CINXE.COM
Search results for: border crimes
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: border crimes</title> <meta name="description" content="Search results for: border crimes"> <meta name="keywords" content="border crimes"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="border crimes" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="border crimes"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 639</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: border crimes</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">639</span> World on the Edge: Migration and Cross Border Crimes in West Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adeyemi%20Kamil%20Hamzah">Adeyemi Kamil Hamzah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cross-border%20migration" title="cross-border migration">cross-border migration</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20crimes" title=" border crimes"> border crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=West%20Africa" title=" West Africa"> West Africa</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=globalisation" title=" globalisation"> globalisation</a> </p> <a href="https://publications.waset.org/abstracts/88736/world-on-the-edge-migration-and-cross-border-crimes-in-west-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88736.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">226</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">638</span> Penalization of Transnational Crimes in the Domestic Legal Order: The Case of Poland</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Magda%20Olesiuk-Okomska">Magda Olesiuk-Okomska</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The degree of international interdependence has grown significantly. Poland is a party to nearly 1000 binding multilateral treaties, including international legal instruments devoted to criminal matters and obliging the state to penalize certain crimes. The paper presents results of a theoretical research conducted as a part of doctoral research. The main hypothesis assumed that there was a separate category of crimes to penalization of which Poland was obliged under international legal instruments; that a catalogue of such crimes and a catalogue of international legal instruments providing for Poland’s international obligations had never been compiled in the domestic doctrine, thus there was no mechanism for monitoring implementation of such obligations. In the course of the research, a definition of transnational crimes was discussed and confronted with notions of international crimes, treaty crimes, as well as cross-border crimes. A list of transnational crimes penalized in the Polish Penal Code as well as in non-code criminal law regulations was compiled; international legal instruments, obliging Poland to criminalize and penalize specific conduct, were enumerated and catalogued. It enabled the determination whether Poland’s international obligations were implemented in domestic legislation, as well as the formulation of de lege lata and de lege ferenda postulates. Implemented research methods included inter alia a dogmatic and legal method, an analytical method and desk research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=international%20criminal%20law" title="international criminal law">international criminal law</a>, <a href="https://publications.waset.org/abstracts/search?q=transnational%20crimes" title=" transnational crimes"> transnational crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=transnational%20criminal%20law" title=" transnational criminal law"> transnational criminal law</a>, <a href="https://publications.waset.org/abstracts/search?q=treaty%20crimes" title=" treaty crimes "> treaty crimes </a> </p> <a href="https://publications.waset.org/abstracts/78790/penalization-of-transnational-crimes-in-the-domestic-legal-order-the-case-of-poland" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78790.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">223</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">637</span> Idea of International Criminal Justice in the Function of Prosecution International Crimes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vanda%20Bo%C5%BEi%C4%87">Vanda Božić</a>, <a href="https://publications.waset.org/abstracts/search?q=%C5%BDeljko%20Nika%C4%8D"> Željko Nikač</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The wars and armed conflicts have often resulted in violations of international humanitarian law, and often commit the most serious international crimes such as war crimes, crimes against humanity, aggression and genocide. However, only in the XX century the rule was articulated idea of establishing a body of international criminal justice in order to prosecute these crimes and their perpetrators. The first steps in this field have been made by establishing the International military tribunals for war crimes at Nuremberg and Tokyo, and the formation of <em>ad hoc</em> tribunals for the former Yugoslavia and Rwanda. In the end, The International Criminal Court was established in Rome in 1998 with the aim of justice and in order to give satisfaction the victims of crimes and their families. The aim of the paper was to provide a historical and comparative analysis of the institutions of international criminal justice based on which these institutions <em>de lege lata</em> fulfilled the goals of individual criminal responsibility and justice. Furthermore, the authors suggest <em>de lege ferenda</em> that the Permanent International Criminal Tribunal, in addition to the prospective case, also takes over the current ICTY and ICTR cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=international%20crimes" title="international crimes">international crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20criminal%20justice" title=" international criminal justice"> international criminal justice</a>, <a href="https://publications.waset.org/abstracts/search?q=prosecution%20of%20crimes" title=" prosecution of crimes"> prosecution of crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=ad%20hoc%20tribunal" title=" ad hoc tribunal"> ad hoc tribunal</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20international%20criminal%20court" title=" the international criminal court"> the international criminal court</a> </p> <a href="https://publications.waset.org/abstracts/67565/idea-of-international-criminal-justice-in-the-function-of-prosecution-international-crimes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67565.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">278</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">636</span> The Analysis of Computer Crimes Act 1997 in the Circumvention and Prevention of Computer Crimes in Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nooraneda%20Mutalip%20Laidey">Nooraneda Mutalip Laidey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Computer Crimes Act 1997 (CCA 1997) was conceded by Malaysia’s legislative body in 1997 and the Act was enforced in June 2000. The purpose of CCA 1997 is to provide for offences related to misuse of computers such as hacking, cracking and phishing. CCA 1997 was modelled after United Kingdom’s Computer Misuses Act 1990 as a response to the emerging computer crimes. This legislation is divided into three parts and 12 Sections. The first part outlines preliminary matters that include short title and relevant definitions, second part provides for the offenses related to misuse of computers and specifies penalties for each offences, and the last part deals with ancillary provisions such as jurisdictional and investigational issues of cybercrime. The main objective of this paper is to discuss the development of computer crimes and its deterrence in Malaysia. Specific sections of CCA 1997 will be analysed in details and detail assessment on the prevention and prosecution of computer crimes in Malaysia will be accessed to determine whether CCA 1997 is so far adequate in preventing computer crimes in Malaysia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer" title="computer">computer</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20crimes" title=" computer crimes"> computer crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=CCA%201997" title=" CCA 1997"> CCA 1997</a>, <a href="https://publications.waset.org/abstracts/search?q=circumvention" title=" circumvention"> circumvention</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a> </p> <a href="https://publications.waset.org/abstracts/43608/the-analysis-of-computer-crimes-act-1997-in-the-circumvention-and-prevention-of-computer-crimes-in-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43608.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">635</span> Resource Allocation Modeling and Simulation in Border Security Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kai%20Jin">Kai Jin</a>, <a href="https://publications.waset.org/abstracts/search?q=Hua%20Li"> Hua Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Qing%20Song"> Qing Song</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Homeland security and border safety is an issue for any country. This paper takes the border security of US as an example to discuss the usage and efficiency of simulation tools in the homeland security application. In this study, available resources and different illegal infiltration parameters are defined, including their individual behavior and objective, in order to develop a model that describes border patrol system. A simulation model is created in Arena. This simulation model is used to study the dynamic activities in the border security. Possible factors that may affect the effectiveness of the border patrol system are proposed. Individual and factorial analysis of these factors is conducted and some suggestions are made. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=resource%20optimization" title="resource optimization">resource optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=modeling" title=" modeling"> modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20security" title=" border security"> border security</a> </p> <a href="https://publications.waset.org/abstracts/12476/resource-allocation-modeling-and-simulation-in-border-security-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12476.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">516</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">634</span> Limitations of Recent National Enactments on International Crimes: The Case of Kenya, Uganda and Sudan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emma%20Charlene%20Lubaale">Emma Charlene Lubaale</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The International Criminal Court (ICC) operates based on the principle of complementarity. On the basis of this principle, states enjoy the primary right to prosecute international crimes, with the ICC intervening only when a state with jurisdiction over an international crime is unable or unwilling to prosecute. To ably exercise their primary right to prosecute international crimes domestically, a number of states are taking steps to criminalise international crimes in their national laws. Significant to note, many of the laws enacted are not being applied in the prosecution of the international crimes allegedly committed. Kenya, Uganda and Sudan are some notable states where commission of international crimes is documented. All these states have recently enacted laws on international crimes. Kenya enacted the International Crimes Act in 2008, Uganda enacted the International Criminal Court Act in 2010 and in 2007, Sudan made provision for international crimes under its Armed Forces Act. However, in all these three states, the enacted national laws on international crimes have thus far not featured in any of the proceedings before these states’ courts. Instead, these states have either relied on ordinary crimes to prosecute international crimes or not prosecuted international crimes altogether. This paper underscores the limitations of the enacted laws, explaining why, even with efforts taken by these states to enact national laws on international crimes, these laws cannot be relied on to advance accountability for the international crimes. Notably, the laws in Kenya and Uganda do not have retroactive application. In Sudan, despite the 2007 reforms, the structure of military justice in Sudan has the effect of placing certain categories of individuals beyond the reach of international criminal justice. For Kenya and Uganda, it is concluded that the only benefit that flows from these enactments is reliance on them to prosecute future international crimes. For Sudan, the 2007 reforms will only have the desired impact if reforms are equally made to the structure of military justice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=complementarity" title="complementarity">complementarity</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20laws" title=" national laws"> national laws</a>, <a href="https://publications.waset.org/abstracts/search?q=Kenya" title=" Kenya"> Kenya</a>, <a href="https://publications.waset.org/abstracts/search?q=Sudan" title=" Sudan"> Sudan</a>, <a href="https://publications.waset.org/abstracts/search?q=Uganda" title=" Uganda"> Uganda</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20crimes" title=" international crimes"> international crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=limitations" title=" limitations"> limitations</a> </p> <a href="https://publications.waset.org/abstracts/60107/limitations-of-recent-national-enactments-on-international-crimes-the-case-of-kenya-uganda-and-sudan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60107.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">282</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">633</span> Analysis on Cyber Threat Actors Targeting Automated Border Security Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mirko%20Sailio">Mirko Sailio</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20automation" title="border automation">border automation</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-security" title=" cyber-security"> cyber-security</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20actors" title=" threat actors"> threat actors</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20cyber-security" title=" border cyber-security"> border cyber-security</a> </p> <a href="https://publications.waset.org/abstracts/136134/analysis-on-cyber-threat-actors-targeting-automated-border-security-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136134.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">632</span> Women's Vulnerability to Cross-Border Criminality in Saki/Iseyin Area of Oyo State in Nigeria: Insight and Experiences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samuel%20Kehinde%20Okunade">Samuel Kehinde Okunade</a>, <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Sunday%20Tolorunshagba"> Daniel Sunday Tolorunshagba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Globally women are classified to be part of the vulnerable group in any environment. In a conflict-ridden environment, women being vulnerable often suffer the consequences as it relates to security and access to basic social services such as medical care. This is the situation in border communities in Nigeria where cross-border crimes are on the rife, thus, putting women at a disadvantaged position and, eventually, victims of such inimical activities. Border communities in the Saki/Iseyin area of Oyo state are a case in point where the lives of inhabitants are daily threatened most, especially women. In light of the above, this article examined the security situation of the Saki/Iseyin area of Oyo State with a view to ascertaining its status in terms of safety of lives and property. This paper also explored the experiences of women in the border communities within the area as it relates to their safety, the safety of their children, access to good health facilities in their immediate environment, and above all, how they have been able to cope or manage the situation. The qualitative research model was adopted utilizing a phenomenological case study approach. A Focused Group Discussion was conducted with 10 pregnant women and 10 mothers in Okerete and Abugudu communities while a Key Informant Interview was conducted with the women leaders in both communities of the Saki/Iseyin border area of Oyo State. The findings of the study revealed the poor state of basic infrastructure. So bad to a point that inhabitants of these communities no longer see themselves as Nigerians because they have been neglected by the government for too long. The only solution is for the government to embark on developmental projects within these communities so that they can live a good life just as those in the cities do. More importantly, this will increase the loyalty of these communities to the Nigeria state by defending and resisting all forms of cross-border criminal activities that go on along the porous borders. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a>, <a href="https://publications.waset.org/abstracts/search?q=Saki%2FIseyin%20border%20area" title=" Saki/Iseyin border area"> Saki/Iseyin border area</a>, <a href="https://publications.waset.org/abstracts/search?q=cross-border%20criminalities" title=" cross-border criminalities"> cross-border criminalities</a>, <a href="https://publications.waset.org/abstracts/search?q=basic%20infrastructure" title=" basic infrastructure"> basic infrastructure</a> </p> <a href="https://publications.waset.org/abstracts/114225/womens-vulnerability-to-cross-border-criminality-in-sakiiseyin-area-of-oyo-state-in-nigeria-insight-and-experiences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114225.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">631</span> Cybercrimes in Nigeria: Its Causes, Effects and Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uzoma%20Igboji">Uzoma Igboji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-crimes" title="cyber-crimes">cyber-crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-terrorism" title=" cyber-terrorism"> cyber-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-criminals" title=" cyber-criminals"> cyber-criminals</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/22647/cybercrimes-in-nigeria-its-causes-effects-and-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">630</span> Examination of Wall Art in Slums to Prevent Crime Case Study: Jabal Al-Natheef</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dana%20Jaber">Dana Jaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Lilian%20Mansor"> Lilian Mansor</a>, <a href="https://publications.waset.org/abstracts/search?q=Lilan%20Al-Nablsi"> Lilan Al-Nablsi</a>, <a href="https://publications.waset.org/abstracts/search?q=Lujain%20Arabiat"> Lujain Arabiat</a>, <a href="https://publications.waset.org/abstracts/search?q=Mariam%20Attoun"> Mariam Attoun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Preventing crime through environmental designs (CPTED) and situational crime prevention methods (SCP) are used to prevent crimes before they occur by anticipating people's actions and behavior in social situations. Many theories focused on wall art in preventing crimes, Graffiti, and situational crime prevention. The main aim of this research is to assess the wall art in slums and how it could avoid crimes by increasing surveillance by studying Jabal Al-Natheef—using a quantitative methodology to study the social life in the site and accumulate the intended actions to prevent crimes by using art. It was shown that the crimes in the area are severe, and they occur in slums due to the bad conditions, maintenance, and lack of surveillance. A finding of how people in the area would react to the art was a positive conclusion to how it could prevent the crimes. The research findings revealed that implementing wall art in slums would decrease the crimes in the area. This research concluded with a proposal to recommend implementing such skills to deter crimes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CPTED" title="CPTED">CPTED</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20crime%20prevention" title=" situational crime prevention"> situational crime prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=wall%20art" title=" wall art"> wall art</a>, <a href="https://publications.waset.org/abstracts/search?q=slums" title=" slums"> slums</a> </p> <a href="https://publications.waset.org/abstracts/161807/examination-of-wall-art-in-slums-to-prevent-crime-case-study-jabal-al-natheef" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161807.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">83</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">629</span> Development of Border Trade of Thailand-Myanmar: Case Study of Ranong Province</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sakapas%20Saengchai">Sakapas Saengchai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research has objective to study and analysis, expending linkage of trading border of Thai-Myanmar and the way of development trading of Thai-Myanmar border. There are advantage of competition in ASEAN Community on collection data and observation, in-depth interview, group conversation and exchange opinion of public agency, entrepreneur and people. Result of study found that main development of border trade is 1) Cross-border service should be development infrastructure of land telecommunication, sea has support economics of cross-border trade, 2) International consumption service should be expand service with Myanmar and India for linkage with entrepreneur and trading from international to Thailand, 3) Establish business for provide service has development cooperation of logistics via Andaman of Thailand, and 4) Mobility personnel, exchange personnel including labor for development potential of border trade has competition advantage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20trade" title="border trade">border trade</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=service" title=" service"> service</a>, <a href="https://publications.waset.org/abstracts/search?q=ASEAN" title=" ASEAN"> ASEAN</a> </p> <a href="https://publications.waset.org/abstracts/55739/development-of-border-trade-of-thailand-myanmar-case-study-of-ranong-province" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55739.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">322</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">628</span> Civil Liability for Digital Crimes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P%C3%A1l%20M%C3%A9sz%C3%A1ros">Pál Mészáros</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this research topic is to examine civil law consequences caused by crimes committed in the digital space. During the commission of certain crimes, not only the rights of one person are violated, but also the rights of an entire institution, for example, if the information system of a university is attacked. The consequences of these crimes committed in the digital space may also be that the victim himself is liable to other third parties, for example, in the event that health data comes into the possession of unauthorized persons, and it can be proved that the service provider's IT system was inadequate. An interesting question may also be the civil liability of credit institutions if someone becomes a victim of fraud but is not expected from him/her to notice the fraud. In such a case, the liability of the credit institution may arise if they do not respond in time in the case of unauthorized bank transactions. Based on the above, the main topic of the research is the civil liability of the victim, or another person or company related to the victim in the case of damages caused by crimes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=civil%20liability" title="civil liability">civil liability</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20crimes" title=" digital crimes"> digital crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=transfer%20of%20responsibility" title=" transfer of responsibility"> transfer of responsibility</a>, <a href="https://publications.waset.org/abstracts/search?q=civil%20law" title=" civil law"> civil law</a> </p> <a href="https://publications.waset.org/abstracts/172211/civil-liability-for-digital-crimes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172211.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">627</span> The Role of Cryptocurrency in Cross-Border Payments: A Case Study of Bangladesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Abdul%20Matin">Mohammad Abdul Matin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research paper aims to investigate the use of cryptocurrency in facilitating cross-border payments, with a specific focus on the case of Bangladesh. With thousands of Bangladeshi living abroad, the demand for efficient and cost-effective remittance channels is high. This paper will examine the current challenges in cross-border payments for Bangladeshi expatriates and explore the potential benefits and barriers to the adoption of cryptocurrency as a solution. Through a combination of literature review, qualitative interviews, and data analysis, the research will provide valuable insights into the opportunities and risks associated with using cryptocurrency for cross-border payments in Bangladesh. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title="cryptocurrency">cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=cross-border%20payments" title=" cross-border payments"> cross-border payments</a>, <a href="https://publications.waset.org/abstracts/search?q=Bangladesh" title=" Bangladesh"> Bangladesh</a>, <a href="https://publications.waset.org/abstracts/search?q=remittance" title=" remittance"> remittance</a>, <a href="https://publications.waset.org/abstracts/search?q=expatriates" title=" expatriates"> expatriates</a> </p> <a href="https://publications.waset.org/abstracts/186744/the-role-of-cryptocurrency-in-cross-border-payments-a-case-study-of-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186744.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">33</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">626</span> An Investigation of Cyber Financial Crimes After the Enactment of PECA: A Case Study of Pakistan’s Banking Sector During 2016 to 2022</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zain%20Khalid">Zain Khalid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper outlines the trends of cyber financial crimes and frauds – approximating upto – in Pakistan after the enactment of The Prevention of Electronic Crimes Act in 2016. The paper elaborates on the newer methods that fraudsters have adopted after tighter preventive and counter measures were employed in Pakistan partly as a result of following the international finance related commitments, particularly the FATF regulations. The paper adopts case studies methods to highlight various aspects of the financial frauds and crimes committed and later investigated jointly by Pakistan’s one of the federal law enforcement agencies, the Federal Investigation Agency, and Mobilink Microfinance Bank , Pakistan’s premier microfinance bank. It additionally enriches the data through expert interviews – with crime investigators and the experts to carry out an in-depth analysis of the various factors involving the crime. This paper emphasizes the structural and situational factors that shape up the cyber financial crimes in Pakistan vis-à-vis digital illiteracy and lack of awareness among the users of financial services. This paper, thus, on the basis of findings and expert interviews, suggests policy reforms to reduce the instances of the financial crimes, especially in the remotest areas of the country. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=financial%20crimes" title="financial crimes">financial crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20crimes" title=" cyber crimes"> cyber crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20literacy" title=" digital literacy"> digital literacy</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism%20financing" title=" terrorism financing"> terrorism financing</a>, <a href="https://publications.waset.org/abstracts/search?q=banking%20sector" title=" banking sector"> banking sector</a> </p> <a href="https://publications.waset.org/abstracts/151513/an-investigation-of-cyber-financial-crimes-after-the-enactment-of-peca-a-case-study-of-pakistans-banking-sector-during-2016-to-2022" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151513.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">625</span> The Effects of European Union’s Bordering Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebru%20Dalgakiran">Ebru Dalgakiran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border and bordering studies have come to the forefront in recent years especially with parallel to increase in international migratory movements. Although conceptualizations of the border and bordering are quite contested within academia, the general point of view is that borders are politically and socially constructed. It means that borders have always their own ‘us vs. them’, and bordering process produce separate identities as well. In that case, Turkey and Greece are notable examples since these two nation-states constructed their borders upon each other’s for years although the Turkish-Greek border was drawn with the Lausanne Treaty of 1923. Nevertheless, on the other hand, The European Union (EU) has been externalized of border management policies to build a stronger area of freedom, security, and justice within the borders. Thus, Turkish-Greek border has become one of the significant external borders of the EU. In this context, this study aims to understand whether the EU’s bordering process through externalizing border management policies can affect Turkey’s and Greece’s bordering processes. By examining official documents of the EU and conducting in-depth interviews with local actors of the border management policies of the EU in Edirne, where is the border city of Turkey with Greece, this study’s main finding is that the EU’s bordering process to control migration at the external borders affects Turkey’s and Greece’s bordering processes. It seems that Turkey and Greece construct their borders upon a common Other, ‘irregular migrants’ now. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border" title="border">border</a>, <a href="https://publications.waset.org/abstracts/search?q=bordering" title=" bordering"> bordering</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20European%20Union" title=" the European Union"> the European Union</a>, <a href="https://publications.waset.org/abstracts/search?q=externalization" title=" externalization"> externalization</a> </p> <a href="https://publications.waset.org/abstracts/73814/the-effects-of-european-unions-bordering-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73814.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">624</span> Study of the Economic Development of Border Areas Malinau District</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Indri%20Nilam%20Sari">Indri Nilam Sari</a>, <a href="https://publications.waset.org/abstracts/search?q=Aris%20Subagiyo"> Aris Subagiyo</a>, <a href="https://publications.waset.org/abstracts/search?q=Nindya%20Sari"> Nindya Sari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Malinau Regency border area is an area which is based on the RTRWN and the development priority. But, in real border area Malinau Regency placed as backyard from Indonesian area and caused development lag that is fairly large compared by town area in Malinau Regency. This research aimed to know the condition of the gap in the Malinau Regency border and its influence on the development of the border region as well as knowing the problems related to the economy development of society in the area of the border district of Malinau. Methods of analysis are used in namely descriptive analysis that represent analysis of land use and analysis of movement activities of the population, level analysis facility and infrastructure, economy analysis that represent top commodity determination analysis (LQ and Growth Share) and accessibility. The results of the study showed that the condition of the Malinau Regency border come within the gap as seen from the contributions of infrastructure repair facilities and accessibility advocates, communities, scattered seed commodities come within the borders and human resources with the condition of the most Upstream Bahau town in the backwaters of the town more. There are a few problems that cause the condition area of the border experiencing inequality, lack of human resources, poor infrastructure, lack of accessibility and low levels of security so that it brings development recommendations was the development of the flagship commodities and infrastructure as well as supporting community economic infrastructure, as well as human resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border" title="border">border</a>, <a href="https://publications.waset.org/abstracts/search?q=economy" title=" economy"> economy</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=Malinau" title=" Malinau"> Malinau</a> </p> <a href="https://publications.waset.org/abstracts/19787/study-of-the-economic-development-of-border-areas-malinau-district" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19787.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">623</span> Digital Humanities in The US/Mexico Borderlands: Activism, Literature, and Border Crossers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Martin%20Camps">Martin Camps</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The two-thousand-mile border that divides the United States and Mexico is a “contact zone” of cultural friction and unbalanced power relations as defined by Mary Louise Pratt. The interest of this paper is to analyze digital platforms created to address the study and comprehension of the borderlands with pedagogical and research reasons. The paper explores ways to engage students in archival and analytical practices to build a repository of resources, links, and digital tools and consider how to adapt them to the study of the borderlands. Sites such as “Torn Apart / Separados,” “Digital Borderlands,” “Borderlands Archives Cartography,” and “Juaritos Literario” show visualizations, mapping, and access to materials and marginal literature on the border phenomenon. Analyzing these projects contributes to highlighting digital projects and the study of the border and how to engage in activism via the study of literature and the representation of a human tragedy that underscores the divisions and biopolitics imposed on the Global South and imagine the digital border futures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=borderlands" title="borderlands">borderlands</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20humanities" title=" digital humanities"> digital humanities</a>, <a href="https://publications.waset.org/abstracts/search?q=activism" title=" activism"> activism</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20literature" title=" border literature"> border literature</a> </p> <a href="https://publications.waset.org/abstracts/165911/digital-humanities-in-the-usmexico-borderlands-activism-literature-and-border-crossers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165911.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">77</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">622</span> The Tourist Satisfaction on Logo Design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Panupong%20Chanplin">Panupong Chanplin</a>, <a href="https://publications.waset.org/abstracts/search?q=Wilailuk%20Mepracha"> Wilailuk Mepracha</a>, <a href="https://publications.waset.org/abstracts/search?q=Sathapath%20Kilaso"> Sathapath Kilaso</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aims of this research were twofold: 1) to logo design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province and 2) to study the level of tourist satisfaction towards logo design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province. Tourist satisfaction was measured using four criteria: a unique product identity, ease of remembrance, product utility, and beauty/impressiveness. The researcher utilized a probability sampling method via simple random sampling. The sample consisted of 30 tourists in the Huay Kon Border Market. Statistics utilized for data analysis were percentage, mean, and standard deviation. The results suggest that tourist had high levels of satisfaction towards all four criteria of the logo design that was designed to target them. This study proposes that specifically logo designed of Huay Kon Border Market could also be implemented with other real media already available on the market. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=satisfaction" title="satisfaction">satisfaction</a>, <a href="https://publications.waset.org/abstracts/search?q=logo" title=" logo"> logo</a>, <a href="https://publications.waset.org/abstracts/search?q=design" title=" design"> design</a>, <a href="https://publications.waset.org/abstracts/search?q=Huay%20Kon%20border%20market" title=" Huay Kon border market"> Huay Kon border market</a> </p> <a href="https://publications.waset.org/abstracts/82085/the-tourist-satisfaction-on-logo-design-of-huay-kon-border-market-chaloemphrakiat-district-nan-province" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82085.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">223</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">621</span> Design and Implementation of an Effective Machine Learning Approach to Crime Prediction and Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashish%20Kumar">Ashish Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Kaptan%20Singh"> Kaptan Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Amit%20Saxena"> Amit Saxena</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, it is believed that crimes have the greatest impact on a person's ability to progress financially and personally. Identifying places where individuals shouldn't go is crucial for preventing crimes and is one of the key considerations. As society and technologies have advanced significantly, so have crimes and the harm they wreak. When there is a concentration of people in one place and changes happen quickly, it is even harder to prevent. Because of this, many crime prevention strategies have been embraced as a component of the development of smart cities in numerous cities. However, crimes can occur anywhere; all that is required is to identify the pattern of their occurrences, which will help to lower the crime rate. In this paper, an analysis related to crime has been done; information related to crimes is collected from all over India that can be accessed from anywhere. The purpose of this paper is to investigate the relationship between several factors and India's crime rate. The review has covered information related to every state of India and their associated regions of the period going in between 2001- 2014. However various classes of violations have a marginally unique scope over the years. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=K-nearest%20neighbor" title="K-nearest neighbor">K-nearest neighbor</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forest" title=" random forest"> random forest</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20tree" title=" decision tree"> decision tree</a>, <a href="https://publications.waset.org/abstracts/search?q=pre-processing" title=" pre-processing"> pre-processing</a> </p> <a href="https://publications.waset.org/abstracts/161449/design-and-implementation-of-an-effective-machine-learning-approach-to-crime-prediction-and-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161449.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">620</span> Efficiency Analysis of Trader in Thailand and Laos Border Trade: Case Study of Textile and Garment Products</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Varutorn%20Tulnawat">Varutorn Tulnawat</a>, <a href="https://publications.waset.org/abstracts/search?q=Padcharee%20Phasuk"> Padcharee Phasuk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper investigates the issue of China’s dumping on border trade between Thailand and Laos. From the pass mostly, the border trade goods are traditional textile and garment mainly served locals and tourists which majority of traders is of small and medium size. In the present day the competition is fierce, the volume of trade has expanded far beyond its original intent. The major competitors in Thai-Laos border trade are China, Vietnam and also South Korea. This research measures and compares the efficiency and ability to survive the onslaught of Thai and Laos firm along Thailand (Nong Kai province) and Laos (Vientiane) border. Two attack strategies are observed, price cutting and incense such as full facilitation for big volume order. Data Envelopment Analysis (DEA) is applied to data surveyed from 90 Thai and Laos entrepreneurs. The expected results are the proportion of efficiency and inefficiency firms. Points of inefficiency and suggested improvement are also discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20trade" title="border trade">border trade</a>, <a href="https://publications.waset.org/abstracts/search?q=dea" title=" dea"> dea</a>, <a href="https://publications.waset.org/abstracts/search?q=textile" title=" textile"> textile</a>, <a href="https://publications.waset.org/abstracts/search?q=garment" title=" garment"> garment</a> </p> <a href="https://publications.waset.org/abstracts/65905/efficiency-analysis-of-trader-in-thailand-and-laos-border-trade-case-study-of-textile-and-garment-products" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65905.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">245</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">619</span> Strengthening the Security of the Thai-Myanmar Border Trade of the People in the Mae Sot Customs Checkpoint Area, Tak Province</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sakapas%20Saengchai">Sakapas Saengchai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A Study on Strengthening the Security of the Thai-Myanmar Border Trade Area of the people in the Mae Sot customs checkpoint area, Tak province, was designed as a qualitative research study. Its objectives were to study the principles of strengthening border trade security and enhancing people's participation. To develop a border trade model that enhances the spatial economy and improves people's quality of life by collecting data using a participant observation method. In-depth interview group chats border checkpoint administrators, Mae Sot customs checkpoint, Tak province, private entrepreneurs, community leaders, and the opening of a community forum to exchange opinions with people in the area. The results of the study found that 1. Security development is to promote crime reduction. Reduce drug trafficking problems Smuggling and human trafficking have been reduced. Including planning and preparation to protect people from terrorism, epidemics, and communicable diseases, including cooperation with Burma on border rules for people and workers, 2. Wealth development is to promote investment. Transport links value chain logistics Cross-border goods and services on the Thai-Myanmar border Both amending regulations and laws to promote fair trade. Emphasis on convenient and fast service as well as promoting the Thai border area to be a tourist attraction that can create prosperity and income for the community in the area By using balanced natural resources, with production and consumption that are environmentally friendly, and emphasizes the participation of the public sector, the private sector, and people from all sectors in the sustainable development of the Thai border. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20trade" title=" border trade"> border trade</a>, <a href="https://publications.waset.org/abstracts/search?q=customs" title=" customs"> customs</a>, <a href="https://publications.waset.org/abstracts/search?q=participation" title=" participation"> participation</a>, <a href="https://publications.waset.org/abstracts/search?q=people" title=" people"> people</a> </p> <a href="https://publications.waset.org/abstracts/140124/strengthening-the-security-of-the-thai-myanmar-border-trade-of-the-people-in-the-mae-sot-customs-checkpoint-area-tak-province" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140124.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">181</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">618</span> The Road to Abolition of Death Penalty in China: With the Perspective of the Ninth Amendment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huang%20Gui">Huang Gui</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper supplies some possible approaches of the death penalty reform in China basic on the analyzing the reformation conducted by the Ninth Amendment. There now are 46 crimes punishable by death, and this penalty still plays a significant role in the criminal punishment structure. In order to abolish entirely the death penalty in Penal Code, the legislature of China should gradually abolish the death penalty for the nonviolent crimes and then for the nonlethal violent crimes and finally for the lethal violent crimes. In the case where the death penalty has not yet been abolished completely, increasing the applicable conditions of suspension of execution of death penalty and reducing the scope of applicable objects (elderly defendant and other kinds of special objects) of death penalty would be an effective road to control and limit the use of death penalty in judicial practice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=death%20penalty" title="death penalty">death penalty</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20eighth%20amendment" title=" the eighth amendment"> the eighth amendment</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20ninth%20amendment" title=" the ninth amendment"> the ninth amendment</a>, <a href="https://publications.waset.org/abstracts/search?q=suspension%20of%20execution%20of%20death" title=" suspension of execution of death"> suspension of execution of death</a>, <a href="https://publications.waset.org/abstracts/search?q=immediate%20execution%20of%20death" title=" immediate execution of death"> immediate execution of death</a>, <a href="https://publications.waset.org/abstracts/search?q=China" title=" China"> China</a> </p> <a href="https://publications.waset.org/abstracts/45577/the-road-to-abolition-of-death-penalty-in-china-with-the-perspective-of-the-ninth-amendment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45577.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">478</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">617</span> Border Trade Policy to Promote Thailand - Myanmar Mae Sai, Chiang Rai Province</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sakapas%20Saengchai">Sakapas Saengchai</a>, <a href="https://publications.waset.org/abstracts/search?q=Pichamon%20Chansuchai"> Pichamon Chansuchai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Research Thai- Myanmar Border Trade Promotion Policy, Mae Sai District, Chiang Rai Province The objectives of this study were to study the policy of promoting Thai- Myanmar border trade in Mae Sai district, Chiang Rai province. And suitable models for the development of border trade in Mae Sai. Chiang Rai province This research uses qualitative methodology. The method of collecting data from research papers. Participatory Observation In-depth interviews in which the information is important, the governor of Chiang Rai. Chiang Rai Customs Service Executive Office of Mae Sai Immigration Bureau Maesai Chamber of Commerce and Private Entrepreneurs By specific sampling Data analysis uses content analysis. The study indicated that Border Trade Promotion Policy The direction taken by the government to focus on developing 1. Security is further reducing crime. Smuggling and human trafficking Including the preparation to protect people from terrorism and natural disasters. And cooperation with Burma on border security. 2. The development of wealth is the promotion of investment. The transport links, logistics value chain. Products and services across the Thai-Myanmar border. Improve the regulations and laws to promote fair trade. Convenient and fast 3. Sustainable development is the ability to generate income, quality of life of people in the Thai border to increase continuously. By using balanced natural resources, production and consumption are environmentally friendly. Which featured the participation of all sectors of the public and private sectors in the region to drive the development of the border with Thailand. Chiang Rai province To be more competitive . <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Border" title="Border">Border</a>, <a href="https://publications.waset.org/abstracts/search?q=Trade" title=" Trade"> Trade</a>, <a href="https://publications.waset.org/abstracts/search?q=Policy" title=" Policy"> Policy</a>, <a href="https://publications.waset.org/abstracts/search?q=Promote" title=" Promote"> Promote</a> </p> <a href="https://publications.waset.org/abstracts/104489/border-trade-policy-to-promote-thailand-myanmar-mae-sai-chiang-rai-province" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104489.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">171</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">616</span> International Criminal Prosecution and Core International Crimes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ikediobi%20Lottanna%20Samuel">Ikediobi Lottanna Samuel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Days are gone when perpetrators of core international crimes hide under the cloak of sovereignty to go with impunity. The principle of international criminal responsibility is a reality. This move to end impunity for violation of human rights has led to the creation of international and hybrid tribunals, a permanent international criminal court, and increased prosecution of human rights violations in domestic courts. This article examines the attempts by the international community to bring perpetrators of heinous crimes to book. The work reveals the inadequacy of the current international mechanism for prosecuting core international crimes in order to end the culture of impunity and entrench the culture of accountability. It also identifies that ad hoc international criminal tribunals and the international criminal court face similar challenges ranging from lack of cooperation by nation states, non-existence of hierarchy of crimes, lack of effective enforcement mechanism, limited prosecutorial capacity and agenda, difficulty in apprehending suspects, difficulty in blending different legal tradition, absence of a coherent sentencing guideline, distant location of courts, selective indictment, etc. These challenges adversely affect the functioning of these courts. It is suggested that a more helpful way to end impunity would be to have a more robust and synergistic relationship between national, regional, and international approaches to prosecuting core international crimes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=prosecution" title="prosecution">prosecution</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal" title=" criminal"> criminal</a>, <a href="https://publications.waset.org/abstracts/search?q=international" title=" international"> international</a>, <a href="https://publications.waset.org/abstracts/search?q=tribunal" title=" tribunal"> tribunal</a>, <a href="https://publications.waset.org/abstracts/search?q=justice" title=" justice"> justice</a>, <a href="https://publications.waset.org/abstracts/search?q=ad%20hoc" title=" ad hoc"> ad hoc</a> </p> <a href="https://publications.waset.org/abstracts/158644/international-criminal-prosecution-and-core-international-crimes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158644.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">214</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">615</span> Long-Term Modal Changes in International Traffic - Example of the Polish Eastern Border</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tomasz%20Komornicki">Tomasz Komornicki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The possibilities of cross-border traffic depend on the degree of permeability of a given border as well as the state of the existing transport infrastructure. The aim of this paper is to identify the impact of economic transformation, EU accession, and infrastructure development on modal shifts in border traffic through the Polish eastern boundary. In the 1980s railway was still the main mode of cross-border transport in Poland. At the beginning of the 1990s, the role of the road and rail transborder passenger traffic was similar, but since 1993, the role of rail was decreasing. The general decline in rail infrastructure in Poland continued uninterruptedly until accession to the European Union. The slow opposite trend can be observed later as a result of the inflow of European funds. In the countries neighbouring Poland from the east, these processes took place with some delay, and the loss of railway position was not so drastic. Therefore, cross-border railway connections have been maintained for quite a long time since the break-up of the USSR. However, finally, cross-border rail transport proved to be completely inflexible in relation to both economic, geopolitical, and transport transformations. It has been shown that the current modal split of the passenger border traffic was shaped by the following factors: a) closure of many transborder railway lines, especially local ones; b) the signing of an agreement on minor border traffic with Ukraine; c) rapidly growing number of citizens of Ukraine working in Poland (unofficial transportation of workers by car directly to their workplaces in Poland); d) the emergence of low-cost air connections between Ukraine and Poland and the growing role of air transport in the Russia-Poland relationship. The summary points to the possibility of a renewed increase in the importance of rail transport on the eastern border of the European Union. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=modal%20change" title="modal change">modal change</a>, <a href="https://publications.waset.org/abstracts/search?q=border" title=" border"> border</a>, <a href="https://publications.waset.org/abstracts/search?q=rail%20transport" title=" rail transport"> rail transport</a>, <a href="https://publications.waset.org/abstracts/search?q=Poland" title=" Poland"> Poland</a> </p> <a href="https://publications.waset.org/abstracts/138771/long-term-modal-changes-in-international-traffic-example-of-the-polish-eastern-border" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138771.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">200</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">614</span> The Anti-Cyber and Information Technology Crimes Law on Information Access and Dissemination by Egyptian Journalists</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Miral%20Sabry%20AlAshry">Miral Sabry AlAshry</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main objective of the study is to investigate the effectiveness of Egyptian Journalists through the Anti-Cyber and Information Technology Crimes Law, as well as its implications for journalistic practice and the implications for press freedom in Egypt. Questionnaires were undertaken with 192 journalists representing four official newspapers, and in-depth interviews were held with 15 journalists. The study used an Authoritarian theory as a theoretical framework. The study revealed that the government placed restrictions on journalists by using the law to oppress them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-cyber%20and%20information%20technology%20crimes%20law" title="anti-cyber and information technology crimes law">anti-cyber and information technology crimes law</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20legislation" title=" media legislation"> media legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20information" title=" personal information"> personal information</a>, <a href="https://publications.waset.org/abstracts/search?q=Egyptian%20constitution" title=" Egyptian constitution"> Egyptian constitution</a> </p> <a href="https://publications.waset.org/abstracts/149218/the-anti-cyber-and-information-technology-crimes-law-on-information-access-and-dissemination-by-egyptian-journalists" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149218.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">373</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">613</span> Criminals not Addicts: Newspaper Framing of Gambling-Related Crimes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cameron%20Brown">Cameron Brown</a>, <a href="https://publications.waset.org/abstracts/search?q=Jessica%20%20Vanburen"> Jessica Vanburen</a>, <a href="https://publications.waset.org/abstracts/search?q=Scott%20Hunt"> Scott Hunt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study analyzed 411 international newspaper stories pertaining to gambling-related crimes from January 2013 to December 2014. These stories included accounts of crimes committed to fund gambling or pay gambling debts or that occurred at gambling establishments. Our analysis pays particular attention to those crimes that were imputed to be committed by “problem” or “addictive” gamblers, who commit crimes to fund gambling or pay gambling debts. Previous research on problem/addictive gambling has focused on its etiology or prevalence rates and has not attended to the media portrayals of this behavior and its association with crime. Using frame analysis concepts, the data demonstrate that the newspaper stories typically frame the events as “crimes” and not the result of illness or addiction. The “evidence” of motive that could have indicated psychological problems or additions were rather framed as “criminal motive.” This framing practice advances an identity of a “problem/addictive gambler” as a deviant criminal perpetrator and not a victim of addiction. The paper concludes with a discussion of how these findings can be used to advance research on social portrayals of problem/addictive gamblers. Specifically, we consider how these media frames impede an understanding of problem/addictive gambling as a public health problem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=problem%20gambling" title="problem gambling">problem gambling</a>, <a href="https://publications.waset.org/abstracts/search?q=addictive%20gambling" title=" addictive gambling"> addictive gambling</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20resonace" title=" identity resonace"> identity resonace</a>, <a href="https://publications.waset.org/abstracts/search?q=frame%20analysis" title=" frame analysis"> frame analysis</a> </p> <a href="https://publications.waset.org/abstracts/64816/criminals-not-addicts-newspaper-framing-of-gambling-related-crimes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64816.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">303</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">612</span> The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Akram%20Waheb%20Nasef%20Alzordoky">Akram Waheb Nasef Alzordoky</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20privacy%20issues" title="social networks privacy issues">social networks privacy issues</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20security%20issues" title=" social networks security issues"> social networks security issues</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20privacy%20precautions%20measures" title=" social networks privacy precautions measures"> social networks privacy precautions measures</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20security%20precautions%20measures" title=" social networks security precautions measures"> social networks security precautions measures</a> </p> <a href="https://publications.waset.org/abstracts/190127/the-effect-of-artificial-intelligence-on-international-law-legal-security-and-privacy-issues" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190127.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">611</span> Sexual and Gender Based Crimes in International Criminal Law: Moving Forwards or Backwards</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khadija%20Ali">Khadija Ali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Prosecution of sexual violence in international criminal law requires not only an understanding of the mechanisms employed to prosecute sexual violence but also a critical analysis of the factors facilitating perpetuation of such crimes in armed conflicts. The extrapolations laid out in this essay delve into the jurisprudence of international criminal law pertaining to sexual and gender based violence followed by the core question of this essay: Has the entrenchment of sexual violence as international crimes in the Rome Statute been successful to address such violence in armed conflicts? <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conflict" title="conflict">conflict</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20criminal%20law" title=" international criminal law"> international criminal law</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20violence" title=" sexual violence"> sexual violence</a> </p> <a href="https://publications.waset.org/abstracts/35603/sexual-and-gender-based-crimes-in-international-criminal-law-moving-forwards-or-backwards" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35603.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">572</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">610</span> Stressors Faced by Border Security Officers: The Singapore Experience</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jansen%20Ang">Jansen Ang</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Neo"> Andrew Neo</a>, <a href="https://publications.waset.org/abstracts/search?q=Dawn%20Chia"> Dawn Chia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20security" title="border security">border security</a>, <a href="https://publications.waset.org/abstracts/search?q=Singapore" title=" Singapore"> Singapore</a>, <a href="https://publications.waset.org/abstracts/search?q=stress" title=" stress"> stress</a>, <a href="https://publications.waset.org/abstracts/search?q=operations" title=" operations"> operations</a> </p> <a href="https://publications.waset.org/abstracts/41300/stressors-faced-by-border-security-officers-the-singapore-experience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41300.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">325</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=21">21</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=22">22</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20crimes&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>