Search results for: Stolen
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26

Search results for: Stolen

26 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 405
25 A Diagnostic Study of Rape Culture in India

Authors: V. U. Ameera

Abstract:

Rape has become an epidemic in India. Rape becomes a repressive weapon, which used to make them silent or used sometimes as a mode of punishment. Even for marrying above their status or for caste violation through a marriage of their choice, women are sentenced for mass rape, and the retribution is done in the presence of her family and villagers. Dalit or lower class women are brutally raped in a process of chastisement carried out by the upper class to keep the former always under their feet. Even in police stations, women are raped so that, their wretched condition will compel them to blurt out the truth. In a patriarchal society, for every trespass of woman, she is retaliated with a trespass into her body, which they think is the finest fine she can pay, as they are still driven by Victorian morality and believe once ‘the jewel’ is stolen, it is stolen forever. Even when the reports of brutal rapes comes out, those who are in responsible position also take the girls to task for going out in inappropriate time. As it is elsewhere in the world, in India too rape is a destructive weapon used to destroy men folk morally and psychologically, as they deem their honor rest in their protecting the purity of their women. During the communal skirmishes, as it is evident from Gujarat and Muzzafar Nagar recently, women are subjected to mass rape so that they can terrorize their men. Even women writers are threatened with rape for criticizing the maneuvers and manipulations of political parties. This becomes possible because of the undue weight given to the chastity of women. This study intends to analyze the nature of rapes occurring in India, including its use as a tool to establish and perpetuate the dominant position of men in social power structures. The study reveals how society, media and literature have imbibed and spread the notion of this sacred glass bowl which is the proud possession of men, the breaking of which steals them of their honor.

Keywords: guardians of chastity, patriarchal mindset, power tool, punishment rape

Procedia PDF Downloads 190
24 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 92
23 Harrison’s Stolen: Addressing Aboriginal and Indigenous Islanders Human Rights

Authors: M. Shukry

Abstract:

According to the United Nations Declaration of Human Rights in 1948, every human being is entitled to rights in life that should be respected by others and protected by the state and community. Such rights are inherent regardless of colour, ethnicity, gender, religion or otherwise, and it is expected that all humans alike have the right to live without discrimination of any sort. However, that has not been the case with Aborigines in Australia. Over a long period of time, the governments of the State and the Territories and the Australian Commonwealth denied the Aboriginal and Indigenous inhabitants of the Torres Strait Islands such rights. Past Australian governments set policies and laws that enabled them to forcefully remove Indigenous children from their parents, which resulted in creating lost generations living the trauma of the loss of cultural identity, alienation and even their own selfhood. Intending to reduce that population of natives and their Aboriginal culture while, on the other hand, assimilate them into mainstream society, they gave themselves the right to remove them from their families with no hope of return. That practice has led to tragic consequences due to the trauma that has affected those children, an experience that is depicted by Jane Harrison in her play Stolen. The drama is the outcome of a six-year project on lost children and which was first performed in 1997 in Melbourne. Five actors only appear on the stage, playing the role of all the different characters, whether the main protagonists or the remaining cast, present or non-present ones as voices. The play outlines the life of five children who have been taken from their parents at an early age, entailing a disastrous negative impact that differs from one to the other. Unknown to each other, what connects between them is being put in a children’s home. The purpose of this paper is to analyse the play’s text in light of the 1948 Declaration of Human Rights, using it as a lens that reflects the atrocities practiced against the Aborigines. It highlights how such practices formed an outrageous violation of those natives’ rights as human beings. Harrison’s dramatic technique in conveying the children’s experiences is through a non-linear structure, fluctuating between past and present that are linked together within each of the five characters, reflecting their suffering and pain to create an emotional link between them and the audience. Her dramatic handling of the issue by fusing tragedy with humour as well as symbolism is a successful technique in revealing the traumatic memory of those children and their present life. The play has made a difference in commencing to address the problem of the right of all children to be with their families, which renders the real meaning of having a home and an identity as people.

Keywords: aboriginal, audience, Australia, children, culture, drama, home, human rights, identity, Indigenous, Jane Harrison, memory, scenic effects, setting, stage, stage directions, Stolen, trauma

Procedia PDF Downloads 270
22 Microwave Security System in Museums: Design and Implementation

Authors: Dalia Elsheakh, Hala Elsadek

Abstract:

The objective of this paper is to propose a competitive microwave security system that can be applied with reasonable price at museums in Egypt, considering the priceless elements in 23 Egyptian museums countrywide and the lack of good recent security systems even in big ones. The system main goal is to detect valuable targets to ensure their presence in the pre-defined positions in order to protect them from being stolen. The system is based on real time microwave scanning for the required space volume through transmitting RF waves at consecutive angles and detecting the back scattered waves from required objects to detect their existence at pre-specified locations.

Keywords: microwave security system, object locating system, real time locating system (RTLS), antenna array, array electronic scanning

Procedia PDF Downloads 315
21 Video Based Automatic License Plate Recognition System

Authors: Ali Ganoun, Wesam Algablawi, Wasim BenAnaif

Abstract:

Video based traffic surveillance based on License Plate Recognition (LPR) system is an essential part for any intelligent traffic management system. The LPR system utilizes computer vision and pattern recognition technologies to obtain traffic and road information by detecting and recognizing vehicles based on their license plates. Generally, the video based LPR system is a challenging area of research due to the variety of environmental conditions. The LPR systems used in a wide range of commercial applications such as collision warning systems, finding stolen cars, controlling access to car parks and automatic congestion charge systems. This paper presents an automatic LPR system of Libyan license plate. The performance of the proposed system is evaluated with three video sequences.

Keywords: license plate recognition, localization, segmentation, recognition

Procedia PDF Downloads 431
20 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 331
19 The Applicability of Western Environmental Criminology Theories to the Arabic Context

Authors: Nawaf Alotaibi, Andy Evans, Alison Heppenstall, Nick Malleson

Abstract:

Throughout the last two decades, motor vehicle theft (MVT) has accounted for the largest proportion of property crime incidents in Saudi Arabia (SA). However, to date, few studies have investigated SA’s MVT problem. Those that have are primarily focused on the characteristics of car thieves, and most have overlooked any spatial-temporal distribution of MVT incidents and the characteristics of victims. This paper represents the first step in understanding this problem by reviewing the existing MVT studies contextualised within the theoretical frameworks developed in environmental criminology theories – originating in the West – and exploring to what extent they are relevant to the SA context. To achieve this, the paper has identified a range of key features in SA that are different from typical Western contexts, that could limit the appropriateness and capability of applying existing environmental criminology theories. Furthermore, despite these Western studies reviewed so far having introduced a number of explanatory variables for MVT rates, a range of significant elements are apparently absent in the current literature and this requires further analysis. For example, almost no attempts have been made to quantify the associations between the locations of vehicle theft, recovery of stolen vehicles, joyriding and traffic volume.

Keywords: environmental criminology theories, motor vehicle theft, Saudi Arabia, spatial analysis

Procedia PDF Downloads 260
18 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 325
17 Detection of Viral-Plant Interaction Using Some Pathogenesis Related Protein Genes to Identify Resistant Genes against Potato LeafRoll Virus and Potato Virus Y in Egyptian Isolates

Authors: Dalia. G. Aseel, E. E. Hafez, S. M. Hammad

Abstract:

Viral RNAs of both potato leaf roll virus (PLRV) and potato virus Y (PVY) were extracted from infected potato leaves collected from different Egyptian regions. Differential Display Polymerase Chain Reaction (DD-PCR) using (Endogluconase, β-1,3-glucanases, Chitinase, Peroxidase and Polyphenol oxidase) primers (forward strand) for was performed. The obtained data revealed different banding patterns depending on the viral type and the region of infection. Regarding PLRV, a 58 up regulated and 19 down regulated genes were detected, while, 31 up regulated and 14 down regulated genes were observed in case of PVY. Based on the nucleotide sequencing, variable phylogenetic relationships were reported for the three sequenced genes coding for: Induced stolen tip protein, Disease resistance RPP-like protein and non-specific lipid-transfer protein. In a complementary approach, using the quantitative Real-time PCR, the expressions of PRs genes understudy were estimated in the infected leaves by PLRV and PVY of three potato cultivars (Spunta, Diamont and Cara). The infection with both viruses inhibited the expressions of the five PRs genes. On the contrary, infected leaves by PLRV or PVY elevated the expression of some defense genes. This interaction also may be enhanced and/or inhibited the expression of some genes responsible for the plant defense mechanisms.

Keywords: PLRV, PVY, PR genes, DD-PCR, qRT-PCR, sequencing

Procedia PDF Downloads 306
16 Study and GIS Development of Geothermal Potential in South Algeria (Adrar Region)

Authors: A. Benatiallah, D. Benatiallah, F. Abaidi, B. Nasri, A. Harrouz, S. Mansouri

Abstract:

The region of Adrar is located in the south-western Algeria and covers a total area of 443.782 km², occupied by a population of 432,193 inhabitants. The main activity of population is agriculture, mainly based on the date palm cultivation occupies a total area of 23,532 ha. Adrar region climate is a continental desert characterized by a high variation in temperature between months (July, August) it exceeds 48°C and coldest months (December, January) with 16°C. Rainfall is very limited in frequency and volume with an aridity index of 4.6 to 5 which corresponds to a type of arid climate. Geologically Adrar region is located on the edge North West and is characterized by a Precambrian basement cover stolen sedimentary deposit of Phanerozoic age transgressive. The depression is filled by Touat site Paleozoic deposits (Cambrian to Namurian) of a vast sedimentary basin extending secondary age of the Saharan Atlas to the north hamada Tinhirt Tademaït and the plateau of south and Touat Gourara west to Gulf of Gabes in the Northeast. In this work we have study geothermal potential of Adrar region from the borehole data eatable in various sites across the area of 400,000 square kilometres; from these data we developed a GIS (Adrar_GIS) that plots data on the various points and boreholes in the region specifying information on available geothermal potential has variable depths.

Keywords: sig, geothermal, potenteil, temperature

Procedia PDF Downloads 431
15 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 65
14 The Concepts of Ibn Taymiyyah in Halal and Haram and Their Relevance to Contemporary Issues

Authors: Muhammad Fakhrul Arrazi

Abstract:

Ibn Taymiyyah is a great figure in Islam. His works have become the reference for many Muslims in implementing the fiqh of Ibadah and Muamalat. This article reviews the concepts that Ibn Taymiyyah has initiated in Halal and Haram, long before the books on Halal and Haram are written by contemporary scholars. There are at least four concepts of Halal and Haram ever spawned by Ibn Taymiyyah. First, the belief of a jurist (Faqih) in a matter that is Haram does not necessarily make the matter Haram. Haram arises from the Quran, Sunnah, Ijma’ and Qiyas as the tarjih. Due to the different opinions among the ulama, we should revisit this concept. Second, if a Muslim involves in a transaction (Muamalat), believes it permissible and gets money from such transaction, then it is legal for other Muslims to transact with the property of this Muslim brother, even if he does not believe that the transactions made by his Muslims brother are permissible. Third, Haram is divided into two; first is Haram because of the nature of an object, such as carrion, blood, and pork. If it is mixed with water or food and alters their taste, color, and smell, the food and water become Haram. Second is Haram because of the way it is obtained such as a stolen item and a broken aqad. If it is mixed with the halal property, the property does not automatically become Haram. Fourth, a treasure whose owners cannot be traced back then it is used for the benefit of the ummah. This study used the secondary data from the classics books by Ibn Taymiyyah, particularly those entailing his views on Halal and Haram. The data were then analyzed by using thematic and comparative approach. It is found that most of the concepts proposed by Ibn Taymiyyah in Halal and Haram correspond the majority’s views in the schools. However, some of his concepts are also in contrary to other scholars. His concepts will benefit the ummah, should it be applied to the contemporary issues.

Keywords: fiqh Muamalat, halal, haram, Ibn Taymiyyah

Procedia PDF Downloads 157
13 A Medical Vulnerability Scoring System Incorporating Health and Data Sensitivity Metrics

Authors: Nadir A. Carreon, Christa Sonderer, Aakarsh Rao, Roman Lysecky

Abstract:

With the advent of complex software and increased connectivity, the security of life-critical medical devices is becoming an increasing concern, particularly with their direct impact on human safety. Security is essential, but it is impossible to develop completely secure and impenetrable systems at design time. Therefore, it is important to assess the potential impact on the security and safety of exploiting a vulnerability in such critical medical systems. The common vulnerability scoring system (CVSS) calculates the severity of exploitable vulnerabilities. However, for medical devices it does not consider the unique challenges of impacts to human health and privacy. Thus, the scoring of a medical device on which human life depends (e.g., pacemakers, insulin pumps) can score very low, while a system on which human life does not depend (e.g., hospital archiving systems) might score very high. In this paper, we propose a medical vulnerability scoring system (MVSS) that extends CVSS to address the health and privacy concerns of medical devices. We propose incorporating two new parameters, namely health impact, and sensitivity impact. Sensitivity refers to the type of information that can be stolen from the device, and health represents the impact on the safety of the patient if the vulnerability is exploited (e.g., potential harm, life-threatening). We evaluate fifteen different known vulnerabilities in medical devices and compare MVSS against two state-of-the-art medical device-oriented vulnerability scoring systems and the foundational CVSS.

Keywords: common vulnerability system, medical devices, medical device security, vulnerabilities

Procedia PDF Downloads 123
12 A Comparative Study on Occupational Fraud and Prosecution

Authors: Michelle Odudu

Abstract:

Ghana and Nigeria are known for their high levels of Occupational Fraud in public offices. The governments of both countries have emphasised their commitment to reducing the losses caused to the state by pledging their allegiance to the counter-fraud agencies to help tackle Occupational Fraud. Yet it seems that the prosecution of such cases is ineffective as high-profile fraudsters can operate with immunity and their cases remain unprosecuted. This research project was based on in-depth examinations of 50 occupational fraud cases involving high-profile individuals in both countries. In doing so, it established the characteristics of those who were prosecuted; the extent to which prosecutions were effectively managed; the barriers to effective prosecutions; and the similarities or differences between the occurrences in both countries. The aim of the project is to examine the practice of and barriers to prosecution of large-scale occupational fraud of those in senior public positions in Ghana and Nigeria. The study drew on the experiences of stakeholders such as defence and prosecution barristers, academics, and fraud analysts via semi-structured interviews and questionnaires. 13 interviews were conducted in Ghana and in Nigeria, where respondents were recruited using a snowball approach. Questionnaires were physically distributed: 20 of the staff at EOCO and 10 to NGO staff in Ghana; 6 and 5 came back, respectively. The empirical data collected suggests that there is no lack of will on the agencies’ part to at least commence proceedings. However, various impediments hamper a successful completion of prosecution. Challenges were more evident in Nigeria, where agencies are less effective at retrieving stolen assets and changing social norms. This is further compounded by several cultural and political factors, which create limitations leaving many cases ‘still pending’.

Keywords: comparative, prosecution, punishment, international, whitecollar, fraud

Procedia PDF Downloads 94
11 Detection of Fuel Theft and Vehicle Position Using Third Party Monitoring Software

Authors: P. Senthilraja, C. Rukumani Khandhan, M. Palaniappan, S. L. Rama, P. Sai Sushimitha, R. Madhan, J. Vinumathi, N. Vijayarangan

Abstract:

Nowadays, the logistics achieve a vast improvement in efficient delivery of goods. The technology improvement also helps to improve its development, but still the owners of transport vehicles face problems, i.e., fuel theft in vehicles by the drivers or by an unknown person. There is no proper solution to overcome the problems. This scheme is to determine the amount of fuel that has been stolen and also to determine the position of the vehicle at a particular time using the technologies like GPS, GSM, ultrasonic fuel level sensor and numeric lock system. The ultrasonic sensor uses the ultrasonic waves to calculate the height of the tank up to which the fuel is available. Based on height it is possible to calculate the amount of fuel. The Global Positioning System (GPS) is a satellite-based navigation system. The scientific community uses GPS for its precision timing capability and position information. The GSM provides the periodic information about the fuel level. A numeric lock system has been provided for fuel tank opening lever. A password is provided to access the fuel tank lever and this is authenticated only by the driver and the owner. Once the fuel tank is opened an alert is sent to owner through a SMS including the timing details. Third party monitoring software is a user interface that updates the information automatically into the database which helps to retrieve the data as and when required. Third party monitoring software provides vehicle’s information to the owner and also shows the status of the vehicle. The techniques that are to be proposed will provide an efficient output. This project helps to overcome the theft and hence to put forth fuel economy.

Keywords: fuel theft, third party monitoring software, bioinformatics, biomedicine

Procedia PDF Downloads 364
10 A Review of the Handling and Disposal of Botulinum Toxin in a Maxillofacial Unit

Authors: Ashana Gupta

Abstract:

Aim: In the UK, Botulinum Toxin (botox) is authorised for treating chronic myofascial pain secondary to masseter muscle hypertrophy (Fedorowicz et al. 2013). This audit aimed to ensure the Maxillofacial Unit is meeting the trust guidelines for the safe storage and disposal of botox. Method: The trust upholds a strict policy for botox handling. The audit was designed to optimise several elements including Staff awareness of regulations around botox handling A questionnaire was designed to test knowledge of advised storage temperatures, reporting of adverse events, disposal procedures and regulatory authorities. Steps taken to safely delivertoxin and eliminate unused toxin. A checklist was completed. These include marks for storagetemperature, identification checks, disposal of sharps, deactivation of toxin, and disposal. Results: All staff correctly stated storage requirements for toxin. 75% staff (n=8) were unsure about reporting and regulations. Whilst all staff knew how to dispose of vials, 0% staff showed awareness for the crucial step of deactivating toxin. All checklists (n=20) scored 100% for adequate storage, ID checks, and toxin disposal. However, there were no steps taken to deactivate toxin in any cases. Staff training took place with revision to clinical protocols. In line with Trust guidelines, an additional clinical step has been introduced including use of 0.5% sodium hypochlorite to deactivate botox. Conclusion: Deactivation is crucial to ensure residual toxin is not misused. There are cases of stolen botox within South-Tees Hospital (Woodcock, 2014). This audit was successful in increasing compliance to safe handling and disposal of botox by 100% and ensured our hospitalmeets Trust guidance.

Keywords: botulinum toxin, aesthetics, handling, disposal

Procedia PDF Downloads 159
9 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia

Authors: Saleh Dabil

Abstract:

This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: (1) the supermarket profile (volume, location, standard and type of the store), (2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), (3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first is ‘the well distributing of the duties and responsibilities between the employees especially for security purposes’. Second is ‘installation of strong security system’ and ‘making well-designed store layout’. Third is ‘giving training for general employees’ and ‘to give periodically security skills training of employees’. There are other suggestions in the study can be looked up in the text.

Keywords: organized crime, retail, theft, loss prevention, store environment

Procedia PDF Downloads 162
8 Altered Gene Expression: Induction/Suppression of some Pathogenesis Related Protein Genes in an Egyptian Isolate of Potato Leafroll Virus (PLRV)

Authors: Dalia G. Aseel

Abstract:

The potato (Solanum tubersum, L.) has become one of the major vegetable crops in Egypt and all over the world. Potato leafroll virus(PLRV) was observed on potato plants collected from different governorates in Egypt. Three cultivars, Spunta, Diamont, and Cara, infected with PLRV were collected; RNA was extracted and subjected to Real-Time PCR using the coat protein gene primers. The results showed that the expression of the coat protein was 39.6-fold, 12.45-fold, and 47.43-fold, respectively, for Spunta, Diamont, and Cara cultivars. Differential Display Polymerase Chain Reaction (DD-PCR) using pathogenesis-related protein 1 (PR-1), β-1,3-glucanases (PR-2), chitinase (PR-3), peroxidase (POD), and polyphenol oxidase (PPO) forward primers for pathogenesis-related proteins (PR). The obtained data revealed different banding patterns depending on the viral type and the region of infection. Regarding PLRV, 58 up-regulated and 19 down-regulated genes were detected. Sequence analysis of the up-and down-regulated genes revealed that infected plants were observed in comparison with the healthy control. Sequence analysis of the up-regulated gene was performed, and the encoding sequence analysis showed that the obtained genes include: induced stolen tip protein. On the other hand, two down-regulated genes were identified: disease resistance RPP-like protein and non-specific lipid-transfer protein. In this study, the expressions of PR-1, PR-2, PR-3, POD, and PPO genes in the infected leaves of three potato cultivars were estimated by quantitative real-time PCR. We can conclude that the PLRV-infection of potato plants inhibited the expression of the five PR genes. On the contrary, infected leaves by PLRV elevated the expression of some defense genes. This interaction may also induce and/or suppress the expression of some genes responsible for the plant's defense mechanisms.

Keywords: PLRV, pathogenesis-related proteins (PRs), DD-PCR, sequence, real-time PCR

Procedia PDF Downloads 103
7 A Team-Based Learning Game Guided by a Social Robot

Authors: Gila Kurtz, Dan Kohen Vacs

Abstract:

Social robots (SR) is an emerging field striving to deploy computers capable of resembling human shapes and mimicking human movements, gestures, and behaviors. The evolving capability of SR to interact with human offers groundbreaking ways for learning and training opportunities. Studies show that SR can offer instructional experiences for fostering creativity, entertainment, enjoyment, and curiosity. These added values are essential for empowering instructional opportunities as gamified learning experiences. We present our project focused on deploying an activity to be experienced in an escape room aimed at team-based learning scaffolded by an SR, NAO. An escape room is a well-known approach for gamified activities focused on a simulated scenario experienced by team-based participants. Usually, the simulation takes place in a physical environment where participants must complete a series of challenges in a limited amount of time. During this experience, players learn something about the assigned topic of the room. In the current learning simulation, students must "save the nation" by locating sensitive information stolen and stored in a vault of four locks. Team members have to look for hints and solve riddles mediated by NAO. Each solution provides a unique code for opening one of the four locks. NAO is also used to provide ongoing feedback on the team's performance. We captured the proceeding of our activity and used it to conduct an evaluation study among ten experts in related areas. The experts were interviewed on their overall assessment of the learning activity and their perception of the added value related to the robot. The results were very encouraging on the feasibility that NAO can serve as a motivational tutor in adults' collaborative game-based learning. We believe that this study marks the first step toward a template for developing innovative team-based training using escape rooms supported by a humanoid robot.

Keywords: social robot, NAO, learning, team based activity, escape room

Procedia PDF Downloads 47
6 Fusion of Finger Inner Knuckle Print and Hand Geometry Features to Enhance the Performance of Biometric Verification System

Authors: M. L. Anitha, K. A. Radhakrishna Rao

Abstract:

With the advent of modern computing technology, there is an increased demand for developing recognition systems that have the capability of verifying the identity of individuals. Recognition systems are required by several civilian and commercial applications for providing access to secured resources. Traditional recognition systems which are based on physical identities are not sufficiently reliable to satisfy the security requirements due to the use of several advances of forgery and identity impersonation methods. Recognizing individuals based on his/her unique physiological characteristics known as biometric traits is a reliable technique, since these traits are not transferable and they cannot be stolen or lost. Since the performance of biometric based recognition system depends on the particular trait that is utilized, the present work proposes a fusion approach which combines Inner knuckle print (IKP) trait of the middle, ring and index fingers with the geometrical features of hand. The hand image captured from a digital camera is preprocessed to find finger IKP as region of interest (ROI) and hand geometry features. Geometrical features are represented as the distances between different key points and IKP features are extracted by applying local binary pattern descriptor on the IKP ROI. The decision level AND fusion was adopted, which has shown improvement in performance of the combined scheme. The proposed approach is tested on the database collected at our institute. Proposed approach is of significance since both hand geometry and IKP features can be extracted from the palm region of the hand. The fusion of these features yields a false acceptance rate of 0.75%, false rejection rate of 0.86% for verification tests conducted, which is less when compared to the results obtained using individual traits. The results obtained confirm the usefulness of proposed approach and suitability of the selected features for developing biometric based recognition system based on features from palmar region of hand.

Keywords: biometrics, hand geometry features, inner knuckle print, recognition

Procedia PDF Downloads 188
5 Consolidating a Regime of State Terror: A Historical Analysis of Necropolitics and the Evolution of Policing Practices in California as a Former Colony, Frontier, and Late-Modern Settler Society

Authors: Peyton M. Provenzano

Abstract:

This paper draws primarily upon the framework of necropolitics and presents California as itself a former frontier, colony, and late-modern settler society. The convergence of these successive and overlapping regimes of state terror is actualized and traceable through an analysis of historical and contemporary police practices. At the behest of the Spanish Crown and with the assistance of the Spanish military, the Catholic Church led the original expedition to colonize California. The indigenous populations of California were subjected to brutal practices of confinement and enslavement at the missions. After the annex of California by the United States, the western-most territory became an infamous frontier where new settlers established vigilante militias to enact violence against indigenous populations to protect their newly stolen land. Early mining settlements sought to legitimize and fund vigilante violence by wielding the authority of rudimentary democratic structures. White settlers circulated petitions for funding to establish a volunteer company under California’s Militia Law for ‘protection’ against the local indigenous populations. The expansive carceral practices of Los Angelinos at the turn of the 19th century exemplify the way in which California solidified its regime of exclusion as a white settler society. Drawing on recent scholarship that queers the notion of biopower and names police as street-level sovereigns, the police murder of Kayla Moore is understood as the latest manifestation of a carceral regime of exclusion and genocide. Kayla Moore was an African American transgender woman living with a mental health disability that was murdered by Berkeley police responding to a mental health crisis call in 2013. The intersectionality of Kayla’s identity made her hyper-vulnerable to state-sanctioned violence. Kayla was a victim not only of the explicitly racial biopower of police, nor the regulatory state power of necropolitics but of the ‘asphyxia’ that was intended to invisibilize both her life and her murder.

Keywords: asphyxia, biopower, california, carceral state, genocide, necropolitics, police, police violence

Procedia PDF Downloads 105
4 Complimentary Allusions: Shawl Scenes in Rossellini, Lean, Fellini, Kubrick, and Bertolucci Films

Authors: Misha Nedeljkovich

Abstract:

In the film’s famous scene (Roma città aperta-1945), Pina (Anna Magnani) collapses in the street when machined-gunned by a German soldier. Her son Marcello (Vito Annchiarico) tries to revive her. Her death is signaling not closure, but the cycle of life; Marcello saves Francesco with the shawl taken from his mother’s corpse. One pivotal scene in Brief Encounter (1945) occurs in the apartment of Alec’s (Trevor Howard) friend Stephen (Valentine Dyall), when Stephen returns to catch Alec and Laura (Celia Johnson) together alone. David Lean directs this scene using her shawl as a sign of in flagrante delicto. In La Strada (1954), Gelsomina (Giulietta Masina) was waving good bye when her mother sensing impending doom changed her mind and desperately tried to stop her waving back with her shawl: Don’t go my daughter! Your shawl! Your shawl! Gelsomina refuses to return, waving back: It’s time to go! Stanley Kubrick’s tale of a boxer who crosses a mobster to win the heart of a lady, Killer’s Kiss (1955), reminds us that Times Square used to contain sweaty boxing gyms and dance halls. The film’s longest Times Square interlude is its oddest: the boxer Davie Gordon played by Jamie Smith has his shawl stolen by two playful men in Shriners’ hats who are silent except for one who blows a harmonica, faintly heard over honking cabs and overheard conversations. This long sequence appears to be joining in on directors’ shawl conversations with Kubrick’s own twist. Principle characters will never know why all this happened to them that evening. Love, death, happiness and everlasting misery all of that is caused by Dave’s shawl. Finally, the decade of cinematic shawl conversations conclude in Betolucci’s Before the Revolution (Prima della rivoluzione–1964). One of his character’s lifts up a shawl asking if this was a Rossellini’s shawl. I argue that exploring complimentary allusions in a film where directors are acknowledging their own great debt to another film or filmmaker will further our knowledge of film history adding both depth and resonance to the great works in cinema.

Keywords: allusions, Bertolucci, Fellini, homage, Kubrick, lean, Rossellini

Procedia PDF Downloads 363
3 An Interpretative Historical Analysis of Asylum and Refugee Policies and Attitudes to Australian Immigration Laws

Authors: Kamal Kithsiri Karunadasa Hewawasam Revulge

Abstract:

This paper is an interpretative historical analysis of Australian migration laws that examines asylum and refugee policies and attitudes in Australia. It looks at major turning points in Australian migration history, and in doing so, the researcher reviewed relevant literature on the aspects crucial to highlighting the current trend of Australian migration policies. The data was collected using secondary data from official government sources, including annual reports, media releases on immigration, inquiry reports, statistical information, and other available literature to identify critical historical events that significantly affected the systematic developments of asylum seekers and refugee policies in Australia and to look at the historical trends of official thinking. A reliance on using these official sources is justified as those are the most convincing sources to analyse the historical events in Australia. Additional literature provides us with critical analyses of the behaviour and culture of the Australian immigration administration. The analytical framework reviewed key Australian Government immigration policies since British colonization and the settlement era of 1787–the 1850s and to the present. The fundamental basis for doing so is that past events and incidents offer us clues and lessons relevant to the present day. Therefore, providing a perspective on migration history in Australia helps analyse how current policymakers' strategies developed and changed over time. Attention is also explicitly focused on Australian asylum and refugee policy internationally, as it helped to broaden the analysis. The finding proved a link between past events and adverse current Australian government policies towards asylum seekers and refugees. It highlighted that Australia's current migration policies are part of a carefully and deliberately planned pattern that arose from the occupation of Australia by early British settlers. In this context, the remarkable point is that the historical events of taking away children from their Australian indigenous parents, widely known as the 'stolen generation' reflected a model of assimilation, or a desire to absorb other cultures into Australian society by fully adopting the settlers' language, their culture, and losing indigenous people's traditions. Current Australian policies towards migrants reflect the same attitude. Hence, it could be argued that policies and attitudes towards asylum seekers and refugees, particularly so-called 'boat people' to some extent, still reflect Australia's earlier colonial and 'white Australia' history.

Keywords: migration law, refugee law, international law, administrative law

Procedia PDF Downloads 43
2 Passivization: as Syntactic Argument Decreasing Parameter in Boro

Authors: Ganga Brahma

Abstract:

Boro employs verbs hooked up with morphemes which lead verbs to adjust with their arguments and hence, affecting the whole of sentence structures. This paper is based on few such syntactic parameters which are usually considered as argument decreasing parameters in linguistic works. Passivizing of few transitive clauses which are usually construed from the verbs occurring with certain morphemes and representation in middle constructions are few of such strategies which lead to conceptualizing of decreasing of syntactic arguments from a sentence. This paper focuses on the mentioned linguistic strategies and attempts to describe the linguistic processes as for how these parameters work in languages especially by concentrating on a particular Tibeto-Burman language i.e. Boro. Boro is a Tibeto-Burman language widely spoken in parts of the north-eastern regions of India. It has an agglutinative nature in forming words as well as clauses. There is a morpheme ‘za’ which means ‘to happen, become’ in Boro whose appearances with verb roots denotes an idea of the subject being passivized. Passivization, usually has notions that it is a reversed representation of its active sentence forms in the terms of argument placements. (However, it is not accountably true as passives and actives have some distinct features of their own and independent of one and the other.) This particular work will concentrate on the semantics of passivization at the same time along with its syntactic reality. The verb khɑo meaning ‘to steal’ offers a sense of passivization with the appearance of the morpheme zɑ which means ‘to happen, become’ (e.g Zunu-ɑ lama-ɑo phɯisɑ khɑo-zɑ-bɑi; Junu-NOM road-LOC money steal-PASS-PRES: Junu got her money stolen on the road). The focus, here, is more on the argument placed at the subject position (i.e. Zunu) and the event taken place. The semantics of such construction asks for the agent because without an agent the event could not have taken place. However, the syntactic elements fill the slots of relegated or temporarily deleted agent which, infact, is the actual subject cum agent in its active representation. Due to the event marker ‘zɑ’ in this presentation it affords to reduce one participant from such a situation which in actual is made up of three participants. Hence, the structure of di-transitive construction here reduces to mono-transitive structure. Unlike passivization, middle construction does not allow relegation of the agents. It permanently deletes agents. However, it also focuses on the fore-grounded subject and highlighting on the changed states on the subjects which happens to be the underlying objects of their respective transitive structures (with agents). This work intends to describe how these two parameters which are different at their semantic realization can meet together at a syntactic level in order to create a linguistic parameter that decreases participants from their actual structures which are with more than one participant.

Keywords: argument-decrease, middle-construction, passivization, transitivity-intransitivity

Procedia PDF Downloads 209
1 RE:SOUNDING a 2000-Year-Old Vietnamese Dong Son Bronze Drum; Artist-Led Collaborations outside the Museum to Challenge the Impasse of Repatriating and Rematriating Cultural Instruments

Authors: H. A. J. Nguyen, V. A. Pham

Abstract:

RE:SOUNDING is an ongoing research project and artwork seeking to return the sound and knowledge of Dong Son bronze drums back to contemporary musicians. Colonial collections of ethnographic instruments are problematic in how they commit acts of conceptual, cultural, and acoustic silencing. The collection (or more honestly), the plagiarism, and pillaging of these instruments have systemically separated them from living and breathing cultures. This includes diasporic communities, who have come to resettle in close proximity - but still have little access - to the museums and galleries that display their cultural objects. Despite recent attempts to 'open up' and 'recognise' the tensions and violence of these ethnographic collections, many museums continue to structurally organize and reproduce knowledge with the same procedural distance and limitations of imperial condescension. Impatient with the slowness of these museums, our diaspora led collaborations participated in the opaque economy of the auction market to gain access and begin the process of digitally recording and archiving the actual sounds of the ancient Dong Son drum. This self-directed, self-initiated artwork not only acoustically reinvigorated an ancient instrument but redistributed these sonic materials back to contemporary musicians, composers, and their diasporic communities throughout Vietnam, South East Asia, and Australia. Our methodologies not only highlight the persistent inflexibility of museum infrastructures but demand that museums refrain from their paternalistic practice of risk-averse ownership, to seriously engage with new technologies and political formations that require all public institutions to be held accountable for the ethical and intellectual viability of their colonial collections. The integrated and practical resolve of diasporic artists and their communities are more than capable of working with new technologies to reclaim and reinvigorate what is culturally and spiritually theirs. The motivation to rematriate – as opposed to merely repatriate – the acoustic legacies of these instruments to contemporary musicians and artists is a new model for decolonial and restorative practices. Exposing the inadequacies of western scholarship that continues to treat these instruments as discreet, disembodied, and detached artifacts, these collaborative strategies have thus far produced a wealth of new knowledge – new to the west perhaps – but not that new to these, our own communities. This includes the little-acknowledged fact that the Dong Son drum were political instruments of war and technology, rather than their simplistic description in the museum and western academia as agrarian instruments of fertility and harvest. Through the collective and continued sharing of knowledge and sound materials produced from this research, these drums are gaining a contemporary relevance beyond the cultural silencing of the museum display cabinet. Acknowledgement: We acknowledge the Wurundjeri and Boon Wurrung of the Kulin Nation and the Gadigal of the Eora Nation where we began this project. We pay our respects to the Peoples, Lands, Traditional Custodians, Practices, and Creator Ancestors of these Great Nations, as well as those First Nations peoples throughout Australia, Vietnam, and Indonesia, where this research continues, and upon whose stolen lands and waterways were never ceded.

Keywords: acoustic archaeology, decolonisation, museum collections, rematriation, repatriation, Dong Son, experimental music, digital recording

Procedia PDF Downloads 112