with alcohol use disorders. This topic will be explored with an overarching emphasis on the effects that a lack of conversation regarding a possible correlation between alcohol consumption and crime may have. Although comparisons may be made in order to clarify or highlight certain issues, particular attention will be paid to jurisdictions within Canada. This paper explores the existing judicial discourse in sentencing regarding the relationship between alcohol and crime, and how this might explain the higher incarceration rates of those suffering from alcohol use disorders in Canada. The research questions are as follows: (1) What are the existing judicial discourses in sentencing around the relationship between alcohol and crime? (2) To what extent has the current discourse on alcohol addiction among judges and legal academics contributed to the incarceration of alcoholics?The major findings of this research indicate a strong correlation between a lack of judicial discussion regarding the accused’s alcohol use disorder and an increased tendency to consider an alcohol use disorder as an aggravating factor. Furthermore, it was found that an 82% of judges who discussed the alcohol use disorder meaningfully referred to the disorder as a mitigating factor. This can be compared with 6.7% of judges who referred to the alcohol use disorder as a mitigating factor in cases where the disorder was not meaningfully discussed.

Keywords: alcohol use disorder, addiction, criminal justice, judicial discourse

Procedia PDF Downloads 233
513 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.

Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19

Procedia PDF Downloads 37
512 'Spare the Rod and Spoil the Child': The Criminal Career of an Armed Robber

Authors: Mahlogonolo Stephina Thobane

Abstract:

The aim of the study upon which this article is based was “to evaluate the possibility of using criminal career research in the development and evaluation of crime control strategies, particularly for armed robberies.” The research employed a concurrent triangulation mixed-method approach where quantitative and qualitative data were collected concurrently but analysed separately through the use of SPSS and Atlas.ti respectively. Forty offenders incarcerated at six correctional centres around the Gauteng province of South Africa for robbery with aggravating circumstances were interviewed as research participants. Since the researcher had no prior information on the total number of the population, purposive sampling (i.e. snowballing) was executed to draw the sample. This research found that offenders launched their criminal career at a very young age of, 11 years, by committing petty crimes such as theft and then, as they grew older, they progressed to more serious and violent crimes such as vehicle hijacking and Cash-in-Transit (CIT) robberies. Thus, it is pivotal that those responsible for developing crime prevention policies focus on interrupting the root causes of crime in the early stages of one’s life in order to prevent continuation of delinquent behaviour from childhood to adolescence and adulthood.

Keywords: criminal career, robbery with aggravating circumstances, cash-in-transit robbery, criminal career research

Procedia PDF Downloads 417
511 The Legal Position of Criminal Prevention in the Metaverse World

Authors: Andi Intan Purnamasari, Supriyadi, Sulbadana, Aminuddin Kasim

Abstract:

Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values ​​achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research.

Keywords: crime, cyber, metaverse, law

Procedia PDF Downloads 119
510 An Exploration of Why Insider Fraud Is the Biggest Threat to Your Business

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, otherwise known as occupational, employee, or internal fraud, is a financial crime threat. Perpetrated by defrauding (or attempting to defraud) one’s current, prospective, or past employer, an ‘employee’ covers anyone employed by the company, including board members and contractors. The Coronavirus pandemic has forced insider fraud into the spotlight, and it isn’t dimming. As the focus of most academics and practitioners has historically been on that of ‘external fraud’, insider fraud is often overlooked or not considered to be a real threat. However, since COVID-19 changed the working world, pushing most of us into remote or hybrid working, employers cannot easily keep an eye on what their staff are doing, which has led to reliance on trust and transparency. This, therefore, brings about an increased risk of insider fraud perpetration. The objective of this paper is to explore why insider fraud is, therefore, now the biggest threat to a business. To achieve the research objective, participating individuals within the financial crime sector (either as a practitioner or consultants) attended semi-structured interviews with the researcher. The principal recruitment strategy for these individuals was via the researcher’s LinkedIn network. The main findings in the research suggest that insider fraud has been ignored and rejected as a threat to a business, owing to a reluctance to admit that a colleague may perpetrate. A positive of the Coronavirus pandemic is that it has forced insider fraud into a more prominent position and giving it more importance on a business’ agenda and risk register. Despite insider fraud always having been a possibility (and therefore a risk) within any business, it is very rare that a business has given it the attention it requires until now, if at all. The research concludes that insider fraud needs to prioritised by all businesses, and even ahead of external fraud. The research also provides advice on how a business can add new or enhance existing controls to mitigate the risk.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 36
509 Investigating the Effects of Empowering the Employees in Managing Crimes by the Police

Authors: Akbar Salimi, Mehdi Moghimi

Abstract:

Goal: The human resource empowerment is a new strategy in achieving a competitive advantage. The aim of the research is to understand crime management by the police by using this strategy. Method: The research is applied in terms of goal and it is a survey type research. The sample intended include all the police officers of a police station for as many as 52 people. The data were collected by a researcher made four choice questionnaire after the validity and reliability were confirmed. Findings: By regarding the Melhem pattern as the framework, four dimensions of empowerment were identified and the triangle of crime was explained and then four hypotheses proportionate to it were formulated. Results: Given the fact that the sample was all counted, all the four hypotheses were supported by using the average data received and by regarding the %50 as the criterion.

Keywords: management, empowerment, employees, police

Procedia PDF Downloads 344
508 Legal Provisions on Child Pornography in Bangladesh: A Comparative Study on South Asian Landscape

Authors: Monira Nazmi Jahan, Nusrat Jahan Nishat

Abstract:

'Child Pornography' is a sex crime that portrays illegal images and videos of a minor over the Internet and now has become a social concern with the increase of commission of this crime. The major objective of this paper is to identify and examine the laws relating to child pornography in Bangladesh and to compare this with other South Asian countries. In Bangladesh to prosecute under child pornography, provisions have been made in ‘Digital Security Act, 2018’ where it has been defined as involving child in areas of child sexuality or in sexuality and whoever commits the crime will be punished for 10 years imprisonment or 10 lac taka fine. In India, the crime is dealt with ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) where the offenders for commission of this crime has been divided separately and has provision for punishments starting from three years to rigorous life imprisonment and shall also be liable to fine. In the Maldives, there is ‘Special Provisions Act to Deal with Child Sex Abuse Offenders, Act number 12/2009’. In this act it has been provided that a person is guilty of such an act if intentionally runs child prostitution, involves child in the creation of pornography or displays child’s sexual organ in pornography then shall be punished between 20 to 25 years of imprisonment. Nepal prosecutes this crime through ‘Act Relating to Children, 2018’ and the conviction of using child in prostitution or sexual services is imprisonment up to fifteen years and fine up to one hundred fifty thousand rupees. In Pakistan, child pornography is prosecuted with ‘Pakistan Penal Code Child Abuse Amendment Act, 2016’. This provides that one is guilty of this offence if he involves child with or without consent in such activities. It provides punishment for two to seven years of imprisonment or fine from two hundred thousand to seven hundred thousand rupees. In Bhutan child pornography is not explicitly addressed under the municipal laws. The Penal Code of Bhutan penalizes all kinds of pornography including child pornography under the provisions of computer pornography and the offence shall be a misdemeanor. Child Pornography is also prohibited under the ‘Child Care and Protection Act’. In Sri Lanka, ‘The Penal Code’ de facto criminalizes child prohibition and has a penalty of two to ten years and may also be liable to fine. The most shocking scenario exists in Afghanistan. There is no specific law for the protection of children from pornography, whereas this serious crime is present there. This paper will be conducted through a qualitative research method that is, the primary sources will be laws, and secondary sources will be journal articles and newspapers. The conclusion that can be drawn is except Afghanistan all other South Asian countries have laws for controlling this crime but still have loopholes. India has the most amended provisions. Nepal has no provision for fine, and Bhutan does not mention any specific punishment. Bangladesh compared to these countries, has a good piece of law; however, it also has space to broaden the laws for controlling child pornography.

Keywords: child abuse, child pornography, life imprisonment, penal code, South Asian countries

Procedia PDF Downloads 184
507 Skills and Abilities Expected from Professionals Conducting Serious Crimes Investigations: A Descriptive Study from Turkey

Authors: Burak M. Gonultas

Abstract:

Criminal investigation provides a practical contribution to this process while criminology provides a theoretical background in the apprehension of criminals arrest and clarification of crimes. However, studies on criminal investigation, which is a practical aspect of this process, are not sufficient. Every crime involves different dynamics in terms of investigation. But investigations of serious crimes are versatile and contains complex processes because of cases they are conducted. Therefore, professionals who conduct serious crime investigations differ in some aspects from others in the field. The most fundamental element of this differentiation is skills and abilities of these professionals. According to Eurostat data, Turkey is in an important position in terms of homicide rates. Therefore, in Turkey practice of serious crime investigation is specialized. The present study aims to research the skills and abilities expected from professionals in conducting an effective serious criminal investigation in Turkey and so aims to offer a number of suggestions. 25 emerged ability and skills collected from literature were asked to professionals (n=289) with semi-structured form according to 5 provinces with the highest and 2 provinces with the lowest number of serious crime cases. Three data categories were collected during experience: 1- Five most important skills and abilities, 2- The most important skills for knowledge and inquiry management and 3- Ability and skills that stand out for five stages of serious criminal investigation. The most rated skills and abilities are investigative skill (13%, n=134), planning/designing (9,2%, n=95) and interpersonal relations/communication (8,8%, n=91) in 1010 skills and abilities. While the 1st and 2nd suggest elections of these professionals, the 3rd also suggests how and what type of training will be given to these professionals. This practice differs from other studies in the area in terms of separately addressing the skills and abilities expected in stages of investigation and in terms of selected methodology.

Keywords: ability, criminal investigation, criminology, homicide, serious crimes, skill, Turkey

Procedia PDF Downloads 246
506 From Knives to Kites: Developments and Dilemmas around the Use of Force in the Israeli–Palestinian Conflict since "Protective Edge"

Authors: Hilly Moodrick-Even Khen

Abstract:

This study analyzes the legal regulation of the use of force in international law in the context of three emerging Palestinian forms of struggle against Israeli occupation: the Knife Intifada, Gaza border disturbances, and the launching of incendiary kites. It discusses what legal paradigms or concepts should regulate the type and level of force used in each situation—a question that is complicated by various dilemmas—and appraises the Israel Defence Forces policies tailored in response. Methodologically, the study is based on analysis of scholarship on the conceptual legal issues as well as dicta of the courts. It evaluates the applicability of two legal paradigms regulating the use of force in military operations—(i) the conduct of hostilities and (ii) law enforcement—as well as the concept of self-defense in international law and the escalation of force procedure. While the “Knife Intifada” clearly falls under the law enforcement paradigm, the disturbances at the border and the launching of incendiary kites raise more difficult questions, as applying law enforcement, especially in the latter case, can have undesirable ramifications for safeguarding humanitarian interests. The use of force in the cases of the border disturbances and the incendiary kites should thus be regulated, mutatis mutandis, by the concept of self-defense and escalation of force procedures; and in the latter case, the hostilities paradigm can also be applied. The study provides a factual description and analysis of the background and nature of the forms of struggle in Gaza and the West Bank—in each case surveying the geo-political developments since operation Protective Edge, contextualizing how the organized and unorganized violent activities evolved, and analyzing them in terms of level of organization and intensity. It then presents the two paradigms of the use of force—law enforcement and conduct of hostilities—and the concept of self-defense. Lastly, it uses the factual findings as the basis for legally analyzing which paradigm or concept regulating the use of force applies for each form of struggle. The study concludes that in most cases, the concept of self-defense is preferable to the hostilities or the law enforcement paradigms, as it best safeguards humanitarian interests and ensures the least loss of civilian lives.

Keywords: Israeli-Palestinian conflict, self defense, terrorism, use of force

Procedia PDF Downloads 89
505 The Role Of Digital Technology In Crime Prevention

Authors: Muhammad Ashfaq

Abstract:

Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police.A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals .Latest digital analysis software should be provided to equip the Cellular Forensic Unit.

Keywords: crime prevention, digital technology, pakistan, police

Procedia PDF Downloads 38
504 The Application of Insects in Forensic Investigations

Authors: Shirin Jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani

Abstract:

Forensic entomology is the science of study and analysis of insects evidences to aid in criminal investigation. Being aware of the distribution, biology, ecology and behavior of insects, which are founded at crime scene can provide information about when, where and how the crime has been committed. It has many application in criminal investigations. Its main use is estimation of the minimum time after death in suspicious death. The close association between insects and corpses and the use of insects in criminal investigations is the subject of forensic entomology. Because insects attack to the decomposing corpse and spawning on it from the initial stages. Forensic scientists can estimate the postmortem index by studying the insects population and the developing larval stages.In addition, toxicological and molecular studies of these insects can reveal the cause of death or even the identity of a victim. It also be used to detect drugs and poisons, and determination of incident location. Gathering robust entomological evidences is made possible for experts by recent Techniques. They can provide vital information about death, corpse movement or burial, submersion interval, time of decapitation, identification of specific sites of trauma, post-mortem artefacts on the body, use of drugs, linking a suspect to the scene of a crime, sexual molestations and the identification of suspects.

Keywords: Forensic entomology, post mortem interval, insects, larvae

Procedia PDF Downloads 476
503 A Study on Explicitation Strategies Employed in Persian Subtitling of English Crime Movies

Authors: Hossein Heidari Tabrizi, Azizeh Chalak, Hossein Enayat

Abstract:

The present study seeks to investigate the application of expansion strategy in Persian subtitles of English crime movies. More precisely, this study aims at classifying the different types of expansion used in subtitles as well as investigating the appropriateness or inappropriateness of the application of each type. To achieve this end, three English movies; namely, The Net (1995), Contact (1997) and Mission Impossible 2 (2000), available with Persian subtitles, were selected for the study. To collect the data, the above mentioned movies were watched and those parts of the Persian subtitles in which expansion had been used were identified and extracted along with their English dialogs. Then, the extracted Persian subtitles were classified based on the reason that led to expansion in each case. Next, the appropriateness or inappropriateness of using expansion in the extracted Persian subtitles was descriptively investigated. Finally, an equivalent not containing any expansion was proposed for those cases in which the meaning could be fully transferred without this strategy. The findings of the study indicated that the reasons range from explicitation (explicitation of visual, co-textual and contextual information), mistranslation and paraphrasing to the preferences of subtitlers. Furthermore, it was found that the employment of expansion strategy was inappropriate in all cases except for those caused by explicitation of contextual information since correct and shorter equivalents which were equally capable of conveying the intended meaning could be posited for the original dialogs.

Keywords: audiovisual translation, English crime movies, expansion strategies, Persian subtitles

Procedia PDF Downloads 441
502 A Study on How Insider Fraud Impacts FinTechs

Authors: Claire Norman-Maillet

Abstract:

Insider fraud is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including Board members and part-time staff. Insider fraud can take many forms, including an employee working alone or in collusion with others. Insider fraud has been on the rise since the Coronavirus pandemic and shows no signs of slowing. The objective of the research is to better understand how FinTechs are impacted by insider fraud and, therefore, how to stop it. This research will make an original contribution to the financial crime field, given the timing of this research being intertwined with the cost-of-living crisis in the UK and the global Coronavirus pandemic. This research focuses on insider fraud within FinTechs specifically, as they are arguably a modern phenomenon in the financial institutions space and have cutting-edge technology at their disposal. To achieve the research objective, the researcher held semi-structured interviews with over 20 individuals who deal with insider fraud perpetration in a practitioner, recruitment, or advisory capacity. The interviews were subsequently transcribed and analysed thematically. Main findings in the research suggest that FinTechs are arguably in the best position to combat insider fraud, given their focus on using recent technologies, as this can be used to combat the threat. However, insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer, as well as the idea that external fraud is the most important threat. The research concludes that, whilst the technology is understandably prioritised by FinTechs for providing an agreeable customer experience, insider fraud needs to be given a platform upon which to be recognised as a significant threat to any company. Moreover, insider fraud needs to be given the same level of weighting and attention by Executive Committees and Boards as the customer experience.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, Coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 31
501 Forensic Necropsy-Importance in Wildlife Conservation

Authors: G. V. Sai Soumya, Kalpesh Solanki, Sumit K. Choudhary

Abstract:

Necropsy is another term used for an autopsy, which is known as death examination in the case of animals. It is a complete standardized procedure involving dissection, observation, interpretation, and documentation. Government Bodies like National Tiger Conservation Authority (NTCA) have given standard operating procedures for commencing the necropsies. Necropsies are rarely performed as compared to autopsies performed on human bodies. There are no databases which maintain the count of autopsies in wildlife, but the research in this area has shown a very small number of necropsies. Long back, wildlife forensics came into existence but is coming into light nowadays as there is an increase in wildlife crime cases, including the smuggling of trophies, pooching, and many more. Physical examination in cases of animals is not sufficient to yield fruitful information, and thus postmortem examination plays an important role. Postmortem examination helps in the determination of time since death, cause of death, manner of death, factors affecting the case under investigation, and thus decreases the amount of time required in solving cases. Increasing the rate of necropsies will help forensic veterinary pathologists to build standardized provision and confidence within them, which will ultimately yield a higher success rate in solving wildlife crime cases.

Keywords: necropsy, wildlife crime, postmortem examination, forensic application

Procedia PDF Downloads 105
500 A Case Study of Wildlife Crime in Bangladesh

Authors: M. Golam Rabbi

Abstract:

Theme of wildlife crime is unique in Bangladesh. In earlier of 2010, wildlife crime was not designated as a crime, unlike other offenses. Forest Department and other enforcement agencies were not in full swing to find out the organized crime scene at that time and recorded few cases along with forest crime. However, after the establishment of Wildlife Crime Control Unitin 2012a, total of 374 offenses have been detected with 566 offenders and 37,039 wildlife and trophies were seized till November 2016. Most offenses seem to be committed outside the forests where the presence of the forest staff is minimal. Total detection percentage of offenses is not known, but offenders are not identified in 60% of detected cases (UDOR). Only 20% cases are decided by the courts even after eight years, conviction rate of the total disposal is 70.65%. Mostly six months imprisonment and BDT 5000 fine seems to be the modal penalty. The monetary value of wildlife crime in the country is approximate $0.72M per year and the maximum value counted for reptiles around $0.45M especially for high-level trafficking of geckos and turtles. The most common seizures of wildlife are birds (mynas, munias, parakeets, lorikeets, water birds, etc.) which have domestic demand for pet. Some other wildlife like turtles, lizards and small mammals are also on the list. Venison and migratory waterbirds often seized which has a large quantity demand for consuming at aristocratic level.Due to porous border and weak enforcement in border region poachers use the way for trafficking of geckos, turtles, and tortoises, snakes, venom, tiger and body parts, spotted deerskin, pangolinetc. Those have very high demand in East Asian countries for so-called medicinal purposes. The recent survey also demonstrates new route for illegal trade and trafficking for instance, after poaching of tiger and deer from the Sundarbans, the largest mangrove track of the planet to Thailand through the Bay of Bengal, sharks fins and ray fish through Chittagong seaport and directly by sea routes to Myanmar and Thailand. However, a good number of records of offense demonstrate the transition route from India to South and South East Asian countries. Star tortoises and Hamilton’s turtles are smuggled in from India which mostly seized at Benapole border of Jessore and Hazrat Shah Jajal International Airport of Dhaka, in very large numbers for transmission to East Asian countries. Most of the cases of wildlife trade routes leading to China, Thailand, Malaysia, and Myanmar. Most surprisingly African ivory was seized in Bangladesh recently, which was meant to be trafficked to the South-East Asia. However; forest department is working to fight against wildlife poaching, illegal trade and trafficking in collaboration with other law enforcement agencies. The department needs a clear mandate and to build technical capabilities for identifying, seizing and holding specimens. The department also needs to step out of the forests and must develop the capacity to surveillance and patrol all sensitive locations across the country.

Keywords: Bangladesh forest department, Sundarban, tiger, wildlife crime, wildlife trafficking

Procedia PDF Downloads 272
499 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime

Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya

Abstract:

Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.

Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident

Procedia PDF Downloads 126
498 To Individualisation of Subject, Donar, by Determination of Serological Markers from Obtain Biological Fluid at Crime Scene

Authors: Arun Kumar, Ravindra Pal Verma, Harsh Sharma, Shani Kumar

Abstract:

For the present study samples was collected from 20 donors with unknown blood group and secretor status had been determined from saliva by using biological fluid. ABO typing on the concentrated samples was successfully performed after 1 month of storage. Urine stained clothing samples are often submitted to forensic science laboratories for ABH blood group antigen determination. The serogenetic markers of semen stains submitted can be used to determine the origin of any of these samples. ABH blood group substances have previously been identified from urine. ABH blood group substance is low in urine in comparison with other body fluids.

Keywords: ABH blood group, crime scene, serological markers, body fluids and urine

Procedia PDF Downloads 549
497 Examining the Influence of Question Phrasing in Police Interviews on Suspects’ Inferences Regarding Interviewer’s Prior Knowledge

Authors: Meghana Srivatsav, Timothy J. Luke, Par Anders Granhag, Aldert Vrij

Abstract:

The aim of this study was to understand how the phrasing of questions influences guilty suspects’ inferences regarding prior information held by the interviewer about the suspect’s crime-related activities. Three phrasing factors were explored namely specificity (crime-related details within questions), stressor (emphasis on the importance of the information in the question) and phase presentation (whether a specific activity was questioned about). 370 participants were recruited and randomly assigned into 6 different question-phrasing groups. Participants assumed the role of a suspect, read a crime narrative and an interview transcript based on the suspect’s activities. Participants responded to scales that measured their perception of interviewer’s knowledge (PIK) based on the questions posed by the interviewer in the interview transcripts. The researchers found that there is an effect of specific details revealed in the questions on the suspect’s perception of interviewer knowledge. Questioning about a specific activity also increased their perception of interviewer’s prior knowledge. However, the individual hypotheses were only partially supported. The study allowed the researchers to explore a psycholinguistic approach to investigate the underlying mechanisms of inferences drawn by suspects from the phrasing of investigative questions.

Keywords: police interviewing, question framing effects on suspects, suspect inferences from questions, suspect interviews

Procedia PDF Downloads 125
496 Laundering vs. Blanqueo: Translating Financial Crime Metaphors From English to Spanish

Authors: Stephen Gerome

Abstract:

This study examines the translation and use of metaphors in the realm of public safety discourse and intends to shed light on a continuing problem in cross-cultural communication. Metaphors can cause problems not only within languages but also in interlingual communication. The use and misuse of metaphors may hinder the ability to adequately communicate prevention efforts and, in some cases, facilitate and allow financial crime to go undetected. The use of lexicalized metaphors in communications by political entities, journalists, and legal agents in communications regarding law, policy making, compliance monitoring and enforcement as well as in adjudication can have negative consequences if misconstrued. This study provides examples of metaphor usage in published documents in a corpus linguistic study that compares the use of lexicalized metaphors in this discourse to shed light on possible unexpected consequences as well as counterproductive ones.

Keywords: translation, legal, corpus linguistics, financial

Procedia PDF Downloads 79
495 Votes - Commercialization in Nigeria: A Crime Against Sustainable Democracy

Authors: Oluwasaanmi Lawrence Adesuyi, Igbekoyi Kayode Emmanuel

Abstract:

This study examined vote - commercialization during elections among the voters in Nigeria, a series of elections in Ekiti State, Southwestern Nigeria. Democracy in Nigeria that came to replace the unwanted ruling and dictating mission of the military government has been facing a societal terror “crime of votes commercialization” that stands in jeopardy against its sustainability in Nigeria. Social exchange and action-bound theories were employed as the theoretical framework. Forty-Eight in-depth interviews, key informant interviews, and case studies were conducted with purposively selected respondents in the three senatorial districts that captured the sixteen local governments of the state. The results show that really commercialization of votes has become the order of the day in all series of electioneering among Ekiti people. Also, it was recorded that true democracy is no longer allowed to triumph as a result of vote buying that allows the highest bidder to be the winner. The result also shows that this attitude is not limited to only one political party or one candidate but involved all the political parties that participated in Election. It has become a frequent idea among the electorates during every festive period of election in Ekiti State. The tyrannical attitude has been given a nickname to suit the conditional situation of votes commercialization - (Diboki o se obe), which means vote and have a pot of soup, this implies that you will get money to take care of yourself and the family when you vote and collect money on the vote you cast, notwithstanding the money is being collected from all candidates that participated in the election, but the highest bidder has the day. The main challenge this has on democracy is that the contestants challenge the result of the election results based on the act of vote commercialization. Also, those that bought people’s votes with a huge amount of money relent on their democratic promises. The study showed that the crime of vote commercialization that threatens democracy must be addressed for sustainability.

Keywords: crime, democracy, jeopardy, military, sustainability, votes-commercialization

Procedia PDF Downloads 60
494 The Role of Digital Technology in Crime Prevention: A Case Study of Cellular Forensics Unit, Capital City Police Peshawar

Authors: Muhammad Ashfaq

Abstract:

Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies, and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries, and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police. A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals. Latest digital analysis software should be provided to equip the Cellular Forensic Unit.

Keywords: criminology-pakistan, crime prevention-KP, digital forensics, digital technology-pakistan

Procedia PDF Downloads 60
493 Combining Shallow and Deep Unsupervised Machine Learning Techniques to Detect Bad Actors in Complex Datasets

Authors: Jun Ming Moey, Zhiyaun Chen, David Nicholson

Abstract:

Bad actors are often hard to detect in data that imprints their behaviour patterns because they are comparatively rare events embedded in non-bad actor data. An unsupervised machine learning framework is applied here to detect bad actors in financial crime datasets that record millions of transactions undertaken by hundreds of actors (<0.01% bad). Specifically, the framework combines ‘shallow’ (PCA, Isolation Forest) and ‘deep’ (Autoencoder) methods to detect outlier patterns. Detection performance analysis for both the individual methods and their combination is reported.

Keywords: detection, machine learning, deep learning, unsupervised, outlier analysis, data science, fraud, financial crime

Procedia PDF Downloads 66
492 Analysis of a Movie about Juvenile Delinquency

Authors: Guliz Kolburan

Abstract:

Juvenile delinquency studies has a special place and importance in criminality researches. Young adolescents, have not reached psychological, mental and physical maturity, and they cannot understand their roles and duties in society. In this case, if such an adolescent turns into a crime machine as a gang leader, he has the least responsibility of this result. All institutions, like family, school, community and the state as a whole have duties and responsibilities in this regard. While planning the studies about prevention of juvenile delinquency, all institutions related with the development of the children, should be involved in the center of the study. So that effective goals for prevention studies can be determined only in this way. Most of youth who commit homicide feel no attachment to anybody or society except for themselves. Children who committed homicide generally developed defense mechanisms about their guilt, sadness, fear and anger. For this reason, treatment of these children should be based on the awareness of these feelings and copying with them. In the movie, events making the youth realize his own feelings and responsibilities were studied from a theoretical perspective. In this study, some of the dialogs and the scenes in the movie were analyzed and the factors cause the young gang leader to be drawn to crime were evaluated in terms of the science of psychology. The aim of this study is to analyze the process of the youth to being drawn into criminal behavior in terms of social and emotional developmental phases in a theoretical perspective via the movie produced in 2005 (94. Min.). The method of this study is discourse analysis.

Keywords: crime, child, evaluation (development), psychology

Procedia PDF Downloads 422
491 Cybercrime: International Police Cooperation with Europol

Authors: Daniel Suarez Alonso

Abstract:

Cybercrime is a growing international threat and a challenge for law enforcement agencies and judicial systems worldwide. International cooperation is necessary to solve this problem because cybercrime knows no borders and often involves multiple jurisdictions, being related to organised crime. The purpose of this article is to analyse international cooperation in the investigation and prosecution of cybercrime, focusing on the framework of the Regulation of the European Union Agency for Law Enforcement Cooperation (EUROPOL), cooperation that takes place between police authorities from different countries. It examines the legal and operational mechanisms in place to facilitate international cooperation in Europe in this area and assesses their effectiveness in the fight against cybercrime. In addition, the study of a Spanish investigation where cooperation with EUROPOL took place will be examined, analyzing how international cooperation was carried out to investigate and track down criminals. Lessons learned from this case will be discussed and recommendations for improving international cooperation in the fight against cybercrime will be proposed.

Keywords: Europol, international cooperation, cybercrime, computer crime, law

Procedia PDF Downloads 23
490 The Role of Asset Recovery in Combatting Organized Crime

Authors: Tamas Bezsenyi, Noemi Katona

Abstract:

Fighting Human Trafficking is a highly important issue worldwide that states need to deal with in international politics. In the EU combatting human trafficking is emphasized in international policy making and also in the work of international law enforcement, thus in the work of the EUROPOL. While the EU Directive against Human Trafficking prescribes how states should fight this transnational crime and also how victims should be assisted, the EUROPOL focuses on the effective cooperation between national law enforcement agencies. However, despite the aims of the common fight, human trafficking is regulated differently in the punitive law of various nation states. This deeply defines the work and possibilities of national law enforcement organizations. Among the manifold differences in this paper, we focus on the role of regulating asset recovery. We highlight that money, and the regulation and practice how the law enforcement deals with income gained from criminal activities, play essential role in combatting human trafficking. While doing research on the investigation of transnational human trafficking by the Hungarian Law Enforcement Agencies, we have found that the unfortunate regulation of asset recovery determines the lower effectiveness of eliminating criminal organizations. While i.e. in the Netherlands confiscation of property takes place in an early stage of the criminal procedure, in Hungary it can be conducted only if money laundering is also assumed. Our presentation builds on the comparison of criminal procedures which we analyse based on criminal files and interviews with coworkers of the National Bureau of Investigation.

Keywords: human trafficking, law enforcement, asset recovery, organized crime

Procedia PDF Downloads 253
489 Bullying Rates Among Students with Special Needs in the United States

Authors: Kaycee Bills

Abstract:

Past studies have indicated students who have disabilities are at a higher risk of experiencing bullying victimization in comparison to other student groups. Extracurricular activity participation has been shown to establish better social outcomes for students. These positive social outcomes indirectly decrease the number of times a student is bullied. The following study uses the National Crime Victimization Survey – School Crime Supplement (NCVS/SCS) to analyze the bullying concurrences experienced among students, with disabilities being a focal variable. To explore the relationship between extracurricular involvement and bullying occurrence rates, this study employs a binary logistic regression to determine if athletic and non-athletic extracurricular activities have an impact on the number of times a student with disabilities experiences bullying. Implications for future social welfare practice and research are discussed.

Keywords: disability, bullying, extracurricular activities, athletics

Procedia PDF Downloads 136
488 The Nigeria Police Force: Human Resources Management Issues and the Community Policing Policy Transfer

Authors: Aminu Musa Audu

Abstract:

This paper examines the human resources management issues of the Nigeria Police and how it is impacting the community policing policy transfer. Nigeria Police Force is the organisation in the country with the constitutional responsibility of maintaining law and order. The high level of crime and other forms of insecurity called for the introduction of ‘police-community partnership’ strategy in 2003. The trend of events has suggested that the effort is not yielding result, partly because the police in Nigeria are facing human resources management challenges. For instance, the prospective candidates for the police jobs are usually not vetted a situation which provides the possibility of recruiting persons of low academic background and questionable character, or even criminal records. Moreover, the existing training, development infrastructure and other logistics for the job of policing are not in good condition. Consequently, the implementation of the ‘community policing’ policy for crime prevention and control in Nigeria stands to suffer setbacks. Adopting qualitative methods and with focus groups discussions and individual in-depth interviews for data collections, the findings from the views and perspectives of the participants were suggestive of poor handlings of human resources management of the Nigeria police organisation and with negative effect on the implementation of community policing policy. The paper therefore recommends that a total overhaul of the human resources component of the police organisation is necessary in the community policing policy transfer process for crime prevention and control in Nigeria.

Keywords: Nigeria Police Force, community policing policy transfer, human resources management, police-community partnership

Procedia PDF Downloads 478