Search results for: victims of terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 689

Search results for: victims of terrorism

239 R-Killer: An Email-Based Ransomware Protection Tool

Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena

Abstract:

Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.

Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine

Procedia PDF Downloads 180
238 Still a Man’s World? Rape Myth Acceptance, Attitudes Towards Women and Traditional Male Gender Role Beliefs in a Sample of British Military Veterans

Authors: Jessica Beck

Abstract:

Despite efforts to address the issue through prevention and education, sexual assault remains an issue within the military. Rape supportive beliefs have been identified as a risk factor linked to sexually aggressive and coercive behaviours. Rape myth acceptance is part of a wider cognitive framework of attitudes which perpetuate negative sociocultural norms about the male role. Notwithstanding the established links between rape myth acceptance, attitudinal variables, and rape proclivity, relatively little research has been conducted with military samples. In this study, 151 British military veterans completed an online survey measuring their rape myth acceptance, attitudes towards women, belief in male role norms and basic personality traits. Consistent with previous research, male veterans had higher levels of rape myth acceptance, more negative attitudes towards women, and subscribed to more traditional notions of masculinity. The types of myths endorsed also varied by gender, with male veterans significantly more likely to blame rape victims or believe women regularly lie about being raped. A relationship between rape myth acceptance, negative attitudes towards women, and adherence to male norms was found, which explained a significant proportion of the variance in rape myth acceptance. Implications for sexual assault prevention programmes are discussed.

Keywords: rape myths, rape myth acceptance, military sexual assault, sexual assault beliefs

Procedia PDF Downloads 63
237 The Limits to Self-Defense Claims in Case of Domestic Violence Homicides

Authors: Maria Elisabete Costa Ferreira

Abstract:

Domestic violence is a serious social issue in which victims are mostly women. Domestic violence develops in cycles, starting with the building of tension, passing through the incident of abuse and ending with reconciliation, also known as honeymoon. As time goes by, the shorter these phases become, and the greater and more severe the attacks, rarely leading to the death of the victim of abuse. Sometimes, the victim stops the abuse by killing the aggressor, usually after the immediate aggression has taken place. This poses an important obstacle to the claim of self-defense by the victim of domestic violence pending trial for the homicide of her long-time abuser. The main problem with self-defense claims in such cases is that the law requires the act of aggression to be present or imminent (imminent threat or immediate danger) so that it permits the victim to take her defense into her own hands. If the episode of aggression has already taken place, this general requirement for the admissibility of self-defense is not satisfied. This paper sheds new light on the concept of the actuality of the aggression, understanding that, since domestic violence is a permanent offense, for as long as the victim stays under the domain of the aggressor, imminent threat will be present, allowing the self-defense claim of a woman who kills her abuser in such circumstances to be admissible. An actualist interpretation of the requirement of the necessity of the means used in self-defense will be satisfied when evaluated from the subjective perspective of the intimate partner victim. Necessity will be satisfied if it is reasonable for the victim to perceive the use of lethal force as the only means to release herself from the abuser.

Keywords: domestic violence, homicide, self-defense, imminent threat, necessity of lethal force

Procedia PDF Downloads 34
236 Impact of Socio-Cultural Attributes of Imo Communities on Widowhood Practice in Imo State, Nigeria

Authors: Otuu O. Obasi, Jude C. Ajaraogu, Happiness C. Anthony-Ikpe

Abstract:

Women in Igbo land generally experience culture-related mistreatment in the event of the death of their husbands. The mistreatment ranges from scraping of widows’ hair to denial of the right to see their husbands’ corpses. The objectives of the study were to determine the forms and prevalence of widowhood practice in the studied communities, the effects of the socio-cultural attributes of the people on the practice, and the perceived effect of the practice on the victims. Data for the study were collected from 64 randomly selected communities out of 640 communities in Imo State, Nigeria. 450 copies of the researcher-made-questionnaire were distributed across the three senatorial zones of the State. A total of 418 or 92.8% were completely filled and returned. The result of the study showed, among other things, that the majority of males and females recognized widowhood practice as dehumanizing, but opined that it cannot be stopped because it is rooted in culture. However, 30.2% of the female population did not agree that the practice is dehumanizing to women since it was their cultural practice. The study also revealed that scrapping of widows’ hair was the commonest practice while sleeping alone with the husband’s corpse was the least practice. Regarding the effect which this practice has on widows, emotional trauma topped the list; and was followed by economic hardship and health deterioration. Also shown by the study was that the level of education and religion did not have a notable effect on widowhood practice. With regard to possible stoppage measures, greater number of the respondents (38%) indicated that a synergy of efforts was needed to curb the social scourge.

Keywords: widowhood practice, socio-cultural attributes, violence, impact

Procedia PDF Downloads 103
235 Resilient Regions for Purpose of Crisis Management

Authors: Jana Gebhartova, Tomas Duda, Ivan Benes

Abstract:

World is characterized by constantly emerging new links, increasing complexity and speed of processes in the society. The globalized world needs (except political and financial mechanisms and institutions) functional supply chains. Transport and supply chains can be interrupted in case of natural disasters, conflicts and civil disorders, sudden demand shocks, export/import restrictions, terrorism. Long-term interruption of crucial services for human existence can results in breakdown of the whole society. If global supply chains can be interrupted, the ability to survive a crisis situation depends on local self-sufficiency, it means ensuring water, food and energy. In the world of 21st century, new way of thinking (based on the concept of resilience) is needed. Planning for self-sufficiency and resilience must be part of the agenda of local governments. The paper presents first results of research project VF20112015518 “Security of population – crisis management” that deals with issue of critical infrastructure, ensuring regional self-sufficiency in crisis situations and issues related to population protection and water, energy and food security. The project is being solved within Security Research of Ministry of the Interior of the Czech Republic in 2011-2015.

Keywords: crisis management, resilience, indicators of self-sufficiency, continuity of supplies

Procedia PDF Downloads 351
234 Association of Extremity Injuries with Safety Gear and Clothing of Hospitalized Motorcycle Riders: A Prospective Study

Authors: Sanjaya N. Munasinghe, R. Gnanasekeram, Dimuthu Tennakoon

Abstract:

During the last few years there has been a dramatic increase in the number of motorcyclists in Sri Lankan roads and thus an increase of motorcycle accidents (MCAs) with a heavy death and casualty toll. Extremity injuries due to MCAs cause a heavy burden on government hospitals. However, data on MCA injuries are limited. This study tries to determine the relationship between extremity injuries with protective gears and clothing motorcycle riders were wearing at the time of the accident. Data were collected from 410 motorcycle riders and passengers involved with MCAs and admitted to orthopedic and emergency observation wards in Teaching Hospital Kurunegala with extremity injuries between 1st February 2015 and 31st July 2015 using an interviewer administered questioner. Data were analyzed using SPSS version 17.0. Distal radial fracture is the most common upper extremity injury (12%), and Tibial fracture is the most common and severe lower extremity injury (23%). Very few participants were wearing safety gloves (2%) and jackets (10%). Most of the participants were wearing slippers (66%), short sleeved upper clothing (96%) and light cloth trousers (49%). According to Chi-square test associations were found between footwear and foot injuries (p-value - 0.001, Cramer's v-value - 0.203) and safety jacket and upper extremity injuries (p-value - 0.002, Cramer's v-value - 0.177). The results indicate that using safety gear can minimize the number of injuries in MCA victims. Thus it is necessary to ensure that motorcycle riders and pillion riders use proper safety gear.

Keywords: extremity injuries, fractures, motorcycle accidents, safety gear

Procedia PDF Downloads 270
233 The Role of Asset Recovery in Combatting Organized Crime

Authors: Tamas Bezsenyi, Noemi Katona

Abstract:

Fighting Human Trafficking is a highly important issue worldwide that states need to deal with in international politics. In the EU combatting human trafficking is emphasized in international policy making and also in the work of international law enforcement, thus in the work of the EUROPOL. While the EU Directive against Human Trafficking prescribes how states should fight this transnational crime and also how victims should be assisted, the EUROPOL focuses on the effective cooperation between national law enforcement agencies. However, despite the aims of the common fight, human trafficking is regulated differently in the punitive law of various nation states. This deeply defines the work and possibilities of national law enforcement organizations. Among the manifold differences in this paper, we focus on the role of regulating asset recovery. We highlight that money, and the regulation and practice how the law enforcement deals with income gained from criminal activities, play essential role in combatting human trafficking. While doing research on the investigation of transnational human trafficking by the Hungarian Law Enforcement Agencies, we have found that the unfortunate regulation of asset recovery determines the lower effectiveness of eliminating criminal organizations. While i.e. in the Netherlands confiscation of property takes place in an early stage of the criminal procedure, in Hungary it can be conducted only if money laundering is also assumed. Our presentation builds on the comparison of criminal procedures which we analyse based on criminal files and interviews with coworkers of the National Bureau of Investigation.

Keywords: human trafficking, law enforcement, asset recovery, organized crime

Procedia PDF Downloads 254
232 Optimal 3D Deployment and Path Planning of Multiple Uavs for Maximum Coverage and Autonomy

Authors: Indu Chandran, Shubham Sharma, Rohan Mehta, Vipin Kizheppatt

Abstract:

Unmanned aerial vehicles are increasingly being explored as the most promising solution to disaster monitoring, assessment, and recovery. Current relief operations heavily rely on intelligent robot swarms to capture the damage caused, provide timely rescue, and create road maps for the victims. To perform these time-critical missions, efficient path planning that ensures quick coverage of the area is vital. This study aims to develop a technically balanced approach to provide maximum coverage of the affected area in a minimum time using the optimal number of UAVs. A coverage trajectory is designed through area decomposition and task assignment. To perform efficient and autonomous coverage mission, solution to a TSP-based optimization problem using meta-heuristic approaches is designed to allocate waypoints to the UAVs of different flight capacities. The study exploits multi-agent simulations like PX4-SITL and QGroundcontrol through the ROS framework and visualizes the dynamics of UAV deployment to different search paths in a 3D Gazebo environment. Through detailed theoretical analysis and simulation tests, we illustrate the optimality and efficiency of the proposed methodologies.

Keywords: area coverage, coverage path planning, heuristic algorithm, mission monitoring, optimization, task assignment, unmanned aerial vehicles

Procedia PDF Downloads 179
231 Turkey-Syria Relations between 2002-2011 from the Perspective of Social Construction

Authors: Didem Aslantaş

Abstract:

In this study, the reforms carried out by the Justice and Development Party, which came to power in 2002, and how the foreign policy understanding it transformed reflected on the relations with Syria will be analyzed from the social constructivist theory. Contrary to the increasing security concerns of the states after the September 11 attacks, the main problem of the research is how the relations between Syria and Turkey developed and how they progressed in non-security dimensions. In order to find an answer to this question, the basic assumptions of the constructivist theory will be used. Since there is a limited number of studies in the literature, a comparative analysis of the Adana Consensus and the Cooperation Agreement between the Republic of Turkey and the Syrian Arab Republic, and the Joint Cooperation Agreement Against Terrorism and Terrorist Organizations will be included. In order to answer the main problem of the research and to support the arguments, document and archive scanning methods from qualitative research methods will be used. In the first part of the study, what the social constructivist theory is and its basic assumptions are explained, while in the second part, Turkey-Syria relations between 2002-2011 are included. In the third and last part, the relations between the two countries will be tried to be read through social constructivism by referring to the foreign policy features of the Ak Party period.

Keywords: Social Constructivist Theory, foreign policy analysis, Justice and Development Party, Syria

Procedia PDF Downloads 59
230 Web Proxy Detection via Bipartite Graphs and One-Mode Projections

Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo

Abstract:

With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.

Keywords: bipartite graph, one-mode projection, clustering, web proxy detection

Procedia PDF Downloads 220
229 Fear of Crime Among Females on University Campuses

Authors: Shahed, Tala, Ahlam, Marah, Sara, Shaden

Abstract:

Research on fear of crime has shown that there are many influences on it, including gender, age, and geographic location. For example, women are more afraid of crime than men. The campus has a high crime rate and fear of crime due to many hiding places and blind spots; women are more likely than men to be victims of certain types of crime, such as rape and verbal and sexual harassment. And it became clear that older female students have a different perception of the place over time and other knowledge and fear of it, another study at Hashemite University. This study aims to understand better how the environment affects the negative experiences of female students and how their age and familiarity environment affects their sense of safety. This study also examines whether CPTED can be used to help prevent crime. The Broken Windows Theory also states that crime occurs in areas with overt indications of criminal activity, antisocial behavior, and civil unrest. This is related to the principle of CPTED maintenance and monitoring, activity support, regional development, and access control. Given their increased vulnerability to harassment, “sexual harassment” can refer to different behaviors. On campuses, harassment was happening everywhere, but it was most prevalent in "blind spots" that were out of sight and deserted. This study uses a methodology based on quantitative data that depends on putting a number on the amount of a particular phenomenon that exists in the world. The main finding shows how CPTED works in an academic context and what adjustments need to be made.

Keywords: Hashmite University, CPTED, crime prevention, university campus, fear of crime, female faer, broken window theory

Procedia PDF Downloads 56
228 The Complementary Explanations of Institutional and Feminist Perspectives for Female Social Enterprise in Pakistan

Authors: Mohammad Sohail Yunis, Hina Hashim, Alistair R. Anderson

Abstract:

Entrepreneurship is gendered with masculine qualities, yet social enterprise epitomizes caring a feminine quality. However enterprising practices may have little to do with gender. Consequently, the purpose of this paper is to examine practices using two very different explanatory theories, feminist and institutional theory, to establish the role played by gender. This study is situated in KP, the poor but traditional north of Pakistan. Utilising on an interpretive qualitative research approach, this research collected data through in-depth interviews with ten women social entrepreneurs of KP, Pakistan and analyzed using thematic analysis. Empirically, this paper identifies and describes on a number of interesting themes that relate to the women entrepreneurship such as 'women empowerment, patriarchal culture, role of culture and societal norms, religious extremism and terrorism, forced entrepreneurs, change creators, institutional corruption, and security issues'. In addition, female social enterprise in KP is set in a patriarchal, masculine culture, but the practices negotiate institutional obstacles to bring benefits to the disenfranchised. Finally, this research claims to present an original insight into female social entrepreneurship in a developing country context and provide fresh theoretical and empirical perspectives to advance knowledge and scholarship.

Keywords: female social entrepreneurship, institutional theory, feminist theory, developing countries

Procedia PDF Downloads 185
227 Trafficking of Women in International Migration: Issues and Major Challenges in Present Scenario

Authors: Neha Singh, Anshuman Rana

Abstract:

Gender-Based Violence (GBV) is a violation of human rights and a form of discrimination which reinforces inequalities between men and women. It is defined as violence that is directed against a person on the basis of gender. There has been increased attention to human trafficking that has exposed to illegal migration. Trafficking is complex, but it generally takes place due to “push and pull factors”. India is both a source as well as a transit country for trafficking. Women are bought and sold with impunity and trafficked to other countries. They are forced to work as sex worker, forced labour and other practices of slavery. Trafficked victims often suffer from serious abuse and physical exhaustion. The effects of violence on women vary widely. GBV typically has physical, psychological and social effects. They face unwanted pregnancies, miscarriages, high rate of infertility and sexually transmitted disease. The social exclusion of women is so great that it constitutes a new form of apartheid. Women are considered as lesser value and deprived of their fundamental rights. Violation of human rights and fundamental freedom such as- trafficking of women, girls for sex trade, forced prostitution and sex tourism have become the focus of internationally organized crimes. My paper will analyse the impact of violence on society as well. Law alone cannot change the scenario and problem of gender-biasness. The whole issue of gender violence needs social awakening and change in attitude of masses, so that due respect and equal status is given to women.

Keywords: gender-based violence, trafficking, migration, violence impact, social exclusion, law enforcement

Procedia PDF Downloads 258
226 India, Pakistan and the US in the Afghan Imbroglio: The Way Forward

Authors: Saroj Kumar Rath

Abstract:

When insurgency erupted in Kashmir in 1989, it was quickly backed by Pakistan. Kashmir witnessed terrorism for more than a decade till 2004 when Indian forces decimated militancy. After the US pressure in 1992, terrorist training camps of Pakistan shifted to Afghanistan and al Qaeda and the Taliban had taken over training of Kashmiri militants in Afghanistan after 1997 as part of their global jihad. The Indo-Pak rivalry over Kashmir dispute had taken a new turn in the aftermath of 9/11 developments. Islamabad viewed its Afghan policy through the prism of denying India any advantage in Kabul. Pakistan was successful in refuting Indian presence in Kabul for a decade through the Taliban. After the 9/11 attacks the Inter Services Intelligence (ISI) saw Northern Alliance, supported by the Americans and all of Pakistan’s regional rivals – India, Iran, and Russia – as claiming victory in Kabul. For Pakistan’s military regime, this was a strategic disaster and prompted the ISI to give refuge to the escaping Taliban, while denying full support to Hamid Karzai. The new development in Afghanistan prompted India to establish a foothold it had lost nearly a decade earlier. India established diplomatic contacts with Afghanistan; supported the Karzai government and funded aid programs. Pakistan alleged that Indian agents are training Baloch and Sindhi dissidents in Pakistan through Afghanistan. Kabul had suddenly become the new Kashmir – the new battleground for India-Pakistan rivalry.

Keywords: Afghan imbroglio, Kashmir conflict, Indo-Pak rivalry, US policy in South Asia

Procedia PDF Downloads 403
225 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities

Authors: Eugenio Ferrer Santiago

Abstract:

The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.

Keywords: data privacy, data protection, urban planning, research ethics

Procedia PDF Downloads 26
224 Understanding Gender-Based Violence through an Adolescent Lens: Qualitative Findings from Delhi, India

Authors: Pratishtha Singh

Abstract:

Gender-based violence (GBV) or gendered violence refers to violence inflicted on a person because of their gender. Majority of men who perpetrate gender-based violence, first do so during their teenage years. Further, the first sexual experience of most girls is coerced. In order to reduce the widespread occurrence of GBV, it is vital to intervene and reach people, especially boys, when their attitudes and beliefs about sexuality and gender are developing. This study aims to understand GBV through an adolescent lens, focusing on their knowledge, attitudes and experiences regarding gendered abuse. This is a cross-sectional, qualitative study. The respondents are Delhi based students in grades 11th and 12th, recruited via snowball sampling. Sixteen in-depth, telephonic interviews were carried out in the month of April, 2020. The data was transcribed verbatim into MS Word and qualitative coding was undertaken in Atlas.ti 8. Twelve out of sixteen respondents admitted experiencing sexual GBV. Out of these, a little more than half of the victims reported it to somebody. Thematic analysis revealed key themes of: (i) Introduction and reinforcement of a patriarchal structure (ii) Violence in teen dating (iii) Acceptability and normalization of violence and (iv) Justice System. Findings reflect a process wherein GBV becomes an intricate part of adolescents’ lives. Participants showed a moderately well-informed understanding of gendered abuse whereas attitudes reflected a complex combination of internalized patriarchy and a desire to bring positive societal reform. The results of this study highlight a need for health promoting, gender-equitable interventions.

Keywords: adolescents, gender, health, violence

Procedia PDF Downloads 104
223 Innovative Approaches to Formal Education: Effect of Online Cooperative Learning Embedded Blended Learning on Student's Academic Achievement and Attitude

Authors: Mohsin Javed

Abstract:

School Education department is usually criticized for utilizing quite low or fewer academic days due to many reasons like extreme weather conditions, sudden holidays, summer vocations, pandemics and, terrorism etc. The purpose of the experimental study was to determine the efficacy of online cooperative learning (OCL) integrated in the rotation model of blended learning. The effects on academic achievement of students and students' attitude about OCL embedded learning were assessed. By using a posttest only control group design, sixty-two first-year students were randomly allocated to either the experimental (30) or control (32) group. The control group received face to face classes for six sessions per week, while the experimental group had three OCL and three formal sessions per week under rotation model. Students' perceptions of OCL were evaluated using a survey questionnaire. Data was analyzed by independent sample t test and one sample t test. According to findings, the intervention greatly improved the state of the dependent variables. The results demonstrate that OCL can be successfully implemented in formal education using a blended learning rotation approach. Higher secondary institutions are advised to use this model in situations like Covid 19, smog, unexpected holidays, instructor absence from class due to increased responsibilities, and summer vacations.

Keywords: blended learning, online cooperative learning, rotation model of blended learning, supplementing

Procedia PDF Downloads 36
222 The Relevance of Family Involvement in the Journey of Dementia Patients

Authors: Akankunda Veronicah Karuhanga

Abstract:

Dementia is an age mental disorder that makes victims lose normal functionality that needs delicate attention. It has been technically defined as a clinical syndrome that presents a number of difficulties in speech and other cognitive functions that change someone’s behaviors and can also cause impairments in activities of daily living, not forgetting a range of neurological disorders that bring memory loss and cognitive impairment. Family members are the primary healthcare givers and therefore, the way how they handle the situation in its early stages determines future deterioration syndromes like total memory loss. Unfortunately, most family members are ignorant about this condition and in most cases, the patients are brought to our facilities when their condition was already mismanaged by family members and we thus cannot do much. For example, incontinence can be managed at early stages through potty training or toilet scheduling before resorting to 24/7 diapers which are also not good. Professional Elderly care should be understood and practiced as an extension of homes, not a dumping place for people considered “abnormal” on account of ignorance. Immediate relatives should therefore be sensitized concerning the normalcy of dementia in the context of old age so that they can be understanding and supportive of dementia patients rather than discriminating against them as present-day lepers. There is a need to skill home-based caregivers on how to handle dementia in its early stages. Unless this is done, many of our elderly homes shall be filled with patients who should have been treated and supported from their homes. This skilling of home-based caregivers is a vital intervention because until elderly care is appreciated as a human moral obligation, many transactional rehabilitation centers will crop up and this shall be one of the worst moral decadences of our times.

Keywords: dementia, family, Alzheimers, relevancy

Procedia PDF Downloads 51
221 Civilization and Violence: Islam, the West, and the Rest

Authors: Imbesat Daudi

Abstract:

One of the most discussed topics of the last century happens to be if Islamic civilization is violent. Many Western intellectuals have promoted the notion that Islamic civilization is violent. Citing 9/11, in which 3000 civilians were killed, they argue that Muslims are prone to violence because Islam promotes violence. However, Muslims reject this notion as nonsense. This topic has not been properly addressed. First, violence of civilizations cannot be proven by citing religious texts, which have been used in discussions over civilizational violence. Secondly, the question of whether Muslims are violent is inappropriate, as there is implicit bias suggesting that Islamic civilization is violent. A proper question should be which civilization is more violent. Third, whether Islamic civilization is indeed violent can only be established if more war-related casualties can be documented within the borders of Islamic civilization than that of their cohorts. This has never been done. Finally, the violent behavior of Muslim countries can be examined by comparing acts of violence committed by Muslim countries with acts of violence of groups of nations belonging to other civilizations by appropriate parameters of violence. Therefore, parameters reflecting group violence have been defined; violent conflicts of various civilizations of the last two centuries were documented, quantified by number of conflicts and number of victims, and compared with each other by following the established principles of statistics. The results show that whereas 80% of genocides and massacres were conducted by Western nations, less than 5% of acts of violence were committed by Muslim countries. Furthermore, the West has the highest incidence (new) and prevalence (new and old) of violent conflicts among all groups of nations. The result is unambiguous and statistically significant. Becoming informed can only be done by a methodical collection of relevant data, objective analysis of data, and unbiased information, a process which this paper follows.

Keywords: Islam and violence, demonization of Muslims, violence and the West, comparison of civilizational violence

Procedia PDF Downloads 27
220 Disaster Adaptation Mechanism and Disaster Prevention Adaptation Planning Strategies for Industrial Parks in Response to Climate Change and Different Socio-Economic Disasters

Authors: Jen-Te Pai, Jao-Heng Liu, Shin-En Pai

Abstract:

The impact of climate change has intensified in recent years, causing Taiwan to face higher frequency and serious natural disasters. Therefore, it is imperative for industrial parks manufacturers to promote adaptation policies in response to climate change. On the other hand, with the rise of the international anti-terrorism situation, once a terrorist attack occurs, it will attract domestic and international media attention, especially the strategic and economic status of the science park. Thus, it is necessary to formulate adaptation and mitigation strategies under climate change and social economic disasters. After reviewed the literature about climate change, urban disaster prevention, vulnerability assessment, and risk communication, the study selected 62 industrial parks compiled by the Industrial Bureau of the Ministry of Economic Affairs of Taiwan as the research object. This study explored the vulnerability and disaster prevention and disaster relief functional assessment of these industrial parks facing of natural and socio-economic disasters. Furthermore, this study explored planned adaptation of industrial parks management section and autonomous adaptation of corporate institutions in the park. The conclusion of this study is that Taiwan industrial parks with a higher vulnerability to natural and socio-economic disasters should employ positive adaptive behaviours.

Keywords: adaptive behaviours, analytic network process, vulnerability, industrial parks

Procedia PDF Downloads 111
219 Combating Money Laundering and Inroads into Banking Secrecy: Evidence from Malaysia

Authors: Aspalella A. Rahman

Abstract:

It is widely accepted that the investigation of money laundering and the tracing and confiscation of criminal proceeds have intruded into the principles of banking secrecy. The inroads into banking secrecy present serious threats to democracy, and more importantly, to the traditional banker-customer relationship. It is generally accepted that the fight against money laundering is in conflict with the secrecy rule. Banking secrecy is a customer privilege whereas combating crime is critical for public safety and security. Indeed, achieving a proper balance is a desirable goal. But how we go about achieving such a balance is a question encountered by many law enforcement authorities. Therefore, this paper examines the effect of disclosure under the Malaysian anti-money laundering laws on the traditional duty of banks to keep the customer’s information confidential. It also analyzes whether the Malaysian laws provide a right balance between a duty to keep customer’s information secret and a duty to disclose such information in the fight against money laundering. On closer inspection, it is submitted that the Malaysian laws provide sufficient safeguards to ensure that the disclosure of customer’s information is carried out in a manner that is not prejudicial to the interest of legitimate customers. This is a positive approach that could protect the innocent customers from being mistreated by the law. Ultimately, it can be said that the growing threat of global money laundering and terrorism makes the overriding of banking secrecy justified because without a flow of information from the banks, the effective prevention of the menace is not possible.

Keywords: anti-money laundering law, banker-customer relationship, banking secrecy, confidentiality, money laundering

Procedia PDF Downloads 395
218 The Influence of Immunity on the Behavior and Dignity of Judges

Authors: D. Avnieli

Abstract:

Immunity of judges from liability represents a departure from the principle that all are equal under the law, and that victims may be granted compensation from their offenders. The purpose of the study is to determine if judicial immunity coincides with the need to ensure the existence of highly independent and incorruptible judiciary. Judges are immune from civil and criminal liability for their judicial acts. Judicial immunity is justified by the need to maintain complete independence and discretion of the judiciary. Scholars and judges believe that absolute immunity is needed to shield judges from pressures, threats, or outside interference. It is commonly accepted, that judges should be free to perform their judicial role in accordance with their assessment of the fact and their understanding of the law, without any restrictions, influences, inducements or interferences. In most countries, immunity applies when judges act in excess of jurisdiction. In some countries, it applies even when they act maliciously or corruptly. The only exception to absolute immunity applicable in all judicial systems is when judges act without jurisdiction over the subject matter. The Israeli Supreme Court recently decided to embrace absolute immunity and strike off a lawsuit of a refugee, who was unlawfully incarcerated. The Court ruled that the plaintiff cannot sue the State or the judge for damages. The questions of malice, dignity, and public scrutiny were not discussed. This paper, based on comparative analysis of many cases, aims to determine if immunity affects the dignity and behavior of judges. It demonstrates that most judges maintain their dignity and ethical code of behavior, but sometimes do not hesitate to act consciously in excess of jurisdiction, and in rare cases even corruptly. Therefore, in order to maintain independent and incorruptible judiciary, immunity should not be applied where judges act consciously in excess of jurisdiction or with malicious incentives.

Keywords: incorruptible judiciary, immunity, independent, judicial, judges, jurisdiction

Procedia PDF Downloads 79
217 The Consequences of Regime Change in Iraq; Formation and Continuation of Geopolitical Crises

Authors: Ali Asghar Sotoudeh

Abstract:

Since the US invasion of Iraq in 2003 and the subsequent regime change, internal conflicts between political and ethnic-religious groups have become a hallmark of Iraqi political dynamism. The most important manifestations of these conflicts are the Kurdish-central government conflicts, as well as fundamentalism since 2003. As a result, it seems not only US presence in Iraq under the pretext of fighting terrorism and expanding democracy has not had a positive effect on controlling fundamentalism and political stability in Iraq, but it has paved the way for the formation and continuation of geopolitical crises in the form of disputes over territory and sources of power. In this regard, given the importance of the study, the main purpose of this study is to examine the process of the impact of US regime-change policy on the formation and continuation of geopolitical crises in Iraq. The central question of this study is, what effect has the US regime change policy had on Iraq's domestic political processes? Findings show that regime change and subsequent imposed federalism have widened the gaps in Iraq's sectarian-ethnic system. As a result, the geopolitical crisis in the context of the dispute over geographical territory and sources of power between ethnic-religious groups has become the most important political dynamic in Iraq since the occupation. The research method in this article is descriptive-analytical, and the data collection method is library and internet resources.

Keywords: Iraq, united states, geopolitical crisis, ethno-religious conflict, political federalism

Procedia PDF Downloads 121
216 Enabling Oral Communication and Accelerating Recovery: The Creation of a Novel Low-Cost Electroencephalography-Based Brain-Computer Interface for the Differently Abled

Authors: Rishabh Ambavanekar

Abstract:

Expressive Aphasia (EA) is an oral disability, common among stroke victims, in which the Broca’s area of the brain is damaged, interfering with verbal communication abilities. EA currently has no technological solutions and its only current viable solutions are inefficient or only available to the affluent. This prompts the need for an affordable, innovative solution to facilitate recovery and assist in speech generation. This project proposes a novel concept: using a wearable low-cost electroencephalography (EEG) device-based brain-computer interface (BCI) to translate a user’s inner dialogue into words. A low-cost EEG device was developed and found to be 10 to 100 times less expensive than any current EEG device on the market. As part of the BCI, a machine learning (ML) model was developed and trained using the EEG data. Two stages of testing were conducted to analyze the effectiveness of the device: a proof-of-concept and a final solution test. The proof-of-concept test demonstrated an average accuracy of above 90% and the final solution test demonstrated an average accuracy of above 75%. These two successful tests were used as a basis to demonstrate the viability of BCI research in developing lower-cost verbal communication devices. Additionally, the device proved to not only enable users to verbally communicate but has the potential to also assist in accelerated recovery from the disorder.

Keywords: neurotechnology, brain-computer interface, neuroscience, human-machine interface, BCI, HMI, aphasia, verbal disability, stroke, low-cost, machine learning, ML, image recognition, EEG, signal analysis

Procedia PDF Downloads 94
215 Discrimination Faced by Dalit Women in India

Authors: Soundarya Lahari Vedula

Abstract:

Dalit women make up a significant portion of the Indian population. However, they are victims of age old discrimination. This paper presents a brief background of the Indian caste system which is a hierarchical division placing Dalits at the lowest rank. Dalits are forced to perform menial and harsh tasks. They often face social ostracism. The situation of Dalit women is of unique significance as they face triple discrimination due to their caste, gender, and class. Dalit women are strictly withheld by the rigid boundaries of the caste system. They are discriminated at every stage of their life and are denied access to public places, education and healthcare facilities among others. They face the worst forms of sexual violence. In spite of legislations and international conventions in place, their plight is not adequately addressed. This paper discusses, in brief, the legal mechanism in place to prohibit untouchability. Furthermore, this paper details on the specific human rights violations faced by Dalit women in the social, economic and political spheres. The violations range from discrimination in public places, denial of education and health services, sexual exploitation and barriers to political representation. Finally, this paper identifies certain lacunae in the existing Indian statutes and broadens on the measures to be taken to improve the situation of Dalit women. This paper offers some recommendations to address the plight of Dalit women such as amendments to the existing statutes, effective implementation of legal mechanisms and a more meaningful interpretation of the international conventions.

Keywords: Dalit, caste, class, discrimination, equality

Procedia PDF Downloads 171
214 Migrant Workers and the Challenge for Human Security in Southeast Asia since 1997

Authors: Hanen Khaldi

Abstract:

This paper aims to study the impact of international migration on human security in the Southeastern region of Asia, especially after Asian Financial Crisis 1997-98. International migration has impacts on many dimensions of security: the state security (sovereignty and autonomy); international relationships security (conflicts, terrorism, etc); and immigrants security. The paper aims to improve our comprehension of the impact of international migration on immigrant security in the region of Southeast Asia, particularly “vulnerable workers’’ whose number is growing very fast in the region. The literature review carried out on this matter led us to ask the following two question: 1) Did the creation of ASEAN Community matter on the evolution of immigrants in the region? And How governments try to resolve the gap between economic objectifs and security of immigrants in the region? To answer these two questions, the paper is subdivided in three parts: Firstly, we will show how the creation of the ASEAN Community, especially ASEAN Economic Community, had a significant impact on the pattern of evolution of immigration in this region. Secondly, we will paint a portrait illustrating the vulnerability of immigrants in Southeast Asia, particularly unskilled workers. Finally, using the theories of regional integration, we will assess how governments try to ensure the security and safety of the immigrants. Overall, our analysis illustrate the significant change of the official discourse of the leaders of the ASEAN member states, now more conciliator and especially more open to cooperation, as well as the proliferation of meetings and initiatives between these countries to control mobility flows in the region, and the ensure immigrants security.

Keywords: migrant workers, human security, human rights

Procedia PDF Downloads 143
213 The Right to Development as Constitutive and Prescriptive Right: The Lower Omo Valley Case of Ethiopia

Authors: Kebene K. Wodajo

Abstract:

The right to development (RTD) has gone through different phases of metamorphoses, from the right to economic growth to full human development. Despite the fact that Africa has taken the lead in articulating and recognizing the RTD in a binding multilateral human rights treaty, realization of the right poses a challenge at the operational level. The challenge is worse in Sub-Saharan Africa, mainly because governments often tend to set economic growth as their ultimate goal, with very little consideration to the local peoples’ welfare in their territory. Ethiopia is not an exception to this. While recording a fast economic growth, yet this has been accompanied by increasing severity of multidimensional poverty. This paper explores the place of the ‘people’ in the development trajectory Ethiopia is pursuing and if and how a right-based approach to development could be brought to practice beyond the rhetoric. By inquiring into the place of the ‘people’, the paper attempts to show whether the people are at the center or at the periphery, beneficiary or victims of the ongoing development. In doing so, it divulges the gulf between the rhetoric and the reality of development practice. By asking/discussing if and how a right-based approach to development could bridge the gap, the paper shows how this approach could translate ‘people’s’ need into right, and recognize them as active subjects and stakeholders of the process of development. As an instance of showing the gap, the paper takes the Lower Omo valley sugar plantation project as a case in point. Through analysis the paper demonstrates that the development trajectory being followed by Ethiopia falls short of fitting into the human development discourse of UN Declaration on the Right to Development (DRD), the African Charter on People and Human Rights (the Charter) and the Ethiopian constitution. The paper argues that Ethiopia’s development efforts must take account of both the constitutive and prescriptive nature of the RTD if social equity is to be met.

Keywords: development, Ethiopia, lower Omo valley, right-based approach, right to development, people, people’s right

Procedia PDF Downloads 292
212 Winning the “Culture War”: Greater Hungary and the American Confederacy as Sites of Nostalgia, Mythology, and Problem-Making for the Far Right in the US and Hungary

Authors: Grace Rademacher

Abstract:

Trauma” of the Kingdom of Hungary and the “Lost Cause” of the American Confederacy. Applying Nicole Maurantonio’s articulation of “confederate exceptionalism” and Svetlana Boym’s definition of “restorative nostalgia”, this article argues that, via memorialization and public discourse, both far right bodies flood their constituencies with narratives of nostalgia and martyrdom to sow existential anxieties about past and prophetic victimhood, all under the guise of protecting or restoring heritage. Linking this practice to gamification and conspiracy theorizing and following the work of Patrick Jagoda, this article identifies such industries of nostalgia as means by which the far right in both nations can partake in the “immanent and improvisational process of problem making.” Reified through monuments and references to the Trianon Trauma and the American confederacy, political actors “problem make” by alleging that they are victims of the West or the Left, subject to the cruel whims of liberalism and denial of historical legitimacy. In both nations, relying on their victimhood, pundits and politicians can appeal to white supremacists and distract citizens from legitimate active conflicts, such as wars or democratic rollbacks, redirecting them to fictional, mythical attacks on Hungarian or American society and civilization. This article will examine memorials and monuments as “lieux de memoire” and identify the purposeful similarities between the discourse of public figures and politicians such as María Schmidt, János Lázár, and Viktor Orbán, with that of Donald Trump and pundits such as Tucker Carlson.

Keywords: nationalism, political memory, white supremacy, trianon

Procedia PDF Downloads 50
211 ‘Undressed Star’, Sexual Scenes and Discourses in Mass Media: Exploring 1980s Taiwan Female Film Stars’ Onscreen Erotic Acting

Authors: Xinchen Zhu

Abstract:

In the history of Chinese-language film, female stars’ acting is connected with issues of national ideology, consumerism, and sexual politics. In the 1980s, Taiwan entered a period of ‘soft authoritarianism’ in which the economy prospered politics became more democratic, and mass culture became more diverse. Film censorship was more flexible and sexual scenes were increasingly shown on screen. Female stars’ bodies were eroticized and commercialized through sexual and nude scenes and, by challenging conservative film censorship and social taboos, became the focus of mass media. This article will explore how discourses in mass media constructed the erotic images of female stars and, conversely, impacted film censorship, filmmakers and film actresses in 1980s’ Taiwan. This article will regard the eroticized female film stars’ acting as a ‘field’ of internal interaction and continuous reproduction, where the ideology of male dominance and voices of female film stars conflict with each other. Based on textual analysis of female stars’ sexual acting and the debate in mass media, the argument is that the eroticized female bodies were gazed upon on and off the screen. In the discourses of mass media, the artistry of actresses’ erotic acting was not only ignored, devalued and delegitimized, these stars were also labelled as ‘undressed star’ or ‘nude star’ and construed as victims of the film industry. However, the female stars were able to speak through mass media platforms, emphasizing their efforts in erotic acting and highlighting modern female subjectivity.

Keywords: sexual scenes, Taiwan female stars, erotic acting, discourses in mass media, female subjectivity

Procedia PDF Downloads 139
210 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income

Authors: M. Koray Cetin, Mehmet Mert

Abstract:

The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.

Keywords: exchange rate, panel data analysis, security, tourism revenues

Procedia PDF Downloads 308