Search results for: fear of crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 904

Search results for: fear of crime

784 Role of Vigilante in Crime Control in Bodija Market

Authors: Obadiah Nwabueze

Abstract:

Bodija market is classified as Central Business District (CBD) of Ibadan North Local Government Area of Oyo State (Nigeria) because of socio economic activities, so Crime is a peculiar social issue that causes insecurity. The law enforcement agencies tasked with crime prevention and control such as the Nigerian Police have insufficient manpower, and a resultant effect is the emergence of Vigilante groups as citizen’s response to crime control and prevention (self-help). The research design adopted for this study is a case study design exploring Vigilante activities in Bodija Market. The study utilizes both quantitative and qualitative approach, sources of data includes primary and secondary sources. A sample of 127 respondents randomly picked from the 4 sections of Bodija Market through questionnaire, comprising of 50 male and 77 females which alienates issues of gender bias in addition to the 4 in-depth interview, making a total of 131 respondents. Statistical package for Social Sciences (SPSS) was used. The descriptive statistics of simple frequency, percentage, charts and graphs were computed for the analysis. Finding in the study shows that the market vigilante is able to deter and disrupt criminal activities through strategic spiritual intelligence (SSI), use of charm and juju, physical presence in strategic locations vulnerable to crime occurrence. Findings in the study also show that vigilantes collaborate with the police by assisting them in surveillance, tracking down criminals, identifying black spots, acting as informants to the police, arrest and handover criminal to police. Their challenges include poor equipment, motivation, unhealthy rivalry between the vigilante and the police. The study recommends that the government should support vigilantes with logistics and training, including patrol vehicle and radio communication. The study also recommends the integration of the informal mechanism (juju and charm) of crime detection and prevention into the formal policing strategy, an office should be created in the force commands for use of SSI.

Keywords: central business district, CBD, charm, Juju, strategic spiritual intelligence, SSI

Procedia PDF Downloads 211
783 Fears of Strangers: Causes of Anonymity Rejection on Virtual World

Authors: Proud Arunrangsiwed

Abstract:

This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.

Keywords: anonymous, anonymity, online identity, trust message, reliability

Procedia PDF Downloads 336
782 The Effect of Balance Training on Stable and Unstable Surfaces under Cognitive Dual-Task Condition on the Two Directions of Body Sway, Functional Balance and Fear of Fall in Non-Fallers Older Adults

Authors: Elham Azimzadeh, Fahimeh Khorshidi, Alireza Farsi

Abstract:

Balance impairment and fear of falling in older adults may reduce their quality of life. Reactive balance training could improve rapid postural responses and fall prevention in the elderly during daily tasks. Performing postural training and simultaneously cognitive dual tasks could be similar to the daily circumstances. Purpose: This study aimed to determine the effect of balance training on stable and unstable surfaces under dual cognitive task conditions on postural control and fear of falling in the elderly. Methods: Thirty non-fallers of older adults (65-75 years) were randomly assigned to two training groups: stable-surface (n=10), unstable-surface (n=10), or a control group (n=10). The intervention groups underwent six weeks of balance training either on a stable (balance board) or an unstable (wobble board) surface while performing a cognitive dual task. The control group received no balance intervention. COP displacements in the anterioposterior (AP) and mediolateral (ML) directions using a computerized balance board, functional balance using TUG, and fear of falling using FES-I were measured in all participants before and after the interventions. Summary of Results: Mixed ANOVA (3 groups * 2 times) with repeated measures and post hoc test showed a significant improvement in both intervention groups in AP index (F= 11/652, P= 0/0002) and functional balance (F= 9/961, P= 0/0001). However, the unstable surface training group had more improvement. However, the fear of falling significantly improved after training on an unstable surface (p= 0/035). All groups had no significant improvement in the ML index (p= 0/817). In the present study, there was an improvement in the AP index after balance training. Conclusion: Unstable surface training may reduce reaction time in posterior ankle muscle activity. Furthermore, focusing attention on cognitive tasks can lead to maintaining balance unconsciously. Most of the daily activities need attention distribution among several activities. So, balance training concurrent to a dual cognitive task is challenging and more similar to the real world. According to the specificity of the training principle, it may improve functional independence and fall prevention in the elderly.

Keywords: cognitive dual task, elderly, fear of falling, postural control, unstable surface

Procedia PDF Downloads 24
781 Using Discriminant Analysis to Forecast Crime Rate in Nigeria

Authors: O. P. Popoola, O. A. Alawode, M. O. Olayiwola, A. M. Oladele

Abstract:

This research work is based on using discriminant analysis to forecast crime rate in Nigeria between 1996 and 2008. The work is interested in how gender (male and female) relates to offences committed against the government, against other properties, disturbance in public places, murder/robbery offences and other offences. The data used was collected from the National Bureau of Statistics (NBS). SPSS, the statistical package was used to analyse the data. Time plot was plotted on all the 29 offences gotten from the raw data. Eigenvalues and Multivariate tests, Wilks’ Lambda, standardized canonical discriminant function coefficients and the predicted classifications were estimated. The research shows that the distribution of the scores from each function is standardized to have a mean O and a standard deviation of 1. The magnitudes of the coefficients indicate how strongly the discriminating variable affects the score. In the predicted group membership, 172 cases that were predicted to commit crime against Government group, 66 were correctly predicted and 106 were incorrectly predicted. After going through the predicted classifications, we found out that most groups numbers that were correctly predicted were less than those that were incorrectly predicted.

Keywords: discriminant analysis, DA, multivariate analysis of variance, MANOVA, canonical correlation, and Wilks’ Lambda

Procedia PDF Downloads 437
780 Current Judicial Discourse Regarding the Impact of Alcohol Use Disorders on Crime in Canada

Authors: Ellen McClure

Abstract:

It is generally well-known that a number of inmates suffer from some form of substance or alcohol use disorder. This study identifies, analyses, classifies and codifies the most recent Canadian criminal judgments involving an accused diagnosed with an alcohol use disorder specifically. From this research, patterns in judicial discourse and sentencing norms can be established, and these findings can be juxtaposed with existing relevant academic literature, particular attention will be given to this discussion at the sentencing stage, and the subsequent incarceration of those with alcohol use disorders. This topic will be explored with an overarching emphasis on the effects that a lack of conversation regarding a possible correlation between alcohol consumption and crime may have. Although comparisons may be made in order to clarify or highlight certain issues, particular attention will be paid to jurisdictions within Canada. This paper explores the existing judicial discourse in sentencing regarding the relationship between alcohol and crime, and how this might explain the higher incarceration rates of those suffering from alcohol use disorders in Canada. The research questions are as follows: (1) What are the existing judicial discourses in sentencing around the relationship between alcohol and crime? (2) To what extent has the current discourse on alcohol addiction among judges and legal academics contributed to the incarceration of alcoholics?The major findings of this research indicate a strong correlation between a lack of judicial discussion regarding the accused’s alcohol use disorder and an increased tendency to consider an alcohol use disorder as an aggravating factor. Furthermore, it was found that an 82% of judges who discussed the alcohol use disorder meaningfully referred to the disorder as a mitigating factor. This can be compared with 6.7% of judges who referred to the alcohol use disorder as a mitigating factor in cases where the disorder was not meaningfully discussed.

Keywords: alcohol use disorder, addiction, criminal justice, judicial discourse

Procedia PDF Downloads 233
779 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.

Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19

Procedia PDF Downloads 36
778 Medical Error: Concept and Description According to Brazilian Physicians

Authors: Vitor S. Mendonca, Maria Luisa S. Schmidt

Abstract:

The Brazilian medical profession is viewed as being error-free, so healthcare professionals who commit an error are condemned there. Medical errors occur frequently in the Brazilian healthcare system, so identifying better options for handling this issue has become of interest primarily for physicians. The purpose of this study is to better understand the tensions involved in the fear of making an error due to the harm and risk this would represent for those involved. A qualitative study was performed by means of the narratives of the lived experiences of ten acting physicians in the State of Sao Paulo. The concept and characterization of errors were discussed, together with the fear of making an error, the near misses or error in itself, how to deal with errors and what to do to avoid them. The analysis indicates an excessive pressure in the medical profession for error-free practices, with a well-established physician-patient relationship to facilitate the management of medical errors. The error occurs, but a lack of information and discussion often leads to its concealment due to fear or possible judgment by society or peers. The establishment of programs that encourage appropriate medical conduct in the event of an error requires coherent answers for humanization in Brazilian medical science. It is necessary to improve the discussion about medical errors and disseminate models of communication and notification of errors in Brazil.

Keywords: medical error, narrative, physician-patient relationship, qualitative research

Procedia PDF Downloads 144
777 Fear of Isolation, Online Efficacy, and Selective Exposure in Online Political Discourse

Authors: Kyujin Shim

Abstract:

This study explores how individual motivations in political psychology will lead to political expression and online discourse, and how those online political discourses result in individuals’ exposure to extreme/ personally-entertaining/ disinhibiting content. This study argues that a new framework beyond the conventional paradigm (e.g., selective exposure based on partisanship/ ideology) is needed for better grasp of non-ideological/ anarchic, and/or of nonpartisan yet anonymity-/ extremity-/ disinhibition-related online behaviors regarding political conversations. Further, this study proposes a new definition of ‘selective exposure,’ with special attention to online efficacy and psychological motivations/gratifications sought in the online sphere.

Keywords: selective exposure, fear of isolation, political psychology, online discourse

Procedia PDF Downloads 402
776 'Spare the Rod and Spoil the Child': The Criminal Career of an Armed Robber

Authors: Mahlogonolo Stephina Thobane

Abstract:

The aim of the study upon which this article is based was “to evaluate the possibility of using criminal career research in the development and evaluation of crime control strategies, particularly for armed robberies.” The research employed a concurrent triangulation mixed-method approach where quantitative and qualitative data were collected concurrently but analysed separately through the use of SPSS and Atlas.ti respectively. Forty offenders incarcerated at six correctional centres around the Gauteng province of South Africa for robbery with aggravating circumstances were interviewed as research participants. Since the researcher had no prior information on the total number of the population, purposive sampling (i.e. snowballing) was executed to draw the sample. This research found that offenders launched their criminal career at a very young age of, 11 years, by committing petty crimes such as theft and then, as they grew older, they progressed to more serious and violent crimes such as vehicle hijacking and Cash-in-Transit (CIT) robberies. Thus, it is pivotal that those responsible for developing crime prevention policies focus on interrupting the root causes of crime in the early stages of one’s life in order to prevent continuation of delinquent behaviour from childhood to adolescence and adulthood.

Keywords: criminal career, robbery with aggravating circumstances, cash-in-transit robbery, criminal career research

Procedia PDF Downloads 416
775 The Legal Position of Criminal Prevention in the Metaverse World

Authors: Andi Intan Purnamasari, Supriyadi, Sulbadana, Aminuddin Kasim

Abstract:

Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values ​​achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research.

Keywords: crime, cyber, metaverse, law

Procedia PDF Downloads 119
774 Foreign Language Classroom Anxiety: An International Student's Perspective on Indonesian Language Learning

Authors: Ukhtie Nantika Mena, Ahmad Juntika Nurihsan, Ilfiandra

Abstract:

This study aims to explore perspective on Foreign Language Classroom Anxiety (FLCA) of an international student. Descriptive narrative is used to discover written and spoken responses from the student. An online survey was employed as a secondary data to identify the level of FLCA among six UPI international students. A student with the highest score volunteered to be interviewed. Several symptoms were found; lack of concentration, excessive worry, fear, unwanted thoughts, and sweating. The results showed that difficulties to understand lecturers' correction, presentation, and fear of getting left behind are three major causes of his anxiety.

Keywords: foreign language classroom anxiety, FLCA, international students, language anxiety

Procedia PDF Downloads 113
773 An Exploration of Why Insider Fraud Is the Biggest Threat to Your Business

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, otherwise known as occupational, employee, or internal fraud, is a financial crime threat. Perpetrated by defrauding (or attempting to defraud) one’s current, prospective, or past employer, an ‘employee’ covers anyone employed by the company, including board members and contractors. The Coronavirus pandemic has forced insider fraud into the spotlight, and it isn’t dimming. As the focus of most academics and practitioners has historically been on that of ‘external fraud’, insider fraud is often overlooked or not considered to be a real threat. However, since COVID-19 changed the working world, pushing most of us into remote or hybrid working, employers cannot easily keep an eye on what their staff are doing, which has led to reliance on trust and transparency. This, therefore, brings about an increased risk of insider fraud perpetration. The objective of this paper is to explore why insider fraud is, therefore, now the biggest threat to a business. To achieve the research objective, participating individuals within the financial crime sector (either as a practitioner or consultants) attended semi-structured interviews with the researcher. The principal recruitment strategy for these individuals was via the researcher’s LinkedIn network. The main findings in the research suggest that insider fraud has been ignored and rejected as a threat to a business, owing to a reluctance to admit that a colleague may perpetrate. A positive of the Coronavirus pandemic is that it has forced insider fraud into a more prominent position and giving it more importance on a business’ agenda and risk register. Despite insider fraud always having been a possibility (and therefore a risk) within any business, it is very rare that a business has given it the attention it requires until now, if at all. The research concludes that insider fraud needs to prioritised by all businesses, and even ahead of external fraud. The research also provides advice on how a business can add new or enhance existing controls to mitigate the risk.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 35
772 Investigating the Effects of Empowering the Employees in Managing Crimes by the Police

Authors: Akbar Salimi, Mehdi Moghimi

Abstract:

Goal: The human resource empowerment is a new strategy in achieving a competitive advantage. The aim of the research is to understand crime management by the police by using this strategy. Method: The research is applied in terms of goal and it is a survey type research. The sample intended include all the police officers of a police station for as many as 52 people. The data were collected by a researcher made four choice questionnaire after the validity and reliability were confirmed. Findings: By regarding the Melhem pattern as the framework, four dimensions of empowerment were identified and the triangle of crime was explained and then four hypotheses proportionate to it were formulated. Results: Given the fact that the sample was all counted, all the four hypotheses were supported by using the average data received and by regarding the %50 as the criterion.

Keywords: management, empowerment, employees, police

Procedia PDF Downloads 344
771 Legal Provisions on Child Pornography in Bangladesh: A Comparative Study on South Asian Landscape

Authors: Monira Nazmi Jahan, Nusrat Jahan Nishat

Abstract:

'Child Pornography' is a sex crime that portrays illegal images and videos of a minor over the Internet and now has become a social concern with the increase of commission of this crime. The major objective of this paper is to identify and examine the laws relating to child pornography in Bangladesh and to compare this with other South Asian countries. In Bangladesh to prosecute under child pornography, provisions have been made in ‘Digital Security Act, 2018’ where it has been defined as involving child in areas of child sexuality or in sexuality and whoever commits the crime will be punished for 10 years imprisonment or 10 lac taka fine. In India, the crime is dealt with ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) where the offenders for commission of this crime has been divided separately and has provision for punishments starting from three years to rigorous life imprisonment and shall also be liable to fine. In the Maldives, there is ‘Special Provisions Act to Deal with Child Sex Abuse Offenders, Act number 12/2009’. In this act it has been provided that a person is guilty of such an act if intentionally runs child prostitution, involves child in the creation of pornography or displays child’s sexual organ in pornography then shall be punished between 20 to 25 years of imprisonment. Nepal prosecutes this crime through ‘Act Relating to Children, 2018’ and the conviction of using child in prostitution or sexual services is imprisonment up to fifteen years and fine up to one hundred fifty thousand rupees. In Pakistan, child pornography is prosecuted with ‘Pakistan Penal Code Child Abuse Amendment Act, 2016’. This provides that one is guilty of this offence if he involves child with or without consent in such activities. It provides punishment for two to seven years of imprisonment or fine from two hundred thousand to seven hundred thousand rupees. In Bhutan child pornography is not explicitly addressed under the municipal laws. The Penal Code of Bhutan penalizes all kinds of pornography including child pornography under the provisions of computer pornography and the offence shall be a misdemeanor. Child Pornography is also prohibited under the ‘Child Care and Protection Act’. In Sri Lanka, ‘The Penal Code’ de facto criminalizes child prohibition and has a penalty of two to ten years and may also be liable to fine. The most shocking scenario exists in Afghanistan. There is no specific law for the protection of children from pornography, whereas this serious crime is present there. This paper will be conducted through a qualitative research method that is, the primary sources will be laws, and secondary sources will be journal articles and newspapers. The conclusion that can be drawn is except Afghanistan all other South Asian countries have laws for controlling this crime but still have loopholes. India has the most amended provisions. Nepal has no provision for fine, and Bhutan does not mention any specific punishment. Bangladesh compared to these countries, has a good piece of law; however, it also has space to broaden the laws for controlling child pornography.

Keywords: child abuse, child pornography, life imprisonment, penal code, South Asian countries

Procedia PDF Downloads 184
770 The Modulation of Self-interest Instruction on the Fair-Proposing Behavior in Ultimatum Game

Authors: N. S. Yen, T. H. Yang, W. H. Huang, Y. F. Fang, H. W. Cho

Abstract:

Ultimatum game is an experimental paradigm to study human decision making. There are two players, a proposer and a responder, to split a fixed amount of money. According to the traditional economic theory on ultimatum game, proposer should propose the selfish offers to responder as much as possible to maximize proposer’s own outcomes. However, most evidences had showed that people chose more fair offers, hence two hypotheses – fairness favoring and strategic concern were proposed. In current study, we induced the motivation in participants to be either selfish or altruistic, and manipulated the task variables, the stake sizes (NT$100, 1000, 10000) and the share sizes (the 40%, 30%, 20%, 10% of the sum as selfish offers, and the 60%, 70%, 80%, 90% of the sum as altruistic offers), to examine the two hypotheses. The results showed that most proposers chose more fair offers with longer reaction times (RTs) no matter in choosing between the fair and selfish offers, or between the fair and altruistic offers. However, the proposers received explicit self-interest instruction chose more selfish offers accompanied with longer RTs in choosing between the fair and selfish offers. Therefore, the results supported the strategic concern hypothesis that previous proposers choosing the fair offers might be resulted from the fear of rejection by responders. Proposers would become more self-interest if the fear of being rejected is eliminated.

Keywords: ultimatum game, proposer, self-interest, fear of rejection

Procedia PDF Downloads 344
769 Skills and Abilities Expected from Professionals Conducting Serious Crimes Investigations: A Descriptive Study from Turkey

Authors: Burak M. Gonultas

Abstract:

Criminal investigation provides a practical contribution to this process while criminology provides a theoretical background in the apprehension of criminals arrest and clarification of crimes. However, studies on criminal investigation, which is a practical aspect of this process, are not sufficient. Every crime involves different dynamics in terms of investigation. But investigations of serious crimes are versatile and contains complex processes because of cases they are conducted. Therefore, professionals who conduct serious crime investigations differ in some aspects from others in the field. The most fundamental element of this differentiation is skills and abilities of these professionals. According to Eurostat data, Turkey is in an important position in terms of homicide rates. Therefore, in Turkey practice of serious crime investigation is specialized. The present study aims to research the skills and abilities expected from professionals in conducting an effective serious criminal investigation in Turkey and so aims to offer a number of suggestions. 25 emerged ability and skills collected from literature were asked to professionals (n=289) with semi-structured form according to 5 provinces with the highest and 2 provinces with the lowest number of serious crime cases. Three data categories were collected during experience: 1- Five most important skills and abilities, 2- The most important skills for knowledge and inquiry management and 3- Ability and skills that stand out for five stages of serious criminal investigation. The most rated skills and abilities are investigative skill (13%, n=134), planning/designing (9,2%, n=95) and interpersonal relations/communication (8,8%, n=91) in 1010 skills and abilities. While the 1st and 2nd suggest elections of these professionals, the 3rd also suggests how and what type of training will be given to these professionals. This practice differs from other studies in the area in terms of separately addressing the skills and abilities expected in stages of investigation and in terms of selected methodology.

Keywords: ability, criminal investigation, criminology, homicide, serious crimes, skill, Turkey

Procedia PDF Downloads 246
768 The Role Of Digital Technology In Crime Prevention

Authors: Muhammad Ashfaq

Abstract:

Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police.A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals .Latest digital analysis software should be provided to equip the Cellular Forensic Unit.

Keywords: crime prevention, digital technology, pakistan, police

Procedia PDF Downloads 38
767 The Application of Insects in Forensic Investigations

Authors: Shirin Jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani

Abstract:

Forensic entomology is the science of study and analysis of insects evidences to aid in criminal investigation. Being aware of the distribution, biology, ecology and behavior of insects, which are founded at crime scene can provide information about when, where and how the crime has been committed. It has many application in criminal investigations. Its main use is estimation of the minimum time after death in suspicious death. The close association between insects and corpses and the use of insects in criminal investigations is the subject of forensic entomology. Because insects attack to the decomposing corpse and spawning on it from the initial stages. Forensic scientists can estimate the postmortem index by studying the insects population and the developing larval stages.In addition, toxicological and molecular studies of these insects can reveal the cause of death or even the identity of a victim. It also be used to detect drugs and poisons, and determination of incident location. Gathering robust entomological evidences is made possible for experts by recent Techniques. They can provide vital information about death, corpse movement or burial, submersion interval, time of decapitation, identification of specific sites of trauma, post-mortem artefacts on the body, use of drugs, linking a suspect to the scene of a crime, sexual molestations and the identification of suspects.

Keywords: Forensic entomology, post mortem interval, insects, larvae

Procedia PDF Downloads 475
766 A Study on Explicitation Strategies Employed in Persian Subtitling of English Crime Movies

Authors: Hossein Heidari Tabrizi, Azizeh Chalak, Hossein Enayat

Abstract:

The present study seeks to investigate the application of expansion strategy in Persian subtitles of English crime movies. More precisely, this study aims at classifying the different types of expansion used in subtitles as well as investigating the appropriateness or inappropriateness of the application of each type. To achieve this end, three English movies; namely, The Net (1995), Contact (1997) and Mission Impossible 2 (2000), available with Persian subtitles, were selected for the study. To collect the data, the above mentioned movies were watched and those parts of the Persian subtitles in which expansion had been used were identified and extracted along with their English dialogs. Then, the extracted Persian subtitles were classified based on the reason that led to expansion in each case. Next, the appropriateness or inappropriateness of using expansion in the extracted Persian subtitles was descriptively investigated. Finally, an equivalent not containing any expansion was proposed for those cases in which the meaning could be fully transferred without this strategy. The findings of the study indicated that the reasons range from explicitation (explicitation of visual, co-textual and contextual information), mistranslation and paraphrasing to the preferences of subtitlers. Furthermore, it was found that the employment of expansion strategy was inappropriate in all cases except for those caused by explicitation of contextual information since correct and shorter equivalents which were equally capable of conveying the intended meaning could be posited for the original dialogs.

Keywords: audiovisual translation, English crime movies, expansion strategies, Persian subtitles

Procedia PDF Downloads 441
765 A Study on How Insider Fraud Impacts FinTechs

Authors: Claire Norman-Maillet

Abstract:

Insider fraud is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including Board members and part-time staff. Insider fraud can take many forms, including an employee working alone or in collusion with others. Insider fraud has been on the rise since the Coronavirus pandemic and shows no signs of slowing. The objective of the research is to better understand how FinTechs are impacted by insider fraud and, therefore, how to stop it. This research will make an original contribution to the financial crime field, given the timing of this research being intertwined with the cost-of-living crisis in the UK and the global Coronavirus pandemic. This research focuses on insider fraud within FinTechs specifically, as they are arguably a modern phenomenon in the financial institutions space and have cutting-edge technology at their disposal. To achieve the research objective, the researcher held semi-structured interviews with over 20 individuals who deal with insider fraud perpetration in a practitioner, recruitment, or advisory capacity. The interviews were subsequently transcribed and analysed thematically. Main findings in the research suggest that FinTechs are arguably in the best position to combat insider fraud, given their focus on using recent technologies, as this can be used to combat the threat. However, insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer, as well as the idea that external fraud is the most important threat. The research concludes that, whilst the technology is understandably prioritised by FinTechs for providing an agreeable customer experience, insider fraud needs to be given a platform upon which to be recognised as a significant threat to any company. Moreover, insider fraud needs to be given the same level of weighting and attention by Executive Committees and Boards as the customer experience.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, Coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 31
764 Forensic Necropsy-Importance in Wildlife Conservation

Authors: G. V. Sai Soumya, Kalpesh Solanki, Sumit K. Choudhary

Abstract:

Necropsy is another term used for an autopsy, which is known as death examination in the case of animals. It is a complete standardized procedure involving dissection, observation, interpretation, and documentation. Government Bodies like National Tiger Conservation Authority (NTCA) have given standard operating procedures for commencing the necropsies. Necropsies are rarely performed as compared to autopsies performed on human bodies. There are no databases which maintain the count of autopsies in wildlife, but the research in this area has shown a very small number of necropsies. Long back, wildlife forensics came into existence but is coming into light nowadays as there is an increase in wildlife crime cases, including the smuggling of trophies, pooching, and many more. Physical examination in cases of animals is not sufficient to yield fruitful information, and thus postmortem examination plays an important role. Postmortem examination helps in the determination of time since death, cause of death, manner of death, factors affecting the case under investigation, and thus decreases the amount of time required in solving cases. Increasing the rate of necropsies will help forensic veterinary pathologists to build standardized provision and confidence within them, which will ultimately yield a higher success rate in solving wildlife crime cases.

Keywords: necropsy, wildlife crime, postmortem examination, forensic application

Procedia PDF Downloads 105
763 A Case Study of Wildlife Crime in Bangladesh

Authors: M. Golam Rabbi

Abstract:

Theme of wildlife crime is unique in Bangladesh. In earlier of 2010, wildlife crime was not designated as a crime, unlike other offenses. Forest Department and other enforcement agencies were not in full swing to find out the organized crime scene at that time and recorded few cases along with forest crime. However, after the establishment of Wildlife Crime Control Unitin 2012a, total of 374 offenses have been detected with 566 offenders and 37,039 wildlife and trophies were seized till November 2016. Most offenses seem to be committed outside the forests where the presence of the forest staff is minimal. Total detection percentage of offenses is not known, but offenders are not identified in 60% of detected cases (UDOR). Only 20% cases are decided by the courts even after eight years, conviction rate of the total disposal is 70.65%. Mostly six months imprisonment and BDT 5000 fine seems to be the modal penalty. The monetary value of wildlife crime in the country is approximate $0.72M per year and the maximum value counted for reptiles around $0.45M especially for high-level trafficking of geckos and turtles. The most common seizures of wildlife are birds (mynas, munias, parakeets, lorikeets, water birds, etc.) which have domestic demand for pet. Some other wildlife like turtles, lizards and small mammals are also on the list. Venison and migratory waterbirds often seized which has a large quantity demand for consuming at aristocratic level.Due to porous border and weak enforcement in border region poachers use the way for trafficking of geckos, turtles, and tortoises, snakes, venom, tiger and body parts, spotted deerskin, pangolinetc. Those have very high demand in East Asian countries for so-called medicinal purposes. The recent survey also demonstrates new route for illegal trade and trafficking for instance, after poaching of tiger and deer from the Sundarbans, the largest mangrove track of the planet to Thailand through the Bay of Bengal, sharks fins and ray fish through Chittagong seaport and directly by sea routes to Myanmar and Thailand. However, a good number of records of offense demonstrate the transition route from India to South and South East Asian countries. Star tortoises and Hamilton’s turtles are smuggled in from India which mostly seized at Benapole border of Jessore and Hazrat Shah Jajal International Airport of Dhaka, in very large numbers for transmission to East Asian countries. Most of the cases of wildlife trade routes leading to China, Thailand, Malaysia, and Myanmar. Most surprisingly African ivory was seized in Bangladesh recently, which was meant to be trafficked to the South-East Asia. However; forest department is working to fight against wildlife poaching, illegal trade and trafficking in collaboration with other law enforcement agencies. The department needs a clear mandate and to build technical capabilities for identifying, seizing and holding specimens. The department also needs to step out of the forests and must develop the capacity to surveillance and patrol all sensitive locations across the country.

Keywords: Bangladesh forest department, Sundarban, tiger, wildlife crime, wildlife trafficking

Procedia PDF Downloads 271
762 Investigation of Kinesiophobia in Individuals with Type 2 Diabetes

Authors: Ismail Okur, Betul Taspinar, Turkan Pasali Kilit, Eda O. Okur, Ferruh Taspinar

Abstract:

Type 2 Diabetes Mellitus (T2DM) is one of the most important global health emergencies and every year more and more people are affected by T2DM. T2DM causes life-changing complications by affecting organ and systems. Although diet and exercise are the best way to treat patients with T2DM, those patients generally have a sedentary life style. This study was planned to determine whether patients with T2DM have kinesiophobia (fear of movement). A controlled trial was conducted on 87 adults. Forty-one individuals with T2DM (study group, 34 female and 7 male) and 46 nondiabetic individuals (control group, 39 female and 7 male) were included in the study. Patients were screened for fear of movement using the Tampa Scale for Kinesiophobia (TSK). The data including age, sex, weight, height, and TSK scores were obtained. Mann Whitney U test were used to analyse the data. The mean ages and BMI of study and control groups were 51.98 ± 6.03 year and 49.52 ± 5.61 year and 31.82 ± 2.88 kg/m2 and 30.22 ± 2.91 kg/m2, respectively. The groups have similar demographic properties. The kinesiophobia scores of study and control groups were 42.78 ± 5.50 and 39.48 ± 5.05, respectively and the difference was statistically significant (p=0.05). This study showed that patients with T2DM had high kinesiophobia scores rather than nondiabetics. Those patients might avoid to do exercise. In other words, patients with T2DM might have lower physical activity level. Therefore the authors suggest that to evaluate and interfere with kinesiophobia before conducting exercise therapy will be useful for diabetes care.

Keywords: diabetes, fear of movement, kinesiophobia, type 2 diabetes mellitus

Procedia PDF Downloads 350
761 Development and Validation of the Dimensional Social Anxiety Scale: Assessment for the Offensive Type of Social Anxiety

Authors: Ryotaro Ishikawa

Abstract:

Social Anxiety Disorder (SAD) is marked by the persistent fear of social or performance situations in which embarrassment may occur. In contrast, SA in Japan and in China is understood differently. Taijin Kyofusho (TKS) is a culture-bound subtype of SAD which has been the focus of recent research. TKS refers to a unique form of SAD found in Japanese and East Asian cultures characterized by a fear of offending others, in contrast to prototypical SAD in which the source of fear is typically concerned about one’s own embarrassment, humiliation, or rejection by others. Criteria for TKS partially overlap with but are distinct from SAD; a primary factor distinguishing TKS from SAD appears to be individualistic versus interdependent or collectivistic self-construals. The aim of this study was to develop a scale to assess the typical SAD and offensive type of SAD (TKS). This study aimed to test the internal consistency and validity of the scale (Dimensional Social Anxiety Scale: DSAS) using university students sample. For this, 148 university students were enrolled (male=90, female=58, age=19.77, Standard Deviation=1.04). As a result of confirmatory factor analysis, three-factor models of DSAS were verified (χ2(74) =128.36). These three factors were named ‘general’, ‘perfomance’, and ‘offensive’. DSAS were significantly correlated with the Liebowitz Social Anxiety Scale (r = .538, p < .001). Good internal consistencies were indicated on the three subscales (α = .76 to 89). In conclusion, this study indicated DSAS has adequate internal consistency and validity for assessing of multi-type of SADs.

Keywords: social anxiety, cognitive theory, assessment, anxiety disorder

Procedia PDF Downloads 88
760 The Effect of Music Therapy on Anxiety, Fear and Pain Management in 6-12 Year Old Children Undergoing Surgery

Authors: Özgür Bahadir, Meltem Kurtuncu

Abstract:

The study was designed as quasi-experimental and conducted to determine the effect of music therapy on anxiety, fear and pain management in 6-12-year-old children undergoing surgery. The present study was carried out between 01.01.2016 and 19.08.2016 in BEU. Application and Research Center. The children aged 6 -12 who applied for surgery between the mentioned dates constituted the universe of the study. In the quasi-experimental study that was conducted in the clinics where children received operational treatment, two groups were formed: experimental group (the children who received musical therapy before the surgery) and control group (the children who were administered surveys and the surgery service routines only). Each group consisted of 30 children, and the participants of the study were 60 children in total. Necessary permissions were obtained from the parents of the children hospitalized before the beginning of the implementation. The data was collected through Child Anxiety Sensitivity Index (CASI), “Fear In Medical Treatment Scale”, Face, Legs, Activity, Cry, Consolability Scale (FLACC), Visual Analog Scale (VAS) and Participant Information Form. In the analysis of the data, Kolmogorov-Smirnov distribution scale was used to examine the normality of the distribution along with descriptive statistics methods (Frequency, Percentage, Mean, Standard Deviation). Data was presented in the tables in numbers and percentages. Means were demonstrated along with the standard deviations. The research compared children received; case and control groups include socio-demographic perspective, non-significant difference statistically among similar groups are intertwined. The general level of fear regarding the medical processes before returning to service after the operation and 30 minutes before getting discharged was found to be significantly low in the experimental group compared to control group (p<0.05). No statistically significant difference was found between experimental and control groups in terms of general level of fear regarding the medical processes before the operation, during the operation day and in the recovery room after the operation (p>0.05). Total CASI AD (anxiety sensitivity) levels before the operation, day of the operation and 30 minutes before the discharge for patients in experimental group was found to be significantly higher than the control group (p>0.05). There was no statistically significant difference between the experimental and control groups in the total CASI AD levels for the post-operative recovery room and for returning to the service room after the operation (p>0.05). VAS levels for patients in the experimental group in the post-operative recovery room was significantly higher than the control group (p>0.05). There was no statistically significant difference between the groups in terms of VAS findings in returning to service room after the operation and in 30 minutes before the discharge (p>0.05). As a result of the research; applied children music therapy in the experimental group anxiety, fear, and pain of the scales, their scores average, is lower than the control group children in this situation an increase in the satisfaction of children and parents was observed. In line with this, music therapy preoperative anxiety, fear, and can be used as an effective method of decreasing postoperative pain clinics is suggested.

Keywords: anxiety, children, fear, music therapy, pain

Procedia PDF Downloads 206
759 Silencing the Protagonist: Gender and Rape Depiction in Pakistani Dramas

Authors: Saman R. Khan, Najma Sadiq

Abstract:

Silencing of opinions is an important aspect of Spiral of Silence theory however its applicability in rape-themed dramas requires investigation. This study focuses on the portrayal of female rape victim protagonists in Pakistani dramas and the factors influencing their behavior after rape. A quantitative content analysis was conducted on two prime-time dramas which directly dealt with female rape victims. Results indicate that the female protagonists who faced rape are shown as silent and submissive characters who are unable to communicate about their ordeal due to fear of social isolation. These findings lend support to the Spiral of Silence theory and indicate that the theory’s basic elements (inability to express opinions and fear of social isolation) exist in these TV dramas.

Keywords: gender stereotyping, rape victims, the spiral of silence, TV dramas

Procedia PDF Downloads 140
758 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime

Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya

Abstract:

Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.

Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident

Procedia PDF Downloads 125
757 To Individualisation of Subject, Donar, by Determination of Serological Markers from Obtain Biological Fluid at Crime Scene

Authors: Arun Kumar, Ravindra Pal Verma, Harsh Sharma, Shani Kumar

Abstract:

For the present study samples was collected from 20 donors with unknown blood group and secretor status had been determined from saliva by using biological fluid. ABO typing on the concentrated samples was successfully performed after 1 month of storage. Urine stained clothing samples are often submitted to forensic science laboratories for ABH blood group antigen determination. The serogenetic markers of semen stains submitted can be used to determine the origin of any of these samples. ABH blood group substances have previously been identified from urine. ABH blood group substance is low in urine in comparison with other body fluids.

Keywords: ABH blood group, crime scene, serological markers, body fluids and urine

Procedia PDF Downloads 549
756 Examining the Influence of Question Phrasing in Police Interviews on Suspects’ Inferences Regarding Interviewer’s Prior Knowledge

Authors: Meghana Srivatsav, Timothy J. Luke, Par Anders Granhag, Aldert Vrij

Abstract:

The aim of this study was to understand how the phrasing of questions influences guilty suspects’ inferences regarding prior information held by the interviewer about the suspect’s crime-related activities. Three phrasing factors were explored namely specificity (crime-related details within questions), stressor (emphasis on the importance of the information in the question) and phase presentation (whether a specific activity was questioned about). 370 participants were recruited and randomly assigned into 6 different question-phrasing groups. Participants assumed the role of a suspect, read a crime narrative and an interview transcript based on the suspect’s activities. Participants responded to scales that measured their perception of interviewer’s knowledge (PIK) based on the questions posed by the interviewer in the interview transcripts. The researchers found that there is an effect of specific details revealed in the questions on the suspect’s perception of interviewer knowledge. Questioning about a specific activity also increased their perception of interviewer’s prior knowledge. However, the individual hypotheses were only partially supported. The study allowed the researchers to explore a psycholinguistic approach to investigate the underlying mechanisms of inferences drawn by suspects from the phrasing of investigative questions.

Keywords: police interviewing, question framing effects on suspects, suspect inferences from questions, suspect interviews

Procedia PDF Downloads 125
755 Laundering vs. Blanqueo: Translating Financial Crime Metaphors From English to Spanish

Authors: Stephen Gerome

Abstract:

This study examines the translation and use of metaphors in the realm of public safety discourse and intends to shed light on a continuing problem in cross-cultural communication. Metaphors can cause problems not only within languages but also in interlingual communication. The use and misuse of metaphors may hinder the ability to adequately communicate prevention efforts and, in some cases, facilitate and allow financial crime to go undetected. The use of lexicalized metaphors in communications by political entities, journalists, and legal agents in communications regarding law, policy making, compliance monitoring and enforcement as well as in adjudication can have negative consequences if misconstrued. This study provides examples of metaphor usage in published documents in a corpus linguistic study that compares the use of lexicalized metaphors in this discourse to shed light on possible unexpected consequences as well as counterproductive ones.

Keywords: translation, legal, corpus linguistics, financial

Procedia PDF Downloads 79