Search results for: victims of terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 689

Search results for: victims of terrorism

359 Sexual and Reproductive Rights After the Signing of the Peace Process: A Territorial Commitment

Authors: Rocio Murad, Juan Carlos Rivillas, Nury Alejandra Rodriguez, Daniela Roldán

Abstract:

In Colombia, around 5 million women have suffered forced displacement and all forms of gender-based violence, mostly adolescents and young women, single mothers, or widows with children affected by the war. After the signing of the peace agreements, the department of Antioquia has been one of the most affected by the armed conflict, from a territorial and gender perspective in the period. The objective of the research was to analyze the situation of sexual and reproductive rights in the department of Antioquia from a territorial and gender perspective in the period after the signing of the Peace Agreement. A mixed methodology was developed. The quantitative component conducted a cross-sectional descriptive study of barriers to access to contraceptive methods, safe abortion and gender-based violence based on microdata from the 2015 National Demographic and Health Survey. In the qualitative component, a case study was developed in Dabeiba, a municipality of Antioquia prioritized in order to deepen the experiences before, during and after the armed conflict in sexual and reproductive rights; using three research techniques: Focused observation, Semi-structured interviews, and Documentary review. The results showed that there is a gradient of greater vulnerability to greater effects of the conflict and that the subregion of Urabá Antioqueño, to which Dabeiba belongs, has the highest levels of vulnerability in relation to departmental data. In this subregion, the percentage of women with an unmet need for contraceptive methods (9%), women with unintended pregnancies (31%), of women between 15 and 19 years of age who are already mothers or are pregnant with their first child (32%) and the percentage of women victims of physical violence (42%) and sexual violence (13%) by their partners are significantly higher. Women, particularly rural and indigenous women, were doubly affected due to the existence of violence that is specifically directed at them or that has a greater impact on their life projects. There was evidence of insufficient, fragmented and disjointed social and institutional action in relation to women's rights and the existence of androcentric and patriarchal social imaginaries through which women and the feminine are undervalued. These results provide evidence of violations of sexual and reproductive rights in contexts of armed conflict and make it possible to identify mechanisms to guarantee the re-establishment of the rights of the victims, particularly women and girls. Among the mechanisms evidenced are: working for the elimination of gender stereotypes; supporting the formation and strengthening of women's social organizations; working for the concerted definition and articulated implementation of actions necessary to respond to sexual and reproductive health needs; and working for the recognition of reproductive violence as specific and different from sexual violence in the context of armed conflict. Also, it was evidenced that it is necessary to implement prevention, attention and reparation actions.

Keywords: sexual and reproductive rights, Colombia, armed conflict, violence against women

Procedia PDF Downloads 62
358 Violence of Tyrant Children to Their Parents: An Interdisciplinary Approach

Authors: Marta Maria Aguilar Carceles, Ginesa Torrente Hernandez

Abstract:

The goal of the current study is focused on giving an interdisciplinary comprehension of an increased phenomenon in recent years: violence against parents. Violence can take different forms depending on the context and the vulnerability of the victims, but in this kind of situations, the relationship between parents and young people can become abusive and uncontrollable. Taking a sample from the Spanish Criminal Courts, this study explores those psychological and sociological factors that can contribute to the appearance and continuity of this kind of behaviors in minors. It is considered factors like the type of offence, presence or absence of psychopathology in the subjects, family aspects, or sociodemographic factors, getting a criminal profile of the minor and evaluating which measures are more efficient or adequate in each particular case. Finally, it will be discussed on how getting effective interventions and restorative responses to address teen violence against their parents within the Spanish Legal System.

Keywords: criminality, legal system, parents, tyrant sons, violence

Procedia PDF Downloads 115
357 Between Order and Chaos: Politics and the Challenge of Peace in Mozambique

Authors: Edmilson Nhambe, Belisario Machaieie

Abstract:

Since the signing of the General Peace Agreement-GPA in 1992, Mozambique has seen successive setbacks in the search for effective peace, civil war, social conflicts, terrorism, and armed conflicts mix the reality of Mozambican democracy. The article seeks to understand the dynamics of conflict and peace in Mozambique. Specifically, it seeks to analyze the structural factors that lead to (violent) conflict situations and the factors that favor or promote peace. For this purpose, desk research was chosen to analyze studies of peace and conflict. This article develops the argument that the non-violation of the peace agreement, in particular the GPA in Rome, as it had a structuring effect on the Mozambican political system, no longer guarantees in itself the irreversibility of the pacification process. In fact, the country is currently stagnating in the category of a fragile peace process with the risk of slipping into a situation of war or open armed conflict.

Keywords: peace, conflict, GPA, instability

Procedia PDF Downloads 157
356 Security Issues and Primary School Participation in Kenya

Authors: Rose Mwanza

Abstract:

This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.

Keywords: ethnicity, social media, participation in school, poverty, terrorism

Procedia PDF Downloads 30
355 The Inclusive Human Trafficking Checklist: A Dialectical Measurement Methodology

Authors: Maria C. Almario, Pam Remer, Jeff Resse, Kathy Moran, Linda Theander Adam

Abstract:

The identification of victims of human trafficking and consequential service provision is characterized by a significant disconnection between the estimated prevalence of this issue and the number of cases identified. This poses as tremendous problem for human rights advocates as it prevents data collection, information sharing, allocation of resources and opportunities for international dialogues. The current paper introduces the Inclusive Human Trafficking Checklist (IHTC) as a measurement methodology with theoretical underpinnings derived from dialectic theory. The presence of human trafficking in a person’s life is conceptualized as a dynamic and dialectic interaction between vulnerability and exploitation. The current papers explores the operationalization of exploitation and vulnerability, evaluates the metric qualities of the instrument, evaluates whether there are differences in assessment based on the participant’s profession, level of knowledge, and training, and assesses if users of the instrument perceive it as useful. A total of 201 participants were asked to rate three vignettes predetermined by experts to qualify as a either human trafficking case or not. The participants were placed in three conditions: business as usual, utilization of the IHTC with and without training. The results revealed a statistically significant level of agreement between the expert’s diagnostic and the application of the IHTC with an improvement of 40% on identification when compared with the business as usual condition While there was an improvement in identification in the group with training, the difference was found to have a small effect size. Participants who utilized the IHTC showed an increased ability to identify elements of identity-based vulnerabilities as well as elements of fraud, which according to the results, are distinctive variables in cases of human trafficking. In terms of the perceived utility, the results revealed higher mean scores for the groups utilizing the IHTC when compared to the business as usual condition. These findings suggest that the IHTC improves appropriate identification of cases and that it is perceived as a useful instrument. The application of the IHTC as a multidisciplinary instrumentation that can be utilized in legal and human services settings is discussed as a pivotal piece of helping victims restore their sense of dignity, and advocate for legal, physical and psychological reparations. It is noteworthy that this study was conducted with a sample in the United States and later re-tested in Colombia. The implications of the instrument for treatment conceptualization and intervention in human trafficking cases are discussed as opportunities for enhancement of victim well-being, restoration engagement and activism. With the idea that what is personal is also political, we believe that the careful observation and data collection in specific cases can inform new areas of human rights activism.

Keywords: exploitation, human trafficking, measurement, vulnerability, screening

Procedia PDF Downloads 301
354 Sustainable Strategies for Post-Disaster Shelters: Case Study-Based Review and Future Prospects

Authors: Fangwen Ni, Hongpeng Xu

Abstract:

When disasters occur, it is important to provide temporary shelters to protect victims from their environment and to comfort them with privacy and dignity. However, the commonly used shelters like tents and shanties can not ensure a comfortable condition. Furthermore, the demand for more energy and less pollution has become a major challenge. Focusing on the sustainable of temporary shelters, this study intends to clarify the essential role of temporary shelters before the reconstruction work is done. The paper also identifies the main problems from three aspects including spatial layout, thermal comfort and utilization of passive technology. Moreover, it expounds the passive strategies of ecological design by case study and simulation. It is found that the living condition of shelters can be improved from the perspective of architectural space, ventilation theory and construction techniques. Regardless of being temporary, these shelters are crucial elements in emergency situations and should be taken more seriously.

Keywords: architectural space, construction technique, sustainable strategy, temporary shelter

Procedia PDF Downloads 236
353 Banks' Financial Performance in Pakistan from 2012-2015

Authors: Saima Akbar

Abstract:

The global financial crisis severely and adversely impacted the Pakistanis’ financial setups with far-reaching consequences for its victims. This study aimed to analyze the various determinants of the banks’ financial performance in Pakistan. The stepwise multiple regression analysis and pre-post analysis were carried out in this regard by using SPSS ver 22. The study found that the assets quality is the most influential determinant of return over assets followed by bank size and solvency. Advances, liquidity, investments, and size have positive while poor assets quality and deposits have a negative impact on the return over assets. The comparison of the pre-crisis and post-crisis coefficient values of the independent variables revealed that the global financial crisis had exerted a significant impact on the relative ability of the financial performance determinants to explain variations in return over assets.

Keywords: pre-crisis, post-crisis, coefficient values, determinants

Procedia PDF Downloads 242
352 Climatic Roots of Piracy in Red Sea

Authors: Nasser Karami

Abstract:

Piracy in the North West of Indian Ocean and the Red Sea has become a global crisis in recent years. Pirates of this area are often very poor people from the Horn of Africa and the western coast of the Red Sea. Climatic and geographical evidence suggests that poverty and destruction of social structures in the region have directly relation to prolonged-drought. Indeed, after the seventies (more than 40 years ago) due to the long-term drought in the region, all political, economic and social structures had declined. Spread of terrorism, violent extremism and of course piracy, are main effects of climate change and drought of this regression. It is disturbing to say the climatic documents say that because of global climate change, severe drought will continue in this region. This mean that the dangers worse than piracy threatens the future of this area. Forty-year data that has assessed in this study indicate that there is direct relationship between spread of drought and piracy in the Red Sea.

Keywords: climate, poverty, climate change, drought, piracy in red sea

Procedia PDF Downloads 470
351 Learning Grammars for Detection of Disaster-Related Micro Events

Authors: Josef Steinberger, Vanni Zavarella, Hristo Tanev

Abstract:

Natural disasters cause tens of thousands of victims and massive material damages. We refer to all those events caused by natural disasters, such as damage on people, infrastructure, vehicles, services and resource supply, as micro events. This paper addresses the problem of micro - event detection in online media sources. We present a natural language grammar learning algorithm and apply it to online news. The algorithm in question is based on distributional clustering and detection of word collocations. We also explore the extraction of micro-events from social media and describe a Twitter mining robot, who uses combinations of keywords to detect tweets which talk about effects of disasters.

Keywords: online news, natural language processing, machine learning, event extraction, crisis computing, disaster effects, Twitter

Procedia PDF Downloads 455
350 Breaching Treaty Obligations of the Rome Statute of the International Criminal Court: The Case of South Africa

Authors: David Abrahams

Abstract:

In October 2016 South Africa deposited its ‘instrument of withdrawal’ from the Rome Statute of the International Criminal Court, with the Secretary-General of the United Nations. The Rome Statute is the founding document of the treaty-based International Criminal Court (ICC). The ICC has jurisdiction to hear cases where crimes against humanity, war crimes and genocide have been committed, on the basis of individual criminal responsibility. It is therefore not surprising that one of the ICCs mandates is to ensure that the sufferings, due to gross human rights violations towards the civilian population is, in principle, brought to an end by punishing those individuals responsible, thus providing justice to the victims. The ICC is unable to effectively fulfill its mandate and thus depends, in part on the willingness of states to assist the Court in its functions. This requires states to ratify the Statute and to domesticate its provisions, depending on whether it is a monist or dualist state. South Africa ratified the Statute in November 2000, and domesticated the Statute in 2002 by virtue of the Implementation of the Rome Statute of the International Criminal Court Act 27 of 2002. South Africa thus remains under an obligation to cooperate with the ICC until the final date of withdrawal, which is October 2017. An AU Summit was hosted by South Africa during June 2015. Omar Al-Bashir, whom the prosecutor of the ICC has indicted on two separate occasions, was invited to the summit. South Africa made an agreement with the AU that it will honour its obligations in terms of its Diplomatic and Immunities Privileges Act of 2001, by granting immunity to all heads of state, including that of Sudan. This decision by South Africa has raised a plethora of questions regarding the status and hierarchy of international laws versus regional laws versus domestic laws. In particular, this paper explores whether a state’s international law treaty obligations may be suspended in favour of, firstly, regional peace (thus safeguarding the security of the civilian population against further atrocities and other gross violations of human rights), and secondly, head of state immunity. This paper also reflects on the effectiveness of the trias politca in South Africa in relation the manner in which South African courts have confirmed South Africa’s failure in fulfilling its obligations in terms of the Rome Statute. A secondary question which will also be explored, is whether the Rome Statute is currently an effective tool in dealing with gross violations of human rights, particularly in a regional African context, given the desire by a number of African states currently party to the Statute, to engage in a mass exodus from the Statute. Finally, the paper concludes with a proposal that there can be no justice for victims of gross human rights violations unless states are serious in playing an instrumental role in bringing an end to impunity in Africa, and that withdrawing from the ICC without an alternative, effective system in place, will simply perpetuate impunity.

Keywords: African Union, diplomatic immunity, impunity, international criminal court, South Africa

Procedia PDF Downloads 504
349 The Effects of Irregular Immigration Originating from Syria on Turkey's Security Issues

Authors: Muzaffer Topgul, Hasan Atac

Abstract:

After the September 11 attacks, fight against terrorism has risen to higher levels in security concepts of the countries. The following reactions of some nation states have led to the formation of unstable areas in different parts of the World. Especially, in Iraq and Syria, the influences of radical groups have risen with the weakening of the central governments. Turkey (with the geographical proximity to the current crisis) has become a stop on the movement of people who were displaced because of terrorism. In the process, the policies of the Syrian regime resulted in a civil war which is still going on since 2011, and remain as an unresolved crisis. With the extension of the problem, changes occurred in foreign policies of the World Powers; moreover, the ongoing effects of the riots, conflicts of interests of foreign powers, conflicts in the region because of the activities of radical groups increased instability within the country. This case continues to affect the security of Turkey, particularly illegal immigration. It has exceeded the number of two million Syrians who took refuge in Turkey due to the civil war, while continuing uncertainty about the legal status of asylum seekers, besides the security problems of asylum-seekers themselves, there are problems in education, health and communication (language) as well. In this study, we will evaluate the term of immigration through the eyes of national and international law, place the disorganized and illegal immigration in security sphere, and define the elements/components of irregular migration within the changing security concept. Ultimately, this article will assess the effects of the Syrian refuges to Turkey’s short-term, mid-term, and long-term security in the light of the national and international data flows and solutions will be presented to the ongoing problem. While explaining the security problems the data and the donnees obtained from the nation and international corporations will be examined thorough the human security dimensions such as living conditions of the immigrants, the ratio of the genders, especially birth rate occasions, the education circumstances of the immigrant children, the effects of the illegal passing on the public order. In addition, the demographic change caused by the immigrants will be analyzed, the changing economical conditions where the immigrants mostly accumulate, and their participation in public life will be worked on and the economical obstacles sourcing due to irregular immigration will be clarified. By the entire datum gathered from the educational, cultural, social, economic, demographical extents, the regional factors affecting the migration and the role of irregular migration in Turkey’s future security will be revealed by implication to current knowledge sources.

Keywords: displaced people, human security, irregular migration, refugees

Procedia PDF Downloads 277
348 Examining Child Rape Provisions of Bangladesh in Comparison with Other South Asian Countries

Authors: Monira Nazmi Jahan

Abstract:

Child rape or child abuse is a serious and fearsome crime against children, which is an epidemic almost in every state of today’s world. However, in the case of Bangladesh, the scenario is terrifying. The objective of this paper is to examine the laws relating to child rape in Bangladesh as according to a renowned Daily Newspaper 'Prothom Alo', nearly 346 children are being raped since January 2019. This paper discusses and draws the difference of child rape provisions of Bangladesh with other South-Asian countries, comprises of India, Maldives, Pakistan, Sri Lanka, Nepal, Bhutan, and Afghanistan. In Bangladesh, girls below 18 years are considered to be a child. ‘The Penal Code, 1860’ and a special law ‘Nari O Shishu Nirjatan Daman Ain, 2012’ provides that any person committing child rape will be punished with rigorous life imprisonment and fine. This piece of law also gives provisions for punishment in case of child’s death after the commission of rape and gang rape, and the punishment is the death penalty. In India there is ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) which has separate provisions for sexual assault, penetrative sexual assault and aggravated penetrative sexual assault by different categories of person such as relatives, institutional officers and trustees and also for mentally and physically challenged child victims and provides punishment up to death penalty. In Pakistan, there is ‘Pakistan Penal Code Amended Act, 2016’ which has only two provisions for child rape. In case offence committed by one person, the punishment is 10 to 25 years of imprisonment and fine. In case of offence committed by two or more persons, each shall be liable to death or imprisonment for life. Unfortunately, Afghanistan has no laws for the protection of rape victims of women let alone children, whereas there are a lot of child rape cases, including both girls and boys who are used for sexual slavery. The Maldives has a special law named ‘Special Provisions Act to Deal with Child Sex Abuse Offenders.’ This has categorized the offenders like POSCO and has provided punishments accordingly. The punishments are: punishments range from 1 to 25 years accordingly, whereas Bangladesh has lesser provisions, but the gravity and duration of punishments are much higher. The Penal Code of Sri Lanka imposes a minimum sentence of 10 years for those convicted of raping a child under 18 years. In Bhutan, child rape provision is made according to the age of a child. ‘The Penal Code of Bhutan, 2004’, mentions provisions for the rape of a child in case of child rape below and above 12 years, gang rape of a child below and above 12 years and has graded the punishments as first, second and third degree. Though Bangladesh has better provisions for punishments, the ages are not categorized in the laws. In Nepal there is ‘Act relating to Children, 2018’ provisions are made for offenders who use or cause or engage child sexual exploitation, and the punishment is same for rape offenders according to prevailing laws in Nepal. No separate punishments for child offenders are made. The ultimate conclusion that can be drawn is Bangladesh has better punishments than all other South-Asian countries and same punishment as India however, Bangladesh can make or amend the laws and categorize offenders as like POSCO of India, Special provisions of Maldives and Bhutan.

Keywords: child rape, death penalty, sexual slavery, South Asia

Procedia PDF Downloads 85
347 Gender Norms and Psychological Mechanisms that Make Sexual Assault Possible

Authors: Moor Avigail

Abstract:

This research examines gender norms that underlie the propensity to commit sexual assault and to carry it out. Factors that have been shown to relate to such propensity will be enumerated and tied to their ramifications. These include sexual objectification of women, endorsement of gender-based rape myths blaming the victim, masculine entitlement, low empathy to victims, along with elevated empathy towards rapists. Heavy use of pornography as well as a misconstruing of the meaning of refusal to sex, have also been implicated. Additionally, a cutting-edge investigation, which we have just completed, examined what seems to occur in the perpetrator's mind during the assault. No research to date has ventured to uncover what essentially allows the rape to be carried out in real time, in the sense of what mental mechanisms go into operation in rapists during the assault itself. Our findings demonstrate that dehumanization and rationalization are pivotal. On the one hand, the perpetrator apparently allows himself to disregard the victim's humanity while simultaneously justifying his actions in relation to the victim's behavior.

Keywords: gender norms, gender psychology, sexual assault, gender

Procedia PDF Downloads 45
346 Neuropsychological Aspects in Adolescents Victims of Sexual Violence with Post-Traumatic Stress Disorder

Authors: Fernanda Mary R. G. Da Silva, Adriana C. F. Mozzambani, Marcelo F. Mello

Abstract:

Introduction: Sexual assault against children and adolescents is a public health problem with serious consequences on their quality of life, especially for those who develop post-traumatic stress disorder (PTSD). The broad literature in this research area points to greater losses in verbal learning, explicit memory, speed of information processing, attention and executive functioning in PTSD. Objective: To compare the neuropsychological functions of adolescents from 14 to 17 years of age, victims of sexual violence with PTSD with those of healthy controls. Methodology: Application of a neuropsychological battery composed of the following subtests: WASI vocabulary and matrix reasoning; Digit subtests (WISC-IV); verbal auditory learning test RAVLT; Spatial Span subtest of the WMS - III scale; abbreviated version of the Wisconsin test; concentrated attention test - D2; prospective memory subtest of the NEUPSILIN scale; five-digit test - FDT and the Stroop test (Trenerry version) in adolescents with a history of sexual violence in the previous six months, referred to the Prove (Violence Care and Research Program of the Federal University of São Paulo), for further treatment. Results: The results showed a deficit in the word coding process in the RAVLT test, with impairment in A3 (p = 0.004) and A4 (p = 0.016) measures, which compromises the verbal learning process (p = 0.010) and the verbal recognition memory (p = 0.012), seeming to present a worse performance in the acquisition of verbal information that depends on the support of the attentional system. A worse performance was found in list B (p = 0.047), a lower priming effect p = 0.026, that is, lower evocation index of the initial words presented and less perseveration (p = 0.002), repeated words. Therefore, there seems to be a failure in the creation of strategies that help the mnemonic process of retention of the verbal information necessary for learning. Sustained attention was found to be impaired, with greater loss of setting in the Wisconsin test (p = 0.023), a lower rate of correct responses in stage C of the Stroop test (p = 0.023) and, consequently, a higher index of erroneous responses in C of the Stroop test (p = 0.023), besides more type II errors in the D2 test (p = 0.008). A higher incidence of total errors was observed in the reading stage of the FDT test p = 0.002, which suggests fatigue in the execution of the task. Performance is compromised in executive functions in the cognitive flexibility ability, suggesting a higher index of total errors in the alternating step of the FDT test (p = 0.009), as well as a greater number of persevering errors in the Wisconsin test (p = 0.004). Conclusion: The data from this study suggest that sexual violence and PTSD cause significant impairment in the neuropsychological functions of adolescents, evidencing risk to quality of life in stages that are fundamental for the development of learning and cognition.

Keywords: adolescents, neuropsychological functions, PTSD, sexual violence

Procedia PDF Downloads 106
345 Face Sketch Recognition in Forensic Application Using Scale Invariant Feature Transform and Multiscale Local Binary Patterns Fusion

Authors: Gargi Phadke, Mugdha Joshi, Shamal Salunkhe

Abstract:

Facial sketches are used as a crucial clue by criminal investigators for identification of suspects when the description of eyewitness or victims are only available as evidence. A forensic artist develops a sketch as per the verbal description is given by an eyewitness that shows the facial look of the culprit. In this paper, the fusion of Scale Invariant Feature Transform (SIFT) and multiscale local binary patterns (MLBP) are proposed as a feature to recognize a forensic face sketch images from a gallery of mugshot photos. This work focuses on comparative analysis of proposed scheme with existing algorithms in different challenges like illumination change and rotation condition. Experimental results show that proposed scheme can lead to better performance for the defined problem.

Keywords: SIFT feature, MLBP, PCA, face sketch

Procedia PDF Downloads 301
344 Mapping and Measuring the Vulnerability Level of the Belawan District Community in Encountering the Rob Flood Disaster

Authors: Dessy Pinem, Rahmadian Sembiring, Adanil Bushra

Abstract:

Medan Belawan is one of the subdistricts of 21 districts in Medan. Medan Belawan Sub-district is directly adjacent to the Malacca Strait in the North. Due to its direct border with the Malacca Strait, the problem in this sub-district, which has continued for many years, is a flood of rob. In 2015, rob floods inundated Sicanang urban village, Belawan I urban village, Belawan Bahagia urban village and Bagan Deli village. The extent of inundation in the flood of rob that occurred in September 2015 reached 540, 938 ha. Rob flood is a phenomenon where the sea water is overflowing into the mainland. Rob floods can also be interpreted as a puddle of water on the coastal land that occurs when the tidal waters. So this phenomenon will inundate parts of the coastal plain or lower place of high tide sea level. Rob flood is a daily disaster faced by the residents in the district of Medan Belawan. Rob floods can happen every month and last for a week. The flood is not only the residents' houses, the flood also soaked the main road to Belawan Port reaching 50 cm. To deal with the problems caused by the flood and to prepare coastal communities to face the character of coastal areas, it is necessary to know the vulnerability of the people who are always the victims of the rob flood. Are the people of Medan Belawan sub-district, especially in the flood-affected villages, able to cope with the consequences of the floods? To answer this question, it is necessary to assess the vulnerability of the Belawan District community in the face of the flood disaster. This research is descriptive, qualitative and quantitative. Data were collected by observation, interview and questionnaires in 4 urban villages often affected by rob flood. The vulnerabilities measured are physical, economic, social, environmental, organizational and motivational vulnerabilities. For vulnerability in the physical field, the data collected is the distance of the building, floor area ratio, drainage, and building materials. For economic vulnerability, data collected are income, employment, building ownership, and insurance ownership. For the vulnerability in the social field, the data collected is education, number of family members, children, the elderly, gender, training for disasters, and how to dispose of waste. For the vulnerability in the field of organizational data collected is the existence of organizations that advocate for the victims, their policies and laws governing the handling of tidal flooding. The motivational vulnerability is seen from the information center or question and answer about the rob flood, and the existence of an evacuation plan or path to avoid disaster or reduce the victim. The results of this study indicate that most people in Medan Belawan sub-district have a high-level vulnerability in physical, economic, social, environmental, organizational and motivational fields. They have no access to economic empowerment, no insurance, no motivation to solve problems and only hope to the government, not to have organizations that support and defend them, and have physical buildings that are easily destroyed by rob floods.

Keywords: disaster, rob flood, Medan Belawan, vulnerability

Procedia PDF Downloads 103
343 The Causes of Non-Disclosure of Intrafamilial Childhood Sexual Abuse and Its Effects

Authors: Ishtiaque Qureshi, Erum Muzaffar

Abstract:

This study aimed to analyze the causes of non-disclosure of intrafamilial childhood sexual abuse (IFCSA) among survivors studying in higher education institutions in Sindh, Pakistan. Employing a mixed-method approach, the research investigated the reasons behind non-disclosure. A quantitative survey conducted in higher education institutions identified IFCSA victims through purposive sampling, and the causes were assessed through in-depth interviews with 18 respondents. Subsequent analysis of the interview transcripts resulted in the categorization of respondents into three groups: (1) those fearing the consequences of revealing facts to their parents, (2) individuals unwilling to subject their parents to conflict with the perpetrator, and (3) those who could not disclose the abuse due to reasons not understood by them. Correlations among non-disclosing respondents were examined with respect to their socio-economic status, family structure, emotional availability of parents, and parenting style.

Keywords: intrafamilial childhood sexual abuse, non-disclosure, survivors of IFCSA, in-depth interviews

Procedia PDF Downloads 21
342 Data Mining Techniques for Anti-Money Laundering

Authors: M. Sai Veerendra

Abstract:

Today, money laundering (ML) poses a serious threat not only to financial institutions but also to the nation. This criminal activity is becoming more and more sophisticated and seems to have moved from the cliché of drug trafficking to financing terrorism and surely not forgetting personal gain. Most of the financial institutions internationally have been implementing anti-money laundering solutions (AML) to fight investment fraud activities. However, traditional investigative techniques consume numerous man-hours. Recently, data mining approaches have been developed and are considered as well-suited techniques for detecting ML activities. Within the scope of a collaboration project on developing a new data mining solution for AML Units in an international investment bank in Ireland, we survey recent data mining approaches for AML. In this paper, we present not only these approaches but also give an overview on the important factors in building data mining solutions for AML activities.

Keywords: data mining, clustering, money laundering, anti-money laundering solutions

Procedia PDF Downloads 511
341 Ties of China and the United States Regarding to the Shanghai Cooperation Organization on the Basis of Soft Power Theory

Authors: Shabnam Dadparvar, Laijin Shen

Abstract:

After a period of conflict between Russia and the West, new signs of confrontation between the United States and China are observed. China, as the most populous country in the world with a high rate of economic growth, neither stands the hegemonic power of the United States nor has the intention of direct confrontation with it. By raising the costs of the United States’ leadership at the international level, China seeks to find a better status without direct confrontation with the US. Meanwhile, the Shanghai Cooperation Organization (SCO), as a soft balancing strategy against the hegemony of the United States is used as a tool to reach this goal. The authors by using a descriptive-analytical method try to explain the policies of China and the United States on Shanghai Cooperation Organization as well as confrontation between these two countries within the framework of 'balance of soft power theory'.

Keywords: balance of soft power, Central Asia, Shanghai cooperation organization, terrorism

Procedia PDF Downloads 344
340 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network

Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad

Abstract:

Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.

Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway

Procedia PDF Downloads 451
339 The Effects of the Russian Crisis on Turkish Tourism Sector: A Case of Antalya Province, Turkey

Authors: Huseyin Cetin, Halil Akmese, Sercan Aras, Vahit Aytekin

Abstract:

Economic crisis, terrorism, global crisis and the relations between countries are the factors affecting tourism industry and tourism industry is vulnerable against these factors. In our study, there are two dimensions about Russian crisis. The crisis between Russia and Ukraine and decreased oil prices in global market have been entailed Russian economic crisis. This crisis has induced that the ruble, Russian currency, has depreciated against American dollars and consequently the purchasing power of Russian has weakened. This is the first dimension of our study. Second dimension is a political crisis between Turkey and Russia owing to the fact that the Russian Warcraft was brought down by Turkish army. The aim of this study is to explain the impact of the consequences of Russian crisis on Turkish tourism industry. The study has been limited only Antalya province.

Keywords: economic crisis, Turkey-Russian crisis, Turkey's tourism industry, tourism in Turkey

Procedia PDF Downloads 350
338 A Comparative Human Rights Analysis of Expulsion as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

Where criminal law used to be the traditional response to cope with the terrorist threat, European governments are increasingly relying on administrative paths. The reliance on immigration law fits into this trend. Terrorism is seen as a civilization menace emanating from abroad. In this context, the expulsion of dangerous aliens, immigration law’s core task, is put forward as a key security tool. Governments all over Europe are focusing on removing dangerous individuals from their territory rather than bringing them to justice. This research reflects on the consequences for the expelled individuals’ fundamental rights. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, igniting the recourse to immigration law as a counterterrorism tool. Yet, they adopt a very different approach on this: the United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also 'securitized' its immigration policy after the recent terrorist hit in Stockholm, but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This paper addresses the situation in Belgium. In 2017, the Belgian parliament introduced several legislative changes by which it considerably expanded and facilitated the possibility to expel unwanted aliens. First, the expulsion measure was subjected to new and questionably definitions: a serious attack on the nation’s safety used to be required to expel certain categories of aliens. Presently, mere suspicions suffice to fulfil the new definition of a 'serious threat to national security'. A definition which fails to respond to the principle of legality; the law, nor the prepatory works clarify what is meant by 'a threat to national security'. This creates the risk of submitting this concept’s interpretation almost entirely to the discretion of the immigration authorities. Secondly, in name of intervening more quickly and efficiently, the automatic suspensive appeal for expulsions was abolished. The European Court of Human Rights nonetheless requires such an automatic suspensive appeal under Article 13 and 3 of the Convention. Whether this procedural reform will stand to endure, is thus questionable. This contribution also raises questions regarding expulsion’s efficacy as a key security tool. In a globalized and mobilized world, particularly in a European Union with no internal boundaries, questions can be raised about the usefulness of this measure. Even more so, by simply expelling a dangerous individual, States avoid their responsibility and shift the risk to another State. Criminal law might in these instances be more capable of providing a conclusive and long term response. This contribution explores the human rights consequences of expulsion as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counter-terrorism and human rights, expulsion, immigration law

Procedia PDF Downloads 96
337 Radical Web Text Classification Using a Composite-Based Approach

Authors: Kolade Olawande Owoeye, George R. S. Weir

Abstract:

The widespread of terrorism and extremism activities on the internet has become a major threat to the government and national securities due to their potential dangers which have necessitated the need for intelligence gathering via web and real-time monitoring of potential websites for extremist activities. However, the manual classification for such contents is practically difficult or time-consuming. In response to this challenge, an automated classification system called composite technique was developed. This is a computational framework that explores the combination of both semantics and syntactic features of textual contents of a web. We implemented the framework on a set of extremist webpages dataset that has been subjected to the manual classification process. Therein, we developed a classification model on the data using J48 decision algorithm, this is to generate a measure of how well each page can be classified into their appropriate classes. The classification result obtained from our method when compared with other states of arts, indicated a 96% success rate in classifying overall webpages when matched against the manual classification.

Keywords: extremist, web pages, classification, semantics, posit

Procedia PDF Downloads 119
336 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 363
335 Idea of International Criminal Justice in the Function of Prosecution International Crimes

Authors: Vanda Božić, Željko Nikač

Abstract:

The wars and armed conflicts have often resulted in violations of international humanitarian law, and often commit the most serious international crimes such as war crimes, crimes against humanity, aggression and genocide. However, only in the XX century the rule was articulated idea of establishing a body of international criminal justice in order to prosecute these crimes and their perpetrators. The first steps in this field have been made by establishing the International military tribunals for war crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. In the end, The International Criminal Court was established in Rome in 1998 with the aim of justice and in order to give satisfaction the victims of crimes and their families. The aim of the paper was to provide a historical and comparative analysis of the institutions of international criminal justice based on which these institutions de lege lata fulfilled the goals of individual criminal responsibility and justice. Furthermore, the authors suggest de lege ferenda that the Permanent International Criminal Tribunal, in addition to the prospective case, also takes over the current ICTY and ICTR cases.

Keywords: international crimes, international criminal justice, prosecution of crimes, ad hoc tribunal, the international criminal court

Procedia PDF Downloads 226
334 Psychosocial Processes and Strategies behind Islamic Deradicalisation: A Scoping Review

Authors: Carvalho M. Catia, Pinto R. Isabel, Azevedo F. Luis, Guerreiro, T. Alexandre, Barbosa R. Mariana, Pinto S. Marta

Abstract:

Due to the loss of territory, foreign terrorist fighters who have joined Islamic State are returning to their home countries. In order to counter this threat to international security, it is important to implement deradicalisation programmes, through strategies and processes that can reverse radicalisation. The objectives of this scoping review - which is underway - are to provide a comprehensive overview of the programmes being implemented, its main characteristics, the main motives and processes leading to deradicalisation, and to identify the key findings and the existing gaps in the literature. The methodology to be implemented in this scoping review follows the guidelines proposed by Arksey and O’Malley and by The Joanna Briggs Institute. The main results will be the development of a synthesis map of the deradicalisation programmes existing in the world, its main features, and recommendations to policy-makers and professionals.

Keywords: deradicalisation strategies, psychosocial processes, radicalisation, terrorism

Procedia PDF Downloads 350
333 The Conduct of Laundering Money through Transport of Cash in the Middle East and North Africa Region

Authors: Haytham Yassine

Abstract:

This article mainly aims to detect and understand how money laundering activities are executed by transport of cash, identifying the underlying factors and separating legitimate from illegitimate usage of cash and how it is being used. This research provides academics with additional literature and provides bank supervisors and practitioners with a better understanding of sources and uses of cash in criminal activities and how cash is used in the laundering mechanism. Data are gathered through survey in the Middle East and North Africa region and review of the available research. The results of the analysis will help distinguish the factors affecting preference for cash rather other payment instruments in the region, identify what causes the tendency to launder illegal proceeds through cash transportation and how illegal cash is being laundered and moved. On the other hand, this paper sheds the light on major cash generating criminal activities, its sources and main destinations.

Keywords: illegitimate activities, cash, money laundering, terrorism financing

Procedia PDF Downloads 116
332 An Integrated Planning Framework for Sustainable Tourism: Case Study of Tunisia

Authors: S. Halioui, I. Arikan, M. Schmidt

Abstract:

Tourism sector in Tunisia faces several problems that range from economic challenges to environmental degradation and social instability. These problems have been intensified because of the increased competition in the tourism market, the political instability, financial crises, and recently terrorism problems have aggravated the situation. As a consequence, a new framework that promotes sustainable tourism in the country and increases its competitiveness is urgently needed. Planning for sustainable tourism sector requires the integration of complex interactions between economic, social and environmental aspects. Sustainable tourism principles can be implemented with the help of Strategic Environmental Assessment (SEA) process, which ensures the full integration of economic, social and environmental considerations while planning for the tourism sector in Tunisia. Results of the paper have broad implications for policy makers and tourism professionals.

Keywords: sustainable tourism, strategic environmental assessment, tourism planning, policy

Procedia PDF Downloads 454
331 Understanding Loc Trade in Kashmir: References of Global Episodes in Arena of Economy and Confidence Building Measure

Authors: Aarushi Baloria, Joshina Jamwal

Abstract:

The paper attempts to understand the genesis of the Kashmir conflict, the LoC trade, and the various challenges which impede LoC trade. The paper further understands how this trade assists in mitigating tension between the countries and act as a conference building measure (CBM). The paper discusses later on the positive aspects of LoC trade with the help of statistical data like increase in state's economy along with negatives like smuggling of arms, drugs, swapping and interchanging of Hawala money and other unconstitutional activities like terrorism that took place on trade points across LoC. Moreover, the paper also mentioned in the international context; the episodes of Ireland of Europe, Palestine of Middle East, Uganda of Africa not only as transaction step but also as a peace channel between the fragmented parts. Thus, the paper, in a nutshell, reflects how the trade across LoC benefited in various psychological, economic, and political reasons, and it is worth taking risk, taking its overall positive things into consideration.

Keywords: drugs, economy, international, peace, psychological, trade

Procedia PDF Downloads 108
330 The Promise of Social Enterprise to Improve Health Outcomes in Trafficking Survivors: A Quantitative Case Study

Authors: Sean Roy, Mercedes Miller

Abstract:

A study was conducted to assess the positive outcomes related to Filipino human trafficking survivors working at a social enterprise. As most existing research on human survivors pertains to the adverse outcomes of victims, the researchers were seeking to fill the dearth of existing data related to positive outcomes. A quantitative study was conducted using a convenience sample of 41 participants within three staggered cohorts of the social enterprise. A Kruskal-Wallis H test was conducted and indicated that participants in the third cohort (who were employed at the social enterprise the longest) had significantly lower anxiety scores than participants in other cohorts. This study indicates that social enterprises hold the promise of positively impacting anxiety of human trafficking survivors and provides a starting point for researchers looking to assess ways to positively influence the lives of survivors.

Keywords: human trafficking, Philippines, quantitative analysis, self-identity

Procedia PDF Downloads 140