Search results for: insider fraud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 183

Search results for: insider fraud

123 The Role of Privatization as a Moderator of the Impact of Non-Institutional Factors on the Performance of the Enterprises in Central and Eastern Europe

Authors: Margerita Topalli

Abstract:

In this paper, we analyze the impact of corruption (business environment, informal payments and state capture), crime and tax time, on the enterprise's performance during economic transition in the Central and Eastern Europe and the role of privatization as a moderator. We examine this effect by comparing the performance of the privatized enterprises and the state-owned-enterprises, while controlling for various forms of selection bias. The present study is based on firm-level panel data collected by the BEEPS for 27 transition countries over 2002, 2005, 2007, and 2011. In addition to firm characteristics, BEEPS collects valuable survey information on different forms of corruption, crime, tax time and firm ownership. We estimate the impact of corruption, crime, tax time on the different performance measures (sales, productivity, employment, labor costs and material costs) of the enterprise, whereby we control for firm ownership, with a special focus on the role of the privatization as a moderator. It argues that in general terms, the privatization has positive effects on the performance of enterprises during transition, but these effects are significantly different, depending on the examined performance measure (sales, productivity, employment, labor costs and material costs). When the privatization is effective, the privatized enterprises show a considerable performance improvements, particularly in terms of revenue growth and productivity growth. It also argues that the effects of privatization are different depending on the types of owner (outsider or insider) to whom it gives control. The results show that privatization to insider owners has no significant performance effect.

Keywords: effects of privatization, enterprise performance, state capture, corruption, firm ownership, economic transition, Central and Eastern Europe

Procedia PDF Downloads 288
122 An Evaluation of the Impact of E-Banking on Operational Efficiency of Banks in Nigeria

Authors: Ibrahim Rabiu Darazo

Abstract:

The research has been conducted on the impact of E-banking on the operational efficiency of Banks in Nigeria, A case of some selected banks (Diamond Bank Plc, GTBankPlc, and Fidelity Bank Plc) in Nigeria. The research is a quantitative research which uses both primary and secondary sources of data collection. Questionnaire were used to obtained accurate data, where 150 Questionnaire were distributed among staff and customers of the three Banks , and the data collected where analysed using chi-square, whereas the secondary data where obtained from relevant text books, journals and relevant web sites. It is clear from the findings that, the use of e-banking by the banks has improved the efficiency of these banks, in terms of providing efficient services to customers electronically, using Internet Banking, Telephone Banking ATMs, reducing time taking to serve customers, e-banking allow new customers to open an account online, customers have access to their account at all the time 24/7.E-banking provide access to customers information from the data base and cost of check and postage were eliminated using e-banking. The recommendation at the end of the research include; the Banks should try to update their electronic gadgets, e-fraud(internal & external) should also be controlled, Banks shall employ qualified man power, Biometric ATMs shall be introduce to reduce fraud using ATM Cards, as it is use in other countries like USA.

Keywords: banks, electronic banking, operational efficiency of banks, biometric ATMs

Procedia PDF Downloads 300
121 Psychosocial Consequences of Discovering Misattributed Paternity in Adulthood: Insider Action Research

Authors: Alyona Cerfontyne, Levita D'Souza, Lefteris Patlamazoglou

Abstract:

Unlike adoption and donor-assisted reproduction, misattributed paternity occurring within the context of spontaneous conception and outside of formally recognised practices of having a child remains largely an understudied phenomenon. In adulthood, to discover misattributed paternity, i.e., that the man you call your father is not related to you genetically, can have profound implications for everyone affected. Until the advent of direct-to-consumer DNA testing 20 years ago, such discoveries were relatively rare. Despite the growing number of individuals uncovering their biogenetic paternity through genetic testing, there is very limited research on misattributed paternity from the perspective of adult children affected by it. No research exists on how to support these individuals through counselling post-discovery. Framed as insider action research, this study aimed to explore the perceived psychosocial consequences of misattributed paternity discoveries and coping strategies used by individuals who discover their misattributed paternity status in adulthood. In total, 12 individuals with misattributed paternity participated in semi-structured interviews in July-August 2022. The collected data was analysed using reflexive thematic analysis. The study’s results indicate that discovering misattributed paternity in adulthood can be likened to a watershed moment forever changing the trajectory of one’s life. Psychological experiences consistent with trauma, as well as grief and loss, re-evaluation of close family relationships, reestablishment of one’s identity, as well as experiencing a profound need to belong are the key themes emerging from the analysis of psychosocial experiences. Post-discovery, individuals with misattributed paternity employ a wide range of emotional and problem-focused coping strategies, amongst which seeking connection with those who understand, searching for information on the new biogenetic family and finding new meanings to life are most prominent. The study contributes both to the academic and practical knowledge of experiences of misattributed paternity and highlights the importance of further research on the topic.

Keywords: discovery of misattributed paternity, misattributed paternity, paternal discrepancy, psychosocial consequences, coping

Procedia PDF Downloads 57
120 Enhancing Halal Food Integrity Through Whistleblowing Practices: Implementing Halal And Toyyib Principles

Authors: Norazilawati Binti Md Dahlal, Nabiila Binti Mat Yusoff, Anis Najiha Binti Ahmad

Abstract:

With the increasing demand for halal products, there is a growing emphasis on ensuring their quality and adherence to halal standards. However, the vulnerability of halal goods to fraud and adulteration poses a significant challenge to the integrity of the halal industry. Whistleblowers play a pivotal role in safeguarding the safety and integrity of halal food by exposing wrongdoings, misconduct, and fraudulent practices. This study explores the implementation of whistleblowing practices aligned with halal and toyyib principles to effectively address halal food fraud issues. Whistleblowing is defined as the act of disclosing information about misconduct, immorality, or unlawful activities to relevant authorities or the public. Although whistleblowing is universally recognized as beneficial, it exposes whistleblowers to substantial risks, including career setbacks, reputation damage, and personal safety threats. Despite legal protections, whistleblowers often face retaliation and hesitancy to come forward. By integrating the principles of halal and toyyib, which encompass the physical and spiritual as well as material and supernatural elements, effective whistleblowing practices can be developed. These principles include the physical characteristic of the product in accordance with Shari’ah law (P1); products that are sourced ethically and responsibly (P2); Products that meet high standard of quality and safety (P3); functioning as servant and caliph of Allah in managing according to Allah's commands and prohibitions (P4); not excessively wasteful or extravagant (P5); positive moral and spiritual implications associated with the product (P6); and aimed at achieving prosperity in both this life and the Hereafter (P7). Employing a quantitative research approach, this study examines Islamic primary data sources and secondary data sources to investigate the prevalence and impact of whistleblowing in the halal industry. By analyzing the principles of halal and toyyib and exploring the importance of whistleblowing effective whistleblowing practices, this research aims to enhance our understanding of promoting accountability and justice within the halal industry from an Islamic perspective.

Keywords: whistleblowing, halal and toyyib, food fraud, halal integrity, Islamic practices

Procedia PDF Downloads 91
119 A Comparison of Ethical Perceptions of Business Students In MINA

Authors: Leonie Jooste

Abstract:

The main purpose of this article is to explore the ethical values of accounting students at Universities and Business Managers. Financial fraud (earnings management) is continuing to exist and published in literature and social media. However, irrespective of extensive publication, and academic research, financial fraud is still happening or still being committed. The student of today may be the manager in the future. In a study by Bruns and Merchant, the authors found that the morality of short-term earnings management was of little concern to researchers and accounting practitioners. However, in the light of increased financial frauds and failures, new and increased emphasis has been placed on the importance of the concepts of earnings quality, earnings management practices, and the inclusion of business ethics in accounting syllabi. This study uses a quantitative analysis related to the Bruns and Merchant survey of accounting students. 59 accounting students in the MENA area were surveyed in 2022 to measure their ethical values regarding earning management practices in organisations. The results of this survey were compared the surveys in 2013 to determine if courses in business ethics offered at the university influenced the perceptions of students on unethical behaviour in business practices. For the data analysis, the mean values and significant differences were calculated and compared. Overall, the results showed that there was hardly any significant difference between the two surveys.

Keywords: ethics, earnings management, corporate social responsibility, business courses.

Procedia PDF Downloads 95
118 Review of Electronic Voting as a Panacea for Election Malpractices in Nigerian Political System: Challenges, Benefits, and Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

The Nigerian political system has witnessed rising occurrences of election malpractice in the last decade. This has been due to election rigging and other forms of electoral fraud. In order to find a sustainable solution to this malpractice, the introduction of electronic voting (e-voting) has been suggested. This paper reviews the challenges, benefits, and issues associated with e-voting as a panacea for election malpractice in Nigeria. The review of existing literature revealed that e-voting can reduce the cost of conducting elections and reduce the opportunity for electoral fraud. The review suggests that the introduction of e-voting in the Nigerian political system would require adequate cybersecurity measures, trust-building initiatives, and proper legal frameworks to ensure its successful implementation. It is recommended that there should be an effective policy that would ensure the security of the system as well as the credibility of the results. Furthermore, a comprehensive awareness campaign needs to be conducted to ensure that voters understand the process and are comfortable using the system. In conclusion, e-voting has the potential to reduce the occurrence of election malpractice in the Nigerian political system. However, the successful implementation of e-voting will require effective policy interventions and trust-building initiatives. Additionally, the costs of acquiring the necessary infrastructure and equipment and implementing proper legal frameworks need to be considered.

Keywords: electronic voting, general election, candidate, INEC, cyberattack

Procedia PDF Downloads 56
117 Corporate Collapses and (Legal) Ethics

Authors: Elizabeth Snyman-Van Deventer

Abstract:

Numerous corporate scandals, which included investment scams, corporate malfeasance, unethical conduct and conflicts of interest, contributed to the collapse of WorldCom, Global Crossing, Xerox, Tyco, Enron, Sprint, AbbVie and Imclone and led to alarmed investors abandoning public securities markets and the tumbling of U.S stock markets. These companies suffered significant financial losses due to substantial and fraudulent misstatements and other illegal, corrupt or unethical practices. Executives were convicted of fraud and sentenced to prison. The corporate financial scandals, governance failures, and the ensuing public outcries led to mandatory legislation, e.g. the Sarbanes-Oxley Act in the USA. In European corporate scandals such as Parmalat, Royal Dutch Ahold, Vivendi, Adecco and Elan, the boards missed financial misrepresentations. In South Africa, Steinhoff is the most well-known example of corporate collapse, but now we can also add Tongaat Hulett. It seems as if fraud and corruption may be the major sources of these corporate collapses. In most instances, there is either the active involvement of the directors and managers in these fraudulent or corrupt practices, or there is a negligent or even intentional failure to act by directors to prevent these activities. However, besides directors and managers, auditors and lawyers failed in most of these companies to fulfil their professional duties. In most of these major collapses, the ethics of especially auditors and directors could be questioned. This paper will first provide a brief overview of corporate collapses. Secondly, the reasons for these collapses, with a focus on unethical conduct, will be discussed.

Keywords: professional duties, corporate collapses, ethical conduct, legal ethics, directors, auditors

Procedia PDF Downloads 35
116 The Intersection of Autistic and Trans* Identity: Qualitative Engaged Study in Eastern Europian Activist Groups

Authors: Hana Drštičková

Abstract:

The paper describes the findings of a qualitative, engaged research focused on the intersection between transgender and autistic identity in a politically engaged setting of activist (trans, queer, crip, disability justice or any combination thereof) groups. It explores the relationship that autistic and trans people have towards activism and how do they feel their identity(ies) impact the kind of political action they take. Geographically, the research terrain is located mainly in Czechia; however, there are important overlaps with other Eastern European countries. The basis of the research’s approach is built on the interconnected principles of the feminist theory of intersectionality, queer/trans studies, disability studies and the concept of the Neurodiversity Paradigm. This paper argues that the social phenomenon of autism and transness is formed differently in Czechia/Eastern Europe and, therefore, deserves additional attention. Nevertheless, it points out that, even though the socio-political context is different, the fact that these identities have a radical political potential to disrupt normative structures in society remains the same. The measure of oppression these structures generate, and the near absence of any public discourse beyond the pathological paradigm in the chosen terrain contributes to the emergence of mainly queer and trans-activist, and to a lesser extent crip, disability justice or mad activist groups, that attract trans and autistic membership. The subsections of the research focus on the topics of the mutual influence of both identities in flux within individual participants, the perceived (dis)connection of networks of oppression or, conversely, support and identification with the community or communities, and the question of how the trans* and autistic members feel their presence affects the activity, internal dynamics, thematic scope and general values of the activist groups they participate in. The research methodology includes participant observation and active participation in groups where the researcher acts as a partial insider, semi-structured in-depth interviews and a critical participatory methodology. Also included is the reflection of not only the combination of researcher and insider roles but also the combination of research and activist intent.

Keywords: activism, autism, queer, neurodiversity, neuroqueer, transgender

Procedia PDF Downloads 39
115 An Investigation into the Impact of Brexit on Consumer Perception of Trust in the Food Industry

Authors: Babatope David Omoniyi, Fiona Lalor, Sinead Furey

Abstract:

This ongoing project investigates the impact of Brexit on consumer perceptions of trust in the food industry. Brexit has significantly impacted the food industry, triggering a paradigm shift in the movement of food/agricultural produce, regulations, and cross-border collaborations between Great Britain, Northern Ireland, and the Republic of Ireland. In a world where the dynamics have shifted because of regulatory changes that impact trade and the free movement of foods and agricultural produce between these three countries, monitoring and controlling every stage of the food supply chain have become challenging, increasing the potential for food fraud and food safety incidents. As consumers play a pivotal role in shaping the market, understanding any shifts in trust post-Brexit enables them to navigate the market with confidence and awareness. This study aims to explore the complexities of consumer perceptions, focusing on trust as a cornerstone of consumer confidence in the post-Brexit food landscape. The objectives include comparing trust in official controls pre- and post-Brexit, determining consumer awareness of food fraud, and devising recommendations that reflect the evidence from this primary research regarding consumer trust in food authenticity post-Brexit. The research design follows an exploratory sequential mixed methods approach, incorporating qualitative methods such as focus groups and structured interviews, along with quantitative research through a large-scale survey. Participants from UCD and Ulster University campuses, comprising academic and non-academic staff, students, and researchers, will provide insights into the impact of Brexit on consumer trust. Preliminary findings from focus groups and interviews highlight changes in labelling, reduced quantity and quality of foods in both Northern Ireland and the Republic of Ireland, fewer food choices, and increased food prices since Brexit. The study aims to further investigate and quantify these impacts through a comprehensive large-scale survey involving participants from Northern Ireland and the Republic of Ireland. The results will inform official controls and consumer-facing messaging contributing valuable insights to navigate the evolving post-Brexit food landscape.

Keywords: Brexit, consumer trust, food fraud, food authenticity, food safety, food industry

Procedia PDF Downloads 26
114 Machine Learning Facing Behavioral Noise Problem in an Imbalanced Data Using One Side Behavioral Noise Reduction: Application to a Fraud Detection

Authors: Salma El Hajjami, Jamal Malki, Alain Bouju, Mohammed Berrada

Abstract:

With the expansion of machine learning and data mining in the context of Big Data analytics, the common problem that affects data is class imbalance. It refers to an imbalanced distribution of instances belonging to each class. This problem is present in many real world applications such as fraud detection, network intrusion detection, medical diagnostics, etc. In these cases, data instances labeled negatively are significantly more numerous than the instances labeled positively. When this difference is too large, the learning system may face difficulty when tackling this problem, since it is initially designed to work in relatively balanced class distribution scenarios. Another important problem, which usually accompanies these imbalanced data, is the overlapping instances between the two classes. It is commonly referred to as noise or overlapping data. In this article, we propose an approach called: One Side Behavioral Noise Reduction (OSBNR). This approach presents a way to deal with the problem of class imbalance in the presence of a high noise level. OSBNR is based on two steps. Firstly, a cluster analysis is applied to groups similar instances from the minority class into several behavior clusters. Secondly, we select and eliminate the instances of the majority class, considered as behavioral noise, which overlap with behavior clusters of the minority class. The results of experiments carried out on a representative public dataset confirm that the proposed approach is efficient for the treatment of class imbalances in the presence of noise.

Keywords: machine learning, imbalanced data, data mining, big data

Procedia PDF Downloads 104
113 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 37
112 Treating On-Demand Bonds as Cash-In-Hand: Analyzing the Use of “Unconscionability” as a Ground for Challenging Claims for Payment under On-Demand Bonds

Authors: Asanga Gunawansa, Shenella Fonseka

Abstract:

On-demand bonds, also known as unconditional bonds, are commonplace in the construction industry as a means of safeguarding the employer from any potential non-performance by a contractor. On-demand bonds may be obtained from commercial banks, and they serve as an undertaking by the issuing bank to honour payment on demand without questioning and/or considering any dispute between the employer and the contractor in relation to the underlying contract. Thus, whether or not a breach had occurred under the underlying contract, which triggers the demand for encashment by the employer, is not a question the bank needs to be concerned with. As a result, an unconditional bond allows the beneficiary to claim the money almost without any condition. Thus, an unconditional bond is as good as cash-in-hand. In the past, establishing fraud on the part of the employer, of which the bank had knowledge, was the only ground on which a bank could dishonour a claim made under an on-demand bond. However, recent jurisprudence in common law countries shows that courts are beginning to consider unconscionable conduct on the part of the employer in claiming under an on-demand bond as a ground that contractors could rely on the prevent the banks from honouring such claims. This has created uncertainty in connection with on-demand bonds and their liquidity. This paper analyzes recent judicial decisions in four common law jurisdictions, namely, England, Singapore, Hong Kong, and Sri Lanka, to identify the scope of using the concept of “unconscionability” as a ground for preventing unreasonable claims for encashment of on-demand bonds. The objective of this paper is to argue that on-demand bonds have lost their effectiveness as “cash-in-hand” and that this is, in fact, an advantage and not an impediment to international commerce, as the purpose of such bonds should not be to provide for illegal and unconscionable conduct by the beneficiaries.

Keywords: fraud, performance guarantees, on-demand bonds, unconscionability

Procedia PDF Downloads 68
111 An Interview and PhotoVoice Exploration of Sexual Education Provision to Women with Physical Disability and Potential Experiences of Violence

Authors: D. Beckwith

Abstract:

This research explored sexual identity for women with physical disability, both congenital and acquired. It also explored whether exposure to violence or negative risk-taking had played a role in their intimate relationships. This phenomenological research used semi-structured interviews and photo elicitation with the researcher’s insider knowledge adding experiential substance and understanding to the discussion. Findings confirm sexuality for women with physical disability is marginalised and de-gendered making it less of a priority for professionals and policy makers and emphasising the need to more effectively support women with disability in relation to their sexuality, sexual expression and violence.

Keywords: lived-experience, identity, PhotoVoice, sexuality, violence, women with physical disability

Procedia PDF Downloads 109
110 Human Rights and Fundamental Freedoms in Crisis as Viewed during Bangladesh Parliamentary Election-2018 and Afterwards: A Contestant's Perspective on Social Measures

Authors: Mohammad S. Islam

Abstract:

Elections in Bangladesh are always controversial, and sometimes it becomes a violent affair when state power is combined with politics. Despite the commitment of the ruling party- the polling government to ensure free, fair, and credible elections, the participants of opposition parties and the general voters became very disappointed, terribly frustrated, and severely shocked. It happened when numerous claims of serious irregularities of vote rigging and violence came out in broad daylight during the election. This paper addresses the issues of how the ruling party created frightening and a horror situation to make people silent over electoral fraud and violent incidents, including gang rape. It also seeks to demonstrate that election-2018 was simply the deceptive action of the ruling party to legitimate their power, but not to provide a minimum opportunity for voters to exercise their fundamental right to vote. The fundamental freedom and the rule of law seemed to be ignored completely in this election process and afterwards. With the help of state machinery, the government of the ruling party violated human rights, restricted fundamental freedoms, and humiliated social protection & dignity. The contestant’s views as witnessed and relevant literatures are cited first for conceptual understanding. Then, the paper will examine how a new dimension of circumstantial social measures related to sustained protection can reduce all kinds of violence against humanity towards establishing a peaceful democratic society. Finally, this paper interprets the key findings and considers wider implications.

Keywords: electoral fraud, human rights, sustained protection, social measures, vote rigging

Procedia PDF Downloads 162
109 Corporate Governance Development in Mongolia: The Role of Professional Accountants

Authors: Ernest Nweke

Abstract:

The work of Professional Accountants and Corporate governance are synonymous and cannot be divorced from each other. Organizations, profit and non-profit alike cannot implement sound corporate practices without inputs from Professional Accountants. In today’s dynamic corporate world, good corporate governance practice is a sine qua non. More so, following the corporate failures of the past decades like Enron and WorldCom, governments around the world, including Mongolia are becoming more proactive in ensuring sound corporate governance mechanisms. In the past fifteen years, the Mongolian government has taken several measures to establish and strengthen internal corporate governance structures in firms. This paper highlights the role of professional accountants and auditors play in ensuring that good corporate governance mechanisms are entrenched in listed companies in Mongolia. Both primary and secondary data are utilized in this research. In collection of primary data, Delphi method was used, securing responses from only knowledgeable senior employees, top managers, and some CEOs. Using this method, a total of 107 top-level company employees and executives randomly selected from 22 companies were surveyed; maximum of 5 and minimum of 4 from each company. These companies cut across several sectors. It was concluded that Professional Accountants play key roles in setting and maintaining firm governance. They do this by ensuring full compliance with all the requirements of good and sound corporate governance, establishing reporting, monitoring and evaluating standards, assisting in the setting up of proper controls, efficient and effective audit systems, sound fraud risk management and putting in place an overall vision for the enterprise. Companies with effective corporate governance mechanisms are usually strong and fraud-resilient. It was also discovered that companies with big 4 audit firms tend to have better governance structures in Mongolia.

Keywords: accountants, corporate disclosure, corporate failure, corporate governance

Procedia PDF Downloads 245
108 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 314
107 Time-Domain Nuclear Magnetic Resonance as a Potential Analytical Tool to Assess Thermisation in Ewe's Milk

Authors: Alessandra Pardu, Elena Curti, Marco Caredda, Alessio Dedola, Margherita Addis, Massimo Pes, Antonio Pirisi, Tonina Roggio, Sergio Uzzau, Roberto Anedda

Abstract:

Some of the artisanal cheeses products of European Countries certificated as PDO (Protected Designation of Origin) are made from raw milk. To recognise potential frauds (e.g. pasteurisation or thermisation of milk aimed at raw milk cheese production), the alkaline phosphatase (ALP) assay is currently applied only for pasteurisation, although it is known to have notable limitations for the validation of ALP enzymatic state in nonbovine milk. It is known that frauds considerably impact on customers and certificating institutions, sometimes resulting in a damage of the product image and potential economic losses for cheesemaking producers. Robust, validated, and univocal analytical methods are therefore needed to allow Food Control and Security Organisms, to recognise a potential fraud. In an attempt to develop a new reliable method to overcome this issue, Time-Domain Nuclear Magnetic Resonance (TD-NMR) spectroscopy has been applied in the described work. Daily fresh milk was analysed raw (680.00 µL in each 10-mm NMR glass tube) at least in triplicate. Thermally treated samples were also produced, by putting each NMR tube of fresh raw milk in water pre-heated at temperatures from 68°C up to 72°C and for up to 3 min, with continuous agitation, and quench-cooled to 25°C in a water and ice solution. Raw and thermally treated samples were analysed in terms of 1H T2 transverse relaxation times with a CPMG sequence (Recycle Delay: 6 s, interpulse spacing: 0.05 ms, 8000 data points) and quasi-continuous distributions of T2 relaxation times were obtained by CONTIN analysis. In line with previous data collected by high field NMR techniques, a decrease in the spin-spin relaxation constant T2 of the predominant 1H population was detected in heat-treated milk as compared to raw milk. The decrease of T2 parameter is consistent with changes in chemical exchange and diffusive phenomena, likely associated to changes in milk protein (i.e. whey proteins and casein) arrangement promoted by heat treatment. Furthermore, experimental data suggest that molecular alterations are strictly dependent on the specific heat treatment conditions (temperature/time). Such molecular variations in milk, which are likely transferred to cheese during cheesemaking, highlight the possibility to extend the TD-NMR technique directly on cheese to develop a method for assessing a fraud related to the use of a milk thermal treatment in PDO raw milk cheese. Results suggest that TDNMR assays might pave a new way to the detailed characterisation of heat treatments of milk.

Keywords: cheese fraud, milk, pasteurisation, TD-NMR

Procedia PDF Downloads 212
106 Riding the Crest of the Wave: Inclusive Education in New Zealand

Authors: Barbara A. Perry

Abstract:

In 1996, the New Zealand government and the Ministry of Education announced that they were setting up a "world class system of inclusive education". As a parent of a son with high and complex needs, a teacher, school Principal and Disability studies Lecturer, this author will track the changes in the journey towards inclusive education over the last 20 years. Strategies for partnering with families to ensure educational success along with insights from one of those on the crest of the wave will be presented. Using a narrative methodology the author will illuminate how far New Zealand has come towards this world class system of inclusion promised and share from personal experience some of the highlights and risks in the system. This author has challenged the old structures and been part of the setting up of new structures particularly for providing parent voice and insight; this paper provides a unique view from an insider’s voice as well as a professional in the system.

Keywords: disability studies, inclusive education, special education, working with families with children with disability

Procedia PDF Downloads 218
105 Mothers and Moneymakers: A Case Study of How Citizen-Women Shape U.S. Marriage Migration Politics Online

Authors: Gina Longo

Abstract:

Social media, internet technology, and affordable travel have created avenues like tourism and internet chatrooms for Western women to meet foreign partners without paid, third-party intermediaries in regions like the Middle East/North Africa (MENA) and Sub-Saharan Africa (SSA), where men from mid-level developing countries meet and marry Western women and try to relocate. Foreign nationals who marry U.S. citizens have an expedited track to naturalization. U.S. immigration officials require that “green card” petitioning couples demonstrate that their relationships are “valid and subsisting” (i.e., for love) and not fraudulent (i.e., for immigration papers). These requirements are ostensibly gender- and racially-neutral, but migration itself is not; black and white women petitioners who seek partners from these regions and solicit advice from similar others about the potential obstacles to their petitions’ success online. Using an online ethnography and textual analysis of conversation threads on a large on-line immigration forum where U.S. petitioners exchange such information, this study examines how gendered and racialized standards of legitimacy are applied to family and sexuality and used discursively online among women petitioners differently to achieve “genuineness” and define “red flags” indicating potential marriage fraud. This paper argues that forum-women members police immigration requests even before cases reach an immigration officer, and use this social media platform to reconstruct gendered and racialized hierarchies of U.S. citizenship. Women petitioners use the formal criteria of U.S. immigration in ways that reveal gender and racial ideologies, expectations for conformity to a gendered hegemonic family ideal, and policing of women’s sexual agency, fertility, and desirability. These intersectional norms shape their online discussions about the suitability of marriages and of the migration of non-citizen male partners of color to the United States.

Keywords: marriage fraud, migration, online forums, women

Procedia PDF Downloads 97
104 Control and Control Systems of Administration in Nigeria

Authors: Inuwa Abdu Ibrahim

Abstract:

Public officials are required to posses certain values to adequately protect public interest, by being leaders that are servants of the people. The reality in Nigeria is that leaders rule as masters of the people rather than servants. The paper looked at control and control systems of administration in Nigeria, its resultant consequences and ways of achieving true control of administrators and administration. Secondary source of data was adopted for the research. It concludes that the keys to administrative efficiency and effectiveness through control are implementation of the already existing procedures and laws, as well as commitment on the part of public officials.

Keywords: Accountability, Fraud, Administration, Nigeria

Procedia PDF Downloads 324
103 ANAC-id - Facial Recognition to Detect Fraud

Authors: Giovanna Borges Bottino, Luis Felipe Freitas do Nascimento Alves Teixeira

Abstract:

This article aims to present a case study of the National Civil Aviation Agency (ANAC) in Brazil, ANAC-id. ANAC-id is the artificial intelligence algorithm developed for image analysis that recognizes standard images of unobstructed and uprighted face without sunglasses, allowing to identify potential inconsistencies. It combines YOLO architecture and 3 libraries in python - face recognition, face comparison, and deep face, providing robust analysis with high level of accuracy.

Keywords: artificial intelligence, deepface, face compare, face recognition, YOLO, computer vision

Procedia PDF Downloads 125
102 Discerning Beginning Teachers' Conceptions of Competence through a Phenomenographic Investigation

Authors: Pauline Swee Choo Goh, Kung Teck Wong

Abstract:

The research reported here investigates variation in beginning teachers’ early experiences of their own teaching competency. A phenomenographic research approach was used to show the qualitatively different ways teacher competence was understood amongst beginning teachers in Malaysia. Phenomenographic interviews were conducted with 18 beginning teachers who had started full time teaching for between 1-3 years. Analysis revealed that beginning teachers ‘saw’, ‘understood’ the conceptions of competency in five different ways: i) the ability to manage classroom and student behavior, ii) a strong knowledge of the subject content, iii) the ability to reach out for assistance and support, iv) understanding the students they teach, and v) possessing values of professionalism. The relationships between these different ways are represented diagrammatically. This investigation gives an insider’s perspective a strong voice of what constitutes teacher competence, as well as illustrates that if teacher competence is to be used for any articulation of teacher standards, the term must be carefully defined through the help of the group most affected by any judgements of their competency to avoid misunderstandings, unhappiness and discontent.

Keywords: pre-service teachers, phenomenology, competency, teacher education

Procedia PDF Downloads 295
101 Healthy Nutrition Within Institutions

Authors: Khalil Boukfoussa

Abstract:

It is important to provide students with food that contains complete nutrients to provide them with mental and physical energy during the school day. Especially since the time students spend in school is equivalent to 50% of their time during the day, which increases the importance of proper nutrition in schools and makes it an ideal way to inculcate the foundations of a healthy lifestyle and healthy eating habits. Proper nutrition is one of the most important things that affect the health and process of growth and development in children, in addition to being a key factor in supporting the ability to focus, supporting mental abilities and developing the student’s academic achievement. In addition to the importance of a healthy diet for the development and growth of the child's body, proper nutrition can significantly contribute to protecting the body from catching viruses and helping it to pass the winter safely. Effective food control systems in different countries are essential to protect the health and safety of domestic consumers. These systems are also crucial in enabling countries to ensure the safety and quality of food entering international trade and to ensure that imported food conforms to national requirements. The current global food trade environment places significant obligations on both importing and exporting countries to strengthen their food control systems and to apply and implement risk-based food control strategiesConsumers are becoming more interested in the way food is produced, processed and marketed, and are increasingly demanding that governments assume greater responsibility for consumer protection and food safety. In many countries, food control is weak because of the abundance of legislation, the multiplicity of jurisdictions and weaknesses in control, monitoring and enforcement. The following guidelines seek to advise national authorities on strategies to strengthen food control systems to protect public health, prevent fraud and fraud, avoid food contamination and help facilitate trade. These Guidelines will assist authorities in selecting the most appropriate food control system options in terms of legislation, infrastructure and enforcement mechanisms. The document clarifies the broad principles that govern food control systems and provides examples of the infrastructure and methods by which national systems can operate

Keywords: food, nutrision, school, safty

Procedia PDF Downloads 41
100 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 272
99 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 387
98 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 248
97 Re-Reading the Impossibility of Identity: Modeling Gender Pluralism in Curriculum and Instruction

Authors: A. K. O’Loughlin

Abstract:

Identity doesn’t exist in discrete categories as it is defined. Kevin Kumashiro reveals the phrase 'an impossibility of identity' in Troubling Education (2000), an investigation of the intersections of culture and gender and the impact of erasure for queer POC identity. This underscores the essentiality of an insider or an outsider identity and the appearance of 'contradiction' or impossibility of these identities. The contradictions between us as subject in our own stories and in the stories of others are often silenced. This silencing of complex, 'contradicting' identity has unmissable implications in the classroom; the developing student in question is done a serious disservice, from which they may never recover. There is no more important point of contact than the teacher, for willingness to encounter a developing person as they are, not as we already think they are, or 'know' them to be, or think they should be. To decide how to regard them based on our own unilateral identity and its associated exhortations and injunctions is, as Hannah Arendt writes in The Origins of Totalitarianism (1951), to sell off our ability to rise, human-like, to the challenge of investigating things as they are. A re-reading of Kumashiro’s impossibility of identity becomes possible through the investigation of pluralism. Identities become possible and un-paradoxical by the notion that contradictions are not problems that an individual is not unilateral, but plural. In this paper, we investigate how philosophies of pluralism can inform our understanding of impossibility of identity in classroom curriculum and pedagogy.

Keywords: identity, gender, culture, pluralism, education, philosophy of education, queer theory, philosophy of mind, adolescent development

Procedia PDF Downloads 263
96 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 502
95 Combining Shallow and Deep Unsupervised Machine Learning Techniques to Detect Bad Actors in Complex Datasets

Authors: Jun Ming Moey, Zhiyaun Chen, David Nicholson

Abstract:

Bad actors are often hard to detect in data that imprints their behaviour patterns because they are comparatively rare events embedded in non-bad actor data. An unsupervised machine learning framework is applied here to detect bad actors in financial crime datasets that record millions of transactions undertaken by hundreds of actors (<0.01% bad). Specifically, the framework combines ‘shallow’ (PCA, Isolation Forest) and ‘deep’ (Autoencoder) methods to detect outlier patterns. Detection performance analysis for both the individual methods and their combination is reported.

Keywords: detection, machine learning, deep learning, unsupervised, outlier analysis, data science, fraud, financial crime

Procedia PDF Downloads 67
94 Constructing Notation for Music Learning in Athletes: Identifying Key Concepts in Music and Body Movements

Authors: Fung Chiat Loo, Fung Ying Loo

Abstract:

This paper discusses, suggests, and constructs a notation system to facilitate the learning and understanding of the two aspects of music and movement in a sports routine. This model serves to provide a simple and logical notation that does not require training in both music and choreography. Notation is an important medium in many art forms, particularly in music and dance, transmitting information that cannot easily be expressed using words or language. Another field that is closely associated with dance and music is sports routine, which equally requires choreography and music. However, from the perspective of music, it is common to observe many incongruencies appearing between the music used and the choreography that impede an optimal perception of the performance. The concept of the notation proceeds with a discussion and review of existing dance notations that could contribute to sports routines, along with rules and a code of points in selected sports routines. The author's involvement as an insider of numerous musical theatre productions also contributed to this study. The notation constructed includes time (tempo), significances of musical accents, direction, and phrasing, along with significances of movements (jump, punch, shape). It is believed that the level of congruence between music and movement will provide optimal visualization, and in that, the notation serves to provide adequate information on both entities for the understanding of athletes and coaches.

Keywords: notation, choreography, music learning, sports routines, congruence

Procedia PDF Downloads 59