Search results for: crime scene
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 682

Search results for: crime scene

172 Diagnosis of the Hydrological and Hydrogeological Potential in the Mancomojan Basin for Estimations of Offer and Demand

Authors: J. M. Alzate, J. Baena

Abstract:

This work presents the final results of the ‘Diagnosis of the hydrological and hydrogeological potential in the Mancomojan basin for estimations of offer and demand’ with the purpose of obtaining solutions of domestic supply for the communities of the zone of study. There was realized the projection of population of the paths by three different scenes. The highest water total demand appears with the considerations of the scene 3, with a total demand for the year 2050 of 59.275 m3/year (1,88 l/s), being the path San Francisco the one that exercises a major pressure on the resource with a demand for the same year of the order of 31.189 m3/year (0,99 l/s). As for the hydrogeological potential of the zone and as alternative of supply of the studied communities, the stratigraphic columns obtained of the geophysical polls do not show strata saturated with water that could be considered to be a potential source of supply for the communities. The water registered in the geophysics tests presents very low resistances what indicates that he presents ions, this water meets in the rock interstices very thin granulometries which indicates that it is a water of constitution, and the flow of this one towards more permeable granulometries is void or limited. The underground resource that is registered so much in electrical vertical polls (SEV) as in tomography and that is saturating rocks of thin granulometry (clays and slimes), was demonstrated by content of ions, which is consistent with the abundant presence of plaster and the genesis marinades with transition to continental of the geological units in the zone. Predominant rocks are sedimentary, sandy rocks of grain I die principally, in minor proportion were observed also sandstones of thick grain to conglomerate with clastic rock of quartz, chert and siltstone of the Formation Mess and sandstones (of thin, average and thick grain) alternating with caps conglomerate whose thickness is, in general, between 5 and 15 cm, the nodules of sandstones are frequent with the same composition of the sandstones that contain them, in some cases with calcareous and crossed stratification of the formation Sincelejo Miembro Morroa.

Keywords: hydrological, hydrogeological potential, geotomography, vertical electrical sounding (VES)

Procedia PDF Downloads 232
171 The Characteristics of Withhold Resuscitation in Out-Of-Hospital Cardiac Arrest

Authors: An-Yi Wang, Wei-Fong Kao, Shin-Han Tsai

Abstract:

Introduction: Information as patient characteristics, resuscitation scene, resuscitation provider perspectives and families wish affects on resuscitation decision-making for out-of-hospital cardiac arrest (OHCA). There is no consistency consensus on how families and emergency physicians approach this decision. The main purpose of our study is to evaluate the characteristics of withholding resuscitation efforts arrival at the hospital. Methods: We retrospectively analyzed patients with OHCA without pre-hospital return-of-spontaneous circulation (ROSC) who was sent to our emergency department (ED) between January 2014 and December 2015. Baseline characteristics, pre-hospital course, and causes of the cardiopulmonary arrest among patients were compared. Results: In 2 years, total 155 arrest patients without pre-hospital ROSC was included. 33(21.3%) patients withhold the resuscitation efforts in ED with mean resuscitation duration 4.45 ± 7.04 minutes after ED arrival. In withholding group, the initial rhythm of arrests was all non-shockable. 9 of them received endotracheal intubation before decision-making. None of the patients in withhold resuscitation group survived to discharge. There was no significant difference among gender, underlying cardiovascular disease, malignancy, chronic renal disease, nor witness collapse between withhold and continue resuscitation groups. Univariate analysis showed there was lower percentage of bystander resuscitation (32.3% vs. 50.4%, p=0.071), and the lower percentage of transport via emergency medical service (EMS) (78.8% vs. 91.8%, p=0.054) in withholding group. Multivariate analysis showed old age (adjusted odds ratio=1.06, 95% C.I.=[1.02-1.11], p<0.05), with underlying respiratory insufficiency (adjusted odds ratio=12.16, 95% C.I.=[3.34-44.29], p<0.05), living at home compared with nursing home (adjusted odds ratio=37.75, 95% C.I.=[1.09-1110.70], p<0.05) were more likely to withhold resuscitation. Transport via EMS was more likely to continue resuscitation (adjusted odds ratio=0.11, 95% C.I.=[0.02-0.71], p<0.05). Conclusion: The decision-making for families and emergency physicians to withhold or continue resuscitation for out-of-hospital cardiac arrest is complex and multi-factorial. Continue resuscitation efforts in nursing home residents is high, and further study among this population is warranted.

Keywords: cardiopulmonary resuscitation, out-of-hospital cardiac arrest, termination resuscitation, withhold resuscitation

Procedia PDF Downloads 229
170 Analysis of Expert Possibilities While Identifying Human Teeth

Authors: Saule Mussabekova

Abstract:

Forensic investigation of human teeth plays an important role in detection of crime, particularly in cases of personal identification of dead bodies changed by putrefactive processes or skeletonized bodies as well as when finding bodies of unknown persons. 152 teeth have been investigated; 85 of them belonged to men and 67 belonged to women taken from alive people of different age. Teeth have been investigated after extraction. Two types of teeth have been investigated: teeth without integrity violation of dental crown and teeth with different degrees of its violation. Additionally, 517 teeth have been investigated that were collected from dead bodies, 252 of which belonged to women and 265 belonged to men, whatever the cause of death with death limitation from 1 month to 20 years. Isohemagglutinating serums and Coliclons of different series have been used for the research of tooth-group specificity by serological methods according to the AB0 system. Standard protocols of different techniques have been used for DNA purification from teeth (by reagent Chelex 100 produced by Bio-Rad using reagent kit 'DNA IQTM System' produced by Promega company (USA) and using columns 'QIAamp DNA Investigator Kit' produced by Qiagen company). Results of comparative forensic investigation of human teeth using serological and molecular genetic methods have shown that use of serological methods for forensic identification is sensible only in cases of preselection prior to the next molecular genetic investigation as well as in cases of impossibility of corresponding genetic investigation for different objective reasons. A number of advantages of methods of molecular genetics in the dental investigation have been marked, particularly in putrefactive changes, in personal identification. Key moments of modern condition of personal identification have been reflected according to dental state. Prospective directions of advance preparation of material have been emphasized for identification of teeth in forensic practice.

Keywords: dental state, forensic identification, molecular genetic analysis, teeth

Procedia PDF Downloads 121
169 The Communist Party of China’s Approach to Human Rights and the Death Penalty in China since 1979

Authors: Huang Gui

Abstract:

The issues of human rights and death penalty are always drawing attentions from international scholars, critics and observers, activities and Chinese scholars, and most of them looking at these problems are just doing with such legal or political from a single perspective, but the real relationship between Chinese political regime and legislation is often ignored. In accordance with the Constitution of P.R.C., Communist Party of China (CPC) does not merely play a key role in political field, but in legislation and law enforcement as well. Therefore, the legislation has to implement the party’s theory and outlook, and realize the party’s policies. So is the death penalty system, though it is only concrete punishment system. Considering this point, basic upon the introducing the relationship between CPC and legislation, this paper would like to explore the shifting of CPC’s outlook on human rights and the death penalty system changes in different eras. In Maoist era, the issue of human rights was rejected and deemed as an exclusion zone, and the death penalty was unjustifiably imposed; human rights were politically recognized and accepted in Deng era, but CPC has its own viewpoints on it. CPC emphasized on national security and stability in that era, and the individual human rights weren’t taken correspondingly and reasonably account of. The death penalty was abused and deemed as an important measure to control crime. In post-Deng, human rights were gradually developed and recognized. The term of ‘state respect and protect human rights’ is contained in Constitution of P.R.C., and the individual human rights are gradually valued, but the CPC still focus on state security, development, and stability, the individual right to life hasn’t been enough valued like the right to substance. Although the steps of reforming death penalty are taking, there are still 46 crimes punishable by death. CPC should change its outlook and pay more attention to the right to life, and try to abolish death penalty de facto and de jure.

Keywords: criminal law, communist party of China, death penalty, human rights, China

Procedia PDF Downloads 388
168 Political Deprivations, Political Risk and the Extent of Skilled Labor Migration from Pakistan: Finding of a Time-Series Analysis

Authors: Syed Toqueer Akhter, Hussain Hamid

Abstract:

Over the last few decades an upward trend has been observed in the case of labor migration from Pakistan. The emigrants are not just economically motivated and in search of a safe living environment towards more developed countries in Europe, North America and Middle East. The opportunity cost of migration comes in the form of brain drain that is the loss of qualified and skilled human capital. Throughout the history of Pakistan, situations of political instability have emerged ranging from violation of political rights, political disappearances to political assassinations. Providing security to the citizens is a major issue faced in Pakistan due to increase in crime and terrorist activities. The aim of the study is to test the impact of political instability, appearing in the form of political terror, violation of political rights and civil liberty on skilled migration of labor. Three proxies are used to measure the political instability; political terror scale (based on a scale of 1-5, the political terror and violence that a country encounters in a particular year), political rights (a rating of 1-7, that describes political rights as the ability for the people to participate without restraint in political process) and civil liberty (a rating of 1-7, civil liberty is defined as the freedom of expression and rights without government intervention). Using time series data from 1980-2011, the distributed lag models were used for estimation because migration is not a onetime process, previous events and migration can lead to more migration. Our research clearly shows that political instability appearing in the form of political terror, political rights and civil liberty all appeared significant in explaining the extent of skilled migration of Pakistan.

Keywords: skilled labor migration, political terror, political rights, civil liberty, distributed lag model

Procedia PDF Downloads 998
167 From Cultural Policy to Social Practice: Literary Festivals as a Platform for Social Inclusion in Pakistan

Authors: S. Jabeen

Abstract:

Though Pakistan has a rich cultural history and a diverse population; its global image is tarnished with labels of Muslim ‘fundamentalism’ and ‘extremism.’ Cultural policy is a tool that can be used by the government of Pakistan to ameliorate this image, but instead, this fundamentalist reputation is reinforced in the 2005 draft of Pakistan’s cultural policy. With its stern focus on a homogenized cultural identity, this 2005 draft bases itself largely on forced participation from the largely Muslim public and leaves little or no benefits to them or cultural minorities in Pakistan. The effects of this homogenized ‘Muslim’ identity linger ten years later where the study and celebration of the cultural heritage of Pakistan in schools and educational festivals focus entirely on creating and maintaining a singular ‘Islamic’ cultural identity. The current lack of inclusion has many adverse effects that include the breeding of extremist mindsets through the usurpation of minority rights and lack of safe cultural public spaces. This paper argues that Pakistan can improve social inclusivity and boost its global image through cultural policy. The paper sets the grounds for research by surveying the effectiveness of different cultural policies across nations with differing socioeconomic status. Then, by sampling two public literary festivals in Pakistan as case studies, the National Youth Peace Festival hosted with a nationalistic agenda using public funds and the Lahore Literary Festival (LLF) that aims to boost the cultural literacy scene of Lahore using both private and public efforts, this paper looks at the success of the private, more inclusive LLF. A revision of cultural policy is suggested that combines public and private efforts to host cultural festivals for the sake of cultural celebration and human development, without a set nationalistic agenda. Consequently, this comparison which is grounded in the human capabilities approach, recommends revising the 2005 draft of the Cultural Policy to improve human capabilities in order to support cultural diversity and ultimately contribute to economic growth in Pakistan.

Keywords: cultural policy, festivals, human capabilities, Pakistan

Procedia PDF Downloads 109
166 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 132
165 Limitations of Recent National Enactments on International Crimes: The Case of Kenya, Uganda and Sudan

Authors: Emma Charlene Lubaale

Abstract:

The International Criminal Court (ICC) operates based on the principle of complementarity. On the basis of this principle, states enjoy the primary right to prosecute international crimes, with the ICC intervening only when a state with jurisdiction over an international crime is unable or unwilling to prosecute. To ably exercise their primary right to prosecute international crimes domestically, a number of states are taking steps to criminalise international crimes in their national laws. Significant to note, many of the laws enacted are not being applied in the prosecution of the international crimes allegedly committed. Kenya, Uganda and Sudan are some notable states where commission of international crimes is documented. All these states have recently enacted laws on international crimes. Kenya enacted the International Crimes Act in 2008, Uganda enacted the International Criminal Court Act in 2010 and in 2007, Sudan made provision for international crimes under its Armed Forces Act. However, in all these three states, the enacted national laws on international crimes have thus far not featured in any of the proceedings before these states’ courts. Instead, these states have either relied on ordinary crimes to prosecute international crimes or not prosecuted international crimes altogether. This paper underscores the limitations of the enacted laws, explaining why, even with efforts taken by these states to enact national laws on international crimes, these laws cannot be relied on to advance accountability for the international crimes. Notably, the laws in Kenya and Uganda do not have retroactive application. In Sudan, despite the 2007 reforms, the structure of military justice in Sudan has the effect of placing certain categories of individuals beyond the reach of international criminal justice. For Kenya and Uganda, it is concluded that the only benefit that flows from these enactments is reliance on them to prosecute future international crimes. For Sudan, the 2007 reforms will only have the desired impact if reforms are equally made to the structure of military justice.

Keywords: complementarity, national laws, Kenya, Sudan, Uganda, international crimes, limitations

Procedia PDF Downloads 258
164 Strengthening the Security of the Thai-Myanmar Border Trade of the People in the Mae Sot Customs Checkpoint Area, Tak Province

Authors: Sakapas Saengchai

Abstract:

A Study on Strengthening the Security of the Thai-Myanmar Border Trade Area of the people in the Mae Sot customs checkpoint area, Tak province, was designed as a qualitative research study. Its objectives were to study the principles of strengthening border trade security and enhancing people's participation. To develop a border trade model that enhances the spatial economy and improves people's quality of life by collecting data using a participant observation method. In-depth interview group chats border checkpoint administrators, Mae Sot customs checkpoint, Tak province, private entrepreneurs, community leaders, and the opening of a community forum to exchange opinions with people in the area. The results of the study found that 1. Security development is to promote crime reduction. Reduce drug trafficking problems Smuggling and human trafficking have been reduced. Including planning and preparation to protect people from terrorism, epidemics, and communicable diseases, including cooperation with Burma on border rules for people and workers, 2. Wealth development is to promote investment. Transport links value chain logistics Cross-border goods and services on the Thai-Myanmar border Both amending regulations and laws to promote fair trade. Emphasis on convenient and fast service as well as promoting the Thai border area to be a tourist attraction that can create prosperity and income for the community in the area By using balanced natural resources, with production and consumption that are environmentally friendly, and emphasizes the participation of the public sector, the private sector, and people from all sectors in the sustainable development of the Thai border.

Keywords: security, border trade, customs, participation, people

Procedia PDF Downloads 150
163 The Image of Victim and Criminal in Love Crimes on Social Media in Egypt: Facebook Discourse Analysis

Authors: Sherehan Hamdalla

Abstract:

Egypt has experienced a series of terrifying love crimes in the last few months. This ‘trend’ of love crimes started with a young man caught on video slaughtering his ex-girlfriend in the street in the city of El Mansoura. The crime shocked all Egyptian citizens at all levels; unfortunately, not less than three similar crimes took place in other different Egyptian cities with the same killing trigger. The characteristics and easy access and reach of social media consider the reason why it is one of the most crucial online communication channels; users utilize social media platforms for sharing and exchanging ideas, news, and many other activities; they can freely share posts that reflect their mindset or personal views regarding any issues, these posts are going viral in all social media account by reposting or numbers of shares for these posts to support the content included, or even to attack. The repetition of sharing certain posts could mobilize other supporters with the same point of view, especially when that crowd’s online participation is confronting a public opinion case’s consequences. The death of that young woman was followed by similar crimes in other cities, such as El Sharkia and Port Said. These love crimes provoked a massive wave of contention among all social classes in Egypt. Strangely, some were supporting the criminal and defending his side for several reasons, which the study will uncover. Facebook, the most popular social media platform for Egyptians, reflects the debate between supporters of the victim and supporters of the criminal. Facebook pages were created specifically to disseminate certain viewpoints online, for example, asking for the maximum penalty to be given to criminals. These pages aimed to mobilize the maximum number of supporters and to affect the outcome of the trials.

Keywords: love crimes, victim, criminal, social media

Procedia PDF Downloads 45
162 Film Review of 'Heroic Saviours and Survivors': The Representation of Sex Trafficking in Popular Films in India

Authors: Nisha James, Shubha Ranganathan

Abstract:

One of the most poignant forms of organized crime against women, which has rarely made it to the world of Indian cinema, is that of sex trafficking, i.e. the forcible involvement of women in the sex trade through fraud or coercion (Hughes, 2005). In the space of Indian cinema, much of the spotlight has been on the sensational drug trafficking and gang mafia of Bombay. During our research on sex trafficking, the rehabilitated women interviewed often expressed strong criticism about mass media’s naive portrayal of prostitutes as money-minting, happy and sexually driven women. They argued that this unrealistic portrayal ignored the fact that this was not a reality for the majority of trafficked women. Given the gravity of sex trafficking as a human rights issue, it is, therefore, refreshing to see three recent films on sex trafficking in Indian Languages – Naa Bangaaru Talli (2014, Telugu), Mardaani (2014, Hindi) and Lakshmi (2014, Hindi). This paper reviews these three films to explore the portrayal of the everyday reality of trafficking for women. Film analysis was used to understand the representation of psychological issues in the media. The strength of these movies starts with their inspirations which are of true stories and that they are all aimed at bringing awareness about the issue of sex trafficking, which is a rising social evil in Indian society though none of the three films move to portray the next phase of rehabilitation and reintegration of victims, which is a very complex and important process in the life of a survivor. According to findings, survivors of sex trafficking find the rehabilitation and reintegration into society to be a slow and tough part of their life as they continuously face stigma and social exclusion and have to strive to live against all odds of non-acceptance starting from their family.

Keywords: film review, Indian films, sex trafficking, survivors

Procedia PDF Downloads 408
161 Comparing Literary Publications about Corruption in South Africa to the Legal Position

Authors: Natasha Venter

Abstract:

Recent publications, including Truth to Power by André de Ruyter, Gangster State by Pieter-Louis Myburgh, and Enemy of the People by Pieter du Toit and Adriaan Basson, expose alleged corrupt acts by high-ranking members of State, as well as those in charge of State-owned entities. These literary contributions have gripped the attention of a nation plagued by corruption scandals and the alleged misappropriation of state funds on an almost daily basis. The books, however, leave the populace with the burning question of why “nothing happens” to these individuals who are so directly implicated in the literature. The process followed by the State in the largest successful prosecution of a corrupt state official, Jackie Selebi, sheds some light as to how such high-ranking persons might be brought to book. The Supreme Court of Appeal’s definition of corruption and the interpretation of the facts (as presented by the State prosecutors) by the court is also valuable. Furthermore, some insight into the laws that criminalise corruption in South Africa, as well as applicable international instruments, is necessary. South Africa is ranked as the 70th most corrupt country out of 180 countries by Transparency International’s 2021 Corruption Perceptions Index. This is worrisome as South Africa is a signatory of the United Nations Convention Against Corruption (2004) and, as such, has certain international obligations to fulfil. However, if the political will to prosecute corrupt officials in South Africa exists, there are laws and instruments available to punish these individuals. This would not only vindicate the authors of literature about corruption in the country but also restore the hope of South Africans that, ultimately, crime does not pay.

Keywords: corruption, eskom, state capture, government, literature, united nations, law, legal, Jackie selebi, supreme court of appeal

Procedia PDF Downloads 62
160 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 232
159 Review of State Anti-Trafficking Laws in the United States of America and Their Success in Combating Human Trafficking and Protecting the Victims

Authors: Andrea Marcela Morales Reyes

Abstract:

In the year 2000, the federal government of the United States of America enacted anti-trafficking legislation to prevent human trafficking, prosecute traffickers, and protect the victims. Since then, all 50 states have followed the federal government's example by enacting state-level anti-trafficking legislation. In order to fight human trafficking in the United States, it is paramount that this legislation is not only comprehensively enacted but also enforced. This study reviewed the anti-trafficking laws enacted in each of the 50 states and investigated the success of such laws by reporting the number of trafficking related prosecutions, cases identified, and victims protected. This study reviewed human trafficking reports issued by nonprofits, and state and federal level agencies. An increase in the number of cases investigated since the state laws have been passed reflects a moderate success in the fight against human trafficking in the U.S. This review also found that although every state has passed anti-trafficking legislation, many still lack a comprehensive approach to combat human trafficking; some states lack key provisions to prevent human trafficking, prosecute traffickers, and protect it victims. This, along with the lack of enforcement of the anti-trafficking plans included in each of the state legislations, has meant that the human trafficking cases investigated in fiscal year 2016 are not near the estimated numbers; which in turn suggests that this crime is still greatly unaccounted for. This study concludes that although important steps have been taken at the national and state level to combat human trafficking, the identification and prosecution of human trafficking cases still proves challenging in the United States.

Keywords: enforcement of laws, human trafficking, anti-trafficking legislation, United States

Procedia PDF Downloads 137
158 Reconnaissance Investigation of Thermal Springs in the Middle Benue Trough, Nigeria by Remote Sensing

Authors: N. Tochukwu, M. Mukhopadhyay, A. Mohamed

Abstract:

It is no new that Nigeria faces a continual power shortage problem due to its vast population power demand and heavy reliance on nonrenewable forms of energy such as thermal power or fossil fuel. Many researchers have recommended using geothermal energy as an alternative; however, Past studies focus on the geophysical & geochemical investigation of this energy in the sedimentary and basement complex; only a few studies incorporated the remote sensing methods. Therefore, in this study, the preliminary examination of geothermal resources in the Middle Benue was carried out using satellite imagery in ArcMap. Landsat 8 scene (TIR, NIR, Red spectral bands) was used to estimate the Land Surface Temperature (LST). The Maximum Likelihood Classification (MLC) technique was used to classify sites with very low, low, moderate, and high LST. The intermediate and high classification happens to be possible geothermal zones, and they occupy 49% of the study area (38077km2). Riverline were superimposed on the LST layer, and the identification tool was used to locate high temperate sites. Streams that overlap on the selected sites were regarded as geothermal springs as. Surprisingly, the LST results show lower temperatures (<36°C) at the famous thermal springs (Awe & Wukari) than some unknown rivers/streams found in Kwande (38°C), Ussa, (38°C), Gwer East (37°C), Yola Cross & Ogoja (36°C). Studies have revealed that temperature increases with depth. However, this result shows excellent geothermal resources potential as it is expected to exceed the minimum geothermal gradient of 25.47 with an increase in depth. Therefore, further investigation is required to estimate the depth of the causative body, geothermal gradients, and the sustainability of the reservoirs by geophysical and field exploration. This method has proven to be cost-effective in locating geothermal resources in the study area. Consequently, the same procedure is recommended to be applied in other regions of the Precambrian basement complex and the sedimentary basins in Nigeria to save a preliminary field survey cost.

Keywords: ArcMap, geothermal resources, Landsat 8, LST, thermal springs, MLC

Procedia PDF Downloads 153
157 A Universal Troupe, “Athens Dramatic Company”: Tours and Performances (1887-1935)

Authors: Papazafeiropoulou Olga

Abstract:

The “Athens Dramatic Company” was one of the longest-running and most widely traveled troupes in the history of modern Greek theatre. The theatre company had been established since 1887, and the following: Euthychios Vonaseras, Eleni Kotopoulis, etc., like the founder of the troupe Theodoros Pofantis, referred to the distribution of the works presented in Patras: The price of a crime, The niece of her uncle, Agathopoulos, Amphitryon, The Two Sergeants, Lawyer and Actors, The Crusaders, The Daughter of Pantopolos, He Will Kill Himself, Macbeth, The Two Orphans, The Auction, Pistis Hope and Mercy, Love Attempt, The Crusaders, The lady is in Loutra, Markos Votsaris. In 1921, after peregrinations in Cyprus, Constantinople, Romania, Crete, Thessaloniki, Volos, Smyrna, the “Athens Dramatic Company” toured in Africa, where the Greek communities flourished. In 1923, the collaborations of troupe’s members and the repertoire varied several times, such as in Johannesburg, from where they traveled via Cape Town to Australia, where they presented the works: Dikaioma o Eros, Enochos, Psychokori, Kolokotronis. Atimoi, Voskopoula, Golfo, etc., while they impressed with the tragedy Oedipus Tyrannus, which was watched by Australians. Alongside the “Athens Dramatic Company” was also touring “Vrysoula’s Pantopoulos Troupe” and most of the members of the two troupes went to America, uniting their formation. In 1927, the old leader of “Athens Dramatic Company” (Theodoros Pofantis) decided to re-establish his troupe, but after unpleasant adventures, he passed away. In the year 1934, the Greek Dramatic Troupe of Athens revived with works including: The Man of the Day, A Dying Heart, A Dream Was and Gone, An Inspection, The Two Sergeants, The Mother, the Father-in-Law and the Non-existent Son-in-law, before finally expiring in 1935, after nearly 40 years of historical passage.

Keywords: athens, dramatic, company, universal, troupe

Procedia PDF Downloads 37
156 Evaluating the Perception of Roma in Europe through Social Network Analysis

Authors: Giulia I. Pintea

Abstract:

The Roma people are a nomadic ethnic group native to India, and they are one of the most prevalent minorities in Europe. In the past, Roma were enslaved and they were imprisoned in concentration camps during the Holocaust; today, Roma are subject to hate crimes and are denied access to healthcare, education, and proper housing. The aim of this project is to analyze how the public perception of the Roma people may be influenced by antiziganist and pro-Roma institutions in Europe. In order to carry out this project, we used social network analysis to build two large social networks: The antiziganist network, which is composed of institutions that oppress and racialize Roma, and the pro-Roma network, which is composed of institutions that advocate for and protect Roma rights. Measures of centrality, density, and modularity were obtained to determine which of the two social networks is exerting the greatest influence on the public’s perception of Roma in European societies. Furthermore, data on hate crimes on Roma were gathered from the Organization for Security and Cooperation in Europe (OSCE). We analyzed the trends in hate crimes on Roma for several European countries for 2009-2015 in order to see whether or not there have been changes in the public’s perception of Roma, thus helping us evaluate which of the two social networks has been more influential. Overall, the results suggest that there is a greater and faster exchange of information in the pro-Roma network. However, when taking the hate crimes into account, the impact of the pro-Roma institutions is ambiguous, due to differing patterns among European countries, suggesting that the impact of the pro-Roma network is inconsistent. Despite antiziganist institutions having a slower flow of information, the hate crime patterns also suggest that the antiziganist network has a higher impact on certain countries, which may be due to institutions outside the political sphere boosting the spread of antiziganist ideas and information to the European public.

Keywords: applied mathematics, oppression, Roma people, social network analysis

Procedia PDF Downloads 248
155 Unlocking Justice: Exploring the Power and Challenges of DNA Analysis in the Criminal Justice System

Authors: Sandhra M. Pillai

Abstract:

This article examines the relevance, difficulties, and potential applications of DNA analysis in the criminal justice system. A potent tool for connecting suspects to crime sites, clearing the innocent of wrongdoing, and resolving cold cases, DNA analysis has transformed forensic investigations. The scientific foundations of DNA analysis, including DNA extraction, sequencing, and statistical analysis, are covered in the article. To guarantee accurate and trustworthy findings, it also discusses the significance of quality assurance procedures, chain of custody, and DNA sample storage. DNA analysis has significantly advanced science, but it also brings up substantial moral and legal issues. To safeguard individual rights and uphold public confidence, privacy concerns, possible discrimination, and abuse of DNA information must be properly addressed. The paper also emphasises the effects of the criminal justice system on people and communities while highlighting the necessity of equity, openness, and fair access to DNA testing. The essay describes the obstacles and future directions for DNA analysis. It looks at cutting-edge technology like next-generation sequencing, which promises to make DNA analysis quicker and more affordable. To secure the appropriate and informed use of DNA evidence, it also emphasises the significance of multidisciplinary collaboration among scientists, law enforcement organisations, legal experts, and policymakers. In conclusion, DNA analysis has enormous potential for improving the course of criminal justice. We can exploit the potential of DNA technology while respecting the ideals of justice, fairness, and individual rights by navigating the ethical, legal, and societal issues and encouraging discussion and collaboration.

Keywords: DNA analysis, DNA evidence, reliability, validity, legal frame, admissibility, ethical considerations, impact, future direction, challenges

Procedia PDF Downloads 40
154 The Feminine Disruption of Speech and Refounding of Discourse: Kristeva’s Semiotic Chora and Psychoanalysis

Authors: Kevin Klein-Cardeña

Abstract:

For Julia Kristeva, contra Lacan, the instinctive body refuses to go away within discourse. Neither is the pre-Oedipal stage of maternal fusion vanquished by the emergence of language and with it, the law of the father. On the contrary, Kristeva argues, the pre-symbolic ambivalently haunts the society of speech, simultaneously animating and threatening the very foundations of signification. Kristeva invents the term “the semiotic” to refer to this continual breaking-through of the material unconscious onto the scene of meaning. This presentation examines Kristeva’s semiotic as a theoretical gesture that itself is a disruption of discourse, re-presenting the ‘return of the repressed’ body in theory—-the breaking-through of the unconscious onto the science of meaning. Faced with linguistic theories concerned with abstract sign-systems as well as Lacanian doctrine privileging the linguistic sign unequivocally over the bodily drive, Kristeva’s theoretical corpus issues the message of a psychic remainder that disrupts with a view toward replenishing theoretical accounts of language and sense. Reviewing Semiotic challenge across these two levels (the sense and science of language), the presentation suggests that Kristeva’s offerings constitute a coherent gestalt, providing an account of the feminist nature of her dual intervention. In contrast to other feminist critiques, Kristeva’s gesture hinges on its restoration of the maternal contribution to subjectivity. Against the backdrop of ‘phallogocentric’ and ‘necrophilic’ theories that strip language of a subject and strip the subject of a body, Kristeva recasts linguistic study through a metaphor of life and birthing. Yet the semiotic fragments the subject it produces, dialoguing with an unconscious curtailed by but also exceeding the symbolic order of signification. Linguistics, too, becomes fragmented in the same measure as it is more meaningfully renewed by its confrontation with the semiotic body. It is Kristeva’s own body that issues this challenge, on both sides of the boundary between the theory and the theorized. The Semiotic becomes comprehensible as a project unified by its concern to disrupt and rehabilitate language, the subject, and the scholarly discourses that treat them.

Keywords: Julia kristeva, the Semiotic, french feminism, psychoanalysic theory, linguistics

Procedia PDF Downloads 39
153 Effect of Classroom Acoustic Factors on Language and Cognition in Bilinguals and Children with Mild to Moderate Hearing Loss

Authors: Douglas MacCutcheon, Florian Pausch, Robert Ljung, Lorna Halliday, Stuart Rosen

Abstract:

Contemporary classrooms are increasingly inclusive of children with mild to moderate disabilities and children from different language backgrounds (bilinguals, multilinguals), but classroom environments and standards have not yet been adapted adequately to meet these challenges brought about by this inclusivity. Additionally, classrooms are becoming noisier as a learner-centered as opposed to teacher-centered teaching paradigm is adopted, which prioritizes group work and peer-to-peer learning. Challenging listening conditions with distracting sound sources and background noise are known to have potentially negative effects on children, particularly those that are prone to struggle with speech perception in noise. Therefore, this research investigates two groups vulnerable to these environmental effects, namely children with a mild to moderate hearing loss (MMHLs) and sequential bilinguals learning in their second language. In the MMHL study, this group was assessed on speech-in-noise perception, and a number of receptive language and cognitive measures (auditory working memory, auditory attention) and correlations were evaluated. Speech reception thresholds were found to be predictive of language and cognitive ability, and the nature of correlations is discussed. In the bilinguals study, sequential bilingual children’s listening comprehension, speech-in-noise perception, listening effort and release from masking was evaluated under a number of different ecologically valid acoustic scenarios in order to pinpoint the extent of the ‘native language benefit’ for Swedish children learning in English, their second language. Scene manipulations included target-to-distractor ratios and introducing spatially separated noise. This research will contribute to the body of findings from which educational institutions can draw when designing or adapting educational environments in inclusive schools.

Keywords: sequential bilinguals, classroom acoustics, mild to moderate hearing loss, speech-in-noise, release from masking

Procedia PDF Downloads 306
152 A Study of Topical and Similarity of Sebum Layer Using Interactive Technology in Image Narratives

Authors: Chao Wang

Abstract:

Under rapid innovation of information technology, the media plays a very important role in the dissemination of information, and it has a totally different analogy generations face. However, the involvement of narrative images provides more possibilities of narrative text. "Images" through the process of aperture, a camera shutter and developable photosensitive processes are manufactured, recorded and stamped on paper, displayed on a computer screen-concretely saved. They exist in different forms of files, data, or evidence as the ultimate looks of events. By the interface of media and network platforms and special visual field of the viewer, class body space exists and extends out as thin as sebum layer, extremely soft and delicate with real full tension. The physical space of sebum layer of confuses the fact that physical objects exist, needs to be established under a perceived consensus. As at the scene, the existing concepts and boundaries of physical perceptions are blurred. Sebum layer physical simulation shapes the “Topical-Similarity" immersing, leading the contemporary social practice communities, groups, network users with a kind of illusion without the presence, i.e. a non-real illusion. From the investigation and discussion of literatures, digital movies editing manufacture and produce the variability characteristics of time (for example, slices, rupture, set, and reset) are analyzed. Interactive eBook has an unique interaction in "Waiting-Greeting" and "Expectation-Response" that makes the operation of image narrative structure more interpretations functionally. The works of digital editing and interactive technology are combined and further analyze concept and results. After digitization of Interventional Imaging and interactive technology, real events exist linked and the media handing cannot be cut relationship through movies, interactive art, practical case discussion and analysis. Audience needs more rational thinking about images carried by the authenticity of the text.

Keywords: sebum layer, topical and similarity, interactive technology, image narrative

Procedia PDF Downloads 363
151 Ex-Offenders’ Labelling, Stigmatisation and Unsuccessful Re-Integration as Factors Leading into Recidivism: A South African Context

Authors: Tshimangadzo Oscar Magadze

Abstract:

For successful re-integration, the individual offender must adapt and transform, which requires that the offender should adopt and internalise socially approved norms, attitudes, values, and beliefs. However, the offender’s labelling and community stigmatisation decide the destination of the offender. Community involvement in ex-offenders’ re-integration is an important issue in efforts to reduce recidivism and to control overcrowding in our correctional facilities. Crime is a social problem that requires society to come together to fight against it. This study was conducted in the Limpopo Province in Vhembe District Municipality within four local municipalities, namely Musina, Makhado, Mutale, and Thulamela. A total number of 30 participants were interviewed, and all were members of the Community Corrections Forums. This was necessitated by the fact that Musina is a very small area, which compelled the Department of Correctional Services to combine the two (Musina and Makhado) into one social re-integration entity. This is a qualitative research study where participants were selected through the use of purposive sampling. Participants were selected based on the value they would add to this study in order to achieve the objectives. The data collection method of this study was the focus group, which comprised of three groups of 10 participants each. Thulamela and Mutale local municipalities formed a group with (10) participants each, whereas Musina (2) and Makhado (8) formed another. Results indicate that the current situation is not conducive for re-integration to be successful. Participants raised many factors that need serious redress, namely offenders’ discrimination, lack of forgiveness by members of the community, which is fuelled by lack of community awareness due to the failure of the Department of Correctional Services in educating communities on ex-offenders’ re-integration.

Keywords: ex-offender, labeling, re-integration, stigmatization

Procedia PDF Downloads 118
150 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom

Authors: Chih-Ping Chang

Abstract:

Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.

Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner

Procedia PDF Downloads 268
149 An Assessment of Female Representation in Philippine Cinema in Comparison to American Cinema (1975 to 2020)

Authors: Amanda Julia Binay, Patricia Elise Suarez

Abstract:

Female representation in media is an important subject in the discussion of gender equality, especially in impactful and influential media like film. As the Filipino film industry continues to grow and evolve, the need for analysis on Filipino female representation on screen is imperative. Additionally, there has been limited research made on female representation in the Philippine film scene. Thus, the paper aims to analyze the presence and evolution of female representation in Philippine cinema and compare the findings with that of American films to see how Filipino filmmakers hold their own against the standards of international movements that call for more and better female representation, especially in Hollywood. The participants selected were Filipino and American films released within the years 1975 to 2020 in five (5) year intervals. Twenty (20) critically acclaimed and highest-grossing Filipino films and twenty (20) critically acclaimed and highest-grossing Hollywood films were then subject to the Bechdel and Peirce tests to obtain statistical measures of their female representation. The findings of the study reveal that the presence of female representation in Philippine film history has been consistent and has continued to grow and evolve throughout the years, with strong female leads with vibrant characteristics and diverse stories. However, analysis of female representation regarding American films has shown an extreme lack thereof with more misogynistic, sexist, and limiting ideals. Thus, the study concludes that the state of female representation in Philippine cinema and film industry holds its own when compared to American cinema and film industry and even outperforms it in many aspects of female representation, such as consistent inclusion and depiction of multi-dimensional female leads and female relationships. Hence, the study implies that women’s consistent presence in Philippine cinema mirrors Filipino women’s prominent role in Philippine society and that American cinema must continue to make efforts to change their portrayals of female characters, leads, and relationships to make them more grounded in reality.

Keywords: female representation, gender studies, feminism, philippine cinema, American cinema, bechdel test, peirce test, comparative analysis

Procedia PDF Downloads 308
148 Task-Based Teaching for Developing Communication Skills in Second Language Learners

Authors: Geeta Goyal

Abstract:

Teaching-learning of English as a second language is a challenge for the learner as well as the teacher. Whereas a student may find it hard and get demotivated while communicating in a language other than mother tongue, a teacher, too, finds it difficult to integrate necessary teaching material in lesson plans to maximize the outcome. Studies reveal that task-based teaching can be useful in diverse contexts in a second language classroom as it helps in creating opportunities for language exposure as per learners' interest and capability levels, which boosts their confidence and learning efficiency. The present study has analysed the impact of various activities carried out in a heterogenous group of second language learners at tertiary level in a semi-urban area in Haryana state of India. Language tasks were specifically planned with a focus on engaging groups of twenty-five students for a period of three weeks. These included language games such as spell-well, cross-naught besides other communicative and interactive tasks like mock-interviews, role plays, sharing experiences, storytelling, simulations, scene-enact, video-clipping, etc. Tools in form of handouts and cue cards were also used as per requirement. This experiment was conducted for ten groups of students taking bachelor’s courses in different streams of humanities, commerce, and sciences. Participants were continuously supervised, monitored, and guided by the respective teacher. Feedback was collected from the students through classroom observations, interviews, and questionnaires. Students' responses revealed that they felt comfortable and got plenty of opportunities to communicate freely without being afraid of making mistakes. It was observed that even slow/timid/shy learners got involved by getting an experience of English language usage in friendly environment. Moreover, it helped the teacher in establishing a trusting relationship with students and encouraged them to do the same with their classmates. The analysis of the data revealed that majority of students demonstrated improvement in their interest and enthusiasm in the class. The study revealed that task-based teaching was an effective method to improve the teaching-learning process under the given conditions.

Keywords: communication skills, English, second language, task-based teaching

Procedia PDF Downloads 61
147 Public Attitudes toward Domestic Violence against Women in China and Spain: A Cross-Cultural Study

Authors: Menglu Yang, Ani Beybutyan, Rocio Pina, Miguel Angel Soria

Abstract:

Domestic violence against women is one of the most serious social problems in the world. Attitudes toward domestic violence against women play an important role in the perpetration of violence against women, the way that victims respond to the violence, and how the community responds to violence against women. China and Spain are countries which have been influenced by the culture which males hold power and dominance over the female for a long time. However, as more connected with other European countries, the legal enforcement related to domestic violence against women developed earlier in Spain, and consequently, social awareness of violence against women evolved differently in two countries. The present study aimed to explore and compare the attitudes toward domestic violence against women across China and Spain, and their influence factors, such as gender equality attitudes and coercive control. Totally 506 participants, 255 from China and 251 from Spain completed questionnaires, including attitudes toward domestic violence against women, definition of violence behavior, justification for violence, gender equity attitudes, and coercive control. Results demonstrated that Chinese participants were less aware of domestic violence against women issue but more agreed that such issue was a crime than Spanish participants. In addition to cultural difference, gender equality attitudes, coercive control, gender, and age also affected attitudes toward domestic violence against women. Our findings imply attitudes toward domestic violence against women differ from countries along with the difference in gender equity attitudes and coercive control; such a difference may arise from cultural, traditional belief and current justice system influence. Despite the developed justice system, male dominance culture may lead to maintain the belief that domestic violence is domestic and private issue which police and justice force may not get involved.

Keywords: cross-cultural differences, domestic violence, public attitudes, violence against women

Procedia PDF Downloads 239
146 Examining Social Connectivity through Email Network Analysis: Study of Librarians' Emailing Groups in Pakistan

Authors: Muhammad Arif Khan, Haroon Idrees, Imran Aziz, Sidra Mushtaq

Abstract:

Social platforms like online discussion and mailing groups are well aligned with academic as well as professional learning spaces. Professional communities are increasingly moving to online forums for sharing and capturing the intellectual abilities. This study investigated dynamics of social connectivity of yahoo mailing groups of Pakistani Library and Information Science (LIS) professionals using Graph Theory technique. Design/Methodology: Social Network Analysis is the increasingly concerned domain for scientists in identifying whether people grow together through online social interaction or, whether they just reflect connectivity. We have conducted a longitudinal study using Network Graph Theory technique to analyze the large data-set of email communication. The data was collected from three yahoo mailing groups using network analysis software over a period of six months i.e. January to June 2016. Findings of the network analysis were reviewed through focus group discussion with LIS experts and selected respondents of the study. Data were analyzed in Microsoft Excel and network diagrams were visualized using NodeXL and ORA-Net Scene package. Findings: Findings demonstrate that professionals and students exhibit intellectual growth the more they get tied within a network by interacting and participating in communication through online forums. The study reports on dynamics of the large network by visualizing the email correspondence among group members in a network consisting vertices (members) and edges (randomized correspondence). The model pair wise relationship between group members was illustrated to show characteristics, reasons, and strength of ties. Connectivity of nodes illustrated the frequency of communication among group members through examining node coupling, diffusion of networks, and node clustering has been demonstrated in-depth. Network analysis was found to be a useful technique in investigating the dynamics of the large network.

Keywords: emailing networks, network graph theory, online social platforms, yahoo mailing groups

Procedia PDF Downloads 208
145 Homosexuality and Culture: A Case Study Depicting the Struggles of a Married Lady

Authors: Athulya Jayakumar, M. Manjula

Abstract:

Though there has been a shift in the understanding of homosexuality from being a sin, crime or pathology in the medical and legal perspectives, the acceptance of homosexuality still remains very scanty in the Indian subcontinent. The present case study is a 24-year-old female who has completed a diploma in polytechnic engineering and residing in the state of Kerala. She initially presented with her husband with complaints of lack of sexual desire and non-cooperation from the index client. After an initial few sessions, the client revealed, in an individual session, about her homosexual orientation which was unknown to her family. She has had multiple short-term relations with females and never had any heterosexual orientation/interest. During her adolescence, she was wondering if she could change herself into a male. However, currently, she accepts her gender. She never wanted a heterosexual marriage; but, had to succumb to the pressure of mother, as a result of a series of unexpected incidents at home and had to agree for the marriage, also with a hope that she may change herself into a bi-sexual. The client was able to bond with the husband emotionally but the multiple attempts at sexual intercourse, at the insistence of the husband, had always been non-pleasurable and induced a sense of disgust. Currently, for several months, there has not been any sexual activity. Also, she actively avoids any chance to have a warm communication with him so that she can avoid chances of him approaching her in a sexual manner. The case study is an attempt to highlight the culture and the struggles of a homosexual individual who comes to therapy for wanting to be a ‘normal wife’ despite having knowledge of legal rights and scenario. There is a scarcity of Indian literature that has systematically investigated issues related to homosexuality. Data on prevalence, emotional problems faced and clinical services available are sparse though it is crucial for increasing understanding of sexual behaviour, orientation and difficulties faced in India.

Keywords: case study, culture, cognitive behavior therapy, female homosexuality

Procedia PDF Downloads 324
144 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.

Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms

Procedia PDF Downloads 61
143 A Novel Methodology for Browser Forensics to Retrieve Searched Keywords from Windows 10 Physical Memory Dump

Authors: Dija Sulekha

Abstract:

Nowadays, a good percentage of reported cybercrimes involve the usage of the Internet, directly or indirectly for committing the crime. Usually, Web Browsers leave traces of browsing activities on the host computer’s hard disk, which can be used by investigators to identify internet-based activities of the suspect. But criminals, who involve in some organized crimes, disable browser file generation feature to hide the evidence while doing illegal activities through the Internet. In such cases, even though browser files were not generated in the storage media of the system, traces of recent and ongoing activities were generated in the Physical Memory of the system. As a result, the analysis of Physical Memory Dump collected from the suspect's machine retrieves lots of forensically crucial information related to the browsing history of the Suspect. This information enables the cyber forensic investigators to concentrate on a few highly relevant selected artefacts while doing the Offline Forensics analysis of storage media. This paper addresses the reconstruction of web browsing activities by conducting live forensics to identify searched terms, downloaded files, visited sites, email headers, email ids, etc. from the physical memory dump collected from Windows 10 Systems. Well-known entry points are available for retrieving all the above artefacts except searched terms. The paper describes a novel methodology to retrieve the searched terms from Windows 10 Physical Memory. The searched terms retrieved in this way can be used for doing advanced file and keyword search in the storage media files reconstructed from the file system recovery in offline forensics.

Keywords: browser forensics, digital forensics, live Forensics, physical memory forensics

Procedia PDF Downloads 85