Search results for: crime pattern theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7277

Search results for: crime pattern theory

7217 Artificial Intelligence and Police

Authors: Mehrnoosh Abouzari

Abstract:

Artificial intelligence has covered all areas of human life and has helped or replaced many jobs. One of the areas of application of artificial intelligence in the police is to detect crime, identify the accused or victim and prove the crime. It will play an effective role in implementing preventive justice and creating security in the community, and improving judicial decisions. This will help improve the performance of the police, increase the accuracy of criminal investigations, and play an effective role in preventing crime and high-risk behaviors in society. This article presents and analyzes the capabilities and capacities of artificial intelligence in police and similar examples used worldwide to prove the necessity of using artificial intelligence in the police. The main topics discussed include the performance of artificial intelligence in crime detection and prediction, the risk capacity of criminals and the ability to apply arbitray institutions, and the introduction of artificial intelligence programs implemented worldwide in the field of criminal investigation for police.

Keywords: police, artificial intelligence, forecasting, prevention, software

Procedia PDF Downloads 172
7216 Examining Risk Based Approach to Financial Crime in the Charity Sector: The Challenges and Solutions, Evidence from the Regulation of Charities in England and Wales

Authors: Paschal Ohalehi

Abstract:

Purpose - The purpose of this paper, which is part of a PhD thesis is to examine the role of risk based approach in minimising financial crime in the charity sector as well as offer recommendations to improving the quality of charity regulation whilst still retaining risk based approach as a regulatory framework and also making a case for a new regulatory model. Increase in financial crimes in the charity sector has put the role of regulation in minimising financial crime up for debates amongst researchers and practitioners. Although previous research has addressed the regulation of charities, research on the role of risk based approach to minimising financial crime in the charity sector is limited. Financial crime is a concern for all organisation including charities. Design/methodology/approach - This research adopts a social constructionist’s epistemological position. This research is carried out using semi structured in-depth interviews amongst randomly selected 24 charity trustees divided into three classes: 10 small charities, 10 medium charities and 4 large charities. The researcher also interviewed 4 stakeholders (NFA, Charity Commission and two different police forces in terms of size and area of coverage) in the charity sector. Findings - The results of this research show that reliance on risk based approach to financial crime in the sector is weak and fragmented with the research pointing to a clear evidence of disconnect between the regulator and the regulated leading to little or lack of regulation of trustees’ activities, limited monitoring of charities and lack of training and awareness on financial crime in the sector. Originality – This paper shows how regulation of charities in general and risk based approach in particular can be improved in order to meet the expectations of the stakeholders, the public, the regulator and the regulated.

Keywords: risk, risk based approach, financial crime, fraud, self-regulation

Procedia PDF Downloads 340
7215 The Evolution and Driving Forces Analysis of Urban Spatial Pattern in Tibet Based on Archetype Theory

Authors: Qiuyu Chen, Bin Long, Junxi Yang

Abstract:

Located in the southwest of the "roof of the world", Tibet is the origin center of Tibetan Culture.Lhasa, Shigatse and Gyantse are three famous historical and cultural cities in Tibet. They have always been prominent political, economic and cultural cities, and have accumulated the unique aesthetic orientation and value consciousness of Tibet's urban construction. "Archetype" usually refers to the theoretical origin of things, which is the collective unconscious precipitation. The archetype theory fundamentally explores the dialectical relationship between image expression, original form and behavior mode. By abstracting and describing typical phenomena or imagery of the archetype object can observe the essence of objects, explore ways in which object phenomena arise. Applying archetype theory to the field of urban planning helps to gain insight, evaluation, and restructuring of the complex and ever-changing internal structural units of cities. According to existing field investigations, it has been found that Dzong, Temple, Linka and traditional residential systems are important structural units that constitute the urban space of Lhasa, Shigatse and Gyantse. This article applies the thinking method of archetype theory, starting from the imagery expression of urban spatial pattern, using technologies such as ArcGIS, Depthmap, and Computer Vision to descriptively identify the spatial representation and plane relationship of three cities through remote sensing images and historical maps. Based on historical records, the spatial characteristics of cities in different historical periods are interpreted in a hierarchical manner, attempting to clarify the origin of the formation and evolution of urban pattern imagery from the perspectives of geopolitical environment, social structure, religious theory, etc, and expose the growth laws and key driving forces of cities. The research results can provide technical and material support for important behaviors such as urban restoration, spatial intervention, and promoting transformation in the region.

Keywords: archetype theory, urban spatial imagery, original form and pattern, behavioral driving force, Tibet

Procedia PDF Downloads 24
7214 Optimized Dynamic Bayesian Networks and Neural Verifier Test Applied to On-Line Isolated Characters Recognition

Authors: Redouane Tlemsani, Redouane, Belkacem Kouninef, Abdelkader Benyettou

Abstract:

In this paper, our system is a Markovien system which we can see it like a Dynamic Bayesian Networks. One of the major interests of these systems resides in the complete training of the models (topology and parameters) starting from training data. The Bayesian Networks are representing models of dubious knowledge on complex phenomena. They are a union between the theory of probability and the graph theory in order to give effective tools to represent a joined probability distribution on a set of random variables. The representation of knowledge bases on description, by graphs, relations of causality existing between the variables defining the field of study. The theory of Dynamic Bayesian Networks is a generalization of the Bayesians networks to the dynamic processes. Our objective amounts finding the better structure which represents the relationships (dependencies) between the variables of a dynamic bayesian network. In applications in pattern recognition, one will carry out the fixing of the structure which obliges us to admit some strong assumptions (for example independence between some variables).

Keywords: Arabic on line character recognition, dynamic Bayesian network, pattern recognition, networks

Procedia PDF Downloads 583
7213 Fear of Gender-Based Crime and Women Empowerment: An Empirical Study among the Urban Residents of Bangladesh

Authors: Mohammad Ashraful Alam, Biro Judit

Abstract:

Fear of gender-based crime and fear of crime victimization for women is a major concern in the urban areas of Bangladesh. Based on the recent data from various human rights organizations and international literature the study found that gender-based crime especially sexual assault and rape are increasing in Bangladesh at a significant rate in comparison to other countries. The major focus of the study was to identify the relationship between fear of gender-based crime and women empowerment. To explore the fact the study followed the mixed methodological approach comprising with quantitative and qualitative methods and used secondary information from national and international sources. Corresponding global pictures the present study found that gender, age, complexion, social position, and ethnicity were more common factors of sexual assault and victimization in Bangladesh which lead to women become more fearful about crime victimization than men. Fear of gender-based crime traumatizes women which leads to withdrawal of their non-essential everyday works and some time from the essential works based on their social position, financial status, and social honor in the society. The increasing crime rate also increases the propensity to fear of criminal victimization, traumatization, and feeling of helplessness which make them vulnerable. The patriarchal culture and practices in Bangladesh based on religious culture and established social norms women always feel defenseless therefore they withdraw themselves from various social activities and own interest. Women who have already victimized feel more fear and become traumatized, and who do not victimize yet but know the severity of victimization from the media and others’ have the feeling of fear of crime. Women who find themselves as weak bonding and low networks with their neighbors and living for a short duration have a feeling of more fear and avoid visiting a certain place in a certain time and avoid some social activities. The study found the young women have more possibilities to become victimized through the feeling of fear of crime is higher among elderly women than young. Though women feel fear of all kinds of crime but usually all aged women are more fearful of sexual assault and rape than other violent crimes. Therefore, elderly women and another person in the family does not allow younger girls to go and involve outside activities to secure their family status. On the other hand, fear of crime in public transport is more common to all aged women at a higher level and sometimes they compromise their freedom, independence, financial opportunities, the job only to avoid the perceived threat, and save their social and cultural honor. The study also explores that fear of crime does not always depend on crime rate but the crime news, the severity of the crime, delay justice, the ineffectiveness of police, bail of criminals, corruption and political favoritism, etc. Finally, the study shows that the fear of gender-based crime and violence is working as a potential barrier to ensuring women's empowerment in Bangladesh.

Keywords: compromise personal freedom, fear of crime, fear of gender-based crime, fear of violent crime victimization, rape, sexual assaults, withdrawal from regular activities, women empowerment

Procedia PDF Downloads 109
7212 An Assessment on the Impact of Community Policing in Crime Prevention and Control in Fagge Local Government Area, Kano State, Nigeria

Authors: Aliyu Shitu Said

Abstract:

One of the major setbacks of every society is the proliferation of crimes that results in the inducement of fear, destruction of properties and loss of lives of people. The rising incidence of crime and general insecurity rate in the society and the inability of the policing agencies to curtail the menace necessitated the introduction of community policing in order to have a collaborative effort with community members in addressing the problem of crime. Thus, this study assessed the impact of community policing in crime prevention and control in Fagge Local Government area, Kano State, Nigeria. The study also examined the elements, roles, and challenges of community policing in crime prevention and control in the study area. The study adopted Broken Window and Routine Activity theories as frame of analysis. Mixed methods of data collection (quantitative and qualitative) were utilized for the study. Multi stage and purposive sampling techniques were adopted in selection of the study population. A total of 308 respondents were sampled for the study. These include 300 members of the public who were sampled through a multi stage sampling for questionnaire administration and 8 other respondents who were purposively sampled for in-depth interview. Findings of the study revealed that community policing has significant impact on crime prevention and control in the study area. Findings of the study further revealed that the elements and roles of community policing are effective and fully utilized, and there is cordial relationship between the police and the community members in the study area. This study therefore recommends that government should provide adequate support to community policing programmes and give more awareness to public, so as to boost the morale of the community in having a collaborative effort with the police in crime prevention and control.

Keywords: community, policing, crime, prevention, control

Procedia PDF Downloads 39
7211 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 41
7210 The Role of Digital Technology in Crime Prevention: A Case Study of Cellular Forensics Unit, Capital City Police Peshawar

Authors: Muhammad Ashfaq

Abstract:

Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies, and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries, and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police. A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals. Latest digital analysis software should be provided to equip the Cellular Forensic Unit.

Keywords: criminology-pakistan, crime prevention-KP, digital forensics, digital technology-pakistan

Procedia PDF Downloads 60
7209 Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor

Authors: Jonathan W. Z. Lim, Vrizlynn L. L. Thing

Abstract:

Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.

Keywords: crime motivations, crime prevention, cybercrime, ex-cyber criminals

Procedia PDF Downloads 109
7208 Aporia, Daze and Arcanes during Visit to Scene of Crime: A Case History

Authors: A. S. Grewal, Sh. Dharambir, R. S. Sangwan, Vikas Dhanda

Abstract:

Every Scene of Crime is of different kind in nature. Sometimes we see such type of circumstances that we become confused to judge whether the case is of homicide or suicide. In such circumstances a doyen is asked for the option. On the basis of his esoteric knowledge he finds such clues which force the sleuth to change the under sections of Indian penal Code. Here we have examined a case by visiting Scene of Crime and found that a person was found lying dead in a room. There was only one passage which was found opened, the pistol along with the fired cartridge case, misfired cartridge were lying on the spot. Observation method, mathematical calculations, chemical examination and other aspects were considered.

Keywords: country-made pistol, misfired cartridge, fired cartridge case, blackening, nitrite

Procedia PDF Downloads 368
7207 Application of Biosensors in Forensic Analysis

Authors: Shirin jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani

Abstract:

Biosensors in forensic analysis are ideal biological tools that can be used for rapid and sensitive initial screening and testing to detect of suspicious components like biological and chemical agent in crime scenes. The wide use of different biomolecules such as proteins, nucleic acids, microorganisms, antibodies and enzymes makes it possible. These biosensors have great advantages such as rapidity, little sample manipulation and high sensitivity, also Because of their stability, specificity and low cost they have become a very important tool to Forensic analysis and detection of crime. In crime scenes different substances such as rape samples, Semen, saliva fingerprints and blood samples, act as a detecting elements for biosensors. On the other hand, successful fluid recovery via biosensor has the propensity to yield a highly valuable source of genetic material, which is important in finding the suspect. Although current biological fluid testing techniques are impaired for identification of body fluids. But these methods have disadvantages. For example if they are to be used simultaneously, Often give false positive result. These limitations can negatively result the output of a case through missed or misinterpreted evidence. The use of biosensor enable criminal researchers the highly sensitive and non-destructive detection of biological fluid through interaction with several fluid-endogenous and other biological and chemical contamination at the crime scene. For this reason, using of the biosensors for detecting the biological fluid found at the crime scenes which play an important role in identifying the suspect and solving the criminal.

Keywords: biosensors, forensic analysis, biological fluid, crime detection

Procedia PDF Downloads 1069
7206 Victim and Active Subject of the Crime of Violence in Family Reflected in the Criminal Code of the Republic of Moldova

Authors: Nastas Andrei

Abstract:

Ensuring accessible and functional justice is one of the priority objectives of judicial reform, and protecting the family against any acts that may harm its existence is one of the first priorities that have determined the need to defend the social order. In this context, the correlative approach of the victim and the aggressor becomes relevant as a subject of the crime of domestic violence. Domestic violence is a threat of physical, moral, or material harm, externalized now or in the past, or its provocation, which is characterized by a constant tendency to escalate and a high probability of repetitiveness in the relationship between the social partners, regardless of their legal status or domicile.Studying the legal support to identify the particularities of the victim and the subject of the crime of domestic violence facilitates the identification of the determinants of this crime, therefore, the development of means to prevent domestic violence. The scientific research has been effectuated on the base of the proper and authentic empirical data obtained from the analysis of the judicial practice in the matter of domestic violence, as well as being based on the most recent scientific issues in the field of the Substantive Criminal Law and other branches of science (criminology, psychology, sociology, pedagogy). As a result of the study performed, there have been formulated conclusions and interpretations able to be used in the science of the Substantive Criminal law, as well as in the practice of application of the legal norm in the matter of domestic violence.

Keywords: family violence, victim, crime, violence

Procedia PDF Downloads 75
7205 Community Perceptions and Attitudes Regarding Wildlife Crime in South Africa

Authors: Louiza C. Duncker, Duarte Gonçalves

Abstract:

Wildlife crime is a complex problem with many interconnected facets, which are generally responded to in parts or fragments in efforts to “break down” the complexity into manageable components. However, fragmentation increases complexity as coherence and cooperation become diluted. A whole-of-society approach has been developed towards finding a common goal and integrated approach to preventing wildlife crime. As part of this development, research was conducted in rural communities adjacent to conservation areas in South Africa to define and comprehend the challenges faced by them, and to understand their perceptions of wildlife crime. The results of the research showed that the perceptions of community members varied - most were in favor of conservation and of protecting rhinos, only if they derive adequate benefit from it. Regardless of gender, income level, education level, or access to services, conservation was perceived to be good and bad by the same people. Even though people in the communities are poor, a willingness to stop rhino poaching does exist amongst them, but their perception of parks not caring about people triggered an attitude of not being willing to stop, prevent or report poaching. Understanding the nuances, the history, the interests and values of community members, and the drivers behind poaching mind-sets (intrinsic or driven by transnational organized crime) is imperative to create sustainable and resilient communities on multiple levels that make a substantial positive impact on people’s lives, but also conserve wildlife for posterity.

Keywords: community perceptions, conservation, rhino poaching, whole-of-society approach, wildlife crime

Procedia PDF Downloads 212
7204 Influence of Socio-Economic Factors on Crime Perpetuation Among Inmates of Correctional Facilities in South-West Nigeria

Authors: Ebenezer Bayode Agboola

Abstract:

The study investigated the influence of socioeconomic factors on crime perpetuation among inmates of correctional facilities in South West Nigeria. A sample size of two hundred and forty-four inmates was drawn from Ado, Akure and Ilesha correctional facilities. The sample size consisted of both male and female inmates. Individual inmate was drawn through systematic sampling with the use of inmates’ register at the correctional facilities. The study employed a mixed design, which allowed the blend of both quantitative and qualitative methods. For the quantitative method, data was collected through the use of a questionnaire and for the qualitative method; data was collected with the aid of an in-depth interview (ID. Four research questions were raised for the study and analysed descriptively using simple frequency count and percentage. Five research hypotheses were formulated for the study and tested using Analysis of Variance (ANOVA) and Multiple Regressions. Based on the data analysis, findings revealed that there was a significant relationship between family history and perpetuation of crime among inmates. Though no significant relationship was found between employment and the perpetuation of crime, however, the rate of crime perpetuation by individuals was significantly found to be related to peer pressure. Also, the study further found that there was a significant relationship between the use of substances and perpetuation of crime. Lastly, it was found that there was a significant relationship between family history, employment, and peer pressure. The study recommended that Parents should pay adequate attention to their children, especially during the adolescent stage and that the Government should enact relevant laws that will checkmate the rising involvement of young people in cybercrime or internet fraud.

Keywords: crime, socio economic factor, inmates, correctional facilities, Southwest

Procedia PDF Downloads 46
7203 Design of an Air and Land Multi-Element Expression Pattern of Navigation Electronic Map for Ground Vehicles under United Navigation Mechanism

Authors: Rui Liu, Pengyu Cui, Nan Jiang

Abstract:

At present, there is much research on the application of centralized management and cross-integration application of basic geographic information. However, the idea of information integration and sharing between land, sea, and air navigation targets is not deeply applied into the research of navigation information service, especially in the information expression. Targeting at this problem, the paper carries out works about the expression pattern of navigation electronic map for ground vehicles under air and land united navigation mechanism. At first, with the support from multi-source information fusion of GIS vector data, RS data, GPS data, etc., an air and land united information expression pattern is designed aiming at specific navigation task of emergency rescue in the earthquake. And then, the characteristics and specifications of the united expression of air and land navigation information under the constraints of map load are summarized and transferred into expression rules in the rule bank. At last, the related navigation experiment is implemented to evaluate the effect of the expression pattern. The experiment selects evaluation factors of the navigation task accomplishment time and the navigation error rate as the main index, and make comparisons with the traditional single information expression pattern. To sum up, the research improved the theory of navigation electronic map and laid a certain foundation for the design and realization of united navigation system in the aspect of real-time navigation information delivery.

Keywords: navigation electronic map, united navigation, multi-element expression pattern, multi-source information fusion

Procedia PDF Downloads 165
7202 Preparedness for Microbial Forensics Evidence Collection on Best Practice

Authors: Victor Ananth Paramananth, Rashid Muniginin, Mahaya Abd Rahman, Siti Afifah Ismail

Abstract:

Safety issues, scene protection, and appropriate evidence collection must be handled in any bio crime scene. There will be a scene or multi-scene to be cordoned for investigation in any bio-incident or bio crime event. Evidence collection is critical in determining the type of microbial or toxin, its lethality, and its source. As a consequence, from the start of the investigation, a proper sampling method is required. The most significant challenges for the crime scene officer would be deciding where to obtain samples, the best sampling method, and the sample sizes needed. Since there could be evidence in liquid, viscous, or powder shape at a crime scene, crime scene officers have difficulty determining which tools to use for sampling. To maximize sample collection, the appropriate tools for sampling methods are necessary. This study aims to assist the crime scene officer in collecting liquid, viscous, and powder biological samples in sufficient quantity while preserving sample quality. Observational tests on sample collection using liquid, viscous, and powder samples for adequate quantity and sample quality were performed using UV light in this research. The density of the light emission varies upon the method of collection and sample types. The best tools for collecting sufficient amounts of liquid, viscous, and powdered samples can be identified by observing UV light. Instead of active microorganisms, the invisible powder is used to assess sufficient sample collection during a crime scene investigation using various collection tools. The liquid, powdered and viscous samples collected using different tools were analyzed using Fourier transform infrared - attenuate total reflection (FTIR-ATR). FTIR spectroscopy is commonly used for rapid discrimination, classification, and identification of intact microbial cells. The liquid, viscous and powdered samples collected using various tools have been successfully observed using UV light. Furthermore, FTIR-ATR analysis showed that collected samples are sufficient in quantity while preserving their quality.

Keywords: biological sample, crime scene, collection tool, UV light, forensic

Procedia PDF Downloads 170
7201 A Discovery on the Symmetrical Pattern of Mirror Primes in P²: Applications in the Formal Proof of the Goldbach Conjecture

Authors: Yingxu Wang

Abstract:

The base 6 structure and properties of mirror primes are discovered in this work towards the proof of Goldbach Conjecture. This paper reveals a fundamental pattern on pairs of mirror primes adjacent to any even number nₑ > 2 with symmetrical distances on both sides determined by a methodology of Mirror Prime Decomposition (MPD). MPD leads to a formal proof of the Goldbach conjecture, which states that the conjecture holds because any pivot even number, nₑ > 2, is a sum of at least an adjacent pair of primes divided by 2. This work has not only revealed the analytic pattern of base 6 primes but also proven the infinitive validation of the Goldbach conjecture.

Keywords: number theory, primes, mirror primes, double recursive patterns, Goldbach conjecture, formal proof, mirror-prime decomposition, applications

Procedia PDF Downloads 20
7200 A Novel Search Pattern for Motion Estimation in High Efficiency Video Coding

Authors: Phong Nguyen, Phap Nguyen, Thang Nguyen

Abstract:

High Efficiency Video Coding (HEVC) or H.265 Standard fulfills the demand of high resolution video storage and transmission since it achieves high compression ratio. However, it requires a huge amount of calculation. Since Motion Estimation (ME) block composes about 80 % of calculation load of HEVC, there are a lot of researches to reduce the computation cost. In this paper, we propose a new algorithm to lower the number of Motion Estimation’s searching points. The number of computing points in search pattern is down from 77 for Diamond Pattern and 81 for Square Pattern to only 31. Meanwhile, the Peak Signal to Noise Ratio (PSNR) and bit rate are almost equal to those of conventional patterns. The motion estimation time of new algorithm reduces by at 68.23%, 65.83%compared to the recommended search pattern of diamond pattern, square pattern, respectively.

Keywords: motion estimation, wide diamond, search pattern, H.265, test zone search, HM software

Procedia PDF Downloads 565
7199 Nudging the Criminal Justice System into Listening to Crime Victims in Plea Agreements

Authors: Dana Pugach, Michal Tamir

Abstract:

Most criminal cases end with a plea agreement, an issue whose many aspects have been discussed extensively in legal literature. One important feature, however, has gained little notice, and that is crime victims’ place in plea agreements following the federal Crime Victims Rights Act of 2004. This law has provided victims some meaningful and potentially revolutionary rights, including the right to be heard in the proceeding and a right to appeal against a decision made while ignoring the victim’s rights. While victims’ rights literature has always emphasized the importance of such right, references to this provision in the general literature about plea agreements are sparse, if existing at all. Furthermore, there are a few cases only mentioning this right. This article purports to bridge between these two bodies of legal thinking – the vast literature concerning plea agreements and victims’ rights research– by using behavioral economics. The article will, firstly, trace the possible structural reasons for the failure of this right to be materialized. Relevant incentives of all actors involved will be identified as well as their inherent consequential processes that lead to the victims’ rights malfunction. Secondly, the article will use nudge theory in order to suggest solutions that will enhance incentives for the repeat players in the system (prosecution, judges, defense attorneys) and lead to the strengthening of weaker group’s interests – the crime victims. Behavioral psychology literature recognizes that the framework in which an individual confronts a decision can significantly influence his decision. Richard Thaler and Cass Sunstein developed the idea of ‘choice architecture’ - ‘the context in which people make decisions’ - which can be manipulated to make particular decisions more likely. Choice architectures can be changed by adjusting ‘nudges,’ influential factors that help shape human behavior, without negating their free choice. The nudges require decision makers to make choices instead of providing a familiar default option. In accordance with this theory, we suggest a rule, whereby a judge should inquire the victim’s view prior to accepting the plea. This suggestion leaves the judge’s discretion intact; while at the same time nudges her not to go directly to the default decision, i.e. automatically accepting the plea. Creating nudges that force actors to make choices is particularly significant when an actor intends to deviate from routine behaviors but experiences significant time constraints, as in the case of judges and plea bargains. The article finally recognizes some far reaching possible results of the suggestion. These include meaningful changes to the earlier stages of criminal process even before reaching court, in line with the current criticism of the plea agreements machinery.

Keywords: plea agreements, victims' rights, nudge theory, criminal justice

Procedia PDF Downloads 300
7198 Analysis of Cooperative Learning Behavior Based on the Data of Students' Movement

Authors: Wang Lin, Li Zhiqiang

Abstract:

The purpose of this paper is to analyze the cooperative learning behavior pattern based on the data of students' movement. The study firstly reviewed the cooperative learning theory and its research status, and briefly introduced the k-means clustering algorithm. Then, it used clustering algorithm and mathematical statistics theory to analyze the activity rhythm of individual student and groups in different functional areas, according to the movement data provided by 10 first-year graduate students. It also focused on the analysis of students' behavior in the learning area and explored the law of cooperative learning behavior. The research result showed that the cooperative learning behavior analysis method based on movement data proposed in this paper is feasible. From the results of data analysis, the characteristics of behavior of students and their cooperative learning behavior patterns could be found.

Keywords: behavior pattern, cooperative learning, data analyze, k-means clustering algorithm

Procedia PDF Downloads 154
7197 Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings

Authors: Vanda Božić, Željko Nikač

Abstract:

Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime.

Keywords: trafficking in children, trafficking in human beings, child as a victim of human trafficking, children’s rights

Procedia PDF Downloads 333
7196 The Magic Bullet in Africa: Exploring an Alternative Theoretical Model

Authors: Daniel Nkrumah

Abstract:

The Magic Bullet theory was a popular media effect theory that defined the power of the mass media in altering beliefs and perceptions of its audiences. However, following the People's Choice study, the theory was said to have been disproved and was supplanted by the Two-Step Flow Theory. This paper examines the relevance of the Magic Bullet theory in Africa and establishes whether it is still relevant in Africa's media spaces and societies. Using selected cases on the continent, it adopts a grounded theory approach and explores a new theoretical model that attempts to enforce an argument that the Two-Step Flow theory though important and valid, was ill-conceived as a direct replacement to the Magic Bullet theory.

Keywords: magic bullet theory, two-step flow theory, media effects, african media

Procedia PDF Downloads 87
7195 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 237
7194 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria

Authors: Auwal Nata'ala

Abstract:

The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.

Keywords: cyber crimes, e-banking, policies, ICT

Procedia PDF Downloads 388
7193 Testifying in Court as a Victim of Crime for Persons with Little or No Functional Speech: Vocabulary Implications

Authors: Robyn White, Juan Bornman, Ensa Johnson

Abstract:

People with disabilities are at a high risk of becoming victims of crime. Individuals with little or no functional speech (LNFS) face an even higher risk. One way of reducing the risk of remaining a victim of crime is to face the alleged perpetrator in court as a witness – therefore it is important for a person with LNFS who has been a victim of crime to have the required vocabulary to testify in court. The aim of this study was to identify and describe the core and fringe legal vocabulary required by illiterate victims of crime, who have little or no functional speech, to testify in court as witnesses. A mixed-method, the exploratory sequential design consisting of two distinct phases was used to address the aim of the research. The first phase was of a qualitative nature and included two different data sources, namely in-depth semi-structured interviews and focus group discussions. The overall aim of this phase was to identify and describe core and fringe legal vocabulary and to develop a measurement instrument based on these results. Results from Phase 1 were used in Phase 2, the quantitative phase, during which the measurement instrument (a custom-designed questionnaire) was socially validated. The results produced six distinct vocabulary categories that represent the legal core vocabulary and 99 words that represent the legal fringe vocabulary. The findings suggested that communication boards should be individualised to the individual and the specific crime. It is believed that the vocabulary lists developed in this study act as a valid and reliable springboard from which communication boards can be developed. Recommendations were therefore made to develop an Alternative and Augmentative Communication Resource Tool Kit to assist the legal justice system.

Keywords: augmentative and alternative communication, person with little or no functional speech, sexual crimes, testifying in court, victim of crime, witness competency

Procedia PDF Downloads 452
7192 The Challenges Involved in Investigating and Prosecuting Hate Crime Online

Authors: Mark Williams

Abstract:

The digital revolution has radically transformed our social environment creating vast opportunities for interconnectivity and social interaction. This revolution, however, has also changed the reach and impact of hate crime, with social media providing a new platform to victimize and harass users in their homes. In this way, developments in the information and communication technologies have exacerbated and facilitated the commission of hate crime, increasing its prevalence and impact. Unfortunately, legislators, policymakers and criminal justice professionals have struggled to keep pace with these technological developments, reducing their ability to intervene in, regulate and govern the commission of hate crimes online. This work is further complicated by the global nature of this crime due to the tendency for offenders and victims to reside in multiple different jurisdictions, as well as the need for criminal justice professionals to obtain the cooperation of private companies to access information required for prosecution. Drawing on in-depth interviews with key criminal justice professionals and policymakers with detailed knowledge in this area, this paper examines the specific challenges the police and prosecution services face as they attempt to intervene in and prosecute the commission of hate crimes online. It is argued that any attempt to reduce online othering, such as the commission of hate crimes online, must be multifaceted, collaborative and involve both innovative technological solutions as well as internationally agreed ethical and legal frameworks.

Keywords: cybercrime, digital policing, hate crime, social media

Procedia PDF Downloads 186
7191 Sustainable Enterprise Theory: A Starting Point for Reporting Sustainable Business Values

Authors: Arne Fagerstrom, Gary Cunningham, Fredrik Hartwig

Abstract:

In this paper, a theory of sustainable enterprises, sustainable enterprise theory (SET), is developed. The sustainable enterprise theory can only be a valid theory if knowledge about life and nature is complete. Knowledge limitations should not stop enterprises from doing business with a goal of better long-term life on earth. Life demands stewardship of the resources used during one’s lifetime. This paper develops a model influenced by (the classical) enterprise theory and resource theory that includes more than money in the business activities of an enterprise. The sustainable enterprise theory is then used in an analysis of accountability and in discussions about sustainable businesses.

Keywords: sustainable business, sustainability reporting, sustainable values, theory of the firm

Procedia PDF Downloads 541
7190 Numerical Simulation of Erosion Control in Slurry Pump Casing by Geometrical Flow Pattern Modification Analysis

Authors: A. R. Momeninezhad

Abstract:

Erosion of Slurry Pumps in Related Industries, is one of the major costs in their production process. Many factories in extractive industries try to find ways to diminish this cost. In this paper, we consider the flow pattern modifications by geometric variations made of numerical simulation of flow inside pump casing, which is one of the most important parts analyzed for erosion. The mentioned pump is a cyclone centrifugal slurry pump, which is operating in Sarcheshmeh Copper Industries in Kerman-Iran, named and tagged as HM600 cyclone pump. Simulation shows many improvements in local wear information and situations for better and more qualified design of casing shape and impeller position, before and after geometric corrections. By theory of liquid-solid two-phase flow, the local wear defeats are analyzed and omitted.

Keywords: flow pattern, slurry pump, simulation, wear

Procedia PDF Downloads 425
7189 Investigating Salience Theory’s Implications for Real-Life Decision Making: An Experimental Test for Whether the Allais Paradox Exists under Subjective Uncertainty

Authors: Christoph Ostermair

Abstract:

We deal with the effect of correlation between prospects on human decision making under uncertainty as proposed by the comparatively new and promising model of “salience theory of choice under risk”. In this regard, we show that the theory entails the prediction that the inconsistency of choices, known as the Allais paradox, should not be an issue in the context of “real-life decision making”, which typically corresponds to situations of subjective uncertainty. The Allais paradox, probably the best-known anomaly regarding expected utility theory, would then essentially have no practical relevance. If, however, empiricism contradicts this prediction, salience theory might suffer a serious setback. Explanations of the model for variable human choice behavior are mostly the result of a particular mechanism that does not come to play under perfect correlation. Hence, if it turns out that correlation between prospects – as typically found in real-world applications – does not influence human decision making in the expected way, this might to a large extent cost the theory its explanatory power. The empirical literature regarding the Allais paradox under subjective uncertainty is so far rather moderate. Beyond that, the results are hard to maintain as an argument, as the presentation formats commonly employed, supposably have generated so-called event-splitting effects, thereby distorting subjects’ choice behavior. In our own incentivized experimental study, we control for such effects by means of two different choice settings. We find significant event-splitting effects in both settings, thereby supporting the suspicion that the so far existing empirical results related to Allais paradoxes under subjective uncertainty may not be able to answer the question at hand. Nevertheless, we find that the basic tendency behind the Allais paradox, which is a particular switch of the preference relation due to a modified common consequence, shared by two prospects, is still existent both under an event-splitting and a coalesced presentation format. Yet, the modal choice pattern is in line with the prediction of salience theory. As a consequence, the effect of correlation, as proposed by the model, might - if anything - only weaken the systematic choice pattern behind the Allais paradox.

Keywords: Allais paradox, common consequence effect, models of decision making under risk and uncertainty, salience theory

Procedia PDF Downloads 163
7188 The Value of Online News: Addressing the Problem of Online Investment Fraud Crimes in Thailand

Authors: Thapthep Paprach, Benya Lertsuwan

Abstract:

Investment fraud is not a new criminal, but there are still more victims during the Internet of Things era. This kind of criminal has been classified as a national and transnational financial crime problem all over the world. In Thailand, the country has also been attacked by this kind of crime. This research concerns whether the mass media that is supposed to cover news about online investment scams realized and warned Thais about this crime. Thus, this study explores the value of news about investment fraud in terms of frequency. The methodology uses web crawling from the top 5 news agency websites that have the most access. We pull out all information reporting about investment fraud. The findings revealed that the ‘Khaosod’ news agency was the first rank in reporting on investment crime. On the other hand, ‘Matichon’ was the least reported. Thairat news agencies frequently reported such criminals from midnight to very early in the morning, while other news agencies reported during the daytime. The results between the frequency of news reporting about investment fraud and the monthly number of victim reports are not correlated. Although the most cases reported to Thai police were in February 2023, but the most news reported was in January 2023. In conclusion, there might be a negative correlation between the amount of investment fraud news reported and the number of victims.

Keywords: investment fraud, news value, online news report, Ponzi schemes, Romance scam

Procedia PDF Downloads 43