Search results for: border crimes
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 618

Search results for: border crimes

408 Rapid Detection of Cocaine Using Aggregation-Induced Emission and Aptamer Combined Fluorescent Probe

Authors: Jianuo Sun, Jinghan Wang, Sirui Zhang, Chenhan Xu, Hongxia Hao, Hong Zhou

Abstract:

In recent years, the diversification and industrialization of drug-related crimes have posed significant threats to public health and safety globally. The widespread and increasingly younger demographics of drug users and the persistence of drug-impaired driving incidents underscore the urgency of this issue. Drug detection, a specialized forensic activity, is pivotal in identifying and analyzing substances involved in drug crimes. It relies on pharmacological and chemical knowledge and employs analytical chemistry and modern detection techniques. However, current drug detection methods are limited by their inability to perform semi-quantitative, real-time field analyses. They require extensive, complex laboratory-based preprocessing, expensive equipment, and specialized personnel and are hindered by long processing times. This study introduces an alternative approach using nucleic acid aptamers and Aggregation-Induced Emission (AIE) technology. Nucleic acid aptamers, selected artificially for their specific binding to target molecules and stable spatial structures, represent a new generation of biosensors following antibodies. Rapid advancements in AIE technology, particularly in tetraphenyl ethene-based luminous, offer simplicity in synthesis and versatility in modifications, making them ideal for fluorescence analysis. This work successfully synthesized, isolated, and purified an AIE molecule and constructed a probe comprising the AIE molecule, nucleic acid aptamers, and exonuclease for cocaine detection. The probe demonstrated significant relative fluorescence intensity changes and selectivity towards cocaine over other drugs. Using 4-Butoxytriethylammonium Bromide Tetraphenylethene (TPE-TTA) as the fluorescent probe, the aptamer as the recognition unit, and Exo I as an auxiliary, the system achieved rapid detection of cocaine within 5 mins in aqueous and urine, with detection limits of 1.0 and 5.0 µmol/L respectively. The probe-maintained stability and interference resistance in urine, enabling quantitative cocaine detection within a certain concentration range. This fluorescent sensor significantly reduces sample preprocessing time, offers a basis for rapid onsite cocaine detection, and promises potential for miniaturized testing setups.

Keywords: drug detection, aggregation-induced emission (AIE), nucleic acid aptamer, exonuclease, cocaine

Procedia PDF Downloads 26
407 Women Right in Islam and Misconceptions: A Critical Study

Authors: Abubakar Ibrahim Usman, Mustapha Halilu

Abstract:

The provisions of rights to women in Islam have generated and are creating a tense and serious debate among Muslims and non-Muslims alike. The Muslims are arguing that Islam provides right to Womenfolk, but their actions, cultural/traditional practices, and treatment reveal otherwise, Non-Muslims, on the other hand, held a different view, saying that Islam has never made such provision. One may not blame their misconception, due to the wide spectrum of treatment given to women in many Muslim societies, which generated, fueled and geared the misconceptions and ceaseless barrage of sensational articles, movies and negative portrayal of Islam today. It has to put in our minds, many actions and Crimes of some Muslims (Who are mostly minority) did not represent the teachings and precepts of Islam, just like one cannot put blame on the parents of a child whose actions fall short of his home background.

Keywords: Islam, women rights, cultural practices, religion

Procedia PDF Downloads 404
406 Study on Impact of Existence of an Open Boundary Foreign Enclave and a 24-Hours Open Corridor for Foreigners inside Indian Territory

Authors: Debarshi Bhattacharya

Abstract:

In 2015, historic Land Boundary Agreement (LBA) executed between India and Bangladesh finally settled almost seven decades long overdue critical enclave problems of the two neighbouring countries. Enclaves within India and Bangladesh were the awful outcome of the partition of India in 1947. As a dire consequence, the populace within these enclaves enormously suffered from getting basic rights and opportunities and governmental support services till long 67 years after India’s independence and partition. As per LBA, 2015, 51 Bangladeshi (BD) enclaves inside Indian territory and 111 Indian enclaves inside Bangladesh territory were actually transferred to each other. But, by virtue of LBA, 1974 executed earlier between the two countries, one BD enclave situated inside India, namely Dohogram-Angarpota (D-A) twin enclave, had not yet been exchanged by means of LBA, 2015 and it still remains as an integral part, may not be contiguous, of Bangladesh completely surrounded by Indian territory. A study was undertaken through an extensive field survey to assess the impact of the existence of D-A BD enclave inside Indian territory from India’s perspective. Field survey was conducted for the purpose in the form of an interview, group discussion, questionnaire survey, personal interaction etc. to gather information from the Indian people residing adjacent to D-A enclave and Tin Bigha Corridor (TBC), people of D-A enclave, officials of Border Security Forces of India and Bangladesh, public representatives, representatives of political organizations etc. The issue of the existence of D-A BD enclave inside Indian territory seriously brought apprehension of future problems to the people of Kuchlibari Region of Mekhligunj Block, India, on its contiguity with Indian mainland due to 24-hour open access for the BD people through TBC. The anxiety of the local Indian people regarding threats to the national security of India as well as to the law and order issues of the locality due to the open border of D-A BD enclave in the region. On the other hand, it was observed that 24 hours opening of TBC brought significant positive changes to the people of D-A BD enclave in terms of their socio-economic condition and security status.

Keywords: enclave, exchange of enclaves, land boundary agreement, Dohogram-Angarpota (D-A) Bangladeshi (BD) enclave, Tin Bigha Corridor

Procedia PDF Downloads 52
405 Decolonial Aesthetics in Ronnie Govender’s at the Edge and Other Cato Manor Stories

Authors: Rajendra Chetty

Abstract:

Decolonial aesthetics departs and delinks from colonial ideas about ‘the arts’ and the modernist/colonial work of aesthetics. Education is trapped in the western epistemic and hermeneutical vocabulary, hence it is necessary to introduce new concepts and work the entanglement between co-existing concepts. This paper will discuss the contribution of Ronnie Govender, a South African writer, to build decolonial sensibilities and delink from the grand narrative of the colonial and apartheid literary landscape in Govender’s text, At the Edge and other Cato Manor Stories. Govender uses the world of art to make a decolonial statement. Decolonial artists have to work in the entanglement of power and engage with a border epistemology. Govender’s writings depart from an embodied consciousness of the colonial wound and moves toward healing. Border thinking and doing (artistic creativity) is precisely the decolonial methodology posited by Linda T. Smith, where theory comes in the form of storytelling. Govender’s stories engage with the wounds infringed by racism and patriarchy, two pillars of eurocentric knowing, sensing, and believing that sustain a structure of knowledge. This structure is embedded in characters, institutions, languages that regulate and mange the world of the excluded. Healing is the process of delinking, or regaining pride, dignity, and humanity, not through the psychoanalytic cure, but the popular healer. The legacies of the community of Cato Manor that was pushed out of their land are built in his stories. Decoloniality then is a concept that carries the experience of liberation struggles and recognizes the strenuous conditions of marginalized people together with their strength, wisdom, and endurance. Govender’s unique performative prose reconstructs and resurrects the lives of the people of Cato Manor, their vitality and humor, pain and humiliation: a vibrant and racially integrated community destroyed by the regime’s notorious racial laws. The paper notes that Govender’s objective with his plays and stories was to open windows to both the pain and joy of life; a mission that is not didactic but to shine a torch on both mankind’s waywardness as well as its inspiring and often moving achievements against huge odds.

Keywords: Govender, decoloniality, delinking, exclusion, racism, Cato Manor

Procedia PDF Downloads 126
404 Reduction of Process of Evidence in Specific Forms of Criminal Proceeding: Problems and Risks

Authors: Filip Ščerba, Veronika Pochylá

Abstract:

Performing of the acts within criminal proceedings usually takes too long and thus this phenomenon can be regarded as one of the most burning problems which have plagued the criminal justice not only in the Czech Republic but at least all over Europe for the last few decades. This problem obviously has to be dealt with and thus the need to tackle this issue has resulted in the trend which is sometimes called Criminal Justice Rationalization, i.e. introducing and enforcing methods supporting the increase in efficiency of the criminal justice in order to make the criminal proceedings shorter and administrative procedure easier. This resulted in the introduction of institutes such as e.g. diversions in criminal proceedings or other forms of shortened pre-trial proceedings, which may be used primarily for dealing with less serious crimes. But also the institute, which was originally mentioned in connection with the system of criminal law in the countries belonging to the Anglo-Saxon legal order where it is frequently called of plea bargaining, has been introduced into the criminal law of many European countries, and it may be applied also in cases of serious crimes. All these special and shortened forms of criminal proceedings are connected with limited extent of process of evidence; in fact, some of these specific forms of criminal proceedings are designed for the purpose to simplify the process of evidence. That is also the reason, why some of these procedures are conditioned with the defendant’s confession. Main hypothesis: Limited process of evidence represents also a potential conflict with certain fundamental principles upon which the criminal proceeding in the Continental legal system is based. (A conflict with principle of material truth may be considered as the most important problem. This principle states that the bodies in criminal proceedings must clarify the facts of the case beyond reasonable doubt to such extent that a decision can be made; the defendant’s confession does not mean that these bodies are freed from the duty to review all the circumstances and facts of the case. Such principle is typical for criminal law in Central European region.) Basic methodologies: The paper is going to analyze such a problem of weakening of the principle of material truth in modern criminal law. Such analysis will be provided primarily on the base of the Czech criminal law, but also other legal regulations will be taken into consideration, and its result may have some relevance for all legal regulations belonging to the Continental legal system, so the paper offers also a comparison with legal systems of other Central European countries.

Keywords: burden of proof, central European countries, criminal justice rationalization, criminal proceeding, Czech legislation, Czech republic, defendant, diversions, evidence, fundamental principles, plea bargaining, pre-trial proceedings, principle of material truth, process of evidence, process of evidence

Procedia PDF Downloads 257
403 Computer Fraud from the Perspective of Iran's Law and International Documents

Authors: Babak Pourghahramani

Abstract:

One of the modern crimes against property and ownership in the cyber-space is the computer fraud. Despite being modern, the aforementioned crime has its roots in the principles of religious jurisprudence. In some cases, this crime is compatible with the traditional regulations and that is when the computer is considered as a crime commitment device and also some computer frauds that take place in the context of electronic exchanges are considered as crime based on the E-commerce Law (approved in 2003) but the aforementioned regulations are flawed and until recent years there was no comprehensive law in this regard; yet after some years the Computer Crime Act was approved in 2009/26/5 and partly solved the problem of legal vacuum. The present study intends to investigate the computer fraud according to Iran's Computer Crime Act and by taking into consideration the international documents.

Keywords: fraud, cyber fraud, computer fraud, classic fraud, computer crime

Procedia PDF Downloads 302
402 Genetic Testing and Research in South Africa: The Sharing of Data Across Borders

Authors: Amy Gooden, Meshandren Naidoo

Abstract:

Genetic research is not confined to a particular jurisdiction. Using direct-to-consumer genetic testing (DTC-GT) as an example, this research assesses the status of data sharing into and out of South Africa (SA). While SA laws cover the sending of genetic data out of SA, prohibiting such transfer unless a legal ground exists, the position where genetic data comes into the country depends on the laws of the country from where it is sent – making the legal position less clear.

Keywords: cross-border, data, genetic testing, law, regulation, research, sharing, South Africa

Procedia PDF Downloads 125
401 Grisotti Flap as Treatment for Central Tumors of the Breast

Authors: R. Pardo, P. Menendez, MA Gil-Olarte, S. Sanchez, E. García, R. Quintana, J. Martín

Abstract:

Introduction : Within oncoplastic breast techniques there is increased interest in immediate partial breast reconstruction. The volume resected is greater than that of conventional conservative techniques. Central tumours of the breast have classically been treated with a mastectomy with regard to oncological safety and cosmetic secondary effects after wide central resection of the nipple and breast tissue beneath. Oncological results for central quadrantectomy have a recurrence level, disease- free period and survival identical to mastectomy. Grissoti flap is an oncoplastic surgical technique that allows the surgeon to perform a safe central quadrantectomy with excellent cosmetic results. Material and methods: The Grissoti flap is a glandular cutaneous advancement rotation flap that can fill the defect in the central portion of the excised breast. If the inferior border is affected by tumour and further surgery is decided upon at the Multidisciplinary Team Meeting, it will be necessary to perform a mastectomy. All patients with a Grisotti flap undergoing surgery since 2009 were reviewed obtaining the following data: age, hystopathological diagnosis, size, operating time, volume of tissue resected, postoperative admission time, re-excisions due to positive margins affected by tumour, wound dehiscence, complications and recurrence. Analysis and results of sentinel node biopsy were also obtained. Results: 12 patients underwent surgery between 2009-2015. The mean age was 54 years (34-67) . All had a preoperative diagnosis of ductal infiltrative carcinoma of less than 2 cm,. Diagnosis was made with Ultrasound, Mamography or both . Magnetic resonance was used in 5 cases. No patients had preoperative positive axilla after ultrasound exploration. Mean operating time was 104 minutes (84-130). Postoperative stay was 24 hours. Mean volume resected was 159 cc (70-286). In one patient the surgical border was affected by tumour and a further procedure with resection of the affected border was performed as ambulatory surgery. The sentinel node biopsy was positive for micrometastasis in only two cases. In one case lymphadenectomy was performed in 2009. In the other, treated in 2015, no lymphadenectomy was performed as the patient had a favourable histopathological prognosis and the multidisciplinary team meeting agreed that lymphadenectomy was not required. No recurrence has been diagnosed in any of the patients who underwent surgery and they are all disease free at present. Conclusions: Conservative surgery for retroareolar central tumours of the breast results in good local control of the disease with free surgical borders, including resection of the nipple areola complex and pectoral major muscle fascia. Reconstructive surgery with the inferior Grissoti flap adequately fills the defect after central quadrantectomy with creation of a new cutaneous disc where a new nipple areola complex is reconstructed with a local flap or micropigmentation. This avoids the need for contralateral symmetrization. Sentinel Node biopsy can be performed without added morbidity. When feasible, the Grissoti flap will avoid skin-sparing mastectomy for central breast tumours that will require the use of an expander, prosthesis or myocutaneous flap, with all the complications of a more complex operation.

Keywords: Grisotti flap, oncoplastic surgery, central tumours, breast

Procedia PDF Downloads 294
400 Comparative Outlook of Teacher Education in Nigeria and India

Authors: Muhammad Badamasi Abdullahi

Abstract:

Teacher education, both pre- and in-service programs, is offered in many countries of the world by different teacher education institutions as declared in the Policies on Education of the countries. However, differences exist from one country to another as a result of some factors peculiar to them. Notwithstanding, there also exist similarities among them in regard to teacher education. This paper is expected to dig into teacher education programs in Nigeria and India so that areas of similarities and differences would be highlighted as well as provide a venue for possible recommendation of both countries to learn from one another. All this is directed towards providing a no -border approach in enhancing effective teaching and learning.

Keywords: teacher education, teaching and learning, pre-service, in-service

Procedia PDF Downloads 348
399 The Analysis of the Effectiveness of the Children’s Act of 2009 in Curbing Child Sexual Abuse: A Case Study of Francistown and the Surrounding Areas

Authors: Gabaikanngwe Ethel Mambo, Kinyanjui Godfrey Gichuhi

Abstract:

The study analysed the Children’s Act of 2009 of Botswana in curbing child sexual abuse (CSA) in Francistown and its surroundings. The qualitative methodology was used to collect data. Retrospective reports of CSA were obtained from various departments dealing with children. The research findings revealed the ineffectiveness of the Children’s Act of 2009 in identifying and preventing CSA. The Act has failed to deter or prevent the offenders from committing crimes against children. The study demonstrated an increase in CSA cases that were never reported. Lack of skills by the justice system exacerbated sexual molestation. The study also revealed that most CSA cases were underreported. Lastly, the study demonstrated those child victims were sexually molested by someone known to them.

Keywords: sexual abuse, molestation, incest, child

Procedia PDF Downloads 70
398 An Enhanced Digital Forensic Model for Internet of Things Forensic

Authors: Tina Wu, Andrew Martin

Abstract:

The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices.

Keywords: acquisition, Internet of Things, model, zoning

Procedia PDF Downloads 236
397 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 236
396 Data Access, AI Intensity, and Scale Advantages

Authors: Chuping Lo

Abstract:

This paper presents a simple model demonstrating that ceteris paribus countries with lower barriers to accessing global data tend to earn higher incomes than other countries. Therefore, large countries that inherently have greater data resources tend to have higher incomes than smaller countries, such that the former may be more hesitant than the latter to liberalize cross-border data flows to maintain this advantage. Furthermore, countries with higher artificial intelligence (AI) intensity in production technologies tend to benefit more from economies of scale in data aggregation, leading to higher income and more trade as they are better able to utilize global data.

Keywords: digital intensity, digital divide, international trade, scale of economics

Procedia PDF Downloads 35
395 Human Rights Abuse in the Garment Factory in Bekasi Indonesia

Authors: Manotar Tampubolon

Abstract:

Although the Indonesian human rights protection has increased in recent years, but human rights violations still occur in the industrial sector. Crimes against human rights continue to occur and go unnoticed in spite of the government's legislation on human rights, employment law in addition to an international treaty that has been ratified by Indonesia. The increasing number of garment companies in Bekasi, also give rise to increased human rights violations since the government does not have a commitment to protect it. The Indonesian government and industry owners should pay attention to and protect the human rights of workers and treat them accordingly. This paper will review the human rights violations experienced by workers at garment factories in the context of the law, as well as ideas to improve the protection of workers' rights.

Keywords: human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 423
394 Entropy in a Field of Emergence in an Aspect of Linguo-Culture

Authors: Nurvadi Albekov

Abstract:

Communicative situation is a basis, which designates potential models of ‘constructed forms’, a motivated basis of a text, for a text can be assumed as a product of the communicative situation. It is within the field of emergence the models of text, that can be potentially prognosticated in a certain communicative situation, are designated. Every text can be assumed as conceptual system structured on the base of certain communicative situation. However in the process of ‘structuring’ of a certain model of ‘conceptual system’ consciousness of a recipient is able act only within the border of the field of emergence for going out of this border indicates misunderstanding of the communicative situation. On the base of communicative situation we can witness the increment of meaning where the synergizing of the informative model of communication, formed by using of the invariant units of a language system, is a result of verbalization of the communicative situation. The potential of the models of a text, prognosticated within the field of emergence, also depends on the communicative situation. The conception ‘the field of emergence’ is interpreted as a unit of the language system, having poly-directed universal structure, implying the presence of the core, the center and the periphery, including different levels of means of a functioning system of language, both in terms of linguistic resources, and in terms of extra linguistic factors interaction of which results increment of a text. The conception ‘field of emergence’ is considered as the most promising in the analysis of texts: oral, written, printed and electronic. As a unit of the language system field of emergence has several properties that predict its use during the study of a text in different levels. This work is an attempt analysis of entropy in a text in the aspect of lingua-cultural code, prognosticated within the model of the field of emergence. The article describes the problem of entropy in the field of emergence, caused by influence of the extra-linguistic factors. The increasing of entropy is caused not only by the fact of intrusion of the language resources but by influence of the alien culture in a whole, and by appearance of non-typical for this very culture symbols in the field of emergence. The borrowing of alien lingua-cultural symbols into the lingua-culture of the author is a reason of increasing the entropy when constructing a text both in meaning and in structuring level. It is nothing but artificial formatting of lexical units that violate stylistic unity of a phrase. It is marked that one of the important characteristics descending the entropy in the field of emergence is a typical similarity of lexical and semantic resources of the different lingua-cultures in aspects of extra linguistic factors.

Keywords: communicative situation, field of emergence, lingua-culture, entropy

Procedia PDF Downloads 333
393 Strategic Alliances of US Engineering and Construction Companies in China

Authors: Zonggui Chen, Yuhong Wang, Yun Le

Abstract:

U.S. engineering and construction companies have increased their presence in China. A strategy for them to enter and operate in China is to forge strategic alliances with local firms. Managing the differences in motives and cultures and using proper controls are essential for a productive strategic alliance. Based on literature and in-depth interviews, this paper examines the differences in motives and cultures within Sino–U.S. strategic alliances and the impacts of the differences on control mechanisms. This paper not only contributes to a better understanding of cross-border strategic alliances in construction, but also facilitates the operation of the alliances.

Keywords: strategic alliance, Chinese construction industry, motives, cultural differences

Procedia PDF Downloads 295
392 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 127
391 Mental Health Impacts of COVID-19 on Diverse Youth and Families in Canada

Authors: Lucksini Raveendran

Abstract:

Introduction: This mixed-methods study focuses on the experiences of ethnocultural youth and families in Canada, identifying key barriers and opportunities to inform service programming and policies that can better meet their mental health needs during the COVID-19 pandemic and beyond. Methods: Mental Health Commission of Canada's Headstrong initiative administered the youth survey (April – June 2020) and family survey (June – August 2020) with a total sample size of 137 and 481 respondents, respectively. Thematic analysis was conducted to identify key challenges faced, coping strategies used, and help-seeking behaviours. A similar approach was also applied to the family survey data, but instead, a representative sample was collated to analyze geographically variable and ethnically diverse subgroups. Results and analysis: Multiple challenges have impacted families, including increased feelings of loneliness and distress from border travel restrictions, especially among those navigating pregnancy alone or managing children with developmental needs, which is often understudied. Also, marginalized groups were disproportionately affected by inequitable access to communication technologies, further deepening the digital divide. Some reported living in congregated homes with regular conflicts, thus leading to increased anxiety and exposure to violence. For many families, urbanicity and ethnicity played a key role in how families reported coping with feelings of uncertainty while managing work commitments, navigating community resources, fulfilling care responsibilities, and homeschooling children of all ages. Despite these challenges, there was evidence of post-traumatic growth and building community resiliency. Conclusions and implications for policy, practice, or additional research: There is a need to foster opportunities to promote and sustain mental health, wellness, and resilience for families through social connections. Also, intersectionality must be embedded in the collection, analysis, and application of data to improve equitable access to evidence-based and recovery-oriented mental health supports among diverse families in Canada. Lastly, address future research on the long-term COVID-19 impacts of travel border restrictions on family wellness.

Keywords: mental health, youth mental health, family wellness, health equity

Procedia PDF Downloads 57
390 Language Transfer in Graduate Candidates’ Essays

Authors: Erika Martínez Lugo

Abstract:

Candidates to some graduate studies are asked to write essays in English to prove their competence to write essays and to do it in English. In the present study, language transfer (LT) in 15 written essays is identified, documented, analyzed, and classified. The essays were written in 2019, and the graduate program is a Masters in Modern Languages in a North-Western Mexican city border with USA. This study is of interest since it is important to determine whether or not some errors have been fossilized and have become mistakes, or if it is part of the candidates’ interlanguage. The results show that most language transfer is negative and syntactic, where the influence of candidates L1 (Spanish) is evident in their use of L2 (English).

Keywords: language transfer, cross-linguistic influence, interlanguage, error vs mistake

Procedia PDF Downloads 147
389 Criminal Liability for Criminal Tax

Authors: Theresia Simatupang dan Rahmayanti

Abstract:

Tax Law is a legal product and therefore should be subject to the legal norms, both about this actions, implementation, and about the material. Law has always aimed at providing justice, and besides that the law as a tool used to organize the order or rule of law. tax classification of a crime in this is very necessary, because the crime of taxation is very detrimental to the country and is still very high in society and socialization associated with punishment in sentencing that would have to provide a deterrent for the perpetrators, so refer to the this, these criminal offenses can endanger the stability of the nation's economy and the country that require special snacks. The application of legal sanctions against the perpetrators of the crime of taxation already has a strong legal basis, namely UU KUP. UU KUP have loaded threat (sanctions) severe punishment for tax payers who commit offenses and crimes in the field of taxation, which is contained in Article 38, and Article 39, Article 41, Article 41 A, and 41 B as well as Article 43 of Law and Law No. 12 KUP about 1985 Land Tax and Building. Criminal sanctions against violators of the tax provision are important because tax payers sanctions for violating tax laws.

Keywords: accountability, tax crime, criminal liability, taxation

Procedia PDF Downloads 318
388 Member States 'Perception of Threat' to Migration Crises as a Determinant Factor of Change in Cooperation: A Comparison between the Yugoslav Migration Crisis and the Syrian Refugees' Crisis

Authors: Diego Caballero Vélez

Abstract:

In 1997 the Schengen Convention was incorporated in the mainstream of EU law by the Amsterdam Treaty. It came into effect in 1999 with the abolition of internal border controls in the EU, a milestone in the European integration project. In the meantime, due to the Yugoslav wars, nearly 700,000 asylum applications were filed in the European countries provoking a major refugee crisis. During this period, the opening of Eastern Europe fostered more cooperation and policy-making at the EU level in migration issues. Currently, a similar migratory crisis is taking place in Europe. The Syrian war has caused the most massive influx of immigrants in Europe since World War II. Nevertheless, the EU is adopting different migration policies from those implemented during the Yugoslav migration crisis. The current crisis has not led to a common European position but national responses have been offered on migration policies and responsibility for border security and asylum-seekers. A lot of factors can explain this change from a cooperation scenario to a no cooperation one, such as the economic crisis, but this research is focused on the premise that 'threat perception' lies at the core of some states grand strategies towards migration and it also influences in multilateral or unilateral responses. Migration rests at the nexus of three dimensions of security, including geopolitical interests, material production, and internal security. According to some scholars, migration policy is an 'integral instrument' of state grand strategy in that context. Political integration at the EU might be altered with the emergence of existential threats. In other words, some areas of the European cooperation can be transformed when a 'critical juncture' occurs, for instance a migration crisis. In that instance, Member states could see migration as a matter of threat that modifies their national interests and willingness to embrace international cooperation. This research will focus on EU Member states´ perceptions of the 90´s migration crisis and the current one. The goal is to evaluate to what extent the perceptions of threat are one of the main factors for explaining the transition from a cooperation scenario to a no-cooperation one in European asylum and security policies. To analyze threat perception in both migration crisis, some relevant Member states are treated as cases of study and a comparative analysis is carried out based on public opinion polls, public and policy discourse in migration, voting practices and deconstruction of the migration policies themselves both at EU level and a national one.

Keywords: cooperation, migration crisis, national responses, threat perception

Procedia PDF Downloads 212
387 A Brief Overview of Seven Churches in Van Province

Authors: Eylem Güzel, Soner Guler, Mustafa Gulen

Abstract:

Van province which has a very rich historical heritage is located in eastern part of Turkey, between Lake Van and the Iranian border. Many civilizations prevailing in Van until today have built up many historical structures such as castles, mosques, churches, bridges, baths, etc. In 2011, a devastating earthquake with magnitude 7.2 Mw, epicenter in Tabanlı Village, occurred in Van, where a large part of the city locates in the first-degree earthquake zone. As a result of this earthquake, 644 people were killed; a lot of reinforced, unreinforced and historical structures were badly damaged. Many historical structures damaged due to this earthquake have been restored. In this study, the damages observed in Seven churches (Yedi Kilise) after 2011 Van earthquake is evaluated with regard to architecture and civil engineering perspective.

Keywords: earthquake, historical structures, Van province, church

Procedia PDF Downloads 513
386 Hydrological Benefits Sharing Concepts in Constructing Friendship Dams on Transboundary Tigris River Between Iraq and Turkey

Authors: Thair Mahmood Altaiee

Abstract:

Because of the increasing population and the growing water requirements from the transboundary water resources within riparian countries in addition to un-proper management of these transboundary water resources, it is likely that a conflicts on the water will be occurred. So it is mandatory to search solutions to mitigate the action and probabilities of these undesired conflicts. One of the solutions for these crises may be sharing the riparian countries in the management of their transboundary water resources and share benefit. Effective cooperation on a transboundary river is any action by the riparian countries that lead to improve management of the river to their mutual acceptance. In principle, friendship dams constructed by riparian countries may play an important role in preventing conflicts like the Turkish-Syrian friendship dam on Asi river (Orontes), Iranian-Tukmenistan dam on Hariroud river, Bulgarian-Turkish dam on Tundzha river, Brazil-Paraguay dam on Parana river, and Aras dam between Iran and Azerbaijan. The objective of this study is to focus the light on the hydrological aspects of cooperation in constructing dams on the transboundary rivers, which may consider an option to prevent conflicts on water between the riparian countries. The various kinds of benefits and external impacts associated with cooperation in dams construction on the transboundary rivers with a real examples will be presented and analyzed. The hydrological benefit sharing from cooperation in dams construction, which type of benefit sharing mechanisms are applicable to dams, and how they vary were discussed. The study considered the cooperative applicability to dams on shared rivers according to selected case study of friendship dams in the world to illustrate the relevance of the cooperation concepts and the feasibility of such propose cooperation between Turkey and Iraq within the Tigris river. It is found that the opportunities of getting benefit from cooperation depend mainly on the hydrological boundary and location of the dam in relation to them. The desire to cooperate on dams construction on transboundary rivers exists if the location of a dam upstream will increase aggregate net benefits. The case studies show that various benefit sharing mechanisms due to cooperation in constructing friendship dams on the riparian countries border are possible for example when the downstream state (Iraq) convinces the upstream state (Turkey) to share building a dam on Tigris river across the Iraqi –Turkish border covering the cost and sharing the net benefit derived from this dam. These initial findings may provide guidance for riparian states engaged in and donors facilitating negotiation on dam projects on transboundary rivers.

Keywords: friendship dams, transboundary rivers, water cooperation, benefit sharing

Procedia PDF Downloads 114
385 Prison Reforms: An Overview of the Nigerian Prisons as a Key Component of an Efficient Criminal Justice Delivery System

Authors: Foluke Dada

Abstract:

Prisons all over the world are set up by law to provide restraint and custody for individuals accused or convicted of crimes by the state. The Nigerian prison dates back to the colonial era and is modelled after the British system. It is a system that lays emphasis on punishment and deterrence. It emphasises retribution rather than reformation. These, it can be argued, results in the inhuman conditions of Nigerian prisons and the conscienceless treatment of convicts and awaiting trial inmates in Nigerian prisons. This paper attempts an examination of the challenges currently beguiling Nigerian prisons, the need for reforms in the prison systems and the imperative of these reforms to an efficient criminal justice delivery system in the country. This paper further postulates that rehabilitation should be favoured as against retribution f the development of the Nigerian criminal justice system in line with the shift towards reform.

Keywords: criminal justice, human rights, prison reforms, rehabilitation and retribution

Procedia PDF Downloads 640
384 The Sociological and Legal Study of Sexual Assault in Nigeria

Authors: Adeshina Francis Akindutre, Adebolarin Adekanle

Abstract:

Sexual assault is often considered as the most extreme form of violence that degrades and humiliates women in society. It is a widespread public health and psychological problem in Nigeria. Criminologically, sexual assaults have been considered as one of the several violent crimes targeted specifically at women and perpetrated by men. This paper attempts to examine the types of sexual assaults in Nigeria, the strategies used by the offenders, the causes, the psychological effects on the victims and the possible solutions of sexual assaults. This work also, examines the law prohibiting sexual assault in Nigeria. The authors made use of three theories: the victim precipitation approach, the feminist approach, and the psychological approach which explain why sexual assault takes place in society. Finally, it takes the Stockholm Syndrome into consideration (the treatment of victims).

Keywords: feminist, victims, offenders, psychological, sexual assault, Stockholm Syndrome

Procedia PDF Downloads 525
383 Meeting the Energy Balancing Needs in a Fully Renewable European Energy System: A Stochastic Portfolio Framework

Authors: Iulia E. Falcan

Abstract:

The transition of the European power sector towards a clean, renewable energy (RE) system faces the challenge of meeting power demand in times of low wind speed and low solar radiation, at a reasonable cost. This is likely to be achieved through a combination of 1) energy storage technologies, 2) development of the cross-border power grid, 3) installed overcapacity of RE and 4) dispatchable power sources – such as biomass. This paper uses NASA; derived hourly data on weather patterns of sixteen European countries for the past twenty-five years, and load data from the European Network of Transmission System Operators-Electricity (ENTSO-E), to develop a stochastic optimization model. This model aims to understand the synergies between the four classes of technologies mentioned above and to determine the optimal configuration of the energy technologies portfolio. While this issue has been addressed before, it was done so using deterministic models that extrapolated historic data on weather patterns and power demand, as well as ignoring the risk of an unbalanced grid-risk stemming from both the supply and the demand side. This paper aims to explicitly account for the inherent uncertainty in the energy system transition. It articulates two levels of uncertainty: a) the inherent uncertainty in future weather patterns and b) the uncertainty of fully meeting power demand. The first level of uncertainty is addressed by developing probability distributions for future weather data and thus expected power output from RE technologies, rather than known future power output. The latter level of uncertainty is operationalized by introducing a Conditional Value at Risk (CVaR) constraint in the portfolio optimization problem. By setting the risk threshold at different levels – 1%, 5% and 10%, important insights are revealed regarding the synergies of the different energy technologies, i.e., the circumstances under which they behave as either complements or substitutes to each other. The paper concludes that allowing for uncertainty in expected power output - rather than extrapolating historic data - paints a more realistic picture and reveals important departures from results of deterministic models. In addition, explicitly acknowledging the risk of an unbalanced grid - and assigning it different thresholds - reveals non-linearity in the cost functions of different technology portfolio configurations. This finding has significant implications for the design of the European energy mix.

Keywords: cross-border grid extension, energy storage technologies, energy system transition, stochastic portfolio optimization

Procedia PDF Downloads 140
382 A Method to Enhance the Accuracy of Digital Forensic in the Absence of Sufficient Evidence in Saudi Arabia

Authors: Fahad Alanazi, Andrew Jones

Abstract:

Digital forensics seeks to achieve the successful investigation of digital crimes through obtaining acceptable evidence from digital devices that can be presented in a court of law. Thus, the digital forensics investigation is normally performed through a number of phases in order to achieve the required level of accuracy in the investigation processes. Since 1984 there have been a number of models and frameworks developed to support the digital investigation processes. In this paper, we review a number of the investigation processes that have been produced throughout the years and introduce a proposed digital forensic model which is based on the scope of the Saudi Arabia investigation process. The proposed model has been integrated with existing models for the investigation processes and produced a new phase to deal with a situation where there is initially insufficient evidence.

Keywords: digital forensics, process, metadata, Traceback, Sauid Arabia

Procedia PDF Downloads 317
381 Formulation Policy of Criminal Sanction in Indonesian Criminal Justice System

Authors: Dini Dewi Heniarti

Abstract:

This One of criminal sanctions that are often imposed by the judge is imprisonment. The issue on the imposition of imprisonment has been subject of contentious debate and criticism among various groups for a long time. In practice, the problematics of imprisonment lead to complicated problems. The impact of the reckless imposition of the imprisonment includes among others overcapacity of the correctional institution and increasing crimes within the correctional facilities. Therefore, there is a need for renewal of the existing condemnation paradigm, considering the developing phenomena associated with the penal imposition. Imprisonment as one element of the Indonesian penal system is an important and integral part of the other elements. The philosophy of the current penal system, which still refers to the Criminal Code, still carries the values of retaliation and fault-finding toward the offender. Therefore, it is important to reconstruct a new thought in order to realize a penal system that is represented in the formulation of a more humanistic criminal sanction

Keywords: criminal code, criminal sanction, Indonesian legal system, reconstruction of thought

Procedia PDF Downloads 200
380 Social and Psychological Contexts of Male-Perpetrators of Violence against Women

Authors: Mythri Kukkaje

Abstract:

Information about the social and psychological contexts that operate as a breeding ground for perpetrators of violence against women in India is scarce. To understand the social and psychological contexts that form the bases of violent behaviour in male-perpetrators against women, interviews were conducted with 13 men above the age of 18 years, who were convicted for their crimes against women. Using thematic analysis, the nurturance and the social background of the perpetrators, determined by their social relationships, the socio-economic status, the extent of substance abuse, the history of experiencing and witnessing violence and their cultural context, were found to define the social context. The nature and the psychological background of the perpetrators determined by the thoughts and beliefs regarding gender and violence, the motivation behind their violent behaviour and a few specific personality traits were found to define the psychological context. These factors on their own, as well as an interaction between them, could be responsible for varying degrees of violence against women.

Keywords: perpetrator, psychological, social, violence against women

Procedia PDF Downloads 194
379 Radiographic Evaluation of Odontogenic Keratocyst: A 14 Years Retrospective Study

Authors: Nor Hidayah Reduwan, Jira Chindasombatjaroen, Suchaya Pornprasersuk-Damrongsri, Sopee Pomsawat

Abstract:

INTRODUCTION: Odontogenic keratocyst (OKC) remain as a controversial pathologic entity under the scrutiny of many researchers and maxillofacial surgeons alike. The high recurrence rate and relatively aggressive nature of this lesion demand a meticulous analysis of the radiographic characteristic of OKC leading to the formulation of an accurate diagnosis. OBJECTIVE: This study aims to determine the radiographic characteristic of odontogenic keratocyst (OKC) using conventional radiographs and cone beam computed tomography (CBCT) images. MATERIALS AND METHODS: Patients histopathologically diagnosed as OKC from 2003 to 2016 by Oral and Maxillofacial Pathology Department were retrospectively reviewed. Radiographs of these cases from the archives of the Department of Oral and Maxillofacial Radiology, Faculty of Dentistry Mahidol University were retrieved. Assessment of the location, shape, border, cortication, locularity, the relationship of lesion to embedded tooth, displacement of adjacent tooth, root resorption and bony expansion of the lesion were conducted. RESULTS: Radiographs of 91 patients (44 males, 47 females) with the mean age of 31 years old (10 to 84 years) were analyzed. Among all patients, 5 cases were syndromic patients. Hence, a total of 103 OKCs were studied. The most common location was at the ramus of mandible (32%) followed by posterior maxilla (29%). Most cases presented as a well-defined unilocular radiolucency with smooth and corticated border. The lesion was in associated with embedded tooth in 48 lesions (47%). Eighty five percent of embedded tooth are impacted 3rd molar. Thirty-seven percentage of embedded tooth were entirely encapsulated in the lesion. The lesion attached to the embedded tooth at the cementoenamel junction (CEJ) in 40% and extended to part of root in 23% of cases. Teeth displacement and root resorption were found in 29% and 6% of cases, respectively. Bony expansion in bucco-lingual dimension was seen in 63% of cases. CONCLUSION: OKCs were predominant in the posterior region of the mandible with radiographic features of a well-defined, unilocular radiolucency with smooth and corticated margin. The lesions might relate to an embedded tooth by surrounding an entire tooth, attached to the CEJ level or extending to part of root. Bony expansion could be found but teeth displacement and root resorption were not common. These features might help in giving the differential diagnosis.

Keywords: cone beam computed tomography, imaging dentistry, odontogenic keratocyst, radiographic features

Procedia PDF Downloads 103