Search results for: victims of terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 687

Search results for: victims of terrorism

507 Impacts of Extremism and Terrorism on Modern Urdu Poetry: A Case Study of Khyber Pakhtunkhwa

Authors: Naqeeb Ahmad Jan, Rukhsana Bibi

Abstract:

Extremism is once again pushing the globe towards ignorance and darkness. In the present day, the wave of extremist element (tendencies) has affected the people across the globe which led them to believe in manifestation of various ideologies. Likely, the Pakistan’s North-Western province (Khyber Pakhtunkhwa) served as a main prey. However, it also served as an equal partner to halt to and control the extremist activities. This current extremist element has also affected the poets herein, and thus they (poets) used their pen as a sword and depicted this havoc, the nature of extremism they witnessed, and also asked for and supported a positive and durable solution to this menace of extremism and terrorism. Their poetic works portrayed and exhibited various examples of the extremism and its possible solution to ensure peace and harmony. The researcher has taken the liberty to argue that a balanced behaviour and attitude play a key role in the fulfillment of desired actions. The imposition of any set of belief, value and attitude leads to the multiplication of extremism and it is so poisonous that it causes to the destruction of whole human society. This study has found that the present day extremism has led to the emergence of new words, similes, metaphor and other figures of speech to be a part of the language and literature to be survived. These words have been analyzed and discussed in a new getup and meanings; the similes and metaphors describing extremism used by poets and writers of this era. The methodology is based on quantitative, analytical and comparative research. Moreover, this research has discussed indication of new words and figures of speech used by the poets and which are in practice, and impacts of extremism on the modern Urdu poetry of Khyber Pakhtunkhwa.

Keywords: extremism, modern Urdu poetry, subcontinent, terrorism

Procedia PDF Downloads 235
506 Legalizing Prostitution: Providing Equality Amongst Men and Women in the Criminal Justice System through a Socialist Feminist Framework

Authors: Amanda Rebman

Abstract:

This paper challenges the criminal justice system’s traditional stance regarding prostitution. Historically, the acceptance and morality of prostitution within the United States has fluctuated depending upon the social attitudes of the era. Today, prostitutes are allegedly viewed as victims; however, they are treated like criminals throughout the criminal justice system and society. Dominant patriarchal narratives within the United States has resulted in woman lacking autonomy over their bodies and diminished their ability to choose their own career. Even though prostitutes are deemed victims, many times, they are convicted of crimes, a practice that results in further victimization. Utilizing the socialist feminist theory to understand these juxtaposing positions on whether to legalize prostitution facilitates a greater understanding of how patriarchal capitalist arrangements ensure the oppression of women throughout the criminal justice system. The legalization of prostitution will alleviate some of this oppression and ensure a more equal treatment of women in the criminal justice system and society at large.

Keywords: equality, feminist theory, prostitution, sex work

Procedia PDF Downloads 101
505 Violence against Women: A Study on the Aggressors' Profile

Authors: Giovana Privatte Maciera, Jair Izaías Kappann

Abstract:

Introduction: The violence against woman is a complex phenomenon that accompanies the woman throughout her life and is a result of a social, cultural, political and religious construction, based on the differences among the genders. Those differences are felt, mainly, because of the patriarchal system that is still present which just naturalize and legitimate the asymmetry of power. As consequence of the women’s lasting historical and collective effort for a legislation against the impunity of violence against women in the national scenery, it was ordained, in 2006, a law known as Maria da Penha. The law was created as a protective measure for women that were victims of violence and consequently for the punishment of the aggressor. Methodology: Analysis of police inquiries is established by the Police Station of Defense of the Woman of Assis city, by formal authorization of the justice, in the period of 2013 to 2015. For the evaluating of the results will be used the content analysis and the theoretical referential of Psychoanalysis. Results and Discussion: The final analysis of the inquiries demonstrated that the violence against women is reproduced by the society and the aggressor, in most cases it is a member of their own family, mainly the current or former-spouse. The most common kinds of aggression were: the threat bodily harm, and the physical violence, that normally happens accompanied by psychological violence, being the most painful for the victims. The biggest part of the aggressors was white, older than the victim, worker and had primary school. But, unlike the expected, the minority of the aggressors were users of alcohol and/or drugs and possessed children in common with the victim. There is a contrast among the number of victims who already admitted have suffered some type of violence earlier by the same aggressor and the number of victims who has registered the occurrence before. The aggressors often use the discourse of denial in their testimony or try to justify their act like the blame was of the victim. It is believed in the interaction of several factors that can influence the aggressor to commit the abuse, including psychological, personal and sociocultural factors. One hypothesis is that the aggressor has a violence history in the family origin. After the aggressor being judged, condemned or not, usually there is no rehabilitation plan or supervision that enable his change. Conclusions: It has noticed the importance of studying the aggressor’s characteristics and the reasons that took him to commit such violence, making possible the implementation of an appropriate treatment to prevent and reduce the aggressions, as well the creation of programs and actions that enable communication and understanding concerning the theme. This is because the recurrence is still high, since the punitive system is not enough and the law is still ineffective and inefficient in certain aspects and in its own functioning. It is perceived a compulsion in repeat so much for the victims as for the aggressors, because they end involving, almost always, in disturbed and violent relationships, with the relation of subordination-dominance as characteristic.

Keywords: aggressors' profile, gender equality, Maria da Penha law, violence against women

Procedia PDF Downloads 303
504 Understanding How Money Laundering and Financing of Terrorism Are Conducted through the Real Estate Sector in the Middle East and North Africa Region

Authors: Haytham Yassine

Abstract:

This research seeks to identify how money laundering activities are executed through the real estate sector. This article provides academics with literature on the topic and provides scholars, and practitioners with a better understanding of the risks and challenges involved. Data are gathered through survey in the Middle East and North Africa region and review of the available research. The results of the analysis will help identifying the factors attracting criminals to the real estate sector and develop an understanding of the methods used to launder illicit funds through this sector and the indicators of suspicion for reporting entities. Further analysis reveals the risks posed by money laundering and terrorist financing on the real estate sector and challenges facing states in this regard.

Keywords: money laundering, terrorism financing, real estate sector, Middle East and North Africa

Procedia PDF Downloads 127
503 Enhancing Digi-Parenting Strategies to Mitigate Children’s Cyber-Aggression

Authors: Misha Teimouri

Abstract:

Our world has been transformed by the use of the internet and the constant flow of information. While this transmission has its benefits, it has also added significant challenges to family relations, primarily in the field of parenting and children's digital lives. Screens, speed, and connectedness are the words that characterize the lives of today's digital generation; it's as if the entire world is in their pockets at all times. Parents attempt to regulate and control their children's internet use in the hopes of maximizing the advantages and minimizing the disadvantages of their children's internet use; however, given that children spend more time online, particularly ever since the pandemic, children's cyber-aggression has become an issue for them. Children may externalize their behavior online, bully others, send anger/hatred/resist messages, share violent and bloody content, and engage in sexting. These types of online aggression make parenting more difficult, especially for digital immigrant parents compared to digital native parents. In response to these challenges, this study investigated the level of cyber aggression among children, as well as the effects of digi-parenting (active, monitoring, restrictive, and warm and supportive) on children's cyber-aggression (sexual, verbal, visual) as victims or aggressors. The study also determined whether there were any differences in parenting styles between digital natives (DN) and digital immigrants. In accordance with the study, boys and older children are more likely to engage in cyber aggression as aggressors, whereas girls and younger children are more likely to engage as victims. Warmth and supportive digiparenting have a greater impact on children's cyber-aggression (sexual, verbal, and visual) as victims or aggressors. This study also found that, when compared to DI parents, DN parents are more successful at digi-parenting and reducing their children's exposure to cyber-aggression.

Keywords: digi-parenting, cyber-aggression, digital natives, digital immigrants, children's cyber-aggression (sexual, verbal, visual)

Procedia PDF Downloads 18
502 'Naming, Blaming, Shaming': Sexual Assault Survivors' Perceptions of the Practice of Shaming

Authors: Anat Peleg, Hadar Dancig-Rosenberg

Abstract:

This interdisciplinary study, to our knowledge the first in this field, is located on the intersection of victimology-law and society-and media literature, and it corresponds both with feminist writing and with cyber literature which explores the techno-social sphere. It depicts the multifaceted dimensions of shaming in the eyes of the survivors through the following research questions: What are the motivations of sexual-assault survivors to publicize the assailants' identity or to refrain from this practice? Is shaming on Facebook perceived by sexual–assault victims as a substitute for the CJS or as a new form of social activism? What positive and negative consequences do survivors experience as a result of shaming their assailants online? The study draws on in-depth semi-structured interviews which we have conducted between 2016-2018 with 20 sexual-assaults survivors who exposed themselves on Facebook. They were sexually attacked in various forms: six participants reported that they had been raped when they were minors; eight women reported that they had been raped as adults; three reported that they had been victims of an indecent act and three reported that they had been harassed either in their workplace or in the public sphere. Most of our interviewees (12) reported to the police and were involved in criminal procedures. More than half of the survivors (11) disclosed the identity of their attackers online. The vocabularies of motives that have emerged from the thematic analysis of the interviews with the survivors consist of both social and personal motivations for using the practice of shaming online. Some survivors maintain that the use of shaming derives from the decline in the public trust in the criminal justice system. It reflects demand for accountability and justice and serves also as a practice of warning other potential victims of the assailants. Other survivors assert that shaming people in a position of privilege is meant to fulfill the public right to know who these privileged men really are. However, these aforementioned moral and practical justifications of the practice of shaming are often mitigated by fear from the attackers' physical or legal actions in response to their allegations. Some interviewees who are feminist activists argue that the practice of shaming perpetuates the social ancient tendency to define women by labels linking them to the men who attacked them, instead of being defined by their own life complexities. The variety of motivations to adopt or resent the practice of shaming by sexual assault victims presented in our study appear to refute the prevailing intuitive stereotype that shaming is an irrational act of revenge, and denote its rationality. The role of social media as an arena for seeking informal justice raises questions about the new power relations created between victims, assailants, the community and the State, outside the formal criminal justice system. At the same time, the survivors' narratives also uncover the risks and pitfalls embedded within the online sphere for sexual assault survivors.

Keywords: criminal justice, gender, Facebook, sexual-assaults

Procedia PDF Downloads 84
501 Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network

Authors: M. Hilani, B. Nassih

Abstract:

Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working.

Keywords: phishing, e-mail, NLP preprocessing, CNN, e-mail filtering

Procedia PDF Downloads 79
500 Islamophobia: A Study of Unfounded Fear of Islam in Nigeria

Authors: AbdulHameed Badmas Yusuf

Abstract:

Islamophobia is unfounded fear of Islam and, more accurately, of his adherents. This phenomenon has found a fertile terrain in Nigeria given her status as a multireligious society where Muslims and Christians co-exist. Over the years, Islamophobia has taken constitutional, diplomatic, educational, financial, and political dimensions in the country. Any move by Muslims to adhere to their religious dictates, within the constitutional framework, is misconstrued by Christians - their religious counterparts- as a systematic way of Islamizing the country. Against this backdrop, this paper casts a look at Islamophobia from the five dimensions mentioned above. It shall identify possible causes of Islamophobia and proffer solutions accordingly. Available resources as well as events in the recent past reveal that Islamophobia is not unconnected with orientalism and terrorism, which are informed by prejudice and ignorance respectively. As such, the paper suggests adequate knowledge and tolerance as inevitable tools to curtail the menace of Islamophobia. This will go a long way in enhancing mutual tolerance and peaceful co-existence among the adherents of Christianity, Islam, and other religions in Nigeria. Both historical and analytical methods are used in this paper.

Keywords: islamophobia, islam, Nigeria, orientalism, terrorism

Procedia PDF Downloads 392
499 Innocent Victims and Immoral Women: Sex Workers in the Philippines through the Lens of Mainstream Media

Authors: Sharmila Parmanand

Abstract:

This paper examines dominant media representations of prostitution in the Philippines and interrogates sex workers’ interactions with the media establishment. This analysis of how sex workers are constituted in media, often as both innocent victims and immoral actors, contributes to an understanding of public discourse on sex work in the Philippines, where decriminalisation has recently been proposed and sex workers are currently classified as potential victims under anti-trafficking laws but also as criminals under the penal code. The first part is an analysis of media coverage of two prominent themes on prostitution: first, raid and rescue operations conducted by law enforcement; and second, prostitution on military bases and tourism hotspots. As a result of pressure from activists and international donors, these two themes often define the policy conversations on sex work in the Philippines. The discourses in written and televised news reports and documentaries from established local and international media sources that address these themes are explored through content analysis. Conclusions are drawn based on specific terms commonly used to refer to sex workers, how sex workers are seen as performing their cultural roles as mothers and wives, how sex work is depicted, associations made between sex work and public health, representations of clients and managers and ‘rescuers’ such as the police, anti-trafficking organisations, and faith-based groups, and which actors are presumed to be issue experts. Images of how prostitution is used as a metaphor for relations between the Philippines and foreign nations are also deconstructed, along with common tropes about developing world female subjects. In general, sex workers are simultaneously portrayed as bad mothers who endanger their family’s morality but also as long-suffering victims who endure exploitation for the sake of their children. They are also depicted as unclean, drug-addicted threats to public health. Their managers and clients are portrayed as cold, abusive, and sometimes violent, and their rescuers as moral and altruistic agents who are essential for sex workers’ rehabilitation and restoration as virtuous citizens. The second part explores sex workers’ own perceptions of their interactions with media, through interviews with members of the Philippine Sex Workers Collective, a loose organisation of sex workers around the Philippines. They reveal that they are often excluded by media practitioners and that they do not feel that they have space for meaningful self-revelation about their work when they do engage with journalists, who seem to have an overt agenda of depicting them as either victims or women of loose morals. In their assessment, media narratives do not necessarily reflect their lived experiences, and in some cases, coverage of rescues and raid operations endangers their privacy and instrumentalises their suffering. Media representations of sex workers may produce subject positions such as ‘victims’ or ‘criminals’ and legitimize specific interventions while foreclosing other ways of thinking. Further, in light of media’s power to reflect and shape public consciousness, it is a valuable academic and political project to examine whether sex workers are able to assert agency in determining how they are represented.

Keywords: discourse analysis, news media, sex work, trafficking

Procedia PDF Downloads 350
498 Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings

Authors: Vanda Božić, Željko Nikač

Abstract:

Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime.

Keywords: trafficking in children, trafficking in human beings, child as a victim of human trafficking, children’s rights

Procedia PDF Downloads 329
497 Relieving Flood Damages In Malaysia through Tax Policies And Measures: A Comparative Analysis

Authors: Chee Fei Chang, May Yee Ng

Abstract:

As a result of its geographical location, flood is a natural disaster that happens regularly in Malaysia. Every year, heavy rainfall is brought by the cyclical monsoon to the East coast of Peninsular Malaysia. In recent years, the occurrence of unexpected heavy downpour somehow connected to climate-change phenomena is also on the increasing trend. Ironically, despite that Malaysians have suffered significant monetary losses as a result of the recurring floods in past many decades, little has been done by the government from the perspective of taxation. Perhaps due to political reason or as a populist measure, the federal and local government are more inclined to offer small cash handout then rolling out long-term tax policy or measure in relieving the financial and tax burden of the victims and affected business entities. Except for the one-off tax break granted to affected businesses in 2007, the authors have not found any income tax exemption or deduction order gazetted with regard to flood disaster. Hence, it is imperative for this study to explore the need and challenges of implementing flood inflicted disaster tax relief or credit in Malaysia. This research consists of two major parts. First, the assessment of relevant tax policies/ measures with regard to non-government organisations and other affected parties. Content and thematic analyses will be applied on current tax legislations and orders issued for this part. Second, a comparative analysis will be conducted benchmarking various disaster tax reliefs and credits implemented in developed countries. Resulting from the increasing climate change-related disasters in Malaysia, the findings of this study will shed light on the importance of introducing disaster tax relief measures to assist individual victims as well as the affected businesses.

Keywords: climate-changed related disaster, disaster tax credits, tax relief for victims, tax measures for disaster recovery

Procedia PDF Downloads 93
496 People’s Perception towards the ASEAN Economic Community (AEC)

Authors: Nopadol Burananuth

Abstract:

The purposes of this research paper were to study the relationship between the economic factor and political factor, the relationship between political and economic factor and social factor, and the effects of economic factor, political factor, and social factor to the people’s perception about ASEAN Economic Community (AEC). A total of 400 samples were selected from four sub-districts from Arunyaprathet District, Srakaow Province. Data analysis method included multiple regression analysis. The findings revealed that political factor depended on trade cooperation, transportation cooperation, and communication cooperation. Social factor was depended on disaster protection, terrorism protection, and international relations. In addition, the people’s perception of the AEC depended on disaster perception, terrorism protection, international relations, transportation cooperation, communication cooperation, interdependence, and labor movement.

Keywords: economic factors, perception, political factors, social factors

Procedia PDF Downloads 550
495 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements

Authors: John Hardy

Abstract:

The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.

Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism

Procedia PDF Downloads 144
494 A Study of Sexual Violence on Women and Children in Hong Kong

Authors: Wing Hang Shelley Leung

Abstract:

With the rise of the recent social movement, namely #MeToo, it shows that a lot of women and children in fact suffered from sexual abuse and some even suffered from child abuse, including in Hong Kong. In view of the ongoing social movements, this paper argues that we have to look beyond their impacts and understand the roots of the problem: what if the underlying cause of the recent social movements was the inherited values that were rooted in us since we were young, or the public’s lack of confidence in the legal system when it comes to this type of personal matters? What if the movements reveal the problematic issue of the lack of protection plans, either in the private or public sphere? If the legal system is presumed to not be able to preemptively protect everyone or effectively punish all perpetrators, can other pillars provide supports to fill in the loopholes of the legal system? This paper takes a theoretical approach to look into current sexuality education, the legal system in Hong Kong and the adoption of Asian values in society to argue that difficulties that are being placed onto victims in disclosing sexual violence they had experienced. Reviews of the current system and recent sexual assaults court cases for case studies allow the research to address the issues of victims’ experience including (a) their reactions to incidents; (b) issues they have in trials; (c) psychological impacts of the incidents; and (d) their understandings of gender equality before and after incidents. The study is significant because it criticises the current legal system in Hong Kong and provides insights to the public by explaining the dynamics between the problem, the legal system and the society. Also, it contributes to the ongoing research about the psychological impacts to victims in Hong Kong, especially how they are placed in a disadvantaged position in the legal system and society and even for their recovery. It contributes to the findings of how family structures, parental responsibilities and gender studies influence a child’s perception of gender equality in Hong Kong and hence their immediate reactions to incidents. To fully address the needs of victims, especially our younger generation, as well as to prevent future harm and to raise awareness, an inclusive framework which recognizes the needs of protecting and safeguarding women and children in the private sphere and a proper education for gender equality are needed.

Keywords: child abuse, children's rights, domestic violence, gender equality, Hong Kong, Me too, sexual violence, women's rights

Procedia PDF Downloads 131
493 The People's Tribunal: Empowerment by Survivors for Survivors of Child Abuse

Authors: Alan Collins

Abstract:

This study explains how The People’s Tribunal empowered survivors of child abuse. It examines how People’s tribunals can be effective mean of empowerment; the challenges of empowerment – expectation v. reality; the findings and how they reflect other inquiry findings; and the importance of listening and learning from survivors. UKCSAPT “The People’s Tribunal” was established by survivors of child sex abuse and members of civil society to investigate historic cases of institutional sex abuse. The independent inquiry, led by a panel of four judges, listened to evidence spanning four decades from survivors and experts. A common theme throughout these accounts showed that a series of institutional failures prevented abuse from being reported; and that there are clear links between children being rendered vulnerable by these failures and predatory abuse on an organised scale. It made a series of recommendations including the establishment of a permanent and open forum for victims to share experiences and give evidence, better links between mental health services and police investigations, and training for police and judiciary professionals on the effects of undisclosed sexual abuse. The main findings of the UKCSAPT report were:-There are clear links between children rendered vulnerable by institutional failures and predatory abuse on an organised scale, even if these links often remain obscure. -UK governmental institutions have failed to provide survivors with meaningful opportunities for either healing or justice. -The vital mental health needs of survivors are not being met and this undermines both their psychological recovery and access to justice. -Police and other authorities often lack the training to understand the complex reasons for the inability of survivors to immediately disclose a history of abuse. -Without far-reaching changes in institutional culture and practices, the sexual abuse of children will continue to be a significant scourge in the UK. The report also outlined a series of recommendations for improving reporting and mental health provision, and access to justice for victims were made, including: -A permanent, government-funded popular tribunal should be established to enable survivors to come forward and tell their stories. -Survivors giving evidence should be assigned an advocate to assist their access to justice. -Mental health services should be linked to police investigations to help victims disclose abuse. -Victims who fear reprisals should be provided with a channel though which to give evidence anonymously.

Keywords: empowerment, survivors, sexual, abuse

Procedia PDF Downloads 225
492 The Consequences of Cyberbullying and School Violence: Risk and Protective Factors

Authors: Ifigenia Stylianou

Abstract:

As more than three-quarters of students going online daily via computers, tablets, and smartphones, the phenomenon of cyberbullying is growing rapidly. Knowing that victims of online bullying are often also victims of traditional bullying and that traditional bullying is considered as an extension of cyberbullying. In this study, we aim to identify (1) whether cyberbullying lead to more intense forms of school bullying, and (2) whether some biological and environmental factors mediate between this relation, and act protectively to bullying and inappropriate behaviour in school. To answer this questions, a sample of X students, aged X, were asked to complete eight questionnaires (Personal Experiences Checklist, Inventory of Peers Attachment, Questionnaire on Teacher Interaction, School Climate Survey for Bullying, Strengths and Difficulties Questionnaire, Youth Psychopathic Traits Inventory-Short Form, Barratt Impulsiveness Scale-11) in X time periods. Results can provide us important information to improve understanding the factors that are related to bullying. In addition, the results can assist in developing intervention programs to tangle the issue of bullying at schools. All data have been collected and are currently being processed for statistical analyses.

Keywords: cyberbullying, bullying, school climate, psychopathy traits, attachment, mediation factors

Procedia PDF Downloads 200
491 Doris Salcedo: Parameters of Political Commitment in Colombia

Authors: Diana Isabel Torres Silva

Abstract:

Doris Salcedo is the most prominent sculptor from Colombia ever and currently, one of the most prestigious Latin-American artists in the world. Her artwork, intended as political art, has war as a background, in particular the Colombian civil conflict, and it addresses the way that its violence affects victims’ lives irreparably. While Salcedo is internationally recognized as a talented and a politically committed artist, some Colombian critics consider her artwork as the propagandist and influenced by the interest of multinational companies and the organizations that fund it. This paper, as part of a more extended research project, attempts to demonstrate that Doris Salcedo’s artwork makes visible the victims suffering and mourning and compels the viewers’ sympathy, although its approach is superficial. It does not achieve a complete or complex understanding of the social and historical causes underneath the war and maybe because of that has become a successful commodity for the international arts market. The paper considers, firstly, the influence that Colombian Nuevo Teatro, from the sixties, had on Salcedo’s early political perspective and, secondly, analyzes in detail the first series of her artwork (1992-1998) and how those works address grieving. The focus point of this analysis will be the domestic furniture sculptures, which are the main symbolic element of Salcedo’s oeuvre.

Keywords: Arts and politics, Doris Salcedo, Colombian art, Political Art

Procedia PDF Downloads 310
490 Refractory Cardiac Arrest: Do We Go beyond, Do We Increase the Organ Donation Pool or Both?

Authors: Ortega Ivan, De La Plaza Edurne

Abstract:

Background: Spain and other European countries have implemented Uncontrolled Donation after Cardiac Death (uDCD) programs. After 15 years of experience in Spain, many things have changed. Recent evidence and technical breakthroughs achieved in resuscitation are relevant for uDCD programs and raise some ethical concerns related to these protocols. Aim: To rethink current uDCD programs in the light of recent evidence on available therapeutic procedures applicable to victims of out-of-hospital cardiac arrest (OHCA). To address the following question: What is the current standard of treatment owed to victims of OHCA before including them in an uDCD protocol? Materials and Methods: Review of the scientific and ethical literature related to both uDCD programs and innovative resuscitation techniques. Results: 1) The standard of treatment received and the chances of survival of victims of OHCA depend on whether they are classified as Non-Heart Beating Patients (NHBP) or Non-Heart-Beating-Donors (NHBD). 2) Recent studies suggest that NHBPs are likely to survive, with good quality of life, if one or more of the following interventions are performed while ongoing CPR -guided by suspected or known cause of OHCA- is maintained: a) direct access to a Cath Lab-H24 or/and to extra-corporeal life support (ECLS); b) transfer in induced hypothermia from the Emergency Medical Service (EMS) to the ICU; c) thrombolysis treatment; d) mobile extra-corporeal membrane oxygenation (mini ECMO) instituted as a bridge to ICU ECLS devices. 3) Victims of OHCA who cannot benefit from any of these therapies should be considered as NHBDs. Conclusion: Current uDCD protocols do not take into account recent improvements in resuscitation and need to be adapted. Operational criteria to distinguish NHBDs from NHBP should seek a balance between the technical imperative (to do whatever is possible), considerations about expected survival with quality of life, and distributive justice (costs/benefits). Uncontrolled DCD protocols can be performed in a way that does not hamper the legitimate interests of patients, potential organ donors, their families, the organ recipients, and the health professionals involved in these processes. Families of NHBDs’ should receive information which conforms to the ethical principles of respect of autonomy and transparency.

Keywords: uncontrolled donation after cardiac death resuscitation, refractory cardiac arrest, out of hospital cardiac, arrest ethics

Procedia PDF Downloads 206
489 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 190
488 Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques

Authors: Saima Nazir, Mustansar Ali Ghazanfar, Sanay Muhammad Umar Saeed, Muhammad Awais Azam, Saad Ali Alahmari

Abstract:

Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances.

Keywords: data mining, counter terrorism, machine learning, SVM

Procedia PDF Downloads 373
487 The Applicability of International Humanitarian Law to Non-State Actors

Authors: Yin Cheung Lam

Abstract:

In 1949, the ratification of the Geneva Conventions heralded the international community’s adoption of a new universal and non-discriminatory approach to human rights in situations of conflict. However, with the proliferation of international terrorism after the 9/11 attacks on the United States (U.S.), the international community’s uneven and contradictory implementations of international humanitarian law (IHL) questioned its agenda of universal human rights. Specifically, the derogation from IHL has never been so pronounced in the U.S. led ‘War on Terror’. While an extensive literature has ‘assessed the impact’ of the implementation of the Geneva Conventions, limited attention has been paid to interrogating the ways in which the Geneva Conventions and its resulting implementation have functioned to discursively reproduce certain understandings of human rights between states and non-state actors. Through a discursive analysis of the Geneva Conventions and the conceptualization of human rights in relation to terrorism, this thesis problematises the way in which the U.S. has understood and reproduced understandings of human rights. Using the U.S. ‘War on Terror’ as an example, it seeks to extend previous analyses of the U.S.’ practice of IHL through a qualitative discursive analysis of the human rights content that appears in the Geneva Conventions in addition to the speeches and policy documents on the ‘War on Terror’.

Keywords: discursive analysis, human rights, non-state actors, war on terror

Procedia PDF Downloads 576
486 Normative Reflections on the International Court of Justice's Jurisprudence on the Protection of Human Rights in Times of War

Authors: Roger-Claude Liwanga

Abstract:

This article reflects on the normative aspects of the jurisprudence on the protection of human rights in times of war that the International Court of Justice (ICJ) developed in 2005 in the Case Concerning Armed Activities on the Territory of the Congo (Democratic Republic of Congo v. Uganda). The article focuses on theories raised in connection with the Democratic Republic of Congo (DRC)'s claim of the violation of human rights of its populations by Uganda as opposed to the violation of its territorial integrity claims. The article begins with a re-visitation of the doctrine of state extraterritorial responsibility for violations of human rights by suggesting that a state's accountability for the breach of its international obligations is not territorially confined but rather transcends the State's national borders. The article highlights the criteria of assessing the State's extraterritorial responsibility, including the circumstances: (1) where the concerned State has effective control over the territory of another State in the context of belligerent occupation, and (2) when the unlawful actions committed by the State's organs on the occupied territory can be attributable to that State. The article also analyzes the ICJ's opinions articulated in DRC v. Uganda with reference to the relationship between human rights law and humanitarian law, and it contends that the ICJ had revised the traditional interaction between these two bodies of law to the extent that human rights law can no longer be excluded from applying in times of war as both branches are complementary rather than exclusive. The article correspondingly looks at the issue of reparations for victims of human rights violations. It posits that reparations for victims of human rights violations should be integral (including restitution, compensation, rehabilitation, satisfaction, and guarantees of non-repetition). Yet, the article concludes by emphasizing that reparations for victims were not integral in DRC v. Uganda because: (1) the ICJ failed to set a reasonable timeframe for the negotiations between the DRC and Uganda on the amount of compensation, resulting in Uganda paying no financial reparation to the DRC since 2005; and (2) the ICJ did not request Uganda to domestically prosecute the perpetrators of human rights abuses.

Keywords: human rights law, humanitarian law, civilian protection, extraterritorial responsibility

Procedia PDF Downloads 104
485 An Australian Central Bank Digital Currency: Developing a Framework for Calibrating National Security and Privacy Considerations

Authors: Nancy Michail, Niloufer Selvadurai, Doron Goldbarsht

Abstract:

This study analyses the development of a central bank digital currency (CBDC) in Australia and the framework being developed to ensure that national security and privacy considerations are appropriately addressed. Through the use of doctrinal methodology, the research closely and critically examines current legislation and regulation on privacy federal laws and the need to comply with anti-money laundering and counter-terrorism financing laws (AML/CTF). It is argued that the introduction of CBDCs may lead to potential tension between the application of AML/CTF laws and the upholding of individuals’ fundamental and legislated rights to privacy; therefore, it emphasises the need for clear delineation of ambits and support between different laws and regulations to ensure they operate within their intended purposes and suggests that the calibration of potential tensions between AML/CTF and privacy laws may be achieved through the innovative application of the proportionality principle.

Keywords: anti-money laundering and counter terrorism financing, central bank digital currency, privacy, proportionality principle

Procedia PDF Downloads 21
484 The Role of Chennai NGOs in Combatting Human Trafficking

Authors: Nisha James, Shubha Ranganathan

Abstract:

Sex trafficking is a type of human trafficking involving prostitution of individuals for sexual exploitation. The stigma and social isolation they face in the society often makes it difficult for them to become rehabilitated from trafficking, due to which many of them continue in prostitution for years after being sex trafficked. Victims are subjected to violations of their fundamental human rights, deprived of basic medical facilities and undergo long-term abuse. This paper focuses on the role of Non-Governmental Organizations (NGOs) in the rescue and rehabilitation of victims of sex trafficking. Semi-structured interviews were conducted with 26 survivors of sex trafficking, five sex workers and 14 non-community staff members of a project running NGO in the city of Chennai in South India. Chennai has a number of NGOs that are involved in HIV/AIDS awareness and prevention programs. In many cases, rehabilitation of sex trafficking victims is also a mandate of these NGOs. This particular NGO was also involved in development activities towards the eradication of HIV/AIDS. For instance, they were engaged in inculcating safe sex practices among high-risk groups such as sex workers or in fighting for sex worker rights. The study found that the NGO’s role in combatting sex trafficking is overrun by the way it approaches these issue related to HIV/AIDS. Further, their activities are dependent solely on funding. Given that gradually, international funding for HIV/AIDS has slowly been withdrawn, there have been problems such as reduction in the salary of the project staff, the outreach workers and peer educators, many of whom were survivors of sex trafficking who have been able to survive on their wages instead of continuing in prostitution. Therefore, till date, the project funding has helped in making them aware of the health and social consequences of continuing in prostitution, and in supporting them socioeconomically, but the lack of funding may also lead the NGO workers into a state of unemployment, poverty and eventually into being re-trafficked. The study concludes by pointing to the need for disengaging anti-trafficking efforts from the HIV/AIDS related programs.

Keywords: non-governmental organization role, non-governmental organization staff, sex trafficking survivors, sex workers

Procedia PDF Downloads 270
483 Uruguayan vs. British Press Coverage of a Political Kidnapping

Authors: Luisa Peirano

Abstract:

What began as a middle-class insurgent political movement whose slogan was 'Words divide us. Action unites us!' ultimately mutated into an underground terrorist group that staged a series of armed robberies, kidnappings and even executions in the 1960s and early 1970s. One of the most memorable was the kidnapping of the British ambassador, Sir Geoffrey Jackson, in January 1971, who was held captive for eight months. The episode, which triggered a massive government response and resulted in the capture of the Tupamaros leaders, continued to have political repercussions decades later when Tupamaros leaders emerged from prison to re-enter mainstream Uruguayan politics. The kidnapping and its aftermath attracted intense media coverage in Uruguay and Britain, coverage that affected public opinion profoundly. The treatment by the Uruguayan and British medias’ diverged, however. Uruguayan newspapers focused on political issues, mirrored the positions of various political parties, and showed the larger context of social, cultural and political forces that rocked Latin America in the 1960s and early 1970s. By contrast, the British press limited its attention mainly to the human drama. On the 30th anniversary of Sir Geoffrey Jackson's death, this study compares over one hundred major newspaper articles and suggests some reasons for the differences between Uruguayan and British media treatment in terms of the volume, content, and perspective as well in the effect on readers. The differences have persisted and continue to matter in present day coverage of terrorism and its victims.

Keywords: British Ambassador, Churchill Archives Centre, Sir Geoffrey Jackson, political kidnapping, Latin America in the 1960's, Tupamaro guerrillas, Uruguay

Procedia PDF Downloads 171
482 Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia

Authors: Daniel Alati

Abstract:

Recent high-profile terrorist events in Canada, the United Kingdom and Europe – the London Bridge attacks, the terrorist attacks in Nice, France and Barcelona, Spain, the 2014 Ottawa Parliament attacks and the 2017 attacks in Edmonton – have all raised levels of public and academic concern with so-called “lone-wolf” and “radicalized” terrorism. Similarly, several countries outside of the “Western” world have been dealing with radicalization to violent extremism for several years. Many South East Asian countries, including Indonesia, Malaysia, Singapore and the Philippines have all had experience with what might be described as ISIS or extremist-inspired acts of terrorism. Indeed, it appears the greatest strength of groups such as ISIS has been their ability to spread a global message of violent extremism that has led to radicalization in markedly different jurisdictions throughout the world. These markedly different jurisdictions have responded with counter-radicalization strategies that warrant further comparative analysis. This paper utilizes an inter-disciplinary legal methodology. In doing so, it compares legal, political, cultural and historical aspects of the counter-radicalization strategies employed by Canada, the United Kingdom and several South East Asian countries (Indonesia, Malaysia, Singapore and the Philippines). Whilst acknowledging significant legal and political differences between these jurisdictions, the paper engages in these analyses with an eye towards understanding which best practices might be shared between the jurisdictions. In doing so, it presents valuable findings of a comparative nature that are useful to both academic and practitioner audiences in several jurisdictions.

Keywords: Canada, United Kingdom and South East Asia, comparative law and politics, radicalization to violent extremism, terrorism

Procedia PDF Downloads 309
481 Sexual Violence against Men in Conflicts: A Neglected Serious Issue

Authors: Olalekan Olaluwoye, Joanne Williams, Elizabeth Hoban, Sonia Brockington

Abstract:

Cases of sexual violence against men have been reported in at least twenty-five conflict situations in history. However, there is a paucity of academic literature and minimal media, policy and legal discussions on sexual violence against men. Most studies and discussions remain locked in the ‘male perpetrators, female victims’ paradigm. Male victims continue to suffer the consequences of sexual violence in conflict and post-conflict settings in silence. A rigorous narrative systematic review of the literature revealed few studies on the subject and those that exist have a narrow focus on rape as the only form of sexual violence despite the existence of other forms of sexual violence that have equally devastating effects. This paper argues that while research and discussions on sexual violence against women should continue, it is time to conduct rigorous mixed methods research to understand the experiences of men and boys survivors of sexual violence. There is a need to study sexual violence more broadly, without limiting it to rape, and to understand the determinants and health implications of sexual violence perpetrated on men. The paper concludes by proposing a research approach that gives voice to the experiences of male survivors of sexual violence in conflict and post-conflict settings.

Keywords: conflict, male survivors, post-conflict settings, sexual violence

Procedia PDF Downloads 116
480 Investigation of Suicide by Poison as a Result of Domestic Violence

Authors: Nazih Ramadan, Ghada Hassabo

Abstract:

Background and Aims: Domestic violence and other forms of violence against women and other family members are known to be substantial and widespread, with women more likely than men to be abused mostly by their partner, which is known as gender-based violence. Domestic violence is a major precipitating factor for suicide in many communities especially in our Middle East area. The aim of the study is to show the real relation between suicidal attempts and domestic violence especially in female victims. We tried also through this study to know the most common age at which the abused person attempt suicide, the perpetrator, the educational level of the abused person, and the social level of them. Materials and Methods: In this study, we collect data from 150 victims of suicidal attempts who came to seek medical help at National Poisoning Center. They were asked to answer a preformed questionnaire after giving consent. Results: The study shows that women are at higher risk for suicidal behavior and that suicidal attempt is directly proportionate to low level of education and low social class situation. Conclusion: the study shows the strong relation between attempting suicide and exposure to domestic violence. At the end of this work, we recommend understanding the broad scope and tragic impact of domestic violence; further research is needed concerning domestic violence-related suicide.

Keywords: Cairo, domestic violence, domestic violence-related suicide, violence against women

Procedia PDF Downloads 254
479 The Value of Online News: Addressing the Problem of Online Investment Fraud Crimes in Thailand

Authors: Thapthep Paprach, Benya Lertsuwan

Abstract:

Investment fraud is not a new criminal, but there are still more victims during the Internet of Things era. This kind of criminal has been classified as a national and transnational financial crime problem all over the world. In Thailand, the country has also been attacked by this kind of crime. This research concerns whether the mass media that is supposed to cover news about online investment scams realized and warned Thais about this crime. Thus, this study explores the value of news about investment fraud in terms of frequency. The methodology uses web crawling from the top 5 news agency websites that have the most access. We pull out all information reporting about investment fraud. The findings revealed that the ‘Khaosod’ news agency was the first rank in reporting on investment crime. On the other hand, ‘Matichon’ was the least reported. Thairat news agencies frequently reported such criminals from midnight to very early in the morning, while other news agencies reported during the daytime. The results between the frequency of news reporting about investment fraud and the monthly number of victim reports are not correlated. Although the most cases reported to Thai police were in February 2023, but the most news reported was in January 2023. In conclusion, there might be a negative correlation between the amount of investment fraud news reported and the number of victims.

Keywords: investment fraud, news value, online news report, Ponzi schemes, Romance scam

Procedia PDF Downloads 40
478 The Status of the Actio Popularis under International Environmental Law in Cases of Damage to Global Commons

Authors: Aimite Jorge, Leenekela Usebiu

Abstract:

In recent years the International Community has seen a rise of what can be termed as ‘actio popularis”;that is to say lawsuits brought by third parties in the interest of the public or the world community as a whole, such as in cases of genocide and terrorism prosecutions under international law. It is equally clear that under current globalized world the effect of multinational activities on the environment is often felt beyond the borders of the territories where they operate. Equally true is the fact that the correspondence of citizens self-determination with national government is increasingly upset by the increasing willingness of states to share some ‘sovereign powers’ in order to address new economic, environmental and security interdependencies. The ‘unbundling’ of functional governance from fixed territories sees continuously citizens give up their formal approval of key decisions in exchange for a more remote, indirect say in supra-national or international decision-making bodies. The efforts to address a growing transnational flow of ecological harm are at the forefront of such indirect transformations, as evidenced by a proliferation of multilateral environmental agreements (MEAs) over the past three decades. However, unlike the defence of the global commons in cases of terrorism and genocide, there is still to be a clear application of action popularis in the case of environment, despite acknowledgement that the effect of the activities of several multinationals on the environment is as destructive to the global commons as genocide or terrorism are. Thus, this paper looking at specific cases of harmful degradation of the environment by certain multinationals transcending national boundaries, argues that it is high-time for a serious consideration of the application of the actio-popularis to environmental concerns. Although it is acknowledged that in international environmental law the challenge to reach a “critical mass” of recognition and support for an ‘actio-popularis’ for environment damage is particularly demanding, it is worth the try.

Keywords: actio popularis in environment law, global commons, transnational environmental damage, law and environment

Procedia PDF Downloads 528