CINXE.COM

Search results for: war criminals

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: war criminals</title> <meta name="description" content="Search results for: war criminals"> <meta name="keywords" content="war criminals"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="war criminals" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="war criminals"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 80</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: war criminals</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">80</span> Moral Wrongdoers: Evaluating the Value of Moral Actions Performed by War Criminals</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jean-Francois%20Caron">Jean-Francois Caron</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This text explores the value of moral acts performed by war criminals, and the extent to which they should alleviate the punishment these individuals ought to receive for violating the rules of war. Without neglecting the necessity of retribution in war crimes cases, it argues from an ethical perspective that we should not rule out the possibility of considering lesser punishments for war criminals who decide to perform a moral act, as it might produce significant positive moral outcomes. This text also analyzes how such a norm could be justified from a moral perspective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=war%20criminals" title="war criminals">war criminals</a>, <a href="https://publications.waset.org/abstracts/search?q=pardon" title=" pardon"> pardon</a>, <a href="https://publications.waset.org/abstracts/search?q=amnesty" title=" amnesty"> amnesty</a>, <a href="https://publications.waset.org/abstracts/search?q=retribution" title=" retribution"> retribution</a> </p> <a href="https://publications.waset.org/abstracts/73157/moral-wrongdoers-evaluating-the-value-of-moral-actions-performed-by-war-criminals" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73157.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">79</span> The Anatomy and Characteristics of Online Romance Scams</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Danuvasin%20Charoen">Danuvasin Charoen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Online romance scams are conducted by criminals using social networks and dating sites. These criminals use love to deceive the victims to send them money. The victims not only lose money to the criminals, but they are also heartbroken. This study investigates how online romance scams work and why people become victims to them. The researcher also identifies the characteristics of the perpetrators and victims. The data were collected from in-depth interviews with former victims and police officers responsible for the cases. By studying the methods and characteristics of the online romance scam, we can develop effective methods and policies to reduce the rates of such crimes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=romance%20scam" title="romance scam">romance scam</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20scam" title=" online scam"> online scam</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing" title=" phishing"> phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title=" cybercrime"> cybercrime</a> </p> <a href="https://publications.waset.org/abstracts/134736/the-anatomy-and-characteristics-of-online-romance-scams" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134736.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">157</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">78</span> Determining the Effectiveness of Dialectical Behavior Therapy in Reducing the Psychopathic Deviance of Criminals</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Setareh%20Gerayeli">Setareh Gerayeli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present study tries to determine the effectiveness of dialectical behavior therapy in reducing the psychopathic deviance of employed criminals released from prison. The experimental method was used in this study, and the statistical population included employed criminals released from prison in Mashhad. Thirty offenders were selected randomly as the samples of the study. The MMPI-2 was used to collect data in the pre-test and post-test stages. The behavioral therapy was conducted on the experimental group during fourteen two and a half hour sessions, while the control group did not receive any intervention. Data analysis was conducted by using covariance. The results showed there is a significant difference between the post-test mean scores of the two groups. The findings suggest that dialectical behavior therapy is effective in reducing psychopathic deviance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminals" title="criminals">criminals</a>, <a href="https://publications.waset.org/abstracts/search?q=dialectical%20behavior%20therapy" title=" dialectical behavior therapy"> dialectical behavior therapy</a>, <a href="https://publications.waset.org/abstracts/search?q=psychopathic%20deviance" title=" psychopathic deviance"> psychopathic deviance</a>, <a href="https://publications.waset.org/abstracts/search?q=prison" title=" prison"> prison</a> </p> <a href="https://publications.waset.org/abstracts/137697/determining-the-effectiveness-of-dialectical-behavior-therapy-in-reducing-the-psychopathic-deviance-of-criminals" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137697.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">232</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">77</span> Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Modesta%20E.%20Ezema">Modesta E. Ezema</a>, <a href="https://publications.waset.org/abstracts/search?q=Christopher%20C.%20Ezema"> Christopher C. Ezema</a>, <a href="https://publications.waset.org/abstracts/search?q=Christian%20C.%20Ugwu"> Christian C. Ugwu</a>, <a href="https://publications.waset.org/abstracts/search?q=Udoka%20F.%20Eze"> Udoka F. Eze</a>, <a href="https://publications.waset.org/abstracts/search?q=Florence%20M.%20Babalola"> Florence M. Babalola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data" title="data">data</a>, <a href="https://publications.waset.org/abstracts/search?q=employee" title=" employee"> employee</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=work%20place" title=" work place"> work place</a> </p> <a href="https://publications.waset.org/abstracts/61588/strategic-workplace-security-the-role-of-malware-and-the-threat-of-internal-vulnerability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61588.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">383</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">76</span> The Impact of Cryptocurrency Classification on Money Laundering: Analyzing the Preferences of Criminals for Stable Coins, Utility Coins, and Privacy Tokens</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Saad">Mohamed Saad</a>, <a href="https://publications.waset.org/abstracts/search?q=Huda%20Ismail"> Huda Ismail</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this research is to examine the impact of cryptocurrency classification on money laundering crimes and to analyze how the preferences of criminals differ according to the type of digital currency used. Specifically, we aim to explore the roles of stablecoins, utility coins, and privacy tokens in facilitating or hindering money laundering activities and to identify the key factors that influence the choices of criminals in using these cryptocurrencies. To achieve our research objectives, we used a dataset for the most highly traded cryptocurrencies (32 currencies) that were published on the coin market cap for 2022. In addition to conducting a comprehensive review of the existing literature on cryptocurrency and money laundering, with a focus on stablecoins, utility coins, and privacy tokens, Furthermore, we conducted several Multivariate analyses. Our study reveals that the classification of cryptocurrency plays a significant role in money laundering activities, as criminals tend to prefer certain types of digital currencies over others, depending on their specific needs and goals. Specifically, we found that stablecoins are more commonly used in money laundering due to their relatively stable value and low volatility, which makes them less risky to hold and transfer. Utility coins, on the other hand, are less frequently used in money laundering due to their lack of anonymity and limited liquidity. Finally, privacy tokens, such as Monero and Zcash, are increasingly becoming a preferred choice among criminals due to their high degree of privacy and untraceability. In summary, our study highlights the importance of understanding the nuances of cryptocurrency classification in the context of money laundering and provides insights into the preferences of criminals in using digital currencies for illegal activities. Based on our findings, our recommendation to the policymakers is to address the potential misuse of cryptocurrencies for money laundering. By implementing measures to regulate stable coins, strengthening cross-border cooperation, fostering public-private partnerships, and increasing cooperation, policymakers can help prevent and detect money laundering activities involving digital currencies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime" title="crime">crime</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title=" cryptocurrency"> cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title=" money laundering"> money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=tokens." title=" tokens."> tokens.</a> </p> <a href="https://publications.waset.org/abstracts/165802/the-impact-of-cryptocurrency-classification-on-money-laundering-analyzing-the-preferences-of-criminals-for-stable-coins-utility-coins-and-privacy-tokens" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165802.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">75</span> Measuring the Height of a Person in Closed Circuit Television Video Footage Using 3D Human Body Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dojoon%20Jung">Dojoon Jung</a>, <a href="https://publications.waset.org/abstracts/search?q=Kiwoong%20Moon"> Kiwoong Moon</a>, <a href="https://publications.waset.org/abstracts/search?q=Joong%20Lee"> Joong Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The height of criminals is one of the important clues that can determine the scope of the suspect's search or exclude the suspect from the search target. Although measuring the height of criminals by video alone is limited by various reasons, the 3D data of the scene and the Closed Circuit Television (CCTV) footage are matched, the height of the criminal can be measured. However, it is still difficult to measure the height of CCTV footage in the non-contact type measurement method because of variables such as position, posture, and head shape of criminals. In this paper, we propose a method of matching the CCTV footage with the 3D data on the crime scene and measuring the height of the person using the 3D human body model in the matched data. In the proposed method, the height is measured by using 3D human model in various scenes of the person in the CCTV footage, and the measurement value of the target person is corrected by the measurement error of the replay CCTV footage of the reference person. We tested for 20 people's walking CCTV footage captured from an indoor and an outdoor and corrected the measurement values with 5 reference persons. Experimental results show that the measurement error (true value-measured value) average is 0.45 cm, and this method is effective for the measurement of the person's height in CCTV footage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20height" title="human height">human height</a>, <a href="https://publications.waset.org/abstracts/search?q=CCTV%20footage" title=" CCTV footage"> CCTV footage</a>, <a href="https://publications.waset.org/abstracts/search?q=2D%2F3D%20matching" title=" 2D/3D matching"> 2D/3D matching</a>, <a href="https://publications.waset.org/abstracts/search?q=3D%20human%20body%20model" title=" 3D human body model"> 3D human body model</a> </p> <a href="https://publications.waset.org/abstracts/93625/measuring-the-height-of-a-person-in-closed-circuit-television-video-footage-using-3d-human-body-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93625.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">248</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">74</span> Digital Forensic Exploration Framework for Email and Instant Messaging Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Manesh">T. Manesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdalla%20A.%20Alameen"> Abdalla A. Alameen</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Mohemmed%20Sha"> M. Mohemmed Sha</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Mohamed%20Mustaq%20Ahmed"> A. Mohamed Mustaq Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensics" title="forensics">forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20sessions" title=" network sessions"> network sessions</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20reconstruction" title=" packet reconstruction"> packet reconstruction</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20reordering" title=" packet reordering"> packet reordering</a> </p> <a href="https://publications.waset.org/abstracts/57591/digital-forensic-exploration-framework-for-email-and-instant-messaging-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">73</span> Cybercrimes in Nigeria: Its Causes, Effects and Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uzoma%20Igboji">Uzoma Igboji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-crimes" title="cyber-crimes">cyber-crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-terrorism" title=" cyber-terrorism"> cyber-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-criminals" title=" cyber-criminals"> cyber-criminals</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/22647/cybercrimes-in-nigeria-its-causes-effects-and-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">538</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">72</span> Offenders and Victims in Public Focus: Media Coverage about Crime and Its Consequences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Melanie%20Verhovnik">Melanie Verhovnik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Media shape the image of crime, peoples’ believes, attitudes and sometimes also behaviors. Media not only gives the impression that crime is increasing, it also suggest that very violent crime is more common than it actually is. It is also no wonder that humans are more afraid of being involved in a crime committed by strangers than committed by somebody they know – because this is the media construct. With the help of three case studies, the paper analyzes how media frames crime and criminals and gives valuable hints as to what better reporting could look like. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=court%20reporting" title="court reporting">court reporting</a>, <a href="https://publications.waset.org/abstracts/search?q=offenders%20in%20media" title=" offenders in media"> offenders in media</a>, <a href="https://publications.waset.org/abstracts/search?q=quantitative%20content%20analysis" title=" quantitative content analysis"> quantitative content analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=victims%20in%20media" title=" victims in media "> victims in media </a> </p> <a href="https://publications.waset.org/abstracts/31791/offenders-and-victims-in-public-focus-media-coverage-about-crime-and-its-consequences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31791.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">71</span> Exploring Military Crime in the Australian Imperial Force by Officers During The First World War</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Des%20Lambley">Des Lambley</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The scope and scale of crime in the AIF is a subject largely overlooked by historians preferring to narrate the macro-scale topics. This examination exposes some 17,000 military criminals, 414 of them officers and illustrates how military law imposed itself. This subjective sociological perspective humanises the impacts of war upon soldiers. Examples of the crimes, their seriousness, punishments and military justice tell of cause and effect linkages between crime, stress and illness. The discourse is derived from original official military sources in the Australian Archives. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Australia" title="Australia">Australia</a>, <a href="https://publications.waset.org/abstracts/search?q=AIF" title="AIF">AIF</a>, <a href="https://publications.waset.org/abstracts/search?q=Military%20Crime" title="Military Crime">Military Crime</a>, <a href="https://publications.waset.org/abstracts/search?q=WW1" title="WW1">WW1</a>, <a href="https://publications.waset.org/abstracts/search?q=Officers" title="Officers">Officers</a> </p> <a href="https://publications.waset.org/abstracts/147768/exploring-military-crime-in-the-australian-imperial-force-by-officers-during-the-first-world-war" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147768.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">70</span> The Impact of the COVID-19 on the Cybercrimes in Hungary and the Possible Solutions for Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=L%C3%A1szl%C3%B3%20Schmidt">László Schmidt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Technological and digital innovation is constantly and dynamically evolving, which poses an enormous challenge to both lawmaking and law enforcement. To legislation because artificial intelligence permeates many areas of people’s daily lives that the legislator must regulate. it can see how challenging it is to regulate e.g. self-driving cars/taxis/camions etc. Not to mention cryptocurrencies and Chat GPT, the use of which also requires legislative intervention. Artificial intelligence also poses an extraordinary challenge to law enforcement. In criminal cases, police and prosecutors can make great use of AI in investigations, e.g. in forensics, DNA samples, reconstruction, identification, etc. But it can also be of great help in the detection of crimes committed in cyberspace. In the case of cybercrime, on the one hand, it can be viewed as a new type of crime that can only be committed with the help of information systems, and that has a specific protected legal object, such as an information system or data. On the other hand, it also includes traditional crimes that are much easier to commit with the help of new tools. According to Hungarian Criminal Code section 375 (1), any person who, for unlawful financial gain, introduces data into an information system, or alters or deletes data processed therein, or renders data inaccessible, or otherwise interferes with the functioning of the information system, and thereby causes damage, is guilty of a felony punishable by imprisonment not exceeding three years. The Covid-19 coronavirus epidemic has had a significant impact on our lives and our daily lives. It was no different in the world of crime. With people staying at home for months, schools, restaurants, theatres, cinemas closed, and no travel, criminals have had to change their ways. Criminals were committing crimes online in even greater numbers than before. These crimes were very diverse, ranging from false fundraising, the collection and misuse of personal data, extortion to fraud on various online marketplaces. The most vulnerable age groups (minors and elderly) could be made more aware and prevented from becoming victims of this type of crime through targeted programmes. The aim of the study is to show the Hungarian judicial practice in relation to cybercrime and possible preventive solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title="cybercrime">cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=Hungary" title=" Hungary"> Hungary</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20law" title=" criminal law"> criminal law</a> </p> <a href="https://publications.waset.org/abstracts/172171/the-impact-of-the-covid-19-on-the-cybercrimes-in-hungary-and-the-possible-solutions-for-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172171.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">60</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">69</span> The Linguistic Fingerprint in Western and Arab Judicial Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asem%20Bani%20Amer">Asem Bani Amer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study handles the linguistic fingerprint in judicial applications described in a law technicality that is recent and developing. It can be adopted to discover criminals by identifying their way of speaking and their special linguistic expressions. This is achieved by understanding the expression "linguistic fingerprint," its concept, and its extended domain, then revealing some of the linguistic fingerprint tools in Western judicial applications and deducing a technical imagination for a linguistic fingerprint in the Arabic language, which is needy for such judicial applications regarding this field, through dictionaries, language rhythm, and language structure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=linguistic%20fingerprint" title="linguistic fingerprint">linguistic fingerprint</a>, <a href="https://publications.waset.org/abstracts/search?q=judicial" title=" judicial"> judicial</a>, <a href="https://publications.waset.org/abstracts/search?q=application" title=" application"> application</a>, <a href="https://publications.waset.org/abstracts/search?q=dictionary" title=" dictionary"> dictionary</a>, <a href="https://publications.waset.org/abstracts/search?q=picture" title=" picture"> picture</a>, <a href="https://publications.waset.org/abstracts/search?q=rhythm" title=" rhythm"> rhythm</a>, <a href="https://publications.waset.org/abstracts/search?q=structure" title=" structure"> structure</a> </p> <a href="https://publications.waset.org/abstracts/162132/the-linguistic-fingerprint-in-western-and-arab-judicial-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162132.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">68</span> A Regulatory Analysis on Legal Problems of BitCoin</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fady%20Tawakol">Fady Tawakol</a> </p> <p class="card-text"><strong>Abstract:</strong></p> BitCoin is a decentralized cryptocurrency that can be used without the need of traditional central banks to accomplish any e-commerce trade. The use of such currency could facilitate new economic interactions and linkages. However, without effective and efficient regulations, cryptocurrency transactions are mostly used by criminals to commit crimes such as money laundering, theft, and blackmailing. And because law is one step behind technological developments, this paper discusses the importance of regulations and supervision for the BitCoin-system, to provide unified regulatory solutions for our digital future in the Middle East. It will provide a detailed analysis of the legal nature of BitCoin along with, its regulation with respect to criminal and civil law. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=BitCoin" title="BitCoin">BitCoin</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20protection" title=" financial protection"> financial protection</a>, <a href="https://publications.waset.org/abstracts/search?q=crypto%20currency" title=" crypto currency"> crypto currency</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title=" money laundering"> money laundering</a> </p> <a href="https://publications.waset.org/abstracts/89987/a-regulatory-analysis-on-legal-problems-of-bitcoin" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89987.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">209</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">67</span> Admissibility as a Property of Evidence in Modern Conditions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iryna%20Teslenko">Iryna Teslenko</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to the provisions of the current criminal procedural legislation of Ukraine, the issue of admissibility of evidence is closely related to both the right to a fair trial and the presumption of innocence. The general rule is that evidence obtained improperly or illegally cannot be taken into account in a court case. Therefore, the evidence base of the prosecution, collected at the stage of the pre-trial investigation, compliance with the requirements of the law during the collection of evidence, is of crucial importance for the criminal process, the violation of which entails the recognition of the relevant evidence as inadmissible, which can nullify all the efforts of the pre-trial investigation body and the prosecution. Therefore, the issue of admissibility of evidence in criminal proceedings is fundamentally important and decisive for the entire process. Research on this issue began in December 2021. At that time, there was still no clear understanding of what needed to be conveyed to the scientific community. In February 2022, the lives of all citizens of Ukraine have totally changed. A war broke out in the country. At a time when the entire world community is on the path of humanizing society, respecting the rights and freedoms of man and citizen, a military conflict has arisen in the middle of Europe - one country attacked another, war crimes are being committed. The world still cannot believe it, but it is happening here and now, people are dying, infrastructure is being destroyed, war crimes are being committed, contrary to the signed and ratified international conventions, and contrary to all the acquisitions and development of world law. At this time, the life of the world has divided into before and after February 24, 2022, the world cannot be the same as it was before, and the approach to solving legal issues in the criminal process, in particular, issues of proving the commission of crimes and the involvement of certain persons in their commission. An international criminal has appeared in the humane European world, who disregards all norms of law and morality, and does not adhere to any principles. Until now, the practice of the European Court of Human Rights and domestic courts of Ukraine treated with certain formalism, such a property of evidence in criminal proceedings as the admissibility of evidence. Currently, we have information that the Office of the Prosecutor of the International Criminal Court in The Hague has started an investigation into war crimes in Ukraine and is documenting them. In our opinion, the world cannot allow formalism in bringing a war criminal to justice. There is a war going on in Ukraine, the cities are under round-the-clock missile fire from the aggressor country, which makes it impossible to carry out certain investigative actions. If due to formal deficiencies, the collected evidence is declared inadmissible, it may lead to the fact that the guilty people will not be punished. And this, in turn, sends a message to other terrorists in the world about the impunity of their actions, the system of deterring criminals from committing criminal offenses (crimes) will collapse due to the understanding of the inevitability of punishment, and this will affect the entire world security and European security in particular. Therefore, we believe that the world cannot allow chaos in the issue of general security, there should be a transformation of the approach in general to such a property of evidence in the criminal process as admissibility in order to ensure the inevitability of the punishment of criminals. We believe that the scientific and legal community should not allow criminals to avoid responsibility. The evil that is destroying Ukraine should be punished. We must all together prove that legal norms are not just words written on paper but rules of behavior of all members of society, their non-observance leads to mandatory responsibility. Everybody who commits crimes will be punished, which is inevitable, and this principle is the guarantor of world security in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=admissibility%20of%20evidence" title="admissibility of evidence">admissibility of evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20process" title=" criminal process"> criminal process</a>, <a href="https://publications.waset.org/abstracts/search?q=war" title=" war"> war</a>, <a href="https://publications.waset.org/abstracts/search?q=Ukraine" title=" Ukraine"> Ukraine</a> </p> <a href="https://publications.waset.org/abstracts/154376/admissibility-as-a-property-of-evidence-in-modern-conditions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154376.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">66</span> Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jonathan%20W.%20Z.%20Lim">Jonathan W. Z. Lim</a>, <a href="https://publications.waset.org/abstracts/search?q=Vrizlynn%20L.%20L.%20Thing"> Vrizlynn L. L. Thing</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime%20motivations" title="crime motivations">crime motivations</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20prevention" title=" crime prevention"> crime prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title=" cybercrime"> cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=ex-cyber%20criminals" title=" ex-cyber criminals"> ex-cyber criminals</a> </p> <a href="https://publications.waset.org/abstracts/143415/cybercrime-stage-based-intervention-through-the-eyes-of-a-cyber-threat-actor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143415.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">65</span> Human Trafficking and Prostitution in Amsterdam</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Isabel%20Roiz">Isabel Roiz</a>, <a href="https://publications.waset.org/abstracts/search?q=Alejandra%20Cossio"> Alejandra Cossio</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This essay will talk about the problems of forced prostitution, human trafficking, and sexual exploitation in the Netherlands. This work conveys information from different sources stating the numbers and statistics of human trafficking throughout Europe and the different types of sexual exploitation as well as the means used for coercing victims into this illegal net. The research aims to inform and compare the way this business is handled and the ways used by criminals to lure and retain victims in spite of the law. It also tries to compare the laws in the Netherlands and Sweden regarding prostitution affects the illegal migration problems and how they change the ways those who work as prostitutes are treated. The aim of the paper is to take all of these aspects into consideration and reach a decision of what laws would most beneficiate the victims. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20trafficking" title="human trafficking">human trafficking</a>, <a href="https://publications.waset.org/abstracts/search?q=prostitution" title=" prostitution"> prostitution</a>, <a href="https://publications.waset.org/abstracts/search?q=laws%20of%20migration" title=" laws of migration"> laws of migration</a>, <a href="https://publications.waset.org/abstracts/search?q=Amsterdam" title=" Amsterdam"> Amsterdam</a> </p> <a href="https://publications.waset.org/abstracts/22571/human-trafficking-and-prostitution-in-amsterdam" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22571.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">348</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">64</span> An Enhanced Digital Forensic Model for Internet of Things Forensic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tina%20Wu">Tina Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Martin"> Andrew Martin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=acquisition" title="acquisition">acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a>, <a href="https://publications.waset.org/abstracts/search?q=zoning" title=" zoning"> zoning</a> </p> <a href="https://publications.waset.org/abstracts/76982/an-enhanced-digital-forensic-model-for-internet-of-things-forensic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76982.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">63</span> Forensic Investigation: The Impact of Biometric-Based Solution in Combatting Mobile Fraud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mokopane%20Charles%20%20Marakalala">Mokopane Charles Marakalala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Research shows that mobile fraud has grown exponentially in South Africa during the lockdown caused by the COVID-19 pandemic. According to the South African Banking Risk Information Centre (SABRIC), fraudulent online banking and transactions resulted in a sharp increase in cybercrime since the beginning of the lockdown, resulting in a huge loss to the banking industry in South Africa. While the Financial Intelligence Centre Act, 38 of 2001, regulate financial transactions, it is evident that criminals are making use of technology to their advantage. Money-laundering ranks among the major crimes, not only in South Africa but worldwide. This paper focuses on the impact of biometric-based solutions in combatting mobile fraud at the South African Risk Information. SABRIC had the challenges of a successful mobile fraud; cybercriminals could hijack a mobile device and use it to gain access to sensitive personal data and accounts. Cybercriminals are constantly looting the depths of cyberspace in search of victims to attack. Millions of people worldwide use online banking to do their regular bank-related transactions quickly and conveniently. This was supported by the SABRIC, who regularly highlighted incidents of mobile fraud, corruption, and maladministration in SABRIC, resulting in a lack of secure their banking online; they are vulnerable to falling prey to fraud scams such as mobile fraud. Criminals have made use of digital platforms since the development of technology. In 2017, 13 438 instances involving banking apps, internet banking, and mobile banking caused the sector to suffer gross losses of more than R250,000,000. The final three parties are forced to point fingers at one another while the fraudster makes off with the money. A non-probability sampling (purposive sampling) was used in selecting these participants. These included telephone calls and virtual interviews. The results indicate that there is a relationship between remote online banking and the increase in money-laundering as the system allows transactions to take place with limited verification processes. This paper highlights the significance of considering the development of prevention mechanisms, capacity development, and strategies for both financial institutions as well as law enforcement agencies in South Africa to reduce crime such as money-laundering. The researcher recommends that strategies to increase awareness for bank staff must be harnessed through the provision of requisite training and to be provided adequate training. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biometric-based%20solution" title="biometric-based solution">biometric-based solution</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation" title=" investigation"> investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title=" cybercrime"> cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20investigation" title=" forensic investigation"> forensic investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud" title=" fraud"> fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=combatting" title=" combatting"> combatting</a> </p> <a href="https://publications.waset.org/abstracts/163189/forensic-investigation-the-impact-of-biometric-based-solution-in-combatting-mobile-fraud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163189.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">101</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">62</span> Money Laundering and Governance in Cryptocurrencies: The Double-Edged Sword of Blockchain Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jiaqi%20Yan">Jiaqi Yan</a>, <a href="https://publications.waset.org/abstracts/search?q=Yani%20Shi"> Yani Shi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the growing popularity of bitcoin transactions, criminals have exploited the bitcoin like cryptocurrencies, and cybercriminals such as money laundering have thrived. Unlike traditional currencies, the Internet-based virtual currencies can be used anonymously via the blockchain technology underpinning. In this paper, we analyze the double-edged sword features of blockchain technology in the context of money laundering. In particular, the traceability feature of blockchain-based system facilitates a level of governance, while the decentralization feature of blockchain-based system may bring governing difficulties. Based on the analysis, we propose guidelines for policy makers in governing blockchain-based cryptocurrency systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title="cryptocurrency">cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title=" money laundering"> money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralization" title=" decentralization"> decentralization</a>, <a href="https://publications.waset.org/abstracts/search?q=traceability" title=" traceability"> traceability</a> </p> <a href="https://publications.waset.org/abstracts/88352/money-laundering-and-governance-in-cryptocurrencies-the-double-edged-sword-of-blockchain-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88352.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">202</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">61</span> WormHex: Evidence Retrieval Tool of Social Media from Volatile Memory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Norah%20Almubairik">Norah Almubairik</a>, <a href="https://publications.waset.org/abstracts/search?q=Wadha%20Almattar"> Wadha Almattar</a>, <a href="https://publications.waset.org/abstracts/search?q=Amani%20Alqarni"> Amani Alqarni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social media applications are increasingly being used in our everyday communications. These applications utilise end-to-end encryption mechanisms, which make them suitable tools for criminals to exchange messages. These messages are preserved in the volatile memory until the device is restarted. Therefore, volatile forensics has become an important branch of digital forensics. In this study, the WormHex tool was developed to inspect the memory dump files of Windows and Mac-based workstations. The tool supports digital investigators to extract valuable data written in Arabic and English through web-based WhatsApp and Twitter applications. The results verify that social media applications write their data into the memory regardless of the operating system running the application, with there being no major differences between Windows and Mac. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=volatile%20memory" title="volatile memory">volatile memory</a>, <a href="https://publications.waset.org/abstracts/search?q=REGEX" title=" REGEX"> REGEX</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20acquisition" title=" memory acquisition"> memory acquisition</a> </p> <a href="https://publications.waset.org/abstracts/147426/wormhex-evidence-retrieval-tool-of-social-media-from-volatile-memory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147426.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">191</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">60</span> Cybercrime: International Police Cooperation with Europol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Suarez%20Alonso">Daniel Suarez Alonso</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrime is a growing international threat and a challenge for law enforcement agencies and judicial systems worldwide. International cooperation is necessary to solve this problem because cybercrime knows no borders and often involves multiple jurisdictions, being related to organised crime. The purpose of this article is to analyse international cooperation in the investigation and prosecution of cybercrime, focusing on the framework of the Regulation of the European Union Agency for Law Enforcement Cooperation (EUROPOL), cooperation that takes place between police authorities from different countries. It examines the legal and operational mechanisms in place to facilitate international cooperation in Europe in this area and assesses their effectiveness in the fight against cybercrime. In addition, the study of a Spanish investigation where cooperation with EUROPOL took place will be examined, analyzing how international cooperation was carried out to investigate and track down criminals. Lessons learned from this case will be discussed and recommendations for improving international cooperation in the fight against cybercrime will be proposed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Europol" title="Europol">Europol</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20cooperation" title=" international cooperation"> international cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title=" cybercrime"> cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20crime" title=" computer crime"> computer crime</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a> </p> <a href="https://publications.waset.org/abstracts/182100/cybercrime-international-police-cooperation-with-europol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182100.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">59</span> Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Modesta%20E.%20Ezema">Modesta E. Ezema</a>, <a href="https://publications.waset.org/abstracts/search?q=Chikwendu%20V.%20Alabekee"> Chikwendu V. Alabekee</a>, <a href="https://publications.waset.org/abstracts/search?q=Victoria%20N.%20Ishiwu"> Victoria N. Ishiwu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ifeyinwa%20NwosuArize"> Ifeyinwa NwosuArize</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinedu%20I.%20Nwoye"> Chinedu I. Nwoye</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algorithm" title="algorithm">algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptosystem" title=" cryptosystem"> cryptosystem</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a> </p> <a href="https://publications.waset.org/abstracts/55625/cryptography-and-cryptosystem-a-panacea-to-security-risk-in-wireless-networking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55625.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">58</span> The Effect of Law on Society</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rezki%20Omar">Rezki Omar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Openness cosmic shares dramatically in the order of something quite a bit of neglected priorities within the community at the level of thought and consciousness, and these priorities provider of legal and human rights awareness after a long delay in the process of awareness of human rights, there is no doubt that the long and arduous road. As is obvious to any observer public affairs as well as the specialist and the observer that there is growth and development in the scene and the legal movement is unprecedented, many when dealing with many of the details sought and tries as much as possible to know what is the natural rights, and duties that must comply with legally in no charge with the issue of what is going on, any attempt of weakness and lack of self-reliance and obstacles level during the search show him by virtue of the difficulty of the availability of legal information in some cases on a particular issue, whether or not the image is complete, legally insufficient. Law relationship to society basically a close relationship, there is no law society, a society is impossible without both at the level of domestic relations or international law: «There is a close link between law and society. The law remains influenced by the society in which it grew, as well as the law affects the society, which is governed by, the relationship between the community and law affected and the impact of relationship ». The law of the most important objectives of protecting members of society, and its role is based on the distribution of rights and duties in a fair way, and protect the public interest of the citizen’s basis. The word community when some sociologists are limited to the group that gathered, including cultural unity Cultural Group distinguish between society and the last. In the recent period issued a set of regulations in the various branches of law, which is different from the class and important one hand, and here is important study of the interaction between law and society, and how to make the laws effective in the community? The opposite is true as well. The law as a social phenomenon is impossible to understand and analyzed without taking into account the extent of their impact and vulnerability within the community and accepted. Must evoke the basis that it was developed to address the problems faced by citizens. The over-age and amplify the sanctions are a contradiction of that fundamental reform of the basic objectives of the offender more than anything else Calantqam and revenge, and if the process is not human mistakes. Michel Foucault believes that «tighten laws and regulations against criminals will not reduce the crime rate in the community, so you must activate the system of moral values of society after more deterrent, and the threat of scandal on a social level.» Besson and refers to the legislators, saying the law: «The only way to reduce the crime rate to strengthen the ethical system of the society, especially in the social Amnhoha sanctity of conscience, then you will not be forced to issue harsh sentences against criminals».In summary, it is necessary to combine the enactment of laws and activate the system of moral values and educational values on the ground, and to understand the causes of social problems at the root of all for the equation is complete, and that the law was drafted to serve the citizens and not to harm him. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=legislators" title="legislators">legislators</a>, <a href="https://publications.waset.org/abstracts/search?q=distinguish" title=" distinguish"> distinguish</a>, <a href="https://publications.waset.org/abstracts/search?q=awareness" title=" awareness"> awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=insufficient" title=" insufficient"> insufficient</a> </p> <a href="https://publications.waset.org/abstracts/26810/the-effect-of-law-on-society" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26810.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">493</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">57</span> Artificial Intelligence and Police</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehrnoosh%20Abouzari">Mehrnoosh Abouzari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Artificial intelligence has covered all areas of human life and has helped or replaced many jobs. One of the areas of application of artificial intelligence in the police is to detect crime, identify the accused or victim and prove the crime. It will play an effective role in implementing preventive justice and creating security in the community, and improving judicial decisions. This will help improve the performance of the police, increase the accuracy of criminal investigations, and play an effective role in preventing crime and high-risk behaviors in society. This article presents and analyzes the capabilities and capacities of artificial intelligence in police and similar examples used worldwide to prove the necessity of using artificial intelligence in the police. The main topics discussed include the performance of artificial intelligence in crime detection and prediction, the risk capacity of criminals and the ability to apply arbitray institutions, and the introduction of artificial intelligence programs implemented worldwide in the field of criminal investigation for police. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=police" title="police">police</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=forecasting" title=" forecasting"> forecasting</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=software" title=" software"> software</a> </p> <a href="https://publications.waset.org/abstracts/141793/artificial-intelligence-and-police" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141793.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">206</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">56</span> Understanding How Money Laundering and Financing of Terrorism Are Conducted through the Real Estate Sector in the Middle East and North Africa Region</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haytham%20Yassine">Haytham Yassine</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research seeks to identify how money laundering activities are executed through the real estate sector. This article provides academics with literature on the topic and provides scholars, and practitioners with a better understanding of the risks and challenges involved. Data are gathered through survey in the Middle East and North Africa region and review of the available research. The results of the analysis will help identifying the factors attracting criminals to the real estate sector and develop an understanding of the methods used to launder illicit funds through this sector and the indicators of suspicion for reporting entities. Further analysis reveals the risks posed by money laundering and terrorist financing on the real estate sector and challenges facing states in this regard. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title="money laundering">money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism%20financing" title=" terrorism financing"> terrorism financing</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20estate%20sector" title=" real estate sector"> real estate sector</a>, <a href="https://publications.waset.org/abstracts/search?q=Middle%20East%20and%20North%20Africa" title=" Middle East and North Africa"> Middle East and North Africa</a> </p> <a href="https://publications.waset.org/abstracts/110230/understanding-how-money-laundering-and-financing-of-terrorism-are-conducted-through-the-real-estate-sector-in-the-middle-east-and-north-africa-region" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110230.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">55</span> Innocent Victims and Immoral Women: Sex Workers in the Philippines through the Lens of Mainstream Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sharmila%20Parmanand">Sharmila Parmanand</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines dominant media representations of prostitution in the Philippines and interrogates sex workers’ interactions with the media establishment. This analysis of how sex workers are constituted in media, often as both innocent victims and immoral actors, contributes to an understanding of public discourse on sex work in the Philippines, where decriminalisation has recently been proposed and sex workers are currently classified as potential victims under anti-trafficking laws but also as criminals under the penal code. The first part is an analysis of media coverage of two prominent themes on prostitution: first, raid and rescue operations conducted by law enforcement; and second, prostitution on military bases and tourism hotspots. As a result of pressure from activists and international donors, these two themes often define the policy conversations on sex work in the Philippines. The discourses in written and televised news reports and documentaries from established local and international media sources that address these themes are explored through content analysis. Conclusions are drawn based on specific terms commonly used to refer to sex workers, how sex workers are seen as performing their cultural roles as mothers and wives, how sex work is depicted, associations made between sex work and public health, representations of clients and managers and ‘rescuers’ such as the police, anti-trafficking organisations, and faith-based groups, and which actors are presumed to be issue experts. Images of how prostitution is used as a metaphor for relations between the Philippines and foreign nations are also deconstructed, along with common tropes about developing world female subjects. In general, sex workers are simultaneously portrayed as bad mothers who endanger their family’s morality but also as long-suffering victims who endure exploitation for the sake of their children. They are also depicted as unclean, drug-addicted threats to public health. Their managers and clients are portrayed as cold, abusive, and sometimes violent, and their rescuers as moral and altruistic agents who are essential for sex workers’ rehabilitation and restoration as virtuous citizens. The second part explores sex workers’ own perceptions of their interactions with media, through interviews with members of the Philippine Sex Workers Collective, a loose organisation of sex workers around the Philippines. They reveal that they are often excluded by media practitioners and that they do not feel that they have space for meaningful self-revelation about their work when they do engage with journalists, who seem to have an overt agenda of depicting them as either victims or women of loose morals. In their assessment, media narratives do not necessarily reflect their lived experiences, and in some cases, coverage of rescues and raid operations endangers their privacy and instrumentalises their suffering. Media representations of sex workers may produce subject positions such as ‘victims’ or ‘criminals’ and legitimize specific interventions while foreclosing other ways of thinking. Further, in light of media’s power to reflect and shape public consciousness, it is a valuable academic and political project to examine whether sex workers are able to assert agency in determining how they are represented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discourse%20analysis" title="discourse analysis">discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=news%20media" title=" news media"> news media</a>, <a href="https://publications.waset.org/abstracts/search?q=sex%20work" title=" sex work"> sex work</a>, <a href="https://publications.waset.org/abstracts/search?q=trafficking" title=" trafficking"> trafficking</a> </p> <a href="https://publications.waset.org/abstracts/65628/innocent-victims-and-immoral-women-sex-workers-in-the-philippines-through-the-lens-of-mainstream-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65628.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">54</span> Legalizing Prostitution: Providing Equality Amongst Men and Women in the Criminal Justice System through a Socialist Feminist Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amanda%20Rebman">Amanda Rebman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper challenges the criminal justice system’s traditional stance regarding prostitution. Historically, the acceptance and morality of prostitution within the United States has fluctuated depending upon the social attitudes of the era. Today, prostitutes are allegedly viewed as victims; however, they are treated like criminals throughout the criminal justice system and society. Dominant patriarchal narratives within the United States has resulted in woman lacking autonomy over their bodies and diminished their ability to choose their own career. Even though prostitutes are deemed victims, many times, they are convicted of crimes, a practice that results in further victimization. Utilizing the socialist feminist theory to understand these juxtaposing positions on whether to legalize prostitution facilitates a greater understanding of how patriarchal capitalist arrangements ensure the oppression of women throughout the criminal justice system. The legalization of prostitution will alleviate some of this oppression and ensure a more equal treatment of women in the criminal justice system and society at large. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=equality" title="equality">equality</a>, <a href="https://publications.waset.org/abstracts/search?q=feminist%20theory" title=" feminist theory"> feminist theory</a>, <a href="https://publications.waset.org/abstracts/search?q=prostitution" title=" prostitution"> prostitution</a>, <a href="https://publications.waset.org/abstracts/search?q=sex%20work" title=" sex work"> sex work</a> </p> <a href="https://publications.waset.org/abstracts/137008/legalizing-prostitution-providing-equality-amongst-men-and-women-in-the-criminal-justice-system-through-a-socialist-feminist-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137008.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">53</span> Cordyceps and Related Fungi from Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sami%20Michael%20Ayodele">Sami Michael Ayodele</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cordyceps are members of the fungi family Cordycepitaceae which are formally in Clavicipitaceae. They parasitize the larvae and adults of different susceptible arthropods. They are highly priced and have been reported to be highly medicinal. Cordyceps have been used for centuries in traditional medicine in China and other Asian countries. Survey studies were carried out to determine the presence of Cordyceps and another entomopathogenic fungal floral in North Central Nigeria for two consecutive years. Thirty samples were collected, twenty-eight were identified, and two were unidentified. Most identified species belong to Ophiocordyceps species (20samples), Cordyceps species (4samples) and Isaria species (4samples). The species identified were: Cordyceps pseudomilitaris, Cordyceps tuberculata, Cordyceps cylindrical, Ophiocordyceps nutans, O. criminals, O. oxycephala, O. kniphofioides and Isaria sinclairii. The morphological and microscopic features of the collected and identified species were similar to those reported in other countries. This is the first official report on the presence of Cordyceps species in Nigeria. Further collections from different ecological regions of Nigeria will show the richness of the floral diversity of these entomopathogenic and medicinal mushrooms in Nigeria. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cordyceps" title="cordyceps">cordyceps</a>, <a href="https://publications.waset.org/abstracts/search?q=entomopathogenic" title=" entomopathogenic"> entomopathogenic</a>, <a href="https://publications.waset.org/abstracts/search?q=medicinal" title=" medicinal"> medicinal</a>, <a href="https://publications.waset.org/abstracts/search?q=North%20Central" title=" North Central"> North Central</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/166551/cordyceps-and-related-fungi-from-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166551.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">52</span> Web-Based Criminal Diary: Paperless Criminal Evidence for Federal Republic of Nigeria </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yekini%20Nureni%20Asafe">Yekini Nureni Asafe</a>, <a href="https://publications.waset.org/abstracts/search?q=Haastrup%20Victor%20Adeleye"> Haastrup Victor Adeleye</a>, <a href="https://publications.waset.org/abstracts/search?q=Ikotun%20Abiodun%20Motunrayo"> Ikotun Abiodun Motunrayo</a>, <a href="https://publications.waset.org/abstracts/search?q=Ojo%20Olanrewaju"> Ojo Olanrewaju</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Web Based Criminal Diary is a web based application whereby data of criminals been convicted by a judge in the court of law in Nigeria are shown to the entire public. Presently, criminal records are kept manually in Nigeria, which means when a person needs to be investigated to know if the person has a criminal record in the country, there is need to pass through different manual processes. With the use of manual record keeping, the criminal records can easily be manipulated by people in charge. The focus of this research work is to design a web-based application system for criminal record in Nigeria, towards elimination of challenges (such as loss of criminal records, in-efficiency in criminal record keeping, data manipulation, and other attendant problems of paper-based record keeping) which surrounds manual processing currently in use. The product of this research work will also help to minimize crime rate in our country since the opportunities and benefits lost as a result of a criminal record create will a lifelong barriers for anyone attempting to overcome a criminal past in our country. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=court%20of%20law" title="court of law">court of law</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal" title=" criminal"> criminal</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20diary" title=" criminal diary"> criminal diary</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20evidence" title=" criminal evidence"> criminal evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=web-based" title=" web-based"> web-based</a> </p> <a href="https://publications.waset.org/abstracts/16125/web-based-criminal-diary-paperless-criminal-evidence-for-federal-republic-of-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16125.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">319</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">51</span> Youth Involvement in Cybercrime in Nigeria: A Case Study of Ikeja Local Government Area</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Niyi%20Adegoke">Niyi Adegoke</a>, <a href="https://publications.waset.org/abstracts/search?q=Saanumi%20Jimmy%20Omolou"> Saanumi Jimmy Omolou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The prevalence rate of youth involving in cybercrime is alarming, which calls for concern among the government, parents, NGO and religious bodies, hence this paper aims at examining youth involvement in cybercrime in Nigeria. Achievement motivation theory was used to explain the activities of cyber-criminals in Nigerian society. A descriptive survey method was adopted for the study. The sample for the study was one hundred and fifty (150) respondents randomly selected from the population of the study. A questionnaire was used to gather information and data from the respondents. Data collected through the questionnaire were analyzed using percentage tool for the respondents’ bio-data while chi-square was employed to test the hypotheses. Findings from the study have revealed that parental negligence, unemployment, peer influence, and quest for materialism were responsible for cyber-crimes in Nigeria. The study concludes with the following recommendations among which are: creating employment opportunities for the youths and ensure good governance and accountability among other things will go a long way to solve the problem of cybercrime in our society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title="cybercrime">cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=youth" title=" youth"> youth</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=unemployment" title=" unemployment"> unemployment</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20communication%20technology" title=" information communication technology"> information communication technology</a> </p> <a href="https://publications.waset.org/abstracts/106841/youth-involvement-in-cybercrime-in-nigeria-a-case-study-of-ikeja-local-government-area" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106841.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">228</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=war%20criminals&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=war%20criminals&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=war%20criminals&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10