Search results for: criminal law theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4901

Search results for: criminal law theory

4631 The Routes of Human Suffering: How Point-Source and Destination-Source Mapping Can Help Victim Services Providers and Law Enforcement Agencies Effectively Combat Human Trafficking

Authors: Benjamin Thomas Greer, Grace Cotulla, Mandy Johnson

Abstract:

Human trafficking is one of the fastest growing international crimes and human rights violations in the world. The United States Department of State (State Department) approximates some 800,000 to 900,000 people are annually trafficked across sovereign borders, with approximately 14,000 to 17,500 of these people coming into the United States. Today’s slavery is conducted by unscrupulous individuals who are often connected to organized criminal enterprises and transnational gangs, extracting huge monetary sums. According to the International Labour Organization (ILO), human traffickers collect approximately $32 billion worldwide annually. Surpassed only by narcotics dealing, trafficking of humans is tied with illegal arms sales as the second largest criminal industry in the world and is the fastest growing field in the 21st century. Perpetrators of this heinous crime abound. They are not limited to single or “sole practitioners” of human trafficking, but rather, often include Transnational Criminal Organizations (TCO), domestic street gangs, labor contractors, and otherwise seemingly ordinary citizens. Monetary gain is being elevated over territorial disputes and street gangs are increasingly operating in a collaborative effort with TCOs to further disguise their criminal activity; to utilizing their vast networks, in an attempt to avoid detection. Traffickers rely on a network of clandestine routes to sell their commodities with impunity. As law enforcement agencies seek to retard the expansion of transnational criminal organization’s entry into human trafficking, it is imperative that they develop reliable trafficking mapping of known exploitative routes. In a recent report given to the Mexican Congress, The Procuraduría General de la República (PGR) disclosed, from 2008 to 2010 they had identified at least 47 unique criminal networking routes used to traffic victims and that Mexico’s estimated domestic victims number between 800,000 adults and 20,000 children annually. Designing a reliable mapping system is a crucial step to effective law enforcement response and deploying a successful victim support system. Creating this mapping analytic is exceedingly difficult. Traffickers are constantly changing the way they traffic and exploit their victims. They swiftly adapt to local environmental factors and react remarkably well to market demands, exploiting limitations in the prevailing laws. This article will highlight how human trafficking has become one of the fastest growing and most high profile human rights violations in the world today; compile current efforts to map and illustrate trafficking routes; and will demonstrate how the proprietary analytical mapping analysis of point-source and destination-source mapping can help local law enforcement, governmental agencies and victim services providers effectively respond to the type and nature of trafficking to their specific geographical locale. Trafficking transcends state and international borders. It demands an effective and consistent cooperation between local, state, and federal authorities. Each region of the world has different impact factors which create distinct challenges for law enforcement and victim services. Our mapping system lays the groundwork for a targeted anti-trafficking response.

Keywords: human trafficking, mapping, routes, law enforcement intelligence

Procedia PDF Downloads 355
4630 The Phenomenon of Nutrition as a 'Trading Zone' Approach in the Paradigm Shift between Humoral Theory and Modern Medicine

Authors: Dilay Merve Temur

Abstract:

How knowledge is produced and how scientific knowledge progress are questions that science philosophers have investigated for centuries. When the scientific and technological developments reached the 20th century, Kuhn proposed a completely new view among all the approaches. In this article, firstly, Kuhn's theory is represented. Secondly, the criticisms of Kuhn's theory directed to him are examined, and Galison's proposal for the trade area term of the incommensurability thesis is shared. The interaction of Humoral Theory with nutrition has been illustrated extensively, and the transition to modern medicine has been described historically by including scientific and technological developments in the field of medicine. This paper will seek to see how the concept of nutrition is positioned as a trading zone within the medicine paradigm, which has experienced a revolution within the framework of the paradigm concept introduced by Kuhn.

Keywords: food studies, incommensurability, nutrition and dietetics, trading zone

Procedia PDF Downloads 140
4629 Extreme Value Theory Applied in Reliability Analysis: Case Study of Diesel Generator Fans

Authors: Jelena Vucicevic

Abstract:

Reliability analysis represents a very important task in different areas of work. In any industry, this is crucial for maintenance, efficiency, safety and monetary costs. There are ways to calculate reliability, unreliability, failure density and failure rate. In this paper, the results for the reliability of diesel generator fans were calculated through Extreme Value Theory. The Extreme Value Theory is not widely used in the engineering field. Its usage is well known in other areas such as hydrology, meteorology, finance. The significance of this theory is in the fact that unlike the other statistical methods it is focused on rare and extreme values, and not on average. It should be noted that this theory is not designed exclusively for extreme events, but for extreme values in any event. Therefore, this is a great opportunity to apply the theory and test if it could be applied in this situation. The significance of the work is the calculation of time to failure or reliability in a new way, using statistic. Another advantage of this calculation is that there is no need for technical details and it can be implemented in any part for which we need to know the time to fail in order to have appropriate maintenance, but also to maximize usage and minimize costs. In this case, calculations have been made on diesel generator fans but the same principle can be applied to any other part. The data for this paper came from a field engineering study of the time to failure of diesel generator fans. The ultimate goal was to decide whether or not to replace the working fans with a higher quality fan to prevent future failures. The results achieved in this method will show the approximation of time for which the fans will work as they should, and the percentage of probability of fans working more than certain estimated time. Extreme Value Theory can be applied not only for rare and extreme events, but for any event that has values which we can consider as extreme.

Keywords: extreme value theory, lifetime, reliability analysis, statistic, time to failure

Procedia PDF Downloads 306
4628 The Effect of Internal Auditing Function on the Quality of Financial Reporting: A Theoretical Framework

Authors: Hani Albogami

Abstract:

The internal audit function is considered as one of the internal corporate governance mechanisms that may have an impact on improving earnings quality by constraining earnings management. The internal audit function is also a unique corporate governance mechanism because internal auditors have more involvement with the day-to-day operations comparing to the audit committee, and also internal auditors audit their companies the whole year compared to the external auditor who audits only a certain time of the year. The relationships between internal audit function and earnings management can be understood by some theories. Therefore, this paper provides a theoretical background of the influence of the quality of internal audit function on earnings management. In particular, the agency theory, institutional theory, singling theory, and resource dependency theory are adapted by this paper to provide some understanding and analyses that can be a basis for future research to contribute to the corporate governance academic studies.

Keywords: internal audit, corporate governance, earnings management, accounting

Procedia PDF Downloads 153
4627 The Role of Piaget's Theory in Conjecture via Analogical Reasoning

Authors: Supratman Ahman Maedi

Abstract:

The construction of knowledge is the goal of learning. The purpose of this research is to know how the role of Piaget theory in allegation via analogy reasoning. This study uses Think out loads when troubleshooting. To explore conjecturing via analogical reasoning is given the question of open analogy. The result: conjecture via analogical reasoning has been done by students in the construction of knowledge, in conjecture there are differences in thinking flow depending on the basic knowledge of the students, in the construction of knowledge occurs assimilation and accommodation problems, strategies and relationships.

Keywords: analogical reasoning, conjecturing, knowledge construction, Piaget's theory

Procedia PDF Downloads 289
4626 Finding the Theory of Riba Avoidance: A Scoping Review to Set the Research Agenda

Authors: Randa Ismail Sharafeddine

Abstract:

The Islamic economic system is distinctive in that it implicitly recognizes money as a separate, independent component of production capable of assuming risk and so entitled to the same reward as other Entrepreneurial Factors of Production (EFP). Conventional theory does not identify money capital explicitly as a component of production; rather, interest is recognized as a reward for capital, the interest rate is the cost of money capital, and it is also seen as a cost of physical capital. The conventional theory of production examines how diverse non-entrepreneurial resources (Land, Labor, and Capital) are selected; however, the economic theory community is largely unaware of the reasons why these resources choose to remain as non-entrepreneurial resources as opposed to becoming entrepreneurial resources. Should land, labor, and financial asset owners choose to work for others in return for rent, income, or interest, or should they engage in entrepreneurial risk-taking in order to profit. This is a decision made often in the actual world, but it has never been effectively treated in economic theory. This article will conduct a critical analysis of the conventional classification of factors of production and propose a classification for resource allocation and income distribution (Rent, Wages, Interest, and Profits) that is more rational, even within the conventional theoretical framework for evaluating and developing production and distribution theories. Money is an essential component of production in an Islamic economy, and it must be used to sustain economic activity.

Keywords: financial capital, production theory, distribution theory, economic activity, riba avoidance, institution of participation

Procedia PDF Downloads 63
4625 Prosecution as Persecution: Exploring the Enduring Legacy of Judicial Harassment of Human Rights Defenders and Political Opponents in Zimbabwe, Cases from 2013-2016

Authors: Bellinda R. Chinowawa

Abstract:

As part of a wider strategy to stifle civil society, Governments routinely resort to judicial harassment through the use of civil and criminal to impugn the integrity of human rights defenders and that of perceived political opponents. This phenomenon is rife in militarised or autocratic regimes where there is no tolerance for dissenting voices. Zimbabwe, ostensibly a presidential republic founded on the values of transparency, equality, freedom, is characterised by brutal suppression of perceived political opponents and those who assert their basic human rights. This is done through a wide range of tactics including unlawful arrests and detention, torture and other cruel, inhuman degrading treatment and enforced disappearances. Professionals including, journalists and doctors are similarly not spared from state attack. For human rights defenders, the most widely used tool of repression is that of judicial harassment where the judicial system is used to persecute them. This can include the levying of criminal charges, civil lawsuits and unnecessary administrative proceedings. Charges preferred against range from petty offences such as criminal nuisance to more serious charges of terrorism and subverting a constitutional government. Additionally, government sponsored individuals and organisations file strategic lawsuits with pecuniary implications order to intimidate and silence critics and engender self-censorship. Some HRDs are convicted and sentenced to prison terms, despite not being criminals in a true sense. While others are acquitted judicial harassment diverts energy and resources away from their human rights work. Through a consideration of statistical data reported by human rights organisations and face to face interviews with a cross section of human rights defenders, the article will map the incidence of judicial harassment in Zimbabwe. The article will consider the multi-level sociological and contextual factors which influence the Government of Zimbabwe to have easy recourse to criminal law and the debilitating effect of these actions on HRDs. These factors include the breakdown of the rule of law resulting in state capture of the judiciary, the proven efficacy of judicial harassment from colonial times to date, and the lack of an adequate redress mechanism at international level. By mapping the use of the judiciary as a tool of repression, from the inception of modern day Zimbabwe to date, it is hoped that HRDs will realise that they are part of a greater community of activists throughout the ages and should emboldened in the realisation that it is an age old tactic used by fallen regimes which should not deter them from calling for accountability.

Keywords: autocratic regime, colonial legacy, judicial harassment, human rights defenders

Procedia PDF Downloads 208
4624 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 94
4623 Collision Theory Based Sentiment Detection Using Discourse Analysis in Hadoop

Authors: Anuta Mukherjee, Saswati Mukherjee

Abstract:

Data is growing everyday. Social networking sites such as Twitter are becoming an integral part of our daily lives, contributing a large increase in the growth of data. It is a rich source especially for sentiment detection or mining since people often express honest opinion through tweets. However, although sentiment analysis is a well-researched topic in text, this analysis using Twitter data poses additional challenges since these are unstructured data with abbreviations and without a strict grammatical correctness. We have employed collision theory to achieve sentiment analysis in Twitter data. We have also incorporated discourse analysis in the collision theory based model to detect accurate sentiment from tweets. We have also used the retweet field to assign weights to certain tweets and obtained the overall weightage of a topic provided in the form of a query. Hadoop has been exploited for speed. Our experiments show effective results.

Keywords: sentiment analysis, twitter, collision theory, discourse analysis

Procedia PDF Downloads 502
4622 Analysis of Preferences in Decision Making in a Bilateral Negotiation Context: An Experimental Approach from Game Theory

Authors: Laura V. Gonzalez, Juan B. Duarte, Luis A. Palacio

Abstract:

Decision making can be conditioned by factors such as the environments, circumstances, behavioral biases, emotions, beliefs and preferences of the participants. The objective of this paper is to analyze the effect ‘amount of information’ and ‘number of options’, on the behavior of competitors under a bilateral negotiation context. For the above, it has been designed an experiment as a classroom game where they negotiate goods, under the condition that none of the players knows exactly the real value of the asset. The game is designed under the concept of zero-sum (non-cooperative game) and focuses on the fact that agents must anticipate the strategies of their opponent to improve their chances of winning in the negotiation. The empirical results show that, contrary to the traditional view of expected utility theory, players prefer to obtain low profits and losses, when faced with a higher expectation of losses, using sub-optimal strategies not in accordance with game theory.

Keywords: bilateral negotiation, classroom game, decision making, game theory

Procedia PDF Downloads 228
4621 Variation in Orbital Elements of Mars and Jupiter Due to the Sun Oblateness by Using Secular Theory

Authors: Avaneesh Vaishwar, Badam Singh Kushvah, Devi Prasad Mishra

Abstract:

We studied the variation in orbital elements of Mars and Jupiter for a time span of 200 thousand years by using secular theory. Here we took Sun oblateness into account and considered the first two zonal gravity constants (J2 and J4) for showing the effect of Sun oblateness on the orbital elements of Mars and Jupiter. We found that in both cases (with and without Sun oblateness) the variation in orbital elements of Mars and Jupiter is periodic moreover in case of the Sun oblateness, the period of variation in orbital elements is decreasing for both the planets.

Keywords: lagrange's planetary equation, orbital elements, planetary system, secular theory

Procedia PDF Downloads 189
4620 The Role of Women in Criminal Organizations

Authors: Rossella Marzullo

Abstract:

Family plays a central role in the Calabrian criminal organization, which draws its strength from blood ties and gender stereotypes that still impose a strong verticalization of intra-family relationships for the benefit of men. However, female figures are of great importance in the organizational structure of the 'Ndrangheta families, despite the fact that they appear to be formally suffocated by the culture of gender subordination still strongly present in the archaic world of criminal organizations. And this is so much true that over time, the women of the 'Ndrangheta have added to the function of ‘internal containment’, the increasingly explicit function of intermediaries in the ‘external’ activities of the clan. But what happens in the 'Ndrangheta if women break the bond and decide to speak? The results are shocking. When a woman starts talking to ask the institutions for help, the system ‘goes crazy’, because the woman is considered the means of consolidating and transmitting family codes: she educates, forges, holds the structure together. If a woman from the 'Ndrangheta decides to speak out and get out of the family bottlenecks of the clan, she does not exclusively destroy the family; she destroys the system. This happens because, while not playing the same roles as men within organizations, women carry out support activities as intermediaries for the circulation of communications, thus ensuring the operability of the gang in practice and on a daily basis. Crossing the border means breaking the bonds of belonging, thus questioning one's own identity and reconstructing it according to other points of reference. How much these disruptive choices are feared by the men of the 'Ndrangheta has been seen in the dramatic stories of Lea Garofalo and Maria Concetta Cacciola: the fear of the breaking of the family pact, of the earthquake that arises from within, has marked their fate of death, useful both to stop the judicial action and to recompose the organization's estate under the aegis of terror. With physical, psychological violence, underhanded torture, and moral blackmail, the men of the mafia family tried to heal the shock caused by the voices of women, relying on violence and yet another attempt to subordinate them. This proves that the 'Ndrangheta is really afraid of them. The female voices of the 'Ndrangheta, who have shaken a consolidated and considered intangible system, represent the anti-'ndrangheta par excellence; in their choices, there is an even stronger desire to break with the mafia world.

Keywords: families, gender, ‘Ndrangheta, stereotypes

Procedia PDF Downloads 96
4619 The Gap of Green Consumption Behavior: Driving from Attitude to Behavior

Authors: Yu Du, Jian-Guo Wang

Abstract:

Green consumption is a key link to develop the ecological economy, and consumers are vital to carry out green consumption. With environmental awareness gradually being aroused, consumers often fail to turn their positive attitude into actual green consumption behavior. According to behavior reasoning theory, reasons for adoption have a direct (positive) influence on consumers’ attitude while reasons against adoption have a direct (negative) influence on consumers’ adoption intentions, the incongruous coexistence of which leads to the attitude-behavior gap of green consumption. Based on behavior reasoning theory, this research integrates reasons for adoption and reasons against adoption into a proposed model, in which reasons both for and against green consumption mediate the relationship between consumer’ values, attitudes, and behavioral intentions. It not only extends the conventional theory of reasoned action but also provides a reference for the government and enterprises to design the repairing strategy of green consumption attitude-behavior gap.

Keywords: green product, attitude-behavior gap, behavior reasoning theory, green consumption, SEM

Procedia PDF Downloads 414
4618 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s

Authors: Zunjarrao Kadam, Vikas Minchekar

Abstract:

The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.

Keywords: experimentally induced stress, facial recognition, cognition, security personnel

Procedia PDF Downloads 234
4617 The Characteristics of the Chairman of Board of Directors That Are Associated with Better Levels of Performance

Authors: Abilio Pires Zacarias

Abstract:

Analyzing company boards of directors is a relevant and timely topic. As the representative of shareholders, the board is the most senior management body of this type of company. Therefore, ascertaining the best kind of candidates to nominate, namely the most appropriate characteristics for leading the board to achieve better levels of performance, is certainly of great interest. The companies selected for this study were the 1,000 largest non-financial companies and the 100 largest financial companies in Portugal according to the Instituto Nacional de Estatística for 2010. The information stemmed from a questionnaire addressed to the person in charge of daily company management and then processed through STATA 17 with the multivariate analysis of variables - MANOVA. The study may correspondingly report that the vast majority of boards in the sample operate a dual leadership structure. By in terms of its prevalence, unitary leadership represents only a minority. Agency theory and stewardship theory postulate different characteristics for the ideal chairman but neither receive confirmation from our results. On the other hand, our findings do validate the behavioral theory of firms (BToF), concluding that experience is associated with organizational performance. This study is also relevant due to its analysis of companies not listed on the financial markets not only because of their weighting in the economy but also because they remain only very poorly studied in this field and thus also correspondingly contributing to deepening the literature.

Keywords: agency theory, behavioral theory of the firm, board of directors, corporate governance, stewardship theory

Procedia PDF Downloads 146
4616 Conspiracy Theory in Discussions of the Coronavirus Pandemic in the Gulf Region

Authors: Rasha Salameh

Abstract:

In light of the tense relationship between Saudi Arabia and Iran, this research paper sheds some light on Al-Arabiya’s reporting of Coronavirus in the Gulf. Particularly because most of the cases, in the beginning, were coming from Iran, some programs of this Saudi channel embraced a conspiracy theory. Hate speech has been used in talking about the topic and discussing it. The results of these discussions will be detailed in this paper in percentages with regard to the research sample, which includes five programs on Al-Arabiya channel: ‘DNA’, ‘Marraya’ (Mirrors), ‘Panorama’, ‘Tafaolcom’ (Your Interaction) and the ‘Diplomatic Street’, in the period between January 19, that is, the date of the first case in Iran, and April 10, 2020. The research shows the use of a conspiracy theory in the programs, in addition to some professional violations. The surveyed sample also shows that the matter receded due to the Arab Gulf states' preoccupation with the successively increasing cases that have appeared there since the start of the pandemic. The results indicate that hate speech was present in the sample at a rate of 98.1% and that most of the programs that dealt with the Iranian issue under the Corona pandemic on Al Arabiya used the conspiracy theory at a rate of 75.5%.

Keywords: Al-Arabiya, Iran, Corona, hate speech, conspiracy theory, politicization of the pandemic

Procedia PDF Downloads 104
4615 An Exhaustive All-Subsets Examination of Trade Theory on WTO Data

Authors: Masoud Charkhabi

Abstract:

We examine trade theory with this motivation. The full set of World Trade Organization data are organized into country-year pairs, each treated as a different entity. Topological Data Analysis reveals that among the 16 region and 240 region-year pairs there exists in fact a distinguishable group of region-period pairs. The generally accepted periods of shifts from dissimilar-dissimilar to similar-similar trade in goods among regions are examined from this new perspective. The period breaks are treated as cumulative and are flexible. This type of all-subsets analysis is motivated from computer science and is made possible with Lossy Compression and Graph Theory. The results question many patterns in similar-similar to dissimilar-dissimilar trade. They also show indications of economic shifts that only later become evident in other economic metrics.

Keywords: econometrics, globalization, network science, topological data, analysis, trade theory, visualization, world trade

Procedia PDF Downloads 341
4614 The Application of Fuzzy Set Theory to Mobile Internet Advertisement Fraud Detection

Authors: Jinming Ma, Tianbing Xia, Janusz Getta

Abstract:

This paper presents the application of fuzzy set theory to implement of mobile advertisement anti-fraud systems. Mobile anti-fraud is a method aiming to identify mobile advertisement fraudsters. One of the main problems of mobile anti-fraud is the lack of evidence to prove a user to be a fraudster. In this paper, we implement an application by using fuzzy set theory to demonstrate how to detect cheaters. The advantage of our method is that the hardship in detecting fraudsters in small data samples has been avoided. We achieved this by giving each user a suspicious degree showing how likely the user is cheating and decide whether a group of users (like all users of a certain APP) together to be fraudsters according to the average suspicious degree. This makes the process more accurate as the data of a single user is too small to be predictable.

Keywords: mobile internet, advertisement, anti-fraud, fuzzy set theory

Procedia PDF Downloads 147
4613 Molecular Dynamics Simulation of Free Vibration of Graphene Sheets

Authors: Seyyed Feisal Asbaghian Namin, Reza Pilafkan, Mahmood Kaffash Irzarahimi

Abstract:

TThis paper considers vibration of single-layered graphene sheets using molecular dynamics (MD) and nonlocal elasticity theory. Based on the MD simulations, Large-scale Atomic/Molecular Massively Parallel Simulator (LAMMPS), an open source software, is used to obtain fundamental frequencies. On the other hand, governing equations are derived using nonlocal elasticity and first order shear deformation theory (FSDT) and solved using generalized differential quadrature method (GDQ). The small-scale effect is applied in governing equations of motion by nonlocal parameter. The effect of different side lengths, boundary conditions and nonlocal parameter are inspected for aforementioned methods. Results are obtained from MD simulations is compared with those of the nonlocal elasticity theory to calculate appropriate values for the nonlocal parameter. The nonlocal parameter value is suggested for graphene sheets with various boundary conditions. Furthermore, it is shown that the nonlocal elasticity approach using classical plate theory (CLPT) assumptions overestimates the natural frequencies.

Keywords: graphene sheets, molecular dynamics simulations, fundamental frequencies, nonlocal elasticity theory, nonlocal parameter

Procedia PDF Downloads 477
4612 Immigrant Status and System Justification and Condemnation

Authors: Nancy Bartekian, Kaelan Vazquez, Christine Reyna

Abstract:

Immigrants coming into the United States of America may justify the American system (political, economic, healthcare, criminal justice) and see it as functional. This may be explained because they may come from countries that are even more unstable than the U.S. and/or come here to benefit from the promise of the “American dream” -a narrative that they might be more likely to believe in if they were willing to undergo the costly and sometimes dangerous process to immigrate. Conversely, native-born Americans, as well as immigrants who may have lived in America for a longer period of time, would have more experiences with the various broken systems in America that are dysfunctional, fail to provide adequate services equitably, and/or are steeped in systemic racism and other biases that disadvantage lower-status groups. Thus, our research expects that system justification would decrease, and condemnation would increase with more time spent in the U.S. for immigrant groups. We predict that a) those not born in the U.S. will be more likely to justify the system, b) they will also be less likely to condemn the system, and c) the longer an immigrant has been in the U.S. the less likely they will to justify, and more they will to condemn the system. We will use a mixed-model multivariate analysis of covariance (MANCOVA) and control for race, income, and education. We will also run linear regression models to test if there is a relationship between the length of time in the United States and a decrease in system justification, and length of time and an increase in system condemnation for those not born in the U.S. We will also conduct exploratory analyses to see if the predicted patterns are more likely within certain systems over other systems (political, economic, healthcare, criminal justice).

Keywords: immigration, system justification, system condemnation, system qualification

Procedia PDF Downloads 71
4611 Solution of Insurance Pricing Model Giving Optimum Premium Level for Both Insured and Insurer by Game Theory

Authors: Betul Zehra Karagul

Abstract:

A game consists of strategies that each actor has in his/her own choice strategies, and a game regulates the certain rules in the strategies that the actors choose, express how they evaluate their knowledge and the utility of output results. Game theory examines the human behaviors (preferences) of strategic situations in which each actor of a game regards the action that others will make in spite of his own moves. There is a balance between each player playing a game with the final number of players and the player with a certain probability of choosing the players, and this is called Nash equilibrium. The insurance is a two-person game where the insurer and insured are the actors. Both sides have the right to act in favor of utility functions. The insured has to pay a premium to buy the insurance cover. The insured will want to pay a low premium while the insurer is willing to get a high premium. In this study, the state of equilibrium for insurance pricing was examined in terms of the insurer and insured with game theory.

Keywords: game theory, insurance pricing, Nash equilibrium, utility function

Procedia PDF Downloads 327
4610 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks

Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla

Abstract:

A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.

Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional

Procedia PDF Downloads 377
4609 Perpetrators of Ableist Sexual Violence: Understanding Who They Are and Why They Target People with Intellectual Disabilities in Australia

Authors: Michael Rahme

Abstract:

Over the past decade, there is an overwhelming consensus spanning across academia, government commissions, and civil societies that concede that individuals with disabilities (IWDs), particularly those with intellectual differences, are a demographic most ‘vulnerable’ to experiences of sexual violence. From this global accord, numerous policies have sprouted in the protection of this ‘pregnable’ sector of society, primarily framed around liberal obligations of stewardship over the ‘defenceless.’ As such, these initiatives mainly target post-incident or victim-based factors of sexual violence, which is apparent in proposals for more inclusive sexual education and accessible contact lines for IWDs. Yet despite the necessity of these initiatives, sexual incidents among this demographic persist and, in nations such as Australia, continue to rise. Culture of Violence theory reveals that such discrepancies in theory and practice stem from societal structures that frame individuals as ‘vulnerable’, ‘impregnable’, or ‘defenceless’ because of their disability, thus propagating their own likelihood of abuse. These structures, as embodied by the Australian experience, allow these sexual violences to endure through cultural ideologies that place the IWDs ‘failures’ at fault while sidelining the institutions that permit this abuse. Such is representative of the initiatives of preventative organizations like People with Disabilities Australia, which have singularly strengthened victim protection networks, despite abuse continuing to rise dramatically among individuals with intellectual disabilities alone. Yet regardless of this rise, screenings of families and workers remain inadequate and practically untouched, a reflection of a tremendous societal warp in understanding surrounding the lived experiences of IWDs. This theory is also representative of broader literature, where the study of the perpetrators of disability rights, particularly sexual rights, is almost unapparent in a field that is already seldom studied. Therefore, placing power on the abuser via stripping that of the victims. As such, the Culture of Violence theory (CVT) sheds light on the institutions that allow these perpetrators to prosper. This paper, taking a CVT approach, aims to dissipate this discrepancy in the Australian experience by way of a qualitative analysis of all available court proceedings and tribunals between 2020-2022. Through an analysis of the perpetrator, their relation to the IWD, and the motives for their actions granted by court and tribunal transcripts and the psychological, and behavioural reports, among other material, that have been presented and consulted during these proceedings. All of which would be made available under the 1982 Freedom of Information Act. The findings from this study, through the incorporation of CVT, determine the institutions in which these abusers function and the ideologies which motivate such behaviour; while being conscious of the issue of re-traumatization and language barriers of the abusees. Henceforth, this study aims to be a potential policy guide on strengthening support institutions that provide IWDs with their basic rights. In turn, undermining sexual violence among individuals with intellectual disabilities at its roots.

Keywords: criminal profiling, intellectual disabilities, prevention, sexual violence

Procedia PDF Downloads 63
4608 Exploring Leadership Adaptability in the Private Healthcare Organizations in the UK in Times of Crises

Authors: Sade Ogundipe

Abstract:

The private healthcare sector in the United Kingdom has experienced unprecedented challenges during times of crisis, necessitating effective leadership adaptability. This qualitative study delves into the dynamic landscape of leadership within the sector, particularly during crises, employing the lenses of complexity theory and institutional theory to unravel the intricate mechanisms at play. Through in-depth interviews with 25 various levels of leaders in the UK private healthcare sector, this research explores how leaders in UK private healthcare organizations navigate complex and often chaotic environments, shedding light on their adaptive strategies and decision-making processes during crises. Complexity theory is used to analyze the complicated, volatile nature of healthcare crises, emphasizing the need for adaptive leadership in such contexts. Institutional theory, on the other hand, provides insights into how external and internal institutional pressures influence leadership behavior. Findings from this study highlight the multifaceted nature of leadership adaptability, emphasizing the significance of leaders' abilities to embrace uncertainty, engage in sensemaking, and leverage the institutional environment to enact meaningful changes. Furthermore, this research sheds light on the challenges and opportunities that leaders face when adapting to crises within the UK private healthcare sector. The study's insights contribute to the growing body of literature on leadership in healthcare, offering practical implications for leaders, policymakers, and stakeholders within the UK private healthcare sector. By employing the dual perspectives of complexity theory and institutional theory, this research provides a holistic understanding of leadership adaptability in the face of crises, offering valuable guidance for enhancing the resilience and effectiveness of healthcare leadership within this vital sector.

Keywords: leadership, adaptability, decision-making, complexity, complexity theory, institutional theory, organizational complexity, complex adaptive system (CAS), crises, healthcare

Procedia PDF Downloads 20
4607 Application of Reception Theory to Analyze the Translation as a Continuous Reception

Authors: Mina Darabi Amin

Abstract:

In 1972, Hans Robert Jauss introduced the Reception Theory a version of Reader-response criticism, that suggests the literary critics to re-examine the relationship between the author, the work and the reader. The revealing of these relationships has shown that, besides the creation, the reception and the reading of the text have different levels which exempt it from a continuous reference to the meaning intended by the artist and could lead to multiplicity of possible interpretations according to the ‘Horizon of Expectations’. This theory could be associated with another intellectual process called ‘translation’, a process that is always confronted by different levels of readers in the target language and different levels of reception by these readers. By adopting the perspective of Reception theory in translation, we could ignore a particular kind of translation and consider the initiation to a literary text, its translation and its reception as a continuous process. Just like the creation of the text, the translation and its reception, are not made once and for all; they are confronted with different levels of reception and interpretation which are made and remade endlessly. After having known and crossing the first levels, the Horizons of Expectation could be extended and the reader could be initiated to the higher levels. On the other hand, we could say that the faithful and free translation are not opposed to each other, but depending on the type of reception by the readers and in a particular moment, the existence of both is necessary. In fact, it is the level of reception in readers and their Horizon of Expectations that determine the degree of fidelity and freedom of translation.

Keywords: reception theory, reading, literary translation, horizons of expectation, reader

Procedia PDF Downloads 155
4606 Exploring the Role of Media Activity Theory as a Conceptual Basis for Advancing Journalism Education: A Comprehensive Analysis of Its Impact on News Production and Consumption in the Digital Age

Authors: Shohnaza Uzokova Beknazarovna

Abstract:

This research study provides a comprehensive exploration of the Theory of Media Activity and its relevance as a conceptual framework for journalism education. The author offers a thorough review of existing literature on media activity theory, emphasizing its potential to enhance the understanding of the evolving media landscape and its implications for journalism practice. Through a combination of theoretical analysis and practical examples, the paper elucidates the ways in which the Theory of Media Activity can inform and enrich journalism education, particularly in relation to the interactive and participatory nature of contemporary media. The author presents a compelling argument for the integration of media activity theory into journalism curricula, emphasizing its capacity to equip students with a nuanced understanding of the reciprocal relationship between media producers and consumers. Furthermore, the paper discusses the implications of technological advancements on media production and consumption, highlighting the need for journalism educators to prepare students to navigate and contribute to the future of journalism in a rapidly changing media environment. Overall, this research paper offers valuable insights into the potential benefits of embracing the Theory of Media Activity as a foundational framework for journalism education. Its thorough analysis and practical implications make it a valuable resource for educators, researchers, and practitioners seeking to enhance journalism pedagogy in response to the dynamic nature of contemporary media.

Keywords: theory of media activity, journalism education, media landscape, media production, media consumption, interactive media, participatory media, technological advancements, media producers, media consumers, journalism practice, contemporary media environment, journalism pedagogy, media theory, media studies

Procedia PDF Downloads 22
4605 E-Bike FE Model Analysis: Connection Stiffness of Elements with Different DOFs

Authors: Lele Zhang, Hui Leng Choo, Alexander Konyukhov, Shuguang Li

Abstract:

Finite Element (FE) model of simplified e-bike structure was generated by main frame with two tiers, which consisted of pipe, mass, beam, and shell elements (pipe 289, beam188, shell 181, shell 281, combin14, link11, mass21). These elements would be introduced and demonstrated using mathematical formulas. Based on coupling theory, constrain equations was proposed. Exporting all the parameters obtained from theory part, the connection stiffness matrix of the whole e-bike structure between each of these elements was detected.

Keywords: coupling theory, stiffness matrix, e-bike, finite element model

Procedia PDF Downloads 349
4604 The Significance of ‘Practice’ in Art Research: Indian and Western Perspective

Authors: Mukta Avachat-Shirke

Abstract:

The process of manifestation in art has been studied deeply by various Indian and Western philosophers through times. In the art of painting, ‘Practice’ is always considered as techniques or making and ‘Theory’ is related to intelligence or the ‘conceptual.' The question about the significance of ‘Practice’ in artistic research has been a topic of debate. The aim of this qualitative study is to find the relevance of practice and theory while creating artworks. This study analyzes the thoughts and philosophy of Abhinavgupta, Hegel, and Croce to find a new perspective for looking at practice and theory within artistic research. With the method of grounded theory, the study attempts to establish the importance of both in artistic research. It discusses the issues like stages of creating art, role of tacit knowledge and importance of the decision-making the ability of the artist. This comparative analysis of these three philosophers along with the present systems can be used as a point of reference for further developments in the pedagogy of art research and artists, to understand the psychology and to follow the process of creativity effectively.

Keywords: artistic research, Indian philosophy, practice, Western Philosophy

Procedia PDF Downloads 267
4603 A Theoretical Framework for Design Theories in Mobile Learning: A Higher Education Perspective

Authors: Paduri Veerabhadram, Antoinette Lombard

Abstract:

In this paper a framework for hypothesizing about mobile learning to complement theories of formal and informal learning is presented. As such, activity theory will form the main theoretical lens through which the elements involved in formal and informal learning for mobile learning will be explored, specifically related to context-aware mobile learning application. The author believes that the complexity of the relationships involved can best be analysed using activity theory. Activity theory, as a social, cultural and activity theory can be used as a mobile learning framework in an academic environment, but to develop an optimal artifact, through investigation of inherent system's contradictions. As such, it serves as a powerful modelling tool to explore and understand the design of a mobile learning environment in the study’s environment. The Academic Tool Kit Framework (ATKF) as also employed for designing of a constructivism learning environment, effective in assisting universities to facilitate lecturers to effectively implement learning through utilizing mobile devices. Results indicate a positive perspective of students in the use of mobile devices for formal and informal learning, based on the context-aware learning environment developed through the use of activity theory and ATKF.

Keywords: collaborative learning, cooperative learning, context-aware learning environment, mobile learning, pedagogy

Procedia PDF Downloads 527
4602 Analyzing a Tourism System by Bifurcation Theory

Authors: Amin Behradfar

Abstract:

‎Tourism has a direct impact on the national revenue for all touristic countries. It creates work opportunities‎, ‎industries‎, ‎and several investments to serve and raise nations performance and cultures. ‎This paper is devoted to analyze dynamical behaviour of a four-dimensional non-linear tourism-based social-ecological system by using the codimension two bifurcation theory‎. ‎In fact we investigate the cusp bifurcation of that‎. ‎Implications of our mathematical results to the tourism‎ ‎industry are discussed‎. Moreover, profitability‎, ‎compatibility and sustainability of the tourism system are shown by the aid of cusp bifurcation and numerical techniques‎.

Keywords: tourism-based social-ecological dynamical systems, cusp bifurcation, center manifold theory, profitability, ‎compatibility, sustainability

Procedia PDF Downloads 476