Search results for: crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 434

Search results for: crime

104 Comparing Literary Publications about Corruption in South Africa to the Legal Position

Authors: Natasha Venter

Abstract:

Recent publications, including Truth to Power by André de Ruyter, Gangster State by Pieter-Louis Myburgh, and Enemy of the People by Pieter du Toit and Adriaan Basson, expose alleged corrupt acts by high-ranking members of State, as well as those in charge of State-owned entities. These literary contributions have gripped the attention of a nation plagued by corruption scandals and the alleged misappropriation of state funds on an almost daily basis. The books, however, leave the populace with the burning question of why “nothing happens” to these individuals who are so directly implicated in the literature. The process followed by the State in the largest successful prosecution of a corrupt state official, Jackie Selebi, sheds some light as to how such high-ranking persons might be brought to book. The Supreme Court of Appeal’s definition of corruption and the interpretation of the facts (as presented by the State prosecutors) by the court is also valuable. Furthermore, some insight into the laws that criminalise corruption in South Africa, as well as applicable international instruments, is necessary. South Africa is ranked as the 70th most corrupt country out of 180 countries by Transparency International’s 2021 Corruption Perceptions Index. This is worrisome as South Africa is a signatory of the United Nations Convention Against Corruption (2004) and, as such, has certain international obligations to fulfil. However, if the political will to prosecute corrupt officials in South Africa exists, there are laws and instruments available to punish these individuals. This would not only vindicate the authors of literature about corruption in the country but also restore the hope of South Africans that, ultimately, crime does not pay.

Keywords: corruption, eskom, state capture, government, literature, united nations, law, legal, Jackie selebi, supreme court of appeal

Procedia PDF Downloads 63
103 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 233
102 Review of State Anti-Trafficking Laws in the United States of America and Their Success in Combating Human Trafficking and Protecting the Victims

Authors: Andrea Marcela Morales Reyes

Abstract:

In the year 2000, the federal government of the United States of America enacted anti-trafficking legislation to prevent human trafficking, prosecute traffickers, and protect the victims. Since then, all 50 states have followed the federal government's example by enacting state-level anti-trafficking legislation. In order to fight human trafficking in the United States, it is paramount that this legislation is not only comprehensively enacted but also enforced. This study reviewed the anti-trafficking laws enacted in each of the 50 states and investigated the success of such laws by reporting the number of trafficking related prosecutions, cases identified, and victims protected. This study reviewed human trafficking reports issued by nonprofits, and state and federal level agencies. An increase in the number of cases investigated since the state laws have been passed reflects a moderate success in the fight against human trafficking in the U.S. This review also found that although every state has passed anti-trafficking legislation, many still lack a comprehensive approach to combat human trafficking; some states lack key provisions to prevent human trafficking, prosecute traffickers, and protect it victims. This, along with the lack of enforcement of the anti-trafficking plans included in each of the state legislations, has meant that the human trafficking cases investigated in fiscal year 2016 are not near the estimated numbers; which in turn suggests that this crime is still greatly unaccounted for. This study concludes that although important steps have been taken at the national and state level to combat human trafficking, the identification and prosecution of human trafficking cases still proves challenging in the United States.

Keywords: enforcement of laws, human trafficking, anti-trafficking legislation, United States

Procedia PDF Downloads 138
101 A Universal Troupe, “Athens Dramatic Company”: Tours and Performances (1887-1935)

Authors: Papazafeiropoulou Olga

Abstract:

The “Athens Dramatic Company” was one of the longest-running and most widely traveled troupes in the history of modern Greek theatre. The theatre company had been established since 1887, and the following: Euthychios Vonaseras, Eleni Kotopoulis, etc., like the founder of the troupe Theodoros Pofantis, referred to the distribution of the works presented in Patras: The price of a crime, The niece of her uncle, Agathopoulos, Amphitryon, The Two Sergeants, Lawyer and Actors, The Crusaders, The Daughter of Pantopolos, He Will Kill Himself, Macbeth, The Two Orphans, The Auction, Pistis Hope and Mercy, Love Attempt, The Crusaders, The lady is in Loutra, Markos Votsaris. In 1921, after peregrinations in Cyprus, Constantinople, Romania, Crete, Thessaloniki, Volos, Smyrna, the “Athens Dramatic Company” toured in Africa, where the Greek communities flourished. In 1923, the collaborations of troupe’s members and the repertoire varied several times, such as in Johannesburg, from where they traveled via Cape Town to Australia, where they presented the works: Dikaioma o Eros, Enochos, Psychokori, Kolokotronis. Atimoi, Voskopoula, Golfo, etc., while they impressed with the tragedy Oedipus Tyrannus, which was watched by Australians. Alongside the “Athens Dramatic Company” was also touring “Vrysoula’s Pantopoulos Troupe” and most of the members of the two troupes went to America, uniting their formation. In 1927, the old leader of “Athens Dramatic Company” (Theodoros Pofantis) decided to re-establish his troupe, but after unpleasant adventures, he passed away. In the year 1934, the Greek Dramatic Troupe of Athens revived with works including: The Man of the Day, A Dying Heart, A Dream Was and Gone, An Inspection, The Two Sergeants, The Mother, the Father-in-Law and the Non-existent Son-in-law, before finally expiring in 1935, after nearly 40 years of historical passage.

Keywords: athens, dramatic, company, universal, troupe

Procedia PDF Downloads 39
100 Evaluating the Perception of Roma in Europe through Social Network Analysis

Authors: Giulia I. Pintea

Abstract:

The Roma people are a nomadic ethnic group native to India, and they are one of the most prevalent minorities in Europe. In the past, Roma were enslaved and they were imprisoned in concentration camps during the Holocaust; today, Roma are subject to hate crimes and are denied access to healthcare, education, and proper housing. The aim of this project is to analyze how the public perception of the Roma people may be influenced by antiziganist and pro-Roma institutions in Europe. In order to carry out this project, we used social network analysis to build two large social networks: The antiziganist network, which is composed of institutions that oppress and racialize Roma, and the pro-Roma network, which is composed of institutions that advocate for and protect Roma rights. Measures of centrality, density, and modularity were obtained to determine which of the two social networks is exerting the greatest influence on the public’s perception of Roma in European societies. Furthermore, data on hate crimes on Roma were gathered from the Organization for Security and Cooperation in Europe (OSCE). We analyzed the trends in hate crimes on Roma for several European countries for 2009-2015 in order to see whether or not there have been changes in the public’s perception of Roma, thus helping us evaluate which of the two social networks has been more influential. Overall, the results suggest that there is a greater and faster exchange of information in the pro-Roma network. However, when taking the hate crimes into account, the impact of the pro-Roma institutions is ambiguous, due to differing patterns among European countries, suggesting that the impact of the pro-Roma network is inconsistent. Despite antiziganist institutions having a slower flow of information, the hate crime patterns also suggest that the antiziganist network has a higher impact on certain countries, which may be due to institutions outside the political sphere boosting the spread of antiziganist ideas and information to the European public.

Keywords: applied mathematics, oppression, Roma people, social network analysis

Procedia PDF Downloads 248
99 Unlocking Justice: Exploring the Power and Challenges of DNA Analysis in the Criminal Justice System

Authors: Sandhra M. Pillai

Abstract:

This article examines the relevance, difficulties, and potential applications of DNA analysis in the criminal justice system. A potent tool for connecting suspects to crime sites, clearing the innocent of wrongdoing, and resolving cold cases, DNA analysis has transformed forensic investigations. The scientific foundations of DNA analysis, including DNA extraction, sequencing, and statistical analysis, are covered in the article. To guarantee accurate and trustworthy findings, it also discusses the significance of quality assurance procedures, chain of custody, and DNA sample storage. DNA analysis has significantly advanced science, but it also brings up substantial moral and legal issues. To safeguard individual rights and uphold public confidence, privacy concerns, possible discrimination, and abuse of DNA information must be properly addressed. The paper also emphasises the effects of the criminal justice system on people and communities while highlighting the necessity of equity, openness, and fair access to DNA testing. The essay describes the obstacles and future directions for DNA analysis. It looks at cutting-edge technology like next-generation sequencing, which promises to make DNA analysis quicker and more affordable. To secure the appropriate and informed use of DNA evidence, it also emphasises the significance of multidisciplinary collaboration among scientists, law enforcement organisations, legal experts, and policymakers. In conclusion, DNA analysis has enormous potential for improving the course of criminal justice. We can exploit the potential of DNA technology while respecting the ideals of justice, fairness, and individual rights by navigating the ethical, legal, and societal issues and encouraging discussion and collaboration.

Keywords: DNA analysis, DNA evidence, reliability, validity, legal frame, admissibility, ethical considerations, impact, future direction, challenges

Procedia PDF Downloads 41
98 Ex-Offenders’ Labelling, Stigmatisation and Unsuccessful Re-Integration as Factors Leading into Recidivism: A South African Context

Authors: Tshimangadzo Oscar Magadze

Abstract:

For successful re-integration, the individual offender must adapt and transform, which requires that the offender should adopt and internalise socially approved norms, attitudes, values, and beliefs. However, the offender’s labelling and community stigmatisation decide the destination of the offender. Community involvement in ex-offenders’ re-integration is an important issue in efforts to reduce recidivism and to control overcrowding in our correctional facilities. Crime is a social problem that requires society to come together to fight against it. This study was conducted in the Limpopo Province in Vhembe District Municipality within four local municipalities, namely Musina, Makhado, Mutale, and Thulamela. A total number of 30 participants were interviewed, and all were members of the Community Corrections Forums. This was necessitated by the fact that Musina is a very small area, which compelled the Department of Correctional Services to combine the two (Musina and Makhado) into one social re-integration entity. This is a qualitative research study where participants were selected through the use of purposive sampling. Participants were selected based on the value they would add to this study in order to achieve the objectives. The data collection method of this study was the focus group, which comprised of three groups of 10 participants each. Thulamela and Mutale local municipalities formed a group with (10) participants each, whereas Musina (2) and Makhado (8) formed another. Results indicate that the current situation is not conducive for re-integration to be successful. Participants raised many factors that need serious redress, namely offenders’ discrimination, lack of forgiveness by members of the community, which is fuelled by lack of community awareness due to the failure of the Department of Correctional Services in educating communities on ex-offenders’ re-integration.

Keywords: ex-offender, labeling, re-integration, stigmatization

Procedia PDF Downloads 119
97 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom

Authors: Chih-Ping Chang

Abstract:

Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.

Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner

Procedia PDF Downloads 269
96 Public Attitudes toward Domestic Violence against Women in China and Spain: A Cross-Cultural Study

Authors: Menglu Yang, Ani Beybutyan, Rocio Pina, Miguel Angel Soria

Abstract:

Domestic violence against women is one of the most serious social problems in the world. Attitudes toward domestic violence against women play an important role in the perpetration of violence against women, the way that victims respond to the violence, and how the community responds to violence against women. China and Spain are countries which have been influenced by the culture which males hold power and dominance over the female for a long time. However, as more connected with other European countries, the legal enforcement related to domestic violence against women developed earlier in Spain, and consequently, social awareness of violence against women evolved differently in two countries. The present study aimed to explore and compare the attitudes toward domestic violence against women across China and Spain, and their influence factors, such as gender equality attitudes and coercive control. Totally 506 participants, 255 from China and 251 from Spain completed questionnaires, including attitudes toward domestic violence against women, definition of violence behavior, justification for violence, gender equity attitudes, and coercive control. Results demonstrated that Chinese participants were less aware of domestic violence against women issue but more agreed that such issue was a crime than Spanish participants. In addition to cultural difference, gender equality attitudes, coercive control, gender, and age also affected attitudes toward domestic violence against women. Our findings imply attitudes toward domestic violence against women differ from countries along with the difference in gender equity attitudes and coercive control; such a difference may arise from cultural, traditional belief and current justice system influence. Despite the developed justice system, male dominance culture may lead to maintain the belief that domestic violence is domestic and private issue which police and justice force may not get involved.

Keywords: cross-cultural differences, domestic violence, public attitudes, violence against women

Procedia PDF Downloads 241
95 Homosexuality and Culture: A Case Study Depicting the Struggles of a Married Lady

Authors: Athulya Jayakumar, M. Manjula

Abstract:

Though there has been a shift in the understanding of homosexuality from being a sin, crime or pathology in the medical and legal perspectives, the acceptance of homosexuality still remains very scanty in the Indian subcontinent. The present case study is a 24-year-old female who has completed a diploma in polytechnic engineering and residing in the state of Kerala. She initially presented with her husband with complaints of lack of sexual desire and non-cooperation from the index client. After an initial few sessions, the client revealed, in an individual session, about her homosexual orientation which was unknown to her family. She has had multiple short-term relations with females and never had any heterosexual orientation/interest. During her adolescence, she was wondering if she could change herself into a male. However, currently, she accepts her gender. She never wanted a heterosexual marriage; but, had to succumb to the pressure of mother, as a result of a series of unexpected incidents at home and had to agree for the marriage, also with a hope that she may change herself into a bi-sexual. The client was able to bond with the husband emotionally but the multiple attempts at sexual intercourse, at the insistence of the husband, had always been non-pleasurable and induced a sense of disgust. Currently, for several months, there has not been any sexual activity. Also, she actively avoids any chance to have a warm communication with him so that she can avoid chances of him approaching her in a sexual manner. The case study is an attempt to highlight the culture and the struggles of a homosexual individual who comes to therapy for wanting to be a ‘normal wife’ despite having knowledge of legal rights and scenario. There is a scarcity of Indian literature that has systematically investigated issues related to homosexuality. Data on prevalence, emotional problems faced and clinical services available are sparse though it is crucial for increasing understanding of sexual behaviour, orientation and difficulties faced in India.

Keywords: case study, culture, cognitive behavior therapy, female homosexuality

Procedia PDF Downloads 325
94 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.

Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms

Procedia PDF Downloads 63
93 A Novel Methodology for Browser Forensics to Retrieve Searched Keywords from Windows 10 Physical Memory Dump

Authors: Dija Sulekha

Abstract:

Nowadays, a good percentage of reported cybercrimes involve the usage of the Internet, directly or indirectly for committing the crime. Usually, Web Browsers leave traces of browsing activities on the host computer’s hard disk, which can be used by investigators to identify internet-based activities of the suspect. But criminals, who involve in some organized crimes, disable browser file generation feature to hide the evidence while doing illegal activities through the Internet. In such cases, even though browser files were not generated in the storage media of the system, traces of recent and ongoing activities were generated in the Physical Memory of the system. As a result, the analysis of Physical Memory Dump collected from the suspect's machine retrieves lots of forensically crucial information related to the browsing history of the Suspect. This information enables the cyber forensic investigators to concentrate on a few highly relevant selected artefacts while doing the Offline Forensics analysis of storage media. This paper addresses the reconstruction of web browsing activities by conducting live forensics to identify searched terms, downloaded files, visited sites, email headers, email ids, etc. from the physical memory dump collected from Windows 10 Systems. Well-known entry points are available for retrieving all the above artefacts except searched terms. The paper describes a novel methodology to retrieve the searched terms from Windows 10 Physical Memory. The searched terms retrieved in this way can be used for doing advanced file and keyword search in the storage media files reconstructed from the file system recovery in offline forensics.

Keywords: browser forensics, digital forensics, live Forensics, physical memory forensics

Procedia PDF Downloads 88
92 The Re-Emergence of Slavery in Libya Is a Crime against Humanity That Must Be Eradicated without Delay

Authors: Vincent Jones

Abstract:

The North African country of Libya is in crisis and is currently a humanitarian disaster. The current American ‘hands off’ foreign policy appear to have contributed to this crisis. The research upon which this paper is based focused on a qualitative analysis of migration to Libya and its history with slavery, current conditions that have contributed to the re-emergence of slavery, an analysis of available resources in the effected region, and an analysis of legal remedies pursuant to international law. In addition, a qualitative analysis of American foreign policy from the Reagan Administration through the current Trump administration has been a focus of analysis. The major findings of this research are: (1) Since the removal of Muammar Gadhafi, a move that the United States played a major role in achieving, the nation of Libya has been in free fall and the rule of law has all but disappeared. As a major port stop for refugees and migrants fleeing atrocities in sub-Saharan African states, Libya has become the gate way to European ports of asylum. The problem is these migrant refugees are unwanted, caught between rival and often ineffective governments, profiteers, and inaction from the international community. (2) The outlook for these refugees is bleak: the ineffective government of Libya is ill-equipped to handle the large influx, European refugee destination states like Italy and Greece are already overburdened by the Syrian refugee crisis and are reluctant to accept more refugees, leaving the powerful and armed Libyan militia in control of a situation that is ripe for exploitation. (3) The combined intervention of the international community, led by a newly committed and engaged American foreign policy. In conclusion, a new American foreign policy approach along with the active engagement of the United Nations, EU, and the African Union can effectively resolve this humanitarian crisis.

Keywords: slavery, Libya, migrants, slave auction

Procedia PDF Downloads 207
91 Effective Environmental Planning Management (EPM) as Panacea to Sustainable Urban Development

Authors: Jegede Kehinde Jacob, Ola Akeem Bayonle, Adewale Yemi Yekeen

Abstract:

The rapid rate of urban growth in most developing countries of the world in recent times is alarming. Mass movement of people from rural areas to the urban centres, the consequence of the uncontrolled rapid urbanisation resulting to many un-conforming environmental challenges such as inadequate infrastructure, land, water and air pollution, poor environmental sanitation, poor and inadequate housing, urban degradation, sprawl and slums, urban violence, crime, robbery and prostitution as well as many other social vices that make the cities unsustainable. The resultant effects of all these are abysmal failure in the management of cities on the part of the governing authorities and other relevant stakeholders as well as unconducive and unwholesome condition of living of the people. This paper attempts to examine holistically the issue of environmental planning management (EPM) process development and management concept with a view for dynamic and interactive approach for various stakeholders as partners in achieving sustainable cities of our dream. The areas of discussion including conceptual and contextual issues, sustainable cities concept, good urban governance including literature review. The paper goes further to examine opportunities and challenges of built environment generally, the nature and context of environmental problems in particular, the role and duties of environmental planning and management (EPM) process in sustainable urban development. The paper further reviewed briefly the various levels of institutionalisation of EPM process with a typical case study of sustainable Ibadan project (SIP). The paper concludes with a list of recommendations to ensure effective and lasting solutions to cities problems through initiation of EPM process achievable in a sustainable manner.

Keywords: built environment, environmental planning, sustainable cities, sustainable development, urbanization

Procedia PDF Downloads 227
90 Prevention of Ragging and Sexual Gender Based Violence (SGBV) in Higher Education Institutions in Sri Lanka

Authors: Anusha Edirisinghe

Abstract:

Sexual Gender based violence is a most common social phenomenon in higher education institutions. It has become a hidden crime of the Universities. Masculinities norms and attitudes are more influential and serve as key drivers and risk for ragging and SGBV. This research will reveal that in Sri Lankan universities, SGBV takes from the violence and murder of women students, assault and battery coerced sex, sexual harassment including harassment via information technology. This study focus is to prevention of ragging and SGBV in University system. Main objective of this paper describes and critically analyses of plight of ragging and SGBV in higher education institutions and legal and national level policy implementation to prevent these crimes in society. This paper is with special reference to ragging case from University of Kelaniya 2016. University Grant commission introduced an Act for the prevention of Ragging and gender standing committee established in Sri Lanka in 2016. And each university has been involved in the prevention of SGBV and ragging in higher education institutions. Case study from first year female student, reported sexual harassment was reported to the police station in May in 2016. After this case, the university has been implementing emergency action plan, short term and long term action plan. Ragging and SGBV task force was established and online complaint center opened to all students and academic and non- academics. Under these circumstances student complained to SGBV and other harassment to the university. University security system was strong support with police and marshals, and vigilant committees including lecturers. After this case all universities start to several programmes to stop violence in university

Keywords: higher Education, ragging, sexual gender-based violence, Sri Lanka

Procedia PDF Downloads 348
89 Neuropsychological Disabilities in Executive Functions and Visuospatial Skills of Juvenile Offenders in a Half-Open Program in Santiago De Chile

Authors: Gabriel Sepulveda Navarro

Abstract:

Traditional interventions for young offenders are necessary but not sufficient to tackle the multiple causes of juvenile crime. For instance, interventions offered to young offenders often are verbally mediated and dialogue based, requiring important metacognitive abilities as well as abstract thinking, assuming average performance in a wide variety of skills. It seems necessary to assess a broader set of abilities and functions in order to increase the efficiency of interventions while addressing offending. In order to clarify these assumptions, Stroop Test, as well as Rey-Osterrieth Complex Figure Test were applied to juvenile offenders tried and sentenced for violent crimes in Santiago de Chile. A random sample was drawn from La Cisterna Half-Open Program, consisting of 50 young males between 18 and 24 years old, residing in different districts of Santiago de Chile. The analysis of results suggests a disproportionately elevated incidence of impairments in executive functions and visuospatial skills. As an outcome, over 40% of the sample shows a significant low performance in both assessments, exceeding four times the same prevalence rates among young people in the general population. While executive functions entail working memory (being able to keep information and use it in some way), cognitive flexibility (to think about something in more than one way) and inhibitory control (being able to self-control, ignore distractions and delay immediate gratification), visuospatial skills permit to orientate and organize a planned conduct. All of these abilities are fundamental to the skill of avoiding violent behaviour and abiding by social rules. Understanding the relevance of neurodevelopmental impairments in the onset of violent and criminal behaviour, as well as recidivism, eventually may guide the deployment of a more comprehensive assessment and treatment for juvenile offenders.

Keywords: executive functions, half-open program, juvenile offenders, neurodisabilities, visuospatial skills

Procedia PDF Downloads 128
88 Development of a Multi-Locus DNA Metabarcoding Method for Endangered Animal Species Identification

Authors: Meimei Shi

Abstract:

Objectives: The identification of endangered species, especially simultaneous detection of multiple species in complex samples, plays a critical role in alleged wildlife crime incidents and prevents illegal trade. This study was to develop a multi-locus DNA metabarcoding method for endangered animal species identification. Methods: Several pairs of universal primers were designed according to the mitochondria conserved gene regions. Experimental mixtures were artificially prepared by mixing well-defined species, including endangered species, e.g., forest musk, bear, tiger, pangolin, and sika deer. The artificial samples were prepared with 1-16 well-characterized species at 1% to 100% DNA concentrations. After multiplex-PCR amplification and parameter modification, the amplified products were analyzed by capillary electrophoresis and used for NGS library preparation. The DNA metabarcoding was carried out based on Illumina MiSeq amplicon sequencing. The data was processed with quality trimming, reads filtering, and OTU clustering; representative sequences were blasted using BLASTn. Results: According to the parameter modification and multiplex-PCR amplification results, five primer sets targeting COI, Cytb, 12S, and 16S, respectively, were selected as the NGS library amplification primer panel. High-throughput sequencing data analysis showed that the established multi-locus DNA metabarcoding method was sensitive and could accurately identify all species in artificial mixtures, including endangered animal species Moschus berezovskii, Ursus thibetanus, Panthera tigris, Manis pentadactyla, Cervus nippon at 1% (DNA concentration). In conclusion, the established species identification method provides technical support for customs and forensic scientists to prevent the illegal trade of endangered animals and their products.

Keywords: DNA metabarcoding, endangered animal species, mitochondria nucleic acid, multi-locus

Procedia PDF Downloads 89
87 An Empirical Study on the Impact of Peace in Tourists' Country of Origin on Their Travel Behavior

Authors: Claudia Seabra, Elisabeth Kastenholz, José Luís Abrantes, Manuel Reis

Abstract:

In a world of increasing mobility and global risks, terrorism has, in a perverse way, capitalized on contemporaneous society’s growing interest in travel to explore a world whose national boundaries and distances have decreased. Terrorists have identified the modern tourist flows originated from the economically more developed countries as new appealing targets so as to: i) call attention to the causes they defend and ii) destroy a country’s foundations of tourism, with the final aim of disrupting the economic and consequently social fabric of the affected countries. The present study analyses sensitivity towards risk and travel behaviors in international travel amongst a sample of 600 international tourists from 49 countries travelling by air. Specifically, the sample was segmented according to the Global Peace Index. This index defines country profiles regarding the levels of peace. The indicators used are established over three broad themes: i) ongoing domestic and international conflict; ii) societal safety and security; and iii) militarisation. Tourists were segmented, according to their country of origin, in different levels of peacefulness. Several facets of travel behavior were evaluated, namely motivations, attitude towards trip planning, quality perception and perceived value of the trip. Also factors related with risk perception were evaluated, specifically terrorism risk perception during the trip, unsafety sensation as well as importance attributed to safety in travel. Results contribute to our understanding of the role of previous exposure to the lack of peace and safety at home in the international tourists behaviors, which is further discussed in terms of tourism management and marketing implications which should particularly interest tourism services and destinations more affected by terrorism, war, political turmoil, crime and other safety risks.

Keywords: terrorism, tourism, safety, risk perception

Procedia PDF Downloads 416
86 Development of a Fuzzy Logic Based Model for Monitoring Child Pornography

Authors: Mariam Ismail, Kazeem Rufai, Jeremiah Balogun

Abstract:

A study was conducted to apply fuzzy logic to the development of a monitoring model for child pornography based on associated risk factors, which can be used by forensic experts or integrated into forensic systems for the early detection of child pornographic activities. A number of methods were adopted in the study, which includes an extensive review of related works was done in order to identify the factors that are associated with child pornography following which they were validated by an expert sex psychologist and guidance counselor, and relevant data was collected. Fuzzy membership functions were used to fuzzify the associated variables identified alongside the risk of the occurrence of child pornography based on the inference rules that were provided by the experts consulted, and the fuzzy logic expert system was simulated using the Fuzzy Logic Toolbox available in the MATLAB Software Release 2016. The results of the study showed that there were 4 categories of risk factors required for assessing the risk of a suspect committing child pornography offenses. The results of the study showed that 2 and 3 triangular membership functions were used to formulate the risk factors based on the 2 and 3 number of labels assigned, respectively. The results of the study showed that 5 fuzzy logic models were formulated such that the first 4 was used to assess the impact of each category on child pornography while the last one takes the 4 outputs from the 4 fuzzy logic models as inputs required for assessing the risk of child pornography. The following conclusion was made; there were factors that were related to personal traits, social traits, history of child pornography crimes, and self-regulatory deficiency traits by the suspects required for the assessment of the risk of child pornography crimes committed by a suspect. Using the values of the identified risk factors selected for this study, the risk of child pornography can be easily assessed from their values in order to determine the likelihood of a suspect perpetuating the crime.

Keywords: fuzzy, membership functions, pornography, risk factors

Procedia PDF Downloads 102
85 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward

Authors: Ahmad Almaududy Amri

Abstract:

Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.

Keywords: piracy, Southeast Asia, maritime security, legal frameworks

Procedia PDF Downloads 476
84 Migration Law in Republic of Panama

Authors: Ronel Solis, Leonardo Collado

Abstract:

Migration law in the Republic of Panama has been regulated mainly by the executive branch. This has created a crisis not only institutional but also social because the evolution of these norms has rested greatly from the discretion of the government in office. This has created instability in immigration regulation and more now, with the migration crisis of which Panama is also part. Different migration policies have been established. The most recent is that of the controlled migration flow, in which, for humanitarian reasons, migrants move from the border with Colombia to the border with Costa Rica. Unfortunately, such control is not enough, and in some cases, unprotected migrants have been confined for months, their passports have been withheld, and no recognition of their rights is offered. The Inter-American Court of Human Rights has condemned Panama for the unfair detention of an irregular migrant, who was detained for two years in Panamanian prisons, without having committed a crime and without accessing a just defense. This is the case Vélez Loor vs. the Republic of Panama. Uncontrollable migration has been putting pressure on Panamanian public health services. The recent denunciation of HIV-related NGOs that warns that there are hundreds of foreigners who receive expensive antiretroviral therapy in Panama is serious, and several of them are irregular migrants. On the other hand, there are no border control posts with the Republic of Colombia, because it is a jungle area and migrants are exposed to arms and drug trafficking, and unfortunately, also to prostitution. Government entities such as the border police service have provided humanitarian support to migrants on the border with Colombia, although it is not their administrative function, and various entities discuss who should address this crisis. However, few economic resources are allocated by the government to solve this problem, especially with the recent mass migration of Venezuelans who have fled their country. The establishment of a migratory normative code is necessary to establish uniformity in the recognition and application of migratory rights. In this way, dependence on the changing migration policies of the different Panamanian governments would be eliminated, and the rights of migrants and nationals would be guaranteed.

Keywords: executive branch, irregular migration, migration code, Republic of Panama

Procedia PDF Downloads 100
83 Islam and Globalization: Accommodation or Containment of One by the Other

Authors: Mohammed Isah Shehu

Abstract:

This paper examined the context of globalization and Islam and accommodation or containment of one by the other. The paper is born out of the misconception and misunderstanding among many people that globalization is purely Western, anti-Islam and that Islam, globalization and Islam are diametrically opposed as such have no places for accommodating each other. The study used secondary sources to gather data. The study found that from its origin, Islam is in the whole context, a globalized religion and the contemporary globalization is already contained by Islam; that while contemporary globalization is centered on Western world, values and preferences (Western civilization, information and communication technology, free markets, trade and investments); some of the major foundation works that are aiding globalization were originally handiworks of past great Muslims (Islamic civilizations, Order of Algebra, tools of Navigation, Calligraphy, Medicine, Astronomy et cetera) whose major values are not Islamic; with globalization the Muslims have greater opportunities of spreading of Islam and practicing it in a most conducive atmosphere, easy and fast linkage with their fellow Muslim brothers wherever they may be; easier and freer world of trade and have the best opportunities to most things. The study however observed that Western contemporary globalization poses threats to religions such as those of globalization of immorality, injustice, trade with anti-Islamic terms and conditions, internationalized crime et cetera. Muslims would have to avoid or be cautious of many things for Islam is a complete religion that has what is forbidden and allowed (halaal and haramm) based on principles of (Shariah, justice to all, humanity and compassion, obedience to and seeking Allah’s pleasure); to Muslims, Contemporary globalization has to be in conformity with original provisions of Islam. The study recommended that Muslims must rise up in seeking knowledge on Islam and all other fields, further intellectual explorations of works by Muslim scholars/thinkers so that any advancement in globalization would be properly domesticated within Islam for the Muslims to make optimum use of any advancement to the benefit of Islam.

Keywords: accommodation, containment, Islam, globalization

Procedia PDF Downloads 259
82 Youth and Conflict in Pakistan: Understanding Causes and Promoting Peace

Authors: Irfan Khan

Abstract:

Both the analytical methods used to understand the phenomena of peacebuilding and the ensuing viewpoints on achieving and sustaining "sustainable peace" are broad and diverse. This new field of study draws from sociology, anthropology, political theory, and political economy, psychology, international relations, and more recently, the development sciences to examine the wide range of 'conflicts' it describes. This paper emphasizes the significance of investigating the causes of juvenile disputes. It explains how police corruption encourages youth crime and why it's so important to address this issue head-on. It also examines the historical foundations and external pressures that have increased religious extremism and sectarian strife in Pakistan. The primary argument is that peace is not only a desirable 'goal' in itself but also that it may be a means to achieve political stability and long-term prosperity. Strategies for constructing peace may take many shapes, each tailored to the specifics of a given conflict, its scope, and the individuals involved. By drawing on some existing literature and applying it to the situation in Pakistan, this article proposes a viewpoint that centers on the participation of young people in the peacebuilding process. Due to their enhanced susceptibility and penchant for demanding change, young people are more likely to get involved in a conflict when economic failure and unemployment are present. The piece also emphasizes the marginalization young people experience as a result of their absence from decision-making processes and the political system. The article claims that Pakistan's rapidly growing young population presents a significant chance for a long-term "demographic dividend" in the form of improvements in peacebuilding processes. This benefit will only materialize if serious steps are taken to increase young people's voice and agency in political decision-making.

Keywords: peacebuilding, youth-led initiatives, empowerment, conflict & violence, religious extremism, political involvement, decision-making

Procedia PDF Downloads 41
81 Consequences of Youth Bulge in Pakistan

Authors: Muhammad Farooq, Muhammad Idrees

Abstract:

The present study has been designed to explore the causes and effects of Youth Bulge in Pakistan. However, youth bulge is a part of population segment which create problem for the whole society. The youth bulge is a common phenomenon in many developing countries, and in particular, in the least developed countries. It is often due to a stage of development where a country achieves success in reducing infant mortality but mothers still have a high fertility rate. The result is that a large share of the population is comprised of children and young adults, and today’s children are tomorrow’s young adults. Youth often play a prominent role in political violence and the existence of a “youth bulge” has been associated with times of political crisis. The population pyramid of Pakistan represents a large youth proportion and our government did not use that youth in positive way and did not provide them opportunity for development, this situation creates frustration in youth that leads them towards conflict, unrest and violence. This study will be focus on the opportunity and motives of the youth bulge situation in Pakistan in the lens of youth bulge theory. Moreover, it will give some suggestions to utilize youth in the development activities and avoid youth bulge situation in Pakistan. The present research was conducted in the metropolitan entities of Punjab, Pakistan. A sample of 300 respondents was taken from three randomly selected metropolitan entities (Faisalabad, Lahore and Rawalpindi) of Punjab Province of Pakistan. Information regarding demography, household, locality and other socio-cultural variables related to causes and effects of youth bulge in the state was collected through a well structured interview schedule. Mean, Standard Deviation and frequency distribution were used to check the measure of central tendency. Multiple linear regression was also applied to measure the influence of various independent variables on the response variable.

Keywords: youth bulge, violence, conflict, social unrest, crime, metropolitan entities, mean, standard deviation, multiple linear regression

Procedia PDF Downloads 427
80 A Convolutional Neural Network Based Vehicle Theft Detection, Location, and Reporting System

Authors: Michael Moeti, Khuliso Sigama, Thapelo Samuel Matlala

Abstract:

One of the principal challenges that the world is confronted with is insecurity. The crime rate is increasing exponentially, and protecting our physical assets especially in the motorist industry, is becoming impossible when applying our own strength. The need to develop technological solutions that detect and report theft without any human interference is inevitable. This is critical, especially for vehicle owners, to ensure theft detection and speedy identification towards recovery efforts in cases where a vehicle is missing or attempted theft is taking place. The vehicle theft detection system uses Convolutional Neural Network (CNN) to recognize the driver's face captured using an installed mobile phone device. The location identification function uses a Global Positioning System (GPS) to determine the real-time location of the vehicle. Upon identification of the location, Global System for Mobile Communications (GSM) technology is used to report or notify the vehicle owner about the whereabouts of the vehicle. The installed mobile app was implemented by making use of python as it is undoubtedly the best choice in machine learning. It allows easy access to machine learning algorithms through its widely developed library ecosystem. The graphical user interface was developed by making use of JAVA as it is better suited for mobile development. Google's online database (Firebase) was used as a means of storage for the application. The system integration test was performed using a simple percentage analysis. Sixty (60) vehicle owners participated in this study as a sample, and questionnaires were used in order to establish the acceptability of the system developed. The result indicates the efficiency of the proposed system, and consequently, the paper proposes the use of the system can effectively monitor the vehicle at any given place, even if it is driven outside its normal jurisdiction. More so, the system can be used as a database to detect, locate and report missing vehicles to different security agencies.

Keywords: CNN, location identification, tracking, GPS, GSM

Procedia PDF Downloads 128
79 A Study of Blood Alcohol Concentration in People Arrested for Various Offences and Its Demographic Pattern

Authors: Tabin Millo, Khoob Chand, Ashok Kumar Jaiswal

Abstract:

Introduction: Various kinds of violence and offences are related to alcohol consumption by the offenders. The relationship between alcohol and violence is complex. But its study is important to achieve understanding of violence as well as alcohol related behavior. This study was done to know the blood alcohol concentration in people involved in various offences and its demographic pattern. The study was carried out in the forensic toxicology laboratory, department of Forensic Medicine, All India Institute of Medical Sciences, New Delhi, India. Material and methods: The blood samples were collected from the arrested people shortly after the commission of the offence by the emergency medical officers in the emergency department and forwarded to the forensic toxicology laboratory through the investigating officer. The blood samples were collected in EDTA vial with sodium fluoride preservative. The samples were analyzed by using gas chromatography with head space (GC-HS), which is ideal for alcohol estimation. The toxicology reports were given within a week. The data of seven years (2011-17) were analyzed for its alcohol concentration, associated crimes and its demographic pattern. Analysis and conclusion: Total 280 samples were analyzed in the period of 2011-2017. All were males except one female who was a bar dancer. The maximum cases were in the age group of 21-30 years (124 cases). The type of offences involved were road traffic accidents (RTA), assault cases, drunken driving, drinking in public place, drunk on duty, sexual offence, bestiality, eve teasing, fall etc. The maximum cases were of assault (75 cases) followed by RTA (64 cases). The maximum cases were in the alcohol concentration range of 101-150mg% (58 cases) followed by 51-100mg% (52 cases). The maximum blood alcohol level detected was 391.51 mg%, belonging to a security guard found unconscious. This study shows that alcohol consumption is associated with various kinds of violence and offences in society.

Keywords: alcohol, crime, toxicology, violence

Procedia PDF Downloads 117
78 The Impact of Undocumented Migration on Human Security in Northern Nigeria

Authors: Targba Aondowase

Abstract:

Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.

Keywords: human security, impact, migration, undocumented

Procedia PDF Downloads 308
77 Legal Personality and Responsibility of Robots

Authors: Mehrnoosh Abouzari, Shahrokh Sahraei

Abstract:

Arrival of artificial intelligence or smart robots in the modern world put them in charge on pericise and at risk. So acting human activities with robots makes criminal or civil responsibilities for their acts or behavior. The practical usage of smart robots has entered them in to a unique situation when naturalization happens and smart robots are identifies as members of society. There would be some legal situation by adopting these new smart citizens. The first situation is about legal responsibility of robots. Recognizing the naturalization of robot involves some basic right , so humans have the rights of employment, property, housing, using energy and other human rights may be employed for robots. So how would be the practice of these rights in the society and if some problems happens with these rights, how would the civil responsibility and punishment? May we consider them as population and count on the social programs? The second episode is about the criminal responsibility of robots in important activity instead of human that is the aim of inventing robots with handling works in AI technology , but the problem arises when some accidents are happened by robots who are in charge of important activities like army, surgery, transporting, judgement and so on. Moreover, recognizing independent identification for robots in the legal world by register ID cards, naturalization and civilian rights makes and prepare the same rights and obligations of human. So, the civil responsibility is not avoidable and if the robot commit a crime it would have criminal responsibility and have to be punished. The basic component of criminal responsibility may changes in so situation. For example, if designation for criminal responsibility bounds to human by sane, maturity, voluntariness, it would be for robots by being intelligent, good programming, not being hacked and so on. So it is irrational to punish robots by prisoning , execution and other human punishments for body. We may determine to make digital punishments like changing or repairing programs, exchanging some parts of its body or wreck it down completely. Finally the responsibility of the smart robot creators, programmers, the boss in chief, the organization who employed robot, the government which permitted to use robot in important bases and activities , will be analyzing and investigating in their article.

Keywords: robot, artificial intelligence, personality, responsibility

Procedia PDF Downloads 118
76 Chemical Warfare Agent Simulant by Photocatalytic Filtering Reactor: Effect of Operating Parameters

Authors: Youcef Serhane, Abdelkrim Bouzaza, Dominique Wolbert, Aymen Amin Assadi

Abstract:

Throughout history, the use of chemical weapons is not exclusive to combats between army corps; some of these weapons are also found in very targeted intelligence operations (political assassinations), organized crime, and terrorist organizations. To improve the speed of action, important technological devices have been developed in recent years, in particular in the field of protection and decontamination techniques to better protect and neutralize a chemical threat. In order to assess certain protective, decontaminating technologies or to improve medical countermeasures, tests must be conducted. In view of the great toxicity of toxic chemical agents from (real) wars, simulants can be used, chosen according to the desired application. Here, we present an investigation about using a photocatalytic filtering reactor (PFR) for highly contaminated environments containing diethyl sulfide (DES). This target pollutant is used as a simulant of CWA, namely of Yperite (Mustard Gas). The influence of the inlet concentration (until high concentrations of DES (1200 ppmv, i.e., 5 g/m³ of air) has been studied. Also, the conversion rate was monitored under different relative humidity and different flow rates (respiratory flow - standards: ISO / DIS 8996 and NF EN 14387 + A1). In order to understand the efficacity of pollutant neutralization by PFR, a kinetic model based on the Langmuir–Hinshelwood (L–H) approach and taking into account the mass transfer step was developed. This allows us to determine the adsorption and kinetic degradation constants with no influence of mass transfer. The obtained results confirm that this small configuration of reactor presents an extremely promising way for the use of photocatalysis for treatment to deal with highly contaminated environments containing real chemical warfare agents. Also, they can give birth to an individual protection device (an autonomous cartridge for a gas mask).

Keywords: photocatalysis, photocatalytic filtering reactor, diethylsulfide, chemical warfare agents

Procedia PDF Downloads 77
75 Legal Judgment Prediction through Indictments via Data Visualization in Chinese

Authors: Kuo-Chun Chien, Chia-Hui Chang, Ren-Der Sun

Abstract:

Legal Judgment Prediction (LJP) is a subtask for legal AI. Its main purpose is to use the facts of a case to predict the judgment result. In Taiwan's criminal procedure, when prosecutors complete the investigation of the case, they will decide whether to prosecute the suspect and which article of criminal law should be used based on the facts and evidence of the case. In this study, we collected 305,240 indictments from the public inquiry system of the procuratorate of the Ministry of Justice, which included 169 charges and 317 articles from 21 laws. We take the crime facts in the indictments as the main input to jointly learn the prediction model for law source, article, and charge simultaneously based on the pre-trained Bert model. For single article cases where the frequency of the charge and article are greater than 50, the prediction performance of law sources, articles, and charges reach 97.66, 92.22, and 60.52 macro-f1, respectively. To understand the big performance gap between articles and charges, we used a bipartite graph to visualize the relationship between the articles and charges, and found that the reason for the poor prediction performance was actually due to the wording precision. Some charges use the simplest words, while others may include the perpetrator or the result to make the charges more specific. For example, Article 284 of the Criminal Law may be indicted as “negligent injury”, "negligent death”, "business injury", "driving business injury", or "non-driving business injury". As another example, Article 10 of the Drug Hazard Control Regulations can be charged as “Drug Control Regulations” or “Drug Hazard Control Regulations”. In order to solve the above problems and more accurately predict the article and charge, we plan to include the article content or charge names in the input, and use the sentence-pair classification method for question-answer problems in the BERT model to improve the performance. We will also consider a sequence-to-sequence approach to charge prediction.

Keywords: legal judgment prediction, deep learning, natural language processing, BERT, data visualization

Procedia PDF Downloads 96