Search results for: organized crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 996

Search results for: organized crime

846 Examining Bulling Rates among Youth with Intellectual Disabilities

Authors: Kaycee L. Bills

Abstract:

Adolescents and youth who are members of a minority group are more likely to experience higher rates of bullying in comparison to other student demographics. Specifically, adolescents with intellectual disabilities are a minority population that is more susceptible to experience unfair treatment in social settings. This study employs the 2015 Wave of the National Crime Victimization Survey – School Crime Supplement (NCVS/SCS) longitudinal dataset to explore bullying rates experienced among adolescents with intellectual disabilities. This study uses chi-square testing and a logistic regression to analyze if having a disability influences the likelihood of being bullied in comparison to other student demographics. Results of the chi-square testing and the logistic regression indicate that adolescent students who were identified as having a disability were approximately four times more likely to experience higher bullying rates in comparison to all other majority and minority student populations. Thus, it means having a disability resulted in higher bullying rates in comparison to all student groups.

Keywords: disability, bullying, social work, school bullying

Procedia PDF Downloads 108
845 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union

Authors: María Elena Menéndez Ibáñez

Abstract:

After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.

Keywords: border control, immigration, international cooperation, national security

Procedia PDF Downloads 106
844 Persistence of DNA on Clothes Contaminated by Semen Stains after Washing

Authors: Ashraf Shebl, Bassam Garah, Radah Youssef

Abstract:

Sexual assault is usually a hidden crime where the only witnesses are the victim and the assailant. For a variety of reasons, even the victim may be unable to provide a detailed account of the assault or the identity of the perpetrator. Often the case history deteriorates into one person’s word against another. With such limited initial information, the physical and biological evidence collected from the victim, from the crime scene, and from the suspect will play a pivotal role in the objective and scientific reconstruction of the events in question. The aim of work is to examine whether DNA profiles could be recovered from repeated washed clothes after contaminated by semen stains. Fresh semen about 1ml. ( <1 h old) taken from donor was deposited on four types of clothes (cotton, silk, polyester, and jeans). Then leave to dry in room temperature and washed by washing machine at temperature (30°C-60°C) and by hand washing. Some items of clothing were washed once, some twice and others three times. DNA could be extracted from some of these samples even after multiple washing. This study demonstrates that complete DNA profiles can be obtained from washed semen stains on different types of clothes, even after many repeated washing. These results indicated that clothes of the victims must be examined even if they were washed many times.

Keywords: sexual assault, DNA, persistence, clothes

Procedia PDF Downloads 164
843 Analysis of Environmental Activism in High Schools in District Peshawar

Authors: Hafiz M. Inamullah, Altaf Ullah

Abstract:

Environmental degradation is a serious issue that has adverse impacts on the human population locally, regionally, and globally. There is a dire need to adopt an environmentally friendly lifestyle to minimize further environmental degradation. One of the mediums through which environmentally friendly attitudes and behavior may be inculcated is through school education. The purpose of this study was to investigate environmental activities organized in High Schools of District Peshawar. The population for this study was comprised of 77 Headmasters of the High Schools in District Peshawar. A sample of 65 Headmasters was selected randomly from the above-mentioned population. One questionnaire was developed from the relevant literature for the Headmasters and was self-administered by the researcher. The collected data was entered into Excel and was analyzed and interpreted through SPSS 20 using the frequencies and percentages, and the Chi-square test was applied. The results indicated that most high schools had never organized environmental activities for secondary-level students. It was suggested that the high schools might organize various environmental activities such as plantations, park visits, debate competitions, environmental clubs, and drawing competitions.

Keywords: proinvirmenlaism, Khyber Pakhtunkhwa, secondary level, Peshawar

Procedia PDF Downloads 55
842 The Role of Privatization as a Moderator of the Impact of Non-Institutional Factors on the Performance of the Enterprises in Central and Eastern Europe

Authors: Margerita Topalli

Abstract:

In this paper, we analyze the impact of corruption (business environment, informal payments and state capture), crime and tax time, on the enterprise's performance during economic transition in the Central and Eastern Europe and the role of privatization as a moderator. We examine this effect by comparing the performance of the privatized enterprises and the state-owned-enterprises, while controlling for various forms of selection bias. The present study is based on firm-level panel data collected by the BEEPS for 27 transition countries over 2002, 2005, 2007, and 2011. In addition to firm characteristics, BEEPS collects valuable survey information on different forms of corruption, crime, tax time and firm ownership. We estimate the impact of corruption, crime, tax time on the different performance measures (sales, productivity, employment, labor costs and material costs) of the enterprise, whereby we control for firm ownership, with a special focus on the role of the privatization as a moderator. It argues that in general terms, the privatization has positive effects on the performance of enterprises during transition, but these effects are significantly different, depending on the examined performance measure (sales, productivity, employment, labor costs and material costs). When the privatization is effective, the privatized enterprises show a considerable performance improvements, particularly in terms of revenue growth and productivity growth. It also argues that the effects of privatization are different depending on the types of owner (outsider or insider) to whom it gives control. The results show that privatization to insider owners has no significant performance effect.

Keywords: effects of privatization, enterprise performance, state capture, corruption, firm ownership, economic transition, Central and Eastern Europe

Procedia PDF Downloads 288
841 The Sources of Anti-Immigrant Sentiments in Russia

Authors: Anya Glikman, Anastasia Gorodzeisky

Abstract:

Since the late 1990th labor immigration and its consequences on the society have become one of the most frequently discussed and debated issues in Russia. Social scientists point that the negative attitudes towards immigrants among Russian majority population is widespread, and their level, at least, twice as high as their level in most other European countries. Moreover, recent study by Gorodzeisky, Glikman and Maskyleison (2014) demonstrates that the two sets of individual level predictors of anti-foreigner sentiment – socio-economic status and conservative views and ideologies – that have been repeatedly proved in research in Western countries are not effective in predicting of anti-foreigner sentiment in Post-Socialist Russia. Apparently, the social mechanisms underlying anti-foreigner sentiment in Western countries, which are characterized by stable regimes and relatively long immigration histories, do not play a significant role in the explanation of anti-foreigner sentiment in Post-Socialist Russia. The present study aims to examine alternative possible sources of anti-foreigner sentiment in Russia while controlling for socio-economic position of individuals and conservative views. More specifically, following the research literature on the topic worldwide, we aim to examine whether and to what extent human values (such as tradition, universalism, safety and power), ethnic residential segregation, fear of crime and exposure to mass media affect anti-foreigner sentiments in Russia. To do so, we estimate a series of multivariate regression equations using the data obtained from 2012 European Social Survey. The national representative sample consists of 2337 Russian born respondents. Descriptive results reveal that about 60% percent of Russians view the impact of immigrants on the country in negative terms. Further preliminary analysis show that anti-foreigner sentiments are associated with exposer to mass media as well as with fear of crime. Specifically, respondents who devoted more time watching news on TV channels and respondents who express higher levels of fear of crime tend to report higher levels of anti-immigrants sentiments. The findings would be discussed in light of sociological perspective and the context of Russian society.

Keywords: anti-immigrant sentiments, fear of crime, human values, mass media, Russia

Procedia PDF Downloads 427
840 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 132
839 Film Review of 'Heroic Saviours and Survivors': The Representation of Sex Trafficking in Popular Films in India

Authors: Nisha James, Shubha Ranganathan

Abstract:

One of the most poignant forms of organized crime against women, which has rarely made it to the world of Indian cinema, is that of sex trafficking, i.e. the forcible involvement of women in the sex trade through fraud or coercion (Hughes, 2005). In the space of Indian cinema, much of the spotlight has been on the sensational drug trafficking and gang mafia of Bombay. During our research on sex trafficking, the rehabilitated women interviewed often expressed strong criticism about mass media’s naive portrayal of prostitutes as money-minting, happy and sexually driven women. They argued that this unrealistic portrayal ignored the fact that this was not a reality for the majority of trafficked women. Given the gravity of sex trafficking as a human rights issue, it is, therefore, refreshing to see three recent films on sex trafficking in Indian Languages – Naa Bangaaru Talli (2014, Telugu), Mardaani (2014, Hindi) and Lakshmi (2014, Hindi). This paper reviews these three films to explore the portrayal of the everyday reality of trafficking for women. Film analysis was used to understand the representation of psychological issues in the media. The strength of these movies starts with their inspirations which are of true stories and that they are all aimed at bringing awareness about the issue of sex trafficking, which is a rising social evil in Indian society though none of the three films move to portray the next phase of rehabilitation and reintegration of victims, which is a very complex and important process in the life of a survivor. According to findings, survivors of sex trafficking find the rehabilitation and reintegration into society to be a slow and tough part of their life as they continuously face stigma and social exclusion and have to strive to live against all odds of non-acceptance starting from their family.

Keywords: film review, Indian films, sex trafficking, survivors

Procedia PDF Downloads 408
838 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 246
837 Adverse Childhood Experience of Domestic Violence and Domestic Mental Health Leading to Youth Violence: An Analysis of Selected Boroughs in London

Authors: Sandra Smart-Akande, Chaminda Hewage, Imtiaz Khan, Thanuja Mallikarachchi

Abstract:

According to UK police-recorded data, there has been a substantial increase in knife-related crime and youth violence in the UK since 2014 particularly in the London boroughs. These crime rates are disproportionally distributed across London with the majority of these crimes occurring in the highly deprived areas of London and among young people aged 11 to 24 with large discrepancies across ethnicity, age, gender and borough of residence. Comprehensive studies and literature have identified risk factors associated with a knife carrying among youth to be Adverse Childhood Experience (ACEs), poor mental health, school or social exclusion, drug dealing, drug using, victim of violent crime, bullying, peer pressure or gang involvement, just to mention a few. ACEs are potentially traumatic events that occur in childhood, this can be experiences or stressful events in the early life of a child and can lead to an increased risk of damaging health or social outcomes in the latter life of the individual. Research has shown that children or youths involved in youth violence have had childhood experience characterised by disproportionate adverse childhood experiences and substantial literature link ACEs to be associated with criminal or delinquent behavior. ACEs are commonly grouped by researchers into: Abuse (Physical, Verbal, Sexual), Neglect (Physical, Emotional) and Household adversities (Mental Illness, Incarcerated relative, Domestic violence, Parental Separation or Bereavement). To the author's best knowledge, no study to date has investigated how household mental health (mental health of a parent or mental health of a child) and domestic violence (domestic violence on a parent or domestic violence on a child) is related to knife homicides across the local authorities areas of London. This study seeks to address the gap by examining a large sample of data from the London Metropolitan Police Force and Characteristics of Children in Need data from the UK Department for Education. The aim of this review is to identify and synthesise evidence from data and a range of literature to identify the relationship between adverse childhood experiences and youth violence in the UK. Understanding the link between ACEs and future outcomes can support preventative action.

Keywords: adverse childhood experiences, domestic violence, mental health, youth violence, prediction analysis, London knife crime

Procedia PDF Downloads 92
836 Rice Blessing Ceremony of Thailand and Vietnam: The Relation of Southeast Asia

Authors: Patthida Bunchavalit, Saharot Kittimahacharoen

Abstract:

The objective of this article is to compare rice blessing ceremony between Thailand and Vietnam. Both countries are located in Southeast Asia where agriculture is the main occupation. As a result of the study, it is found that the rice blessing ceremony of Thai and Vietnamese societies have differences and similarities. A person leading the ceremony is a person who has the highest position in the country. For Thailand, it is the king or royal family member while for Vietnam, it is the president. In Thailand, the ceremony began in Ayutthaya period which derived from Buddhism and Brahmanism ideology. It is annually organized in the beginning of raining season. In Vietnam, it is annually organized in the beginning of spring. The first time it occurred was in Tien Le Monarchy period of Thien Phuc era deriving from Chinese ideology. The differences are ideas, believes, objectives and details of the ceremony. It is, in Thailand, to boost farmer’s morale and to predict the fertility of crops in each year. Additionally, there is a prediction using royal cows. Meanwhile, in Vietnam the purpose is to worship god of weather for seasonal rain and productive harvesting. Therefore, it is presumed that the rice blessing ceremony of Thailand and Vietnam somewhat have similarities in spite of having different origin but are on the same basis of belief.

Keywords: agriculture, ceremony, culture, Thailand, Vietnam

Procedia PDF Downloads 157
835 Primary School Students’ Modeling Processes: Crime Problem

Authors: Neslihan Sahin Celik, Ali Eraslan

Abstract:

As a result of PISA (Program for International Student Assessments) survey that tests how well students can apply the knowledge and skills they have learned at school to real-life challenges, the new and redesigned mathematics education programs in many countries emphasize the necessity for the students to face complex and multifaceted problem situations and gain experience in this sense allowing them to develop new skills and mathematical thinking to prepare them for their future life after school. At this point, mathematical models and modeling approaches can be utilized in the analysis of complex problems which represent real-life situations in which students can actively participate. In particular, model eliciting activities that bring about situations which allow the students to create solutions to problems and which involve mathematical modeling must be used right from primary school years, allowing them to face such complex, real-life situations from early childhood period. A qualitative study was conducted in a university foundation primary school in the city center of a big province in 2013-2014 academic years. The participants were 4th grade students in a primary school. After a four-week preliminary study applied to a fourth-grade classroom, three students included in the focus group were selected using criterion sampling technique. A focus group of three students was videotaped as they worked on the Crime Problem. The conversation of the group was transcribed, examined with students’ written work and then analyzed through the lens of Blum and Ferri’s modeling processing cycle. The results showed that primary fourth-grade students can successfully work with model eliciting problem while they encounter some difficulties in the modeling processes. In particular, they developed new ideas based on different assumptions, identified the patterns among variables and established a variety of models. On the other hand, they had trouble focusing on problems and occasionally had breaks in the process.

Keywords: primary school, modeling, mathematical modeling, crime problem

Procedia PDF Downloads 375
834 Digital Activism and the Individual: A Utilitarian Perspective

Authors: Tania Mitra

Abstract:

Digital Activism or Cyber Activism uses digital media as a means to disseminate information and mobilize masses towards a specific goal. When digital activism was first born in the early 1990s, it was primarily used by groups of organized political activists. However, with the advent of social media, online activism has filtered down to the individual- one who does not necessarily belong to or identify with an agenda, group, or political party. A large part of digital activism today stems from the individual’s notion of what is right and wrong. This gives rise to a discourse around descriptive ethics and the implications of the independent digital activist. Although digital activism has paved the way for and bolstered support for causes like the MeToo Movement and Black Lives Matter, the lack of a unified, organized body has led to counterintuitive progressions and suspicions regarding the movements. The paper introduces the ideas of 'clout' culture, click baits, and clicktivism (the phenomenon where activism is reduced to a blind following of the online trends), to discuss the impacts of exclusive digital activism. By using Jeremy Bentham's utilitarian approach to ethics, that places emphasis on the best possible outcome for a society, the paper will show how individual online activism reaching for a larger, more common end can sometimes lead to an undermining of that end, not only in the online space but also how it manifests in the real world.

Keywords: digital activism, ethics, independent digital activist, utilitarianism

Procedia PDF Downloads 98
833 Glorification Trap in Combating Human Trafficking in Indonesia: An Application of Three-Dimensional Model of Anti-Trafficking Policy

Authors: M. Kosandi, V. Susanti, N. I. Subono, E. Kartini

Abstract:

This paper discusses the risk of glorification trap in combating human trafficking, as it is shown in the case of Indonesia. Based on a research on Indonesian combat against trafficking in 2017-2018, this paper shows the tendency of misinterpretation and misapplication of the Indonesian anti-trafficking law into misusing the law for glorification, to create an image of certain extent of achievement in combating human trafficking. The objective of this paper is to explain the persistent occurrence of human trafficking crimes despite the significant progress of anti-trafficking efforts of Indonesian government. The research was conducted in 2017-2018 by qualitative approach through observation, depth interviews, discourse analysis, and document study, applying the three-dimensional model for analyzing human trafficking in the source country. This paper argues that the drive for glorification of achievement in the combat against trafficking has trapped Indonesian government in the loop of misinterpretation, misapplication, and misuse of the anti-trafficking law. In return, the so-called crime against humanity remains high and tends to increase in Indonesia.

Keywords: human trafficking, anti-trafficking policy, transnational crime, source country, glorification trap

Procedia PDF Downloads 139
832 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 416
831 A Novel Methodology for Browser Forensics to Retrieve Searched Keywords from Windows 10 Physical Memory Dump

Authors: Dija Sulekha

Abstract:

Nowadays, a good percentage of reported cybercrimes involve the usage of the Internet, directly or indirectly for committing the crime. Usually, Web Browsers leave traces of browsing activities on the host computer’s hard disk, which can be used by investigators to identify internet-based activities of the suspect. But criminals, who involve in some organized crimes, disable browser file generation feature to hide the evidence while doing illegal activities through the Internet. In such cases, even though browser files were not generated in the storage media of the system, traces of recent and ongoing activities were generated in the Physical Memory of the system. As a result, the analysis of Physical Memory Dump collected from the suspect's machine retrieves lots of forensically crucial information related to the browsing history of the Suspect. This information enables the cyber forensic investigators to concentrate on a few highly relevant selected artefacts while doing the Offline Forensics analysis of storage media. This paper addresses the reconstruction of web browsing activities by conducting live forensics to identify searched terms, downloaded files, visited sites, email headers, email ids, etc. from the physical memory dump collected from Windows 10 Systems. Well-known entry points are available for retrieving all the above artefacts except searched terms. The paper describes a novel methodology to retrieve the searched terms from Windows 10 Physical Memory. The searched terms retrieved in this way can be used for doing advanced file and keyword search in the storage media files reconstructed from the file system recovery in offline forensics.

Keywords: browser forensics, digital forensics, live Forensics, physical memory forensics

Procedia PDF Downloads 84
830 Agricultural Organized Areas Approach for Resilience to Droughts, Nutrient Cycle and Rural and Wild Fires

Authors: Diogo Pereira, Maria Moura, Joana Campos, João Nunes

Abstract:

As the Ukraine war highlights the European Economic Area’s vulnerability and external dependence on feed and food, agriculture gains significant importance. Transformative change is necessary to reach a sustainable and resilient agricultural sector. Agriculture is an important drive for bioeconomy and the equilibrium and survival of society and rural fires resilience. The pressure of (1) water stress, (2) nutrient cycle, and (3) social demographic evolution towards 70% of the population in Urban systems and the aging of the rural population, combined with climate change, exacerbates the problem and paradigm of rural and wildfires, especially in Portugal. The Portuguese territory is characterized by (1) 28% of marginal land, (2) the soil quality of 70% of the territory not being appropriate for agricultural activity, (3) a micro smallholding, with less than 1 ha per proprietor, with mainly familiar and traditional agriculture in the North and Centre regions, and (4) having the most vulnerable areas for rural fires in these same regions. The most important difference between the South, North and Centre of Portugal, referring to rural and wildfires, is the agricultural activity, which has a higher level in the South. In Portugal, rural and wildfires represent an average annual economic loss of around 800 to 1000 million euros. The WinBio model is an agrienvironmental metabolism design, with the capacity to create a new agri-food metabolism through Agricultural Organized Areas, a privatepublic partnership. This partnership seeks to grow agricultural activity in regions with (1) abandoned territory, (2) micro smallholding, (3) water and nutrient management necessities, and (4) low agri-food literacy. It also aims to support planning and monitoring of resource use efficiency and sustainability of territories, using agriculture as a barrier for rural and wildfires in order to protect rural population.

Keywords: agricultural organized areas, residues, climate change, drought, nutrients, rural and wild fires

Procedia PDF Downloads 51
829 A Comprehensive Evaluation of the Bus Rapid Transit Project from Gazipur to Airport at Dhaka Focusing on Environmental Impacts

Authors: Swapna Begum, Higano Yoshiro

Abstract:

Dhaka is the capital city of Bangladesh. It is considered as one of the traffic congested cities in the world. The growth of the population of this city is increasing day by day. The land use pattern and the increased socio-economic characteristics increase the motor vehicle ownership of this city. The rapid unplanned urbanization and poor transportation planning have deteriorated the transport environment of this city. Also, the huge travel demand with non-motorized traffics on streets is accounted for enormous traffic congestion in this city. The land transport sector in Dhaka is mainly dependent on road transport comprised of both motorized and non-motorized modes of travel. This improper modal mix and the un-integrated system have resulted in huge traffic congestion in this city. Moreover, this city has no well-organized public transport system and any Mass Transit System to cope with this ever increasing demand. Traffic congestion causes serious air pollution and adverse impact on the economy by deteriorating the accessibility, level of service, safety, comfort and operational efficiency. Therefore, there is an imperative need to introduce a well-organized, properly scheduled mass transit system like (Bus Rapid Transit) BRT minimizing the existing problems.

Keywords: air pollution, BRT, mass transit, traffic congestion

Procedia PDF Downloads 375
828 Integrating a Universal Forensic DNA Database: Anticipated Deterrent Effects

Authors: Karen Fang

Abstract:

Investigative genetic genealogy has attracted much interest in both the field of ethics and the public eye due to its global application in criminal cases. Arguments have been made regarding privacy and informed consent, especially with law enforcement using consumer genetic testing results to convict individuals. In the case of public interest, DNA databases have the strong potential to significantly reduce crime, which in turn leads to safer communities and better futures. With the advancement of genetic technologies, the integration of a universal forensic DNA database in violent crimes, crimes against children, and missing person cases is expected to deter crime while protecting one’s privacy. Rather than collecting whole genomes from the whole population, STR profiles can be used to identify unrelated individuals without compromising personal information such as physical appearance, disease risk, and geographical origin, and additionally, reduce cost and storage space. STR DNA profiling is already used in the forensic science field and going a step further benefits several areas, including the reduction in recidivism, improved criminal court case turnaround time, and just punishment. Furthermore, adding individuals to the database as early as possible prevents young offenders and first-time offenders from participating in criminal activity. It is important to highlight that DNA databases should be inclusive and tightly governed, and the misconception on the use of DNA based on crime television series and other media sources should be addressed. Nonetheless, deterrent effects have been observed in countries like the US and Denmark with DNA databases that consist of serious violent offenders. Fewer crimes were reported, and fewer people were convicted of those crimes- a favorable outcome, not even the death penalty could provide. Currently, there is no better alternative than a universal forensic DNA database made up of STR profiles. It can open doors for investigative genetic genealogy and fostering better communities. Expanding the appropriate use of DNA databases is ethically acceptable and positively impacts the public.

Keywords: bioethics, deterrent effects, DNA database, investigative genetic genealogy, privacy, public interest

Procedia PDF Downloads 126
827 Socio-Economic and Psychological Factors of Moscow Population Deviant Behavior: Sociological and Statistical Research

Authors: V. Bezverbny

Abstract:

The actuality of the project deals with stable growing of deviant behavior’ statistics among Moscow citizens. During the recent years the socioeconomic health, wealth and life expectation of Moscow residents is regularly growing up, but the limits of crime and drug addiction have grown up seriously. Another serious Moscow problem has been economical stratification of population. The cost of identical residential areas differs at 2.5 times. The project is aimed at complex research and the development of methodology for main factors and reasons evaluation of deviant behavior growing in Moscow. The main project objective is finding out the links between the urban environment quality and dynamics of citizens’ deviant behavior in regional and municipal aspect using the statistical research methods and GIS modeling. The conducted research allowed: 1) to evaluate the dynamics of deviant behavior in Moscow different administrative districts; 2) to describe the reasons of crime increasing, drugs addiction, alcoholism, suicides tendencies among the city population; 3) to develop the city districts classification based on the level of the crime rate; 4) to create the statistical database containing the main indicators of Moscow population deviant behavior in 2010-2015 including information regarding crime level, alcoholism, drug addiction, suicides; 5) to present statistical indicators that characterize the dynamics of Moscow population deviant behavior in condition of expanding the city territory; 6) to analyze the main sociological theories and factors of deviant behavior for concretization the deviation types; 7) to consider the main theoretical statements of the city sociology devoted to the reasons for deviant behavior in megalopolis conditions. To explore the level of deviant behavior’ factors differentiation, the questionnaire was worked out, and sociological survey involved more than 1000 people from different districts of the city was conducted. Sociological survey allowed to study the socio-economical and psychological factors of deviant behavior. It also included the Moscow residents’ open-ended answers regarding the most actual problems in their districts and reasons of wish to leave their place. The results of sociological survey lead to the conclusion that the main factors of deviant behavior in Moscow are high level of social inequality, large number of illegal migrants and bums, nearness of large transport hubs and stations on the territory, ineffective work of police, alcohol availability and drug accessibility, low level of psychological comfort for Moscow citizens, large number of building projects.

Keywords: deviant behavior, megapolis, Moscow, urban environment, social stratification

Procedia PDF Downloads 162
826 Challenging Human Trade in Sub-Saharan Africa and Beyond: A Foresight Approach to Contextualizing and Understanding the Consequences of Sub-Saharan Africa’s Demographic Emergence

Authors: Ricardo Schnug

Abstract:

This paper puts the transnational crime of human trafficking in the context of Sub-Saharan Africa and its quickly growing youth bulge. By mapping recent and concurrent trends and emerging issues, it explores the implications that it has not only for the region itself but also for the greater global dynamics of the issue. Through the application of Causal Layered Analysis to various alternative future scenarios as well as the identification of the core narrative surrounding the international discourse, it is possible to understand more deeply the forces that underlie future trafficking and what change becomes possible. With the provision of a reconstructed narrative that avoids the current blind spots, this research points out the need for a new and organic leadership paradigm that allows for a more holistic and future-oriented inquiry about socio-economic and political change and what it entails for a transnational crime such as human trafficking. 'Ubuntu' as a social and leadership philosophy then, provides the principles needed for creating this path towards a truly preferred future. Furthermore, this paper inspires follow-up research and the continuous monitoring and transdisciplinary research of this region’s demographic emergence as well as its possible consequences that have been explored in this inquiry.

Keywords: causal layered analysis, emerging issues, human trafficking, scenarios, sub-Saharan Africa

Procedia PDF Downloads 165
825 Characteristics Features and Action Mechanism of Some Country Made Pistols

Authors: Ajitesh Pal, Arpan Datta Roy, H. K. Pratihari

Abstract:

The different illegal firearms crudely made by skilled gunsmith from scrap materials are popularly known as country made firearms. Such firearms along with improvised ammunition are clandestinely marketed at the cheaper price without any license to the extremist group, criminal, poachers and firearm lovers. As per National Crime Records Bureau (NCRB), MHA, Govt of India about 80% firearm cases are committed by country made/improvised firearms. The ballistic division of the laboratory has examined a good number of cases. The analysis of firearm cases received for forensic examination revealed that 7.65mm calibre pistols mostly improvised firearm are commonly used in firearm related crime cases. In the present communication, physical parameters and other characteristics features of some 7.65mm calibre pistols have been discussed in detail. The detailed study on country made (CM) firearm will help to prepare a database related to type of material used, origin of the raw material and tools used for inscription. The study also includes to establish the chemistry of propellants & head stamp pattern. The database will be helpful to the firearm examiners, researchers, students pursuing study on forensic science as reference material.

Keywords: improvised pistol, stringent gun law, working mechanism, parameters, database

Procedia PDF Downloads 43
824 An Application for Risk of Crime Prediction Using Machine Learning

Authors: Luis Fonseca, Filipe Cabral Pinto, Susana Sargento

Abstract:

The increase of the world population, especially in large urban centers, has resulted in new challenges particularly with the control and optimization of public safety. Thus, in the present work, a solution is proposed for the prediction of criminal occurrences in a city based on historical data of incidents and demographic information. The entire research and implementation will be presented start with the data collection from its original source, the treatment and transformations applied to them, choice and the evaluation and implementation of the Machine Learning model up to the application layer. Classification models will be implemented to predict criminal risk for a given time interval and location. Machine Learning algorithms such as Random Forest, Neural Networks, K-Nearest Neighbors and Logistic Regression will be used to predict occurrences, and their performance will be compared according to the data processing and transformation used. The results show that the use of Machine Learning techniques helps to anticipate criminal occurrences, which contributed to the reinforcement of public security. Finally, the models were implemented on a platform that will provide an API to enable other entities to make requests for predictions in real-time. An application will also be presented where it is possible to show criminal predictions visually.

Keywords: crime prediction, machine learning, public safety, smart city

Procedia PDF Downloads 76
823 Forensic Study on Personal Identification of Pakistani Population by Individualizing Characteristics of Footprints

Authors: Muneeba Butt

Abstract:

One of the most important physical evidence which leaves suspects at the crime scene is footprints. Analysis of footprints, which can provide useful information for personal identification, is helpful in crime scene investigation. For the current study, 200 samples collected (144 male and 56 female) from Pakistani population with a consent form. The footprints were collected by using black ink with an ink pad. The entire samples were photographed, and then the magnifying glass was used for visualization of individual characteristics including detail of toes, humps, phalange mark, and flat foot cracks in footprint patterns. The descriptive results of individualizing characteristics features were presented in tabular form with respective frequency and percentage. In the result in the male population, the prevalence of tibialis type (T-type) is highest. In the female population, the prevalence of midularis type (M-type) is highest. Humps on the first toe are more found in the male population rather than other humps. In the female population, humps on the third toe are more found rather than other humps. In the male population, the prevalence of phalange mark by toe 1 is highest followed by toe 3, toe 5, toe 2, toe 4 and in female population the prevalence of phalange mark by toe 1 is highest followed by toe 5, 4, 3 and 2. Creases marks are found highest in male population as compared to the female population.

Keywords: foot prints, toes, humps, cracks

Procedia PDF Downloads 130
822 The Impact of the COVID-19 on the Cybercrimes in Hungary and the Possible Solutions for Prevention

Authors: László Schmidt

Abstract:

Technological and digital innovation is constantly and dynamically evolving, which poses an enormous challenge to both lawmaking and law enforcement. To legislation because artificial intelligence permeates many areas of people’s daily lives that the legislator must regulate. it can see how challenging it is to regulate e.g. self-driving cars/taxis/camions etc. Not to mention cryptocurrencies and Chat GPT, the use of which also requires legislative intervention. Artificial intelligence also poses an extraordinary challenge to law enforcement. In criminal cases, police and prosecutors can make great use of AI in investigations, e.g. in forensics, DNA samples, reconstruction, identification, etc. But it can also be of great help in the detection of crimes committed in cyberspace. In the case of cybercrime, on the one hand, it can be viewed as a new type of crime that can only be committed with the help of information systems, and that has a specific protected legal object, such as an information system or data. On the other hand, it also includes traditional crimes that are much easier to commit with the help of new tools. According to Hungarian Criminal Code section 375 (1), any person who, for unlawful financial gain, introduces data into an information system, or alters or deletes data processed therein, or renders data inaccessible, or otherwise interferes with the functioning of the information system, and thereby causes damage, is guilty of a felony punishable by imprisonment not exceeding three years. The Covid-19 coronavirus epidemic has had a significant impact on our lives and our daily lives. It was no different in the world of crime. With people staying at home for months, schools, restaurants, theatres, cinemas closed, and no travel, criminals have had to change their ways. Criminals were committing crimes online in even greater numbers than before. These crimes were very diverse, ranging from false fundraising, the collection and misuse of personal data, extortion to fraud on various online marketplaces. The most vulnerable age groups (minors and elderly) could be made more aware and prevented from becoming victims of this type of crime through targeted programmes. The aim of the study is to show the Hungarian judicial practice in relation to cybercrime and possible preventive solutions.

Keywords: cybercrime, COVID-19, Hungary, criminal law

Procedia PDF Downloads 32
821 Contribution of Crime Scene and Autopsy Investigation to the Solving of the Case in the Case of Death as a Result of Self-Harm

Authors: Murat Mert, Yusuf Ozer, Fatih Kolay

Abstract:

Behaviour of giving harm to the body in literature has been named as “self-injury”, “self-mutilation” ve “self-harm”. “Self-injury”, or “self-mutilation” is generally used for the same meaning and mentioned as an action which is committed to the body itself directly. As is seen that alcohol and drug users have injured their bodies because of deprivation, whereas behaviour of self-injury in some societies is accepted as religious and cultural, it has nevertheless been diagnosed in people who have a borderline personality disorder, histrionic personality disorder, psychotic personality disorder and mood disorder. There has not been any direct self-murder tendency in people having self-harmed. However, death cases can be seen together with loss of consciousness depending on loss of blood by exceeding the limit in the course of injury action. 34- year old – male person who was alcohol addicted, having had a psycological treatment beforehand, had mutilated his small intestine together with fatty tissue by cutting his body with a razor-blade at the thought of insects strolling around the body (delirium tremens) due to deprivation attack and had died in the result of various cuts. In this study, crime scene investigation and death mechanism of the person having had self-harmed in a result of abstinence syndrome will be explained. Relevant criteria which differentiate this case from homicide will be examined.

Keywords: self-injury, autopsy, abstinence syndrome, CSI

Procedia PDF Downloads 63
820 The Impact of Undocumented Migration on Human Security in Northern Nigeria

Authors: Targba Aondowase

Abstract:

Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.

Keywords: human security, impact, migration, undocumented

Procedia PDF Downloads 307
819 Teacher Trainers’ Motivation in Transformation of Teaching and Learning: The Fun Way Approach

Authors: Malathi Balakrishnan, Gananthan M. Nadarajah, Noraini Abd Rahim, Amy Wong On Mei

Abstract:

The purpose of the study is to investigate the level of intrinsic motivation of trainers after attending a Continuous Professional Development Course (CPD) organized by Institute of Teacher Training Malaysia titled, ‘Transformation of Teaching and Learning the Fun Way’. This study employed a survey whereby 96 teacher trainers were given Situational Intrinsic Motivational Scale (SIMS) Instruments. Confirmatory factor analysis was carried out to get validity of this instrument in local setting. Data were analyzed with SPSS for descriptive statistic. Semi structured interviews were also administrated to collect qualitative data on participants experiences after participating in the two-day fun-filled program. The findings showed that the participants’ level of intrinsic motivation showed higher mean than the amotivation. The results revealed that the intrinsic motivation mean is 19.0 followed by Identified regulation with a mean of 17.4, external regulation 9.7 and amotivation 6.9. The interview data also revealed that the participants were motivated after attending this training program. It can be concluded that this program, which was organized by Institute of Teacher Training Malaysia, was able to enhance participants’ level of motivation. Self-Determination Theory (SDT) as a multidimensional approach to motivation was utilized. Therefore, teacher trainers may have more success using the ‘The fun way approach’ in conducting training program in future.

Keywords: teaching and learning, motivation, teacher trainer, SDT

Procedia PDF Downloads 413
818 An Investigation of Cyber Financial Crimes After the Enactment of PECA: A Case Study of Pakistan’s Banking Sector During 2016 to 2022

Authors: Zain Khalid

Abstract:

The paper outlines the trends of cyber financial crimes and frauds – approximating upto – in Pakistan after the enactment of The Prevention of Electronic Crimes Act in 2016. The paper elaborates on the newer methods that fraudsters have adopted after tighter preventive and counter measures were employed in Pakistan partly as a result of following the international finance related commitments, particularly the FATF regulations. The paper adopts case studies methods to highlight various aspects of the financial frauds and crimes committed and later investigated jointly by Pakistan’s one of the federal law enforcement agencies, the Federal Investigation Agency, and Mobilink Microfinance Bank , Pakistan’s premier microfinance bank. It additionally enriches the data through expert interviews – with crime investigators and the experts to carry out an in-depth analysis of the various factors involving the crime. This paper emphasizes the structural and situational factors that shape up the cyber financial crimes in Pakistan vis-à-vis digital illiteracy and lack of awareness among the users of financial services. This paper, thus, on the basis of findings and expert interviews, suggests policy reforms to reduce the instances of the financial crimes, especially in the remotest areas of the country.

Keywords: financial crimes, cyber crimes, digital literacy, terrorism financing, banking sector

Procedia PDF Downloads 54
817 The Challenges of Digital Crime Nowadays

Authors: Bendes Ákos

Abstract:

Digital evidence will be the most widely used type of evidence in the future. With the development of the modern world, more and more new types of crimes have evolved and transformed. For this reason, it is extremely important to examine these types of crimes in order to get a comprehensive picture of them, with which we can help the authorities work. In 1865, with early technologies, people were able to forge a picture of a quality that is not even recognized today. With the help of today's technology, authorities receive a lot of false evidence. Officials are not able to process such a large amount of data, nor do they have the necessary technical knowledge to get a real picture of the authenticity of the given evidence. The digital world has many dangers. Unfortunately, we live in an age where we must protect everything digitally: our phones, our computers, our cars, and all the smart devices that are present in our personal lives and this is not only a burden on us, since companies, state and public utilities institutions are also forced to do so. The training of specialists and experts is essential so that the authorities can manage the incoming digital evidence at some level. When analyzing evidence, it is important to be able to examine it from the moment it is created. Establishing authenticity is a very important issue during official procedures. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. Otherwise, they will not have sufficient probative value and in case of doubt, the court will always decide in favor of the defendant. One of the most common problems in the world of digital data and evidence is doubt, which is why it is extremely important to examine the above-mentioned problems. The most effective way to avoid digital crimes is to prevent them, for which proper education and knowledge are essential. The aim is to present the dangers inherent in the digital world and the new types of digital crimes. After the comparison of the Hungarian investigative techniques with international practice, modernizing proposals will be given. A sufficiently stable yet flexible legislation is needed that can monitor the rapid changes in the world and not regulate afterward but rather provide an appropriate framework. It is also important to be able to distinguish between digital and digitalized evidence, as the degree of probative force differs greatly. The aim of the research is to promote effective international cooperation and uniform legal regulation in the world of digital crimes.

Keywords: digital crime, digital law, cyber crime, international cooperation, new crimes, skepticism

Procedia PDF Downloads 38