Search results for: work theft
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13332

Search results for: work theft

13332 An Empirical Study on Employees’ Theft Behavior in Insurance Industry

Authors: B. Khorsandi Talab, M. Kordi

Abstract:

It is highly deplorable that every year, theft behavior among employees of the insurance industry is growing throughout the world. A very significant source of contraction (despite many costly technological and widespread security measures) needs to be addressed and prevented. Employee and agent theft cannot be ignored as it causes significant losses to employers. This study investigates the workplace factors that affect the insurance employee and agent theft behavior. Although identifying theft is difficult, this study will help employers to further understand employees’ theft behavior. This study was conducted in two service small and medium organizations (two branches of insurance companies) in ALBORZ’s capital city, KARAJ. Data has been collected via questionnaire from 30 employees and agents consisting employees and supervisors of branches and agencies. According to the results, it must be acknowledged that compensation, organizational justice, internal control systems, penalties and personal characteristics were associated with employees' theft behavior, it is despite the fact that, no effect could be assumed for organizational ethics and requirement in this case. Nevertheless, poor financial status cannot be considered as the driving factor in pushing employees to steal property as well as increasing their theft behavior. As mentioned earlier, the purpose of this study was to determine the factors contributing to employees’ theft (insurance employees and agencies) behavior in insurance organizations in Karaj.

Keywords: service theft, employee theft behavior, work theft, insurance agency, SMEs

Procedia PDF Downloads 411
13331 The Impact of Information Technology Monitoring on Employee Theft and Productivity

Authors: Ajayi Oluwasola Felix

Abstract:

This paper examines how firm investments in technology-based employee monitoring impact both misconduct and productivity. We use unique and detailed theft and sales data from 392 restaurant locations from five firms that adopt a theft monitoring information technology (IT) product. We use difference-in-differences (DD) models with staggered adoption dates to estimate the treatment effect of IT monitoring on theft and productivity. We find significant treatment effects in reduced theft and improved productivity that appear to be primarily driven by changed worker behavior rather than worker turnover. We examine four mechanisms that may drive this productivity result: economic and cognitive multitasking, fairness-based motivation, and perceived increases of general oversight. The observed productivity results represent substantial financial benefits to both firms and the legitimate tip-based earnings of workers. Our results suggest that employee misconduct is not solely a function of individual differences in ethics or morality, but can also be influenced by managerial policies that can benefit both firms and employees.

Keywords: information technology, monitoring, misconduct, employee theft

Procedia PDF Downloads 376
13330 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia

Authors: Saleh Dabil

Abstract:

This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: (1) the supermarket profile (volume, location, standard and type of the store), (2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), (3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first is ‘the well distributing of the duties and responsibilities between the employees especially for security purposes’. Second is ‘installation of strong security system’ and ‘making well-designed store layout’. Third is ‘giving training for general employees’ and ‘to give periodically security skills training of employees’. There are other suggestions in the study can be looked up in the text.

Keywords: organized crime, retail, theft, loss prevention, store environment

Procedia PDF Downloads 167
13329 Ethnic Minority, Oil Theft and Insecurity in the North: Where the Gap and the Compromise are

Authors: Elaiho Osaruwense, Ajuzie Godson Chidiebere

Abstract:

Nigeria of at least 250 ethnic group a have suffered a lot of social, economic and political setback especially in the regime of oil and gas, that are exploited from the minority region of the Niger south -south areas. The rate of insecurity in the north gives a lot of questioning and concern, with the series of killings by the Boko Haram in some part of the north etc. the fact still remains on how the gap and the compromise will be reconciling especially with the incoming president of Muhammadu Buhari with all the problems which was not resolve by the past administration (President Ebele Jonathan), considering the configuration and the character of the Nigerian state. This paper tends to critically evaluate all this problems, assertion, proffering possible solution.

Keywords: ethnic minority, oil theft, insecurity, the gap and the compromise

Procedia PDF Downloads 315
13328 A Convolutional Neural Network Based Vehicle Theft Detection, Location, and Reporting System

Authors: Michael Moeti, Khuliso Sigama, Thapelo Samuel Matlala

Abstract:

One of the principal challenges that the world is confronted with is insecurity. The crime rate is increasing exponentially, and protecting our physical assets especially in the motorist industry, is becoming impossible when applying our own strength. The need to develop technological solutions that detect and report theft without any human interference is inevitable. This is critical, especially for vehicle owners, to ensure theft detection and speedy identification towards recovery efforts in cases where a vehicle is missing or attempted theft is taking place. The vehicle theft detection system uses Convolutional Neural Network (CNN) to recognize the driver's face captured using an installed mobile phone device. The location identification function uses a Global Positioning System (GPS) to determine the real-time location of the vehicle. Upon identification of the location, Global System for Mobile Communications (GSM) technology is used to report or notify the vehicle owner about the whereabouts of the vehicle. The installed mobile app was implemented by making use of python as it is undoubtedly the best choice in machine learning. It allows easy access to machine learning algorithms through its widely developed library ecosystem. The graphical user interface was developed by making use of JAVA as it is better suited for mobile development. Google's online database (Firebase) was used as a means of storage for the application. The system integration test was performed using a simple percentage analysis. Sixty (60) vehicle owners participated in this study as a sample, and questionnaires were used in order to establish the acceptability of the system developed. The result indicates the efficiency of the proposed system, and consequently, the paper proposes the use of the system can effectively monitor the vehicle at any given place, even if it is driven outside its normal jurisdiction. More so, the system can be used as a database to detect, locate and report missing vehicles to different security agencies.

Keywords: CNN, location identification, tracking, GPS, GSM

Procedia PDF Downloads 125
13327 The Applicability of Western Environmental Criminology Theories to the Arabic Context

Authors: Nawaf Alotaibi, Andy Evans, Alison Heppenstall, Nick Malleson

Abstract:

Throughout the last two decades, motor vehicle theft (MVT) has accounted for the largest proportion of property crime incidents in Saudi Arabia (SA). However, to date, few studies have investigated SA’s MVT problem. Those that have are primarily focused on the characteristics of car thieves, and most have overlooked any spatial-temporal distribution of MVT incidents and the characteristics of victims. This paper represents the first step in understanding this problem by reviewing the existing MVT studies contextualised within the theoretical frameworks developed in environmental criminology theories – originating in the West – and exploring to what extent they are relevant to the SA context. To achieve this, the paper has identified a range of key features in SA that are different from typical Western contexts, that could limit the appropriateness and capability of applying existing environmental criminology theories. Furthermore, despite these Western studies reviewed so far having introduced a number of explanatory variables for MVT rates, a range of significant elements are apparently absent in the current literature and this requires further analysis. For example, almost no attempts have been made to quantify the associations between the locations of vehicle theft, recovery of stolen vehicles, joyriding and traffic volume.

Keywords: environmental criminology theories, motor vehicle theft, Saudi Arabia, spatial analysis

Procedia PDF Downloads 268
13326 Detection of Fuel Theft and Vehicle Position Using Third Party Monitoring Software

Authors: P. Senthilraja, C. Rukumani Khandhan, M. Palaniappan, S. L. Rama, P. Sai Sushimitha, R. Madhan, J. Vinumathi, N. Vijayarangan

Abstract:

Nowadays, the logistics achieve a vast improvement in efficient delivery of goods. The technology improvement also helps to improve its development, but still the owners of transport vehicles face problems, i.e., fuel theft in vehicles by the drivers or by an unknown person. There is no proper solution to overcome the problems. This scheme is to determine the amount of fuel that has been stolen and also to determine the position of the vehicle at a particular time using the technologies like GPS, GSM, ultrasonic fuel level sensor and numeric lock system. The ultrasonic sensor uses the ultrasonic waves to calculate the height of the tank up to which the fuel is available. Based on height it is possible to calculate the amount of fuel. The Global Positioning System (GPS) is a satellite-based navigation system. The scientific community uses GPS for its precision timing capability and position information. The GSM provides the periodic information about the fuel level. A numeric lock system has been provided for fuel tank opening lever. A password is provided to access the fuel tank lever and this is authenticated only by the driver and the owner. Once the fuel tank is opened an alert is sent to owner through a SMS including the timing details. Third party monitoring software is a user interface that updates the information automatically into the database which helps to retrieve the data as and when required. Third party monitoring software provides vehicle’s information to the owner and also shows the status of the vehicle. The techniques that are to be proposed will provide an efficient output. This project helps to overcome the theft and hence to put forth fuel economy.

Keywords: fuel theft, third party monitoring software, bioinformatics, biomedicine

Procedia PDF Downloads 365
13325 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 95
13324 Examining the Challenges Faced by Passengers Using Arik Air for International and Domestic Travel

Authors: Mahmud Hafsat Hussaini, Eldah Ephraim Eldah, Bata Zoakah Amina

Abstract:

This research work was aimed at examining the challenges faced by passengers using Arik air for domestic and international travels. Passengers do complain of delay flights, theft and rude behavior by Arik staff while on transit or in the process of travelling using the aircraft. Being the national carrier in Nigeria these behaviors have tarnished the image of the airline and makes travel experience to be challenging. Hundred survey questionnaires were administered to travellers who have used the airline for domestic and international flights. Findings show that the staff of the airline do lack customer care skills and are sometimes rude to customers. The airline does have different agents that book for international flights who delays confirming bookings even after payment. The website of the airline is mostly down and makes bookings difficult. Other findings related to the study are a delay of domestic flights within Nigeria. Passengers are sometimes kept for 8 hours in the airport due to delay of flights. The study, therefore, recommends that flight schedule should be adhered to and staff should be trained to meet of with passengers demand. The security of guest luggage at the airport should be put in place to avoid theft. An effective booking platform should be accessible to passengers for easy booking.

Keywords: examining, challenges, domestic, international, travels

Procedia PDF Downloads 186
13323 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria

Authors: Adebisi A. Sunday, Babajide Adeokin

Abstract:

The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.

Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer

Procedia PDF Downloads 101
13322 Piracy Killed the Radio Star: A System Archetype Analysis of Digital Music Theft

Authors: Marton Gergely

Abstract:

Digital experience goods, such as music and video, are readily available and easily accessible through a sundry of illegal mediums. Furthermore, the rate of music theft has been increasing at a seemingly unstoppable rate. Instead of studying the effect of copyright infringement on affected shareholders, this paper aims to examine the overall impact that digital music piracy has on society as a whole. Through a systems dynamics approach, an archetype is built to model the behavior of both legal and illegal music users. Additionally, the effects over time are considered. The conceptual model suggests that if piracy continues to grow at the current pace, industry shareholders will eventually lose the motivation to supply new music. In turn, this tragedy would affect not only the illegal players, but legal consumers as well, by means of a decrease in overall quality of life.

Keywords: music piracy, illegal downloading, tragedy of the commons, system archetypes

Procedia PDF Downloads 323
13321 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 114
13320 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 355
13319 Improving the Social Interactions of Students with Conduct Disorder in Dil Betigil Primary School

Authors: Dawit Thomas Lambamo

Abstract:

Conduct disorder has become a major health and social problem; it is the most common psychiatric problem diagnosed among students which affect the academic and social interaction of students. This intervention was conducted in Dil Betigil primary school. After identifying six students with conduct disorder in Dil Betigil primary school, the intervention was conducted using a true experimental research design specifically pretest and posttest control group design. Data from teachers and parents of the students with conduct disorder were collected using adapted conduct disorder scale and semi-structured interview. The independent sample t-test of Pretest results of both experimental and control group indicated that there is no statistically significant difference between experimental and control groups. Intervention is carried out to enhance their social interaction and to decrees aggressive, a serious violation of rules and theft behavior of students in collaboration with teachers and parents. After six intervention weeks the post-test result showed that there was statistically significant difference in aggression and serious violation between the experimental and control groups, but there was no statistically significant mean difference regarding deceitful or theft between the experimental and control group.

Keywords: conduct, disorder, social interaction, interaction

Procedia PDF Downloads 287
13318 Design and Development of an Autonomous Underwater Vehicle for Irrigation Canal Monitoring

Authors: Mamoon Masud, Suleman Mazhar

Abstract:

Indus river basin’s irrigation system in Pakistan is extremely complex, spanning over 50,000 km. Maintenance and monitoring of this demands enormous resources. This paper describes the development of a streamlined and low-cost autonomous underwater vehicle (AUV) for the monitoring of irrigation canals including water quality monitoring and water theft detection. The vehicle is a hovering-type AUV, designed mainly for monitoring irrigation canals, with fully documented design and open source code. It has a length of 17 inches, and a radius of 3.5 inches with a depth rating of 5m. Multiple sensors are present onboard the AUV for monitoring water quality parameters including pH, turbidity, total dissolved solids (TDS) and dissolved oxygen. A 9-DOF Inertial Measurement Unit (IMU), GY-85, is used, which incorporates an Accelerometer (ADXL345), a Gyroscope (ITG-3200) and a Magnetometer (HMC5883L). The readings from these sensors are fused together using directional cosine matrix (DCM) algorithm, providing the AUV with the heading angle, while a pressure sensor gives the depth of the AUV. 2 sonar-based range sensors are used for obstacle detection, enabling the vehicle to align itself with the irrigation canals edges. 4 thrusters control the vehicle’s surge, heading and heave, providing 3 DOF. The thrusters are controlled using a proportional-integral-derivative (PID) feedback control system, with heading angle and depth being the controller’s input and the thruster motor speed as the output. A flow sensor has been incorporated to monitor canal water level to detect water-theft event in the irrigation system. In addition to water theft detection, the vehicle also provides information on water quality, providing us with the ability to identify the source(s) of water contamination. Detection of such events can provide useful policy inputs for improving irrigation efficiency and reducing water contamination. The AUV being low cost, small sized and suitable for autonomous maneuvering, water level and quality monitoring in the irrigation canals, can be used for irrigation network monitoring at a large scale.

Keywords: the autonomous underwater vehicle, irrigation canal monitoring, water quality monitoring, underwater line tracking

Procedia PDF Downloads 116
13317 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 26
13316 Demographic Determinants of Spatial Patterns of Urban Crime

Authors: Natalia Sypion-Dutkowska

Abstract:

Abstract — The main research objective of the paper is to discover the relationship between the age groups of residents and crime in particular districts of a large city. The basic analytical tool is specific crime rates, calculated not in relation to the total population, but for age groups in a different social situation - property, housing, work, and representing different generations with different behavior patterns. They are the communities from which criminals and victims of crimes come. The analysis of literature and national police reports gives rise to hypotheses about the ability of a given age group to generate crime as a source of offenders and as a group of victims. These specific indicators are spatially differentiated, which makes it possible to detect socio-demographic determinants of spatial patterns of urban crime. A multi-feature classification of districts was also carried out, in which specific crime rates are the diagnostic features. In this way, areas with a similar structure of socio-demographic determinants of spatial patterns on urban crime were designated. The case study is the city of Szczecin in Poland. It has about 400,000 inhabitants and its area is about 300 sq km. Szczecin is located in the immediate vicinity of Germany and is the economic, academic and cultural capital of the region. It also has a seaport and an airport. Moreover, according to ESPON 2007, Szczecin is the Transnational and National Functional Urban Area. Szczecin is divided into 37 districts - auxiliary administrative units of the municipal government. The population of each of them in 2015-17 was divided into 8 age groups: babes (0-2 yrs.), children (3-11 yrs.), teens (12-17 yrs.), younger adults (18-30 yrs.), middle-age adults (31-45 yrs.), older adults (46-65 yrs.), early older (66-80) and late older (from 81 yrs.). The crimes reported in 2015-17 in each of the districts were divided into 10 groups: fights and beatings, other theft, car theft, robbery offenses, burglary into an apartment, break-in into a commercial facility, car break-in, break-in into other facilities, drug offenses, property damage. In total, 80 specific crime rates have been calculated for each of the districts. The analysis was carried out on an intra-city scale, this is a novel approach as this type of analysis is usually carried out at the national or regional level. Another innovative research approach is the use of specific crime rates in relation to age groups instead of standard crime rates. Acknowledgments: This research was funded by the National Science Centre, Poland, registration number 2019/35/D/HS4/02942.

Keywords: age groups, determinants of crime, spatial crime pattern, urban crime

Procedia PDF Downloads 145
13315 On the Estimation of Crime Rate in the Southwest of Nigeria: Principal Component Analysis Approach

Authors: Kayode Balogun, Femi Ayoola

Abstract:

Crime is at alarming rate in this part of world and there are many factors that are contributing to this antisocietal behaviour both among the youths and old. In this work, principal component analysis (PCA) was used as a tool to reduce the dimensionality and to really know those variables that were crime prone in the study region. Data were collected on twenty-eight crime variables from National Bureau of Statistics (NBS) databank for a period of fifteen years, while retaining as much of the information as possible. We use PCA in this study to know the number of major variables and contributors to the crime in the Southwest Nigeria. The results of our analysis revealed that there were eight principal variables have been retained using the Scree plot and Loading plot which implies an eight-equation solution will be appropriate for the data. The eight components explained 93.81% of the total variation in the data set. We also found that the highest and commonly committed crimes in the Southwestern Nigeria were: Assault, Grievous Harm and Wounding, theft/stealing, burglary, house breaking, false pretence, unlawful arms possession and breach of public peace.

Keywords: crime rates, data, Southwest Nigeria, principal component analysis, variables

Procedia PDF Downloads 410
13314 Patterns of Problem Behavior of Out-Of-School Adolescents and Gender Difference in South Korea

Authors: Jaeyoung Lee, Minji Je

Abstract:

Objectives: The adolescents not attending school are named out-of-school adolescents. They are more vulnerable to health management and are likely to be exposed to a number of risk factors. This study was conducted to investigate the problem behavior of out-of-school adolescents and analyze the difference caused by gender. Methods: In this study, the problem behaviors of out-of-school adolescents, the vulnerable class, were defined in 8 types and based on this definition, the survey on run away from home, drop out, prostitution, violence, internet game addiction, theft, drug addiction, and smoking was conducted. The study was conducted in a total of 507 out-of-school adolescents, including 342 males, and 165 females. The type, frequency and start time of the 8 problem behaviors were identified. The collected data were analyzed with chi-square test and t-test using SPSS statistics 22. Results: Among the problem behaviors of the subjects, violence ( =17.41, p < .001), internet game addiction ( =16.14, p < .001), theft ( =22.48, p < .001), drug addiction ( =4.17, p=.041), and smoking ( =3.90, p=.048) were more significantly high in male out-of-school adolescents than female out-of-school adolescents. In addition, the frequency of the problem behavior was higher in male out-of-school adolescents with statistical significance than in female out-of-school adolescents (t=5.08, p= < .001). In terms of the start time of the problem behavior, only internet game addiction was higher in male out-of-school adolescents with the statistical significance than in female out-of-school adolescents ( =6.22, p=.032). No statistically significant difference was found in other problem behaviors (p > .05). Conclusions: In this study, it was found that gender difference in problem behaviors of out-of-school adolescents exists, and its frequency and difference of types were identified. When the social countermeasures were provided for those adolescents, a distinguished approach is required depending on the patterns of problem behavior and gender. When preparing policy alternatives and interventions for out-of-school adolescents, it is required to reflect the results of this study.

Keywords: addictive behavior, adolescent, gender, problem behavior

Procedia PDF Downloads 176
13313 Implementation of Proof of Work Using Ganache

Authors: Sakshi Singh, Shampa Chakraverty

Abstract:

One of the essential characteristics of Blockchain is the ability to validate the integrity of new transactions added to the Blockchain. Moreover, one of the essential consensus algorithms, Proof of Work, performs this job. In this work, we implemented the Proof of Work consensus method on the block formed by performing the transaction using Ganache. The primary goal of this implementation is to understand the process and record how Proof of Work works in reality on newly created blocks.

Keywords: proof of work, blockchain, ganache, smart contract

Procedia PDF Downloads 118
13312 A Regulatory Analysis on Legal Problems of BitCoin

Authors: Fady Tawakol

Abstract:

BitCoin is a decentralized cryptocurrency that can be used without the need of traditional central banks to accomplish any e-commerce trade. The use of such currency could facilitate new economic interactions and linkages. However, without effective and efficient regulations, cryptocurrency transactions are mostly used by criminals to commit crimes such as money laundering, theft, and blackmailing. And because law is one step behind technological developments, this paper discusses the importance of regulations and supervision for the BitCoin-system, to provide unified regulatory solutions for our digital future in the Middle East. It will provide a detailed analysis of the legal nature of BitCoin along with, its regulation with respect to criminal and civil law.

Keywords: BitCoin, financial protection, crypto currency, money laundering

Procedia PDF Downloads 182
13311 Answering the Call for Empirical Evidence: Burnout, Context and Remote Work

Authors: Clif P. Lewis, Ise-Lu Möller

Abstract:

The COVID-19 pandemic has had a profound impact on employment. The ‘future of work’ is now the ‘present of work’. Changes in the social context within which organisations are embedded necessitated drastic changes in how we work. Through the leveraging of technology and changes in mindset, we have seen exciting innovations in the world of work. This global shift in the context of employment offers a unique opportunity to examine a key unresolved issue in the study of Burnout, namely contextual antecedents. This study answers the call for deeper empirical insight into the contexts within which Burnout occur. We explore the emergence of Burnout within a remote work context by using survey data that incorporates the latest global work trends into the Areas of Worklife framework.

Keywords: burnout, remote work, pandemic, wellness

Procedia PDF Downloads 144
13310 Reforming the Law to Allow a Duress Defence to Those Committing Crime under Coercive Control

Authors: Amy Elkington

Abstract:

Women in abusive relationships who commit crimes under duress are unfairly treated by the English legal system. Despite the offence of Coercive Control being introduced in 2015 that recognises that a woman’s autonomy has been eroded, coercion is no longer a defence to women who feel compelled to act due to their partner’s behavior or abuse. This problem is intensified by the fact that women in abusive relationships are more likely to commit crimes to ensure their survival. Furthermore, the very fact that they are ‘associating’ with their abusive partners means that they are excluded from pleading a defence of duress. Women who kill their abusers may be able to reduce their conviction from murder to manslaughter, but this depends on successfully pleading either loss of control or diminished responsibility, both not without their issues, but this does not provide a defence where a lesser crime is committed. Self-defence is also widely unavailable to either murder or non-fatal offences, as the amount of force used is often deemed disproportionate because women are more likely to use weapons in their defence. Regardless, this would not provide a defence where the crime committed is one such as theft. An alternative that has been proposed would be to introduce a new defence that would work similarly to the exemption to prosecution afforded to those who are trafficked that commit crime under duress. Despite having support in the Lords in March 2021, this recommendation has been rejected by the Government on the basis that it would not achieve an appropriate balance of justice. The result is that abused women who commit crime are left without an appropriate defence. A doctrinal approach highlights the injustices in these types of cases and concludes that it is time for the current law of duress to change.

Keywords: coercive control, crime, defences, duress

Procedia PDF Downloads 169
13309 Long Hours Impact on Work-Life Balance

Authors: Syeda Faiza Gardazi, Syed Ahsan Ali Gardazi, Ajmal Waheed

Abstract:

The trend of overtime is increasing among workers due to more pressure to perform workloads, job insecurity, and financial issues. Overtime work affects the work-life balance conflict negatively as well positively. Work-life balance conflict has become an important issue as traditional work and family roles have changed. The purpose of the current research was to study the impact of overtime work on work-life balance conflict along with the moderating role of job satisfaction. For this purpose, data is collected from the employees working in different public and private sectors of Pakistan using simple random sampling technique. Descriptive statistics was used for data presentation and analysis. Correlation and regression analysis were used to test four research hypotheses proposed on the basis of research framework. The findings led to the acceptance of four hypotheses. The results show that high working hours and overtime in general lead to high work-life balance conflict. Moreover, job satisfaction moderates the relationship between overtime work and work-life balance conflict.

Keywords: family to work conflict, overtime work, work to family conflict, work-life balance conflict

Procedia PDF Downloads 221
13308 Conductivity and Selection of Copper Clad Steel Wires for Grounding Applications

Authors: George Eduful, Kingsford J. A. Atanga

Abstract:

Copper clad steel wire (CCS) is primarily used for grounding applications to reduce the high incidence of copper ground conductor theft in electrical installations. The cross sectional area of the CCS is selected by relating the diameter equivalence to a copper conductor. The main difficulty is how to use a simple analytical relation to determine the right conductivity of CCS for a particular application. The use of Eddy-Current instrument for measuring conductivity is known but in most cases, the instrument is not readily available. The paper presents a simplified approach on how to size and determine CCS conductivity for a given application.

Keywords: copper clad steel wire, conductivity, grounding, skin effect

Procedia PDF Downloads 252
13307 Effect of Social Media on Knowledge Work

Authors: Pekka Makkonen, Georgios Lampropoulos, Kerstin Siakas

Abstract:

This paper examines the impact of social media on knowledge work. It discloses and highlights which specific aspects, areas and tasks of knowledge work can be improved by the use of social media. Moreover, the study includes a survey about higher education students’ viewpoints in regard to the use of social media as a means to enhance knowledge work and knowledge sharing. The analysis has been conducted based both on empirical data and on discussions about the sources dealing with knowledge work and how it can be enhanced by using social media. The results show that social media can improve knowledge work, knowledge building and maintenance tasks in which communication, information sharing and collaboration play a vital role. Additionally, by using social media, personal, collaborative and supplementary work activities can be enhanced. Based on the results of the study, we suggest how knowledge work can be enhanced when using the contemporary information and communications technologies (ICTs) of the 21st century and recommend future directions towards improving knowledge work.

Keywords: knowledge work, social media, social media services, improving work performance

Procedia PDF Downloads 126
13306 Who Am I at Work: Work Identity Formation

Authors: Carol Belle-Hallsworth

Abstract:

Human interaction at work evolves over time and, with it, work identity. The social identity is built upon the development of its underpinning and preceding stages. Work identity can be viewed in the same way and will shift based on changes in the work environment and challenges to the work identity (threats to the four stages). This paper provides an analysis of how the stages of trust, autonomy, industry and initiative are related to the employee identity at work. Describing how they are related to each other and the development of identity. It has become common to notice changes in employee behavior during and after major operational changes in an organization. Previous studies suggest that there are emotional triggers that result in the new behaviors displayed. This study seeks to test a theoretical model by testing the relationship between the first four Erikson stages as constructs. A randomized sample of participants undertook a self-administered survey to capture information on trust, autonomy, initiative, and industry.

Keywords: work identity, change management, organizational management, technology implementation

Procedia PDF Downloads 268
13305 History, Challenges and Solutions for Social Work Education and Recognition in Vietnam

Authors: Thuy Bui Anh, Ngan Nguyen Thi Thanh

Abstract:

Currently, social work in Vietnam is entering the first step in the development process to become a true profession with a strong position in society. However, Spirit of helping and sharing of social work has already existed in the daily life of Vietnamese people for a very long time, becoming a precious heritage passed down from ancestors to the next generations while expanding the territory, building and defending for the country. Following the stream of history, charity work in Vietnam has gradually transformed itself towards a more professional work, especially in the last 2 decades. Accordingly, more than 50 universities and educational institutions in Vietnam have been licensed to train social work, ensuring a stronger foundation on human resources working in this field. Despite the strong growth, social work profession, social work education and the recognition of the role of the social workers still need to be fueled to develop, responded to the increasing demand of Vietnam society.

Keywords: education, history, recognition, social work, Vietnam

Procedia PDF Downloads 296
13304 Effectiveness of an Unorthodox Intervention for Work-Family Interaction: A Field Experiment

Authors: Hassan Rasool

Abstract:

There is limited research in the intervention domain of work family interaction. We identified that meditation could be effective in coping work family conflict and nurturing work family facilitation across domains. We conducted pretest posttest control group field experiment on a sample of sixty employees to test the effectiveness of meditation in a financial sector organization. Empirical evidence confirms that the intervention was effective in coping work family conflict & nurturing facilitation across work & home domains. The intervention, also positively affected a known outcome (i.e. satisfaction at work and home) of work family interaction. Future research perspectives on the use of unorthodox interventions in the domain of work family interaction are also discussed.

Keywords: work family interaction, meditation, satisfaction, experiment

Procedia PDF Downloads 424
13303 Conflating Voluntary Sex Work and Trafficked Sex Work in Malaysia

Authors: Haezreena Begum Abdul Hamid

Abstract:

This article will explore the conflation between voluntary sex work and trafficked sex work. In doing so, the article will analyse the meaning of trafficking according to the United Nations ‘Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children’ and the Malaysian Anti-Trafficking in Persons and Anti-Migrant Smuggling Act, 2007 (ATIP), and discuss the ambiguities that may arise in understanding the term. While the law on human trafficking has long been understood by scholars, key stakeholders, and enforcement officers, identifying a victim of trafficking is far from being straight forward. This is because of the diverse understanding on sex trafficking and sex work, and the fact that ‘consent’ by trafficked persons remains irrelevant in cases of trafficking. As a result, women who voluntarily engage in sex work are sometimes categorised as ‘trafficked’ and are ‘rescued’ by the authorities in the name of ‘protection’, while those who insist of having agency can be charged for violating the immigration laws. In light of such circumstances, this article aims to explore the conflation between voluntary sex work and trafficked sex work and how such conflation have succeeded in fostering distrust between sex workers and authorities.

Keywords: voluntary sex work, trafficked sex work, sex work, coercion, protection

Procedia PDF Downloads 210