CINXE.COM
Search results for: crime prediction
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <script> var _paq = window._paq = window._paq || []; /* tracker methods like "setCustomDimension" should be called before "trackPageView" */ _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="//matomo.waset.org/"; _paq.push(['setTrackerUrl', u+'matomo.php']); _paq.push(['setSiteId', '2']); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s); })(); </script> <!-- End Matomo Code --> <title>Search results for: crime prediction</title> <meta name="description" content="Search results for: crime prediction"> <meta name="keywords" content="crime prediction"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="crime prediction" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2025/2026/2027">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="crime prediction"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2699</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: crime prediction</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2639</span> Demographic Determinants of Spatial Patterns of Urban Crime </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Natalia%20Sypion-Dutkowska">Natalia Sypion-Dutkowska</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Abstract — The main research objective of the paper is to discover the relationship between the age groups of residents and crime in particular districts of a large city. The basic analytical tool is specific crime rates, calculated not in relation to the total population, but for age groups in a different social situation - property, housing, work, and representing different generations with different behavior patterns. They are the communities from which criminals and victims of crimes come. The analysis of literature and national police reports gives rise to hypotheses about the ability of a given age group to generate crime as a source of offenders and as a group of victims. These specific indicators are spatially differentiated, which makes it possible to detect socio-demographic determinants of spatial patterns of urban crime. A multi-feature classification of districts was also carried out, in which specific crime rates are the diagnostic features. In this way, areas with a similar structure of socio-demographic determinants of spatial patterns on urban crime were designated. The case study is the city of Szczecin in Poland. It has about 400,000 inhabitants and its area is about 300 sq km. Szczecin is located in the immediate vicinity of Germany and is the economic, academic and cultural capital of the region. It also has a seaport and an airport. Moreover, according to ESPON 2007, Szczecin is the Transnational and National Functional Urban Area. Szczecin is divided into 37 districts - auxiliary administrative units of the municipal government. The population of each of them in 2015-17 was divided into 8 age groups: babes (0-2 yrs.), children (3-11 yrs.), teens (12-17 yrs.), younger adults (18-30 yrs.), middle-age adults (31-45 yrs.), older adults (46-65 yrs.), early older (66-80) and late older (from 81 yrs.). The crimes reported in 2015-17 in each of the districts were divided into 10 groups: fights and beatings, other theft, car theft, robbery offenses, burglary into an apartment, break-in into a commercial facility, car break-in, break-in into other facilities, drug offenses, property damage. In total, 80 specific crime rates have been calculated for each of the districts. The analysis was carried out on an intra-city scale, this is a novel approach as this type of analysis is usually carried out at the national or regional level. Another innovative research approach is the use of specific crime rates in relation to age groups instead of standard crime rates. Acknowledgments: This research was funded by the National Science Centre, Poland, registration number 2019/35/D/HS4/02942. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=age%20groups" title="age groups">age groups</a>, <a href="https://publications.waset.org/abstracts/search?q=determinants%20of%20crime" title=" determinants of crime"> determinants of crime</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20crime%20pattern" title=" spatial crime pattern"> spatial crime pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=urban%20crime" title=" urban crime"> urban crime</a> </p> <a href="https://publications.waset.org/abstracts/136622/demographic-determinants-of-spatial-patterns-of-urban-crime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136622.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">175</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2638</span> Fear of Gender-Based Crime and Women Empowerment: An Empirical Study among the Urban Residents of Bangladesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Ashraful%20Alam">Mohammad Ashraful Alam</a>, <a href="https://publications.waset.org/abstracts/search?q=Biro%20Judit"> Biro Judit</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fear of gender-based crime and fear of crime victimization for women is a major concern in the urban areas of Bangladesh. Based on the recent data from various human rights organizations and international literature the study found that gender-based crime especially sexual assault and rape are increasing in Bangladesh at a significant rate in comparison to other countries. The major focus of the study was to identify the relationship between fear of gender-based crime and women empowerment. To explore the fact the study followed the mixed methodological approach comprising with quantitative and qualitative methods and used secondary information from national and international sources. Corresponding global pictures the present study found that gender, age, complexion, social position, and ethnicity were more common factors of sexual assault and victimization in Bangladesh which lead to women become more fearful about crime victimization than men. Fear of gender-based crime traumatizes women which leads to withdrawal of their non-essential everyday works and some time from the essential works based on their social position, financial status, and social honor in the society. The increasing crime rate also increases the propensity to fear of criminal victimization, traumatization, and feeling of helplessness which make them vulnerable. The patriarchal culture and practices in Bangladesh based on religious culture and established social norms women always feel defenseless therefore they withdraw themselves from various social activities and own interest. Women who have already victimized feel more fear and become traumatized, and who do not victimize yet but know the severity of victimization from the media and others’ have the feeling of fear of crime. Women who find themselves as weak bonding and low networks with their neighbors and living for a short duration have a feeling of more fear and avoid visiting a certain place in a certain time and avoid some social activities. The study found the young women have more possibilities to become victimized through the feeling of fear of crime is higher among elderly women than young. Though women feel fear of all kinds of crime but usually all aged women are more fearful of sexual assault and rape than other violent crimes. Therefore, elderly women and another person in the family does not allow younger girls to go and involve outside activities to secure their family status. On the other hand, fear of crime in public transport is more common to all aged women at a higher level and sometimes they compromise their freedom, independence, financial opportunities, the job only to avoid the perceived threat, and save their social and cultural honor. The study also explores that fear of crime does not always depend on crime rate but the crime news, the severity of the crime, delay justice, the ineffectiveness of police, bail of criminals, corruption and political favoritism, etc. Finally, the study shows that the fear of gender-based crime and violence is working as a potential barrier to ensuring women's empowerment in Bangladesh. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=compromise%20personal%20freedom" title="compromise personal freedom">compromise personal freedom</a>, <a href="https://publications.waset.org/abstracts/search?q=fear%20of%20crime" title=" fear of crime"> fear of crime</a>, <a href="https://publications.waset.org/abstracts/search?q=fear%20of%20gender-based%20crime" title=" fear of gender-based crime"> fear of gender-based crime</a>, <a href="https://publications.waset.org/abstracts/search?q=fear%20of%20violent%20crime%20victimization" title=" fear of violent crime victimization"> fear of violent crime victimization</a>, <a href="https://publications.waset.org/abstracts/search?q=rape" title=" rape"> rape</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20assaults" title=" sexual assaults"> sexual assaults</a>, <a href="https://publications.waset.org/abstracts/search?q=withdrawal%20from%20regular%20activities" title=" withdrawal from regular activities"> withdrawal from regular activities</a>, <a href="https://publications.waset.org/abstracts/search?q=women%20empowerment" title=" women empowerment"> women empowerment</a> </p> <a href="https://publications.waset.org/abstracts/128701/fear-of-gender-based-crime-and-women-empowerment-an-empirical-study-among-the-urban-residents-of-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128701.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">147</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2637</span> An Assessment on the Impact of Community Policing in Crime Prevention and Control in Fagge Local Government Area, Kano State, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aliyu%20Shitu%20Said">Aliyu Shitu Said</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the major setbacks of every society is the proliferation of crimes that results in the inducement of fear, destruction of properties and loss of lives of people. The rising incidence of crime and general insecurity rate in the society and the inability of the policing agencies to curtail the menace necessitated the introduction of community policing in order to have a collaborative effort with community members in addressing the problem of crime. Thus, this study assessed the impact of community policing in crime prevention and control in Fagge Local Government area, Kano State, Nigeria. The study also examined the elements, roles, and challenges of community policing in crime prevention and control in the study area. The study adopted Broken Window and Routine Activity theories as frame of analysis. Mixed methods of data collection (quantitative and qualitative) were utilized for the study. Multi stage and purposive sampling techniques were adopted in selection of the study population. A total of 308 respondents were sampled for the study. These include 300 members of the public who were sampled through a multi stage sampling for questionnaire administration and 8 other respondents who were purposively sampled for in-depth interview. Findings of the study revealed that community policing has significant impact on crime prevention and control in the study area. Findings of the study further revealed that the elements and roles of community policing are effective and fully utilized, and there is cordial relationship between the police and the community members in the study area. This study therefore recommends that government should provide adequate support to community policing programmes and give more awareness to public, so as to boost the morale of the community in having a collaborative effort with the police in crime prevention and control. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community" title="community">community</a>, <a href="https://publications.waset.org/abstracts/search?q=policing" title=" policing"> policing</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=control" title=" control"> control</a> </p> <a href="https://publications.waset.org/abstracts/176808/an-assessment-on-the-impact-of-community-policing-in-crime-prevention-and-control-in-fagge-local-government-area-kano-state-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176808.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2636</span> Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jonathan%20W.%20Z.%20Lim">Jonathan W. Z. Lim</a>, <a href="https://publications.waset.org/abstracts/search?q=Vrizlynn%20L.%20L.%20Thing"> Vrizlynn L. L. Thing</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime%20motivations" title="crime motivations">crime motivations</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20prevention" title=" crime prevention"> crime prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title=" cybercrime"> cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=ex-cyber%20criminals" title=" ex-cyber criminals"> ex-cyber criminals</a> </p> <a href="https://publications.waset.org/abstracts/143415/cybercrime-stage-based-intervention-through-the-eyes-of-a-cyber-threat-actor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143415.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">145</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2635</span> Analysis on Prediction Models of TBM Performance and Selection of Optimal Input Parameters</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hang%20Lo%20Lee">Hang Lo Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Ki%20Il%20Song"> Ki Il Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Hee%20Hwan%20Ryu"> Hee Hwan Ryu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An accurate prediction of TBM(Tunnel Boring Machine) performance is very difficult for reliable estimation of the construction period and cost in preconstruction stage. For this purpose, the aim of this study is to analyze the evaluation process of various prediction models published since 2000 for TBM performance, and to select the optimal input parameters for the prediction model. A classification system of TBM performance prediction model and applied methodology are proposed in this research. Input and output parameters applied for prediction models are also represented. Based on these results, a statistical analysis is performed using the collected data from shield TBM tunnel in South Korea. By performing a simple regression and residual analysis utilizinFg statistical program, R, the optimal input parameters are selected. These results are expected to be used for development of prediction model of TBM performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=TBM%20performance%20prediction%20model" title="TBM performance prediction model">TBM performance prediction model</a>, <a href="https://publications.waset.org/abstracts/search?q=classification%20system" title=" classification system"> classification system</a>, <a href="https://publications.waset.org/abstracts/search?q=simple%20regression%20analysis" title=" simple regression analysis"> simple regression analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=residual%20analysis" title=" residual analysis"> residual analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=optimal%20input%20parameters" title=" optimal input parameters"> optimal input parameters</a> </p> <a href="https://publications.waset.org/abstracts/52738/analysis-on-prediction-models-of-tbm-performance-and-selection-of-optimal-input-parameters" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52738.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2634</span> Aporia, Daze and Arcanes during Visit to Scene of Crime: A Case History</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20S.%20Grewal">A. S. Grewal</a>, <a href="https://publications.waset.org/abstracts/search?q=Sh.%20Dharambir"> Sh. Dharambir</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20S.%20Sangwan"> R. S. Sangwan</a>, <a href="https://publications.waset.org/abstracts/search?q=Vikas%20Dhanda"> Vikas Dhanda </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Every Scene of Crime is of different kind in nature. Sometimes we see such type of circumstances that we become confused to judge whether the case is of homicide or suicide. In such circumstances a doyen is asked for the option. On the basis of his esoteric knowledge he finds such clues which force the sleuth to change the under sections of Indian penal Code. Here we have examined a case by visiting Scene of Crime and found that a person was found lying dead in a room. There was only one passage which was found opened, the pistol along with the fired cartridge case, misfired cartridge were lying on the spot. Observation method, mathematical calculations, chemical examination and other aspects were considered. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=country-made%20pistol" title="country-made pistol">country-made pistol</a>, <a href="https://publications.waset.org/abstracts/search?q=misfired%20cartridge" title=" misfired cartridge"> misfired cartridge</a>, <a href="https://publications.waset.org/abstracts/search?q=fired%20cartridge%20case" title=" fired cartridge case"> fired cartridge case</a>, <a href="https://publications.waset.org/abstracts/search?q=blackening" title=" blackening"> blackening</a>, <a href="https://publications.waset.org/abstracts/search?q=nitrite" title=" nitrite"> nitrite</a> </p> <a href="https://publications.waset.org/abstracts/7867/aporia-daze-and-arcanes-during-visit-to-scene-of-crime-a-case-history" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7867.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2633</span> Application of Biosensors in Forensic Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shirin%20jalili">Shirin jalili</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadi%20Shirzad"> Hadi Shirzad</a>, <a href="https://publications.waset.org/abstracts/search?q=Samaneh%20Nabavi"> Samaneh Nabavi</a>, <a href="https://publications.waset.org/abstracts/search?q=Somayeh%20Khanjani"> Somayeh Khanjani </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Biosensors in forensic analysis are ideal biological tools that can be used for rapid and sensitive initial screening and testing to detect of suspicious components like biological and chemical agent in crime scenes. The wide use of different biomolecules such as proteins, nucleic acids, microorganisms, antibodies and enzymes makes it possible. These biosensors have great advantages such as rapidity, little sample manipulation and high sensitivity, also Because of their stability, specificity and low cost they have become a very important tool to Forensic analysis and detection of crime. In crime scenes different substances such as rape samples, Semen, saliva fingerprints and blood samples, act as a detecting elements for biosensors. On the other hand, successful fluid recovery via biosensor has the propensity to yield a highly valuable source of genetic material, which is important in finding the suspect. Although current biological fluid testing techniques are impaired for identification of body fluids. But these methods have disadvantages. For example if they are to be used simultaneously, Often give false positive result. These limitations can negatively result the output of a case through missed or misinterpreted evidence. The use of biosensor enable criminal researchers the highly sensitive and non-destructive detection of biological fluid through interaction with several fluid-endogenous and other biological and chemical contamination at the crime scene. For this reason, using of the biosensors for detecting the biological fluid found at the crime scenes which play an important role in identifying the suspect and solving the criminal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biosensors" title="biosensors">biosensors</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20analysis" title=" forensic analysis"> forensic analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=biological%20fluid" title=" biological fluid"> biological fluid</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20detection" title=" crime detection "> crime detection </a> </p> <a href="https://publications.waset.org/abstracts/28079/application-of-biosensors-in-forensic-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28079.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1127</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2632</span> Victim and Active Subject of the Crime of Violence in Family Reflected in the Criminal Code of the Republic of Moldova</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nastas%20Andrei">Nastas Andrei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ensuring accessible and functional justice is one of the priority objectives of judicial reform, and protecting the family against any acts that may harm its existence is one of the first priorities that have determined the need to defend the social order. In this context, the correlative approach of the victim and the aggressor becomes relevant as a subject of the crime of domestic violence. Domestic violence is a threat of physical, moral, or material harm, externalized now or in the past, or its provocation, which is characterized by a constant tendency to escalate and a high probability of repetitiveness in the relationship between the social partners, regardless of their legal status or domicile.Studying the legal support to identify the particularities of the victim and the subject of the crime of domestic violence facilitates the identification of the determinants of this crime, therefore, the development of means to prevent domestic violence. The scientific research has been effectuated on the base of the proper and authentic empirical data obtained from the analysis of the judicial practice in the matter of domestic violence, as well as being based on the most recent scientific issues in the field of the Substantive Criminal Law and other branches of science (criminology, psychology, sociology, pedagogy). As a result of the study performed, there have been formulated conclusions and interpretations able to be used in the science of the Substantive Criminal law, as well as in the practice of application of the legal norm in the matter of domestic violence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=family%20violence" title="family violence">family violence</a>, <a href="https://publications.waset.org/abstracts/search?q=victim" title=" victim"> victim</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=violence" title=" violence"> violence</a> </p> <a href="https://publications.waset.org/abstracts/148610/victim-and-active-subject-of-the-crime-of-violence-in-family-reflected-in-the-criminal-code-of-the-republic-of-moldova" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148610.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2631</span> Diesel Fault Prediction Based on Optimized Gray Neural Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Han%20Bing">Han Bing</a>, <a href="https://publications.waset.org/abstracts/search?q=Yin%20Zhenjie"> Yin Zhenjie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to analyze the status of a diesel engine, as well as conduct fault prediction, a new prediction model based on a gray system is proposed in this paper, which takes advantage of the neural network and the genetic algorithm. The proposed GBPGA prediction model builds on the GM (1.5) model and uses a neural network, which is optimized by a genetic algorithm to construct the error compensator. We verify our proposed model on the diesel faulty simulation data and the experimental results show that GBPGA has the potential to employ fault prediction on diesel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fault%20prediction" title="fault prediction">fault prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title=" neural network"> neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=GM%281" title=" GM(1"> GM(1</a>, <a href="https://publications.waset.org/abstracts/search?q=5%29%20genetic%20algorithm" title="5) genetic algorithm">5) genetic algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=GBPGA" title=" GBPGA"> GBPGA</a> </p> <a href="https://publications.waset.org/abstracts/48844/diesel-fault-prediction-based-on-optimized-gray-neural-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48844.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">311</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2630</span> Community Perceptions and Attitudes Regarding Wildlife Crime in South Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Louiza%20C.%20Duncker">Louiza C. Duncker</a>, <a href="https://publications.waset.org/abstracts/search?q=Duarte%20Gon%C3%A7alves"> Duarte Gonçalves</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wildlife crime is a complex problem with many interconnected facets, which are generally responded to in parts or fragments in efforts to “break down” the complexity into manageable components. However, fragmentation increases complexity as coherence and cooperation become diluted. A whole-of-society approach has been developed towards finding a common goal and integrated approach to preventing wildlife crime. As part of this development, research was conducted in rural communities adjacent to conservation areas in South Africa to define and comprehend the challenges faced by them, and to understand their perceptions of wildlife crime. The results of the research showed that the perceptions of community members varied - most were in favor of conservation and of protecting rhinos, only if they derive adequate benefit from it. Regardless of gender, income level, education level, or access to services, conservation was perceived to be good and bad by the same people. Even though people in the communities are poor, a willingness to stop rhino poaching does exist amongst them, but their perception of parks not caring about people triggered an attitude of not being willing to stop, prevent or report poaching. Understanding the nuances, the history, the interests and values of community members, and the drivers behind poaching mind-sets (intrinsic or driven by transnational organized crime) is imperative to create sustainable and resilient communities on multiple levels that make a substantial positive impact on people’s lives, but also conserve wildlife for posterity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20perceptions" title="community perceptions">community perceptions</a>, <a href="https://publications.waset.org/abstracts/search?q=conservation" title=" conservation"> conservation</a>, <a href="https://publications.waset.org/abstracts/search?q=rhino%20poaching" title=" rhino poaching"> rhino poaching</a>, <a href="https://publications.waset.org/abstracts/search?q=whole-of-society%20approach" title=" whole-of-society approach"> whole-of-society approach</a>, <a href="https://publications.waset.org/abstracts/search?q=wildlife%20crime" title=" wildlife crime"> wildlife crime</a> </p> <a href="https://publications.waset.org/abstracts/59058/community-perceptions-and-attitudes-regarding-wildlife-crime-in-south-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59058.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">242</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2629</span> Influence of Socio-Economic Factors on Crime Perpetuation Among Inmates of Correctional Facilities in South-West Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebenezer%20Bayode%20Agboola">Ebenezer Bayode Agboola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study investigated the influence of socioeconomic factors on crime perpetuation among inmates of correctional facilities in South West Nigeria. A sample size of two hundred and forty-four inmates was drawn from Ado, Akure and Ilesha correctional facilities. The sample size consisted of both male and female inmates. Individual inmate was drawn through systematic sampling with the use of inmates’ register at the correctional facilities. The study employed a mixed design, which allowed the blend of both quantitative and qualitative methods. For the quantitative method, data was collected through the use of a questionnaire and for the qualitative method; data was collected with the aid of an in-depth interview (ID. Four research questions were raised for the study and analysed descriptively using simple frequency count and percentage. Five research hypotheses were formulated for the study and tested using Analysis of Variance (ANOVA) and Multiple Regressions. Based on the data analysis, findings revealed that there was a significant relationship between family history and perpetuation of crime among inmates. Though no significant relationship was found between employment and the perpetuation of crime, however, the rate of crime perpetuation by individuals was significantly found to be related to peer pressure. Also, the study further found that there was a significant relationship between the use of substances and perpetuation of crime. Lastly, it was found that there was a significant relationship between family history, employment, and peer pressure. The study recommended that Parents should pay adequate attention to their children, especially during the adolescent stage and that the Government should enact relevant laws that will checkmate the rising involvement of young people in cybercrime or internet fraud. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime" title="crime">crime</a>, <a href="https://publications.waset.org/abstracts/search?q=socio%20economic%20factor" title=" socio economic factor"> socio economic factor</a>, <a href="https://publications.waset.org/abstracts/search?q=inmates" title=" inmates"> inmates</a>, <a href="https://publications.waset.org/abstracts/search?q=correctional%20facilities" title=" correctional facilities"> correctional facilities</a>, <a href="https://publications.waset.org/abstracts/search?q=Southwest" title=" Southwest"> Southwest</a> </p> <a href="https://publications.waset.org/abstracts/177841/influence-of-socio-economic-factors-on-crime-perpetuation-among-inmates-of-correctional-facilities-in-south-west-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177841.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">99</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2628</span> Financial Fraud Prediction for Russian Non-Public Firms Using Relational Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Natalia%20Feruleva">Natalia Feruleva</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The goal of this paper is to develop the fraud risk assessment model basing on both relational and financial data and test the impact of the relationships between Russian non-public companies on the likelihood of financial fraud commitment. Relationships mean various linkages between companies such as parent-subsidiary relationship and person-related relationships. These linkages may provide additional opportunities for committing fraud. Person-related relationships appear when firms share a director, or the director owns another firm. The number of companies belongs to CEO and managed by CEO, the number of subsidiaries was calculated to measure the relationships. Moreover, the dummy variable describing the existence of parent company was also included in model. Control variables such as financial leverage and return on assets were also implemented because they describe the motivating factors of fraud. To check the hypotheses about the influence of the chosen parameters on the likelihood of financial fraud, information about person-related relationships between companies, existence of parent company and subsidiaries, profitability and the level of debt was collected. The resulting sample consists of 160 Russian non-public firms. The sample includes 80 fraudsters and 80 non-fraudsters operating in 2006-2017. The dependent variable is dichotomous, and it takes the value 1 if the firm is engaged in financial crime, otherwise 0. Employing probit model, it was revealed that the number of companies which belong to CEO of the firm or managed by CEO has significant impact on the likelihood of financial fraud. The results obtained indicate that the more companies are affiliated with the CEO, the higher the likelihood that the company will be involved in financial crime. The forecast accuracy of the model is about is 80%. Thus, the model basing on both relational and financial data gives high level of forecast accuracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=financial%20fraud" title="financial fraud">financial fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20prediction" title=" fraud prediction"> fraud prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=non-public%20companies" title=" non-public companies"> non-public companies</a>, <a href="https://publications.waset.org/abstracts/search?q=regression%20analysis" title=" regression analysis"> regression analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=relational%20data" title=" relational data"> relational data</a> </p> <a href="https://publications.waset.org/abstracts/112446/financial-fraud-prediction-for-russian-non-public-firms-using-relational-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/112446.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">128</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2627</span> Preparedness for Microbial Forensics Evidence Collection on Best Practice</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Victor%20Ananth%20Paramananth">Victor Ananth Paramananth</a>, <a href="https://publications.waset.org/abstracts/search?q=Rashid%20Muniginin"> Rashid Muniginin</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahaya%20Abd%20Rahman"> Mahaya Abd Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Siti%20Afifah%20Ismail"> Siti Afifah Ismail</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Safety issues, scene protection, and appropriate evidence collection must be handled in any bio crime scene. There will be a scene or multi-scene to be cordoned for investigation in any bio-incident or bio crime event. Evidence collection is critical in determining the type of microbial or toxin, its lethality, and its source. As a consequence, from the start of the investigation, a proper sampling method is required. The most significant challenges for the crime scene officer would be deciding where to obtain samples, the best sampling method, and the sample sizes needed. Since there could be evidence in liquid, viscous, or powder shape at a crime scene, crime scene officers have difficulty determining which tools to use for sampling. To maximize sample collection, the appropriate tools for sampling methods are necessary. This study aims to assist the crime scene officer in collecting liquid, viscous, and powder biological samples in sufficient quantity while preserving sample quality. Observational tests on sample collection using liquid, viscous, and powder samples for adequate quantity and sample quality were performed using UV light in this research. The density of the light emission varies upon the method of collection and sample types. The best tools for collecting sufficient amounts of liquid, viscous, and powdered samples can be identified by observing UV light. Instead of active microorganisms, the invisible powder is used to assess sufficient sample collection during a crime scene investigation using various collection tools. The liquid, powdered and viscous samples collected using different tools were analyzed using Fourier transform infrared - attenuate total reflection (FTIR-ATR). FTIR spectroscopy is commonly used for rapid discrimination, classification, and identification of intact microbial cells. The liquid, viscous and powdered samples collected using various tools have been successfully observed using UV light. Furthermore, FTIR-ATR analysis showed that collected samples are sufficient in quantity while preserving their quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biological%20sample" title="biological sample">biological sample</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20scene" title=" crime scene"> crime scene</a>, <a href="https://publications.waset.org/abstracts/search?q=collection%20tool" title=" collection tool"> collection tool</a>, <a href="https://publications.waset.org/abstracts/search?q=UV%20light" title=" UV light"> UV light</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic" title=" forensic"> forensic</a> </p> <a href="https://publications.waset.org/abstracts/139362/preparedness-for-microbial-forensics-evidence-collection-on-best-practice" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139362.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">200</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2626</span> A Prediction Model of Adopting IPTV</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jeonghwan%20Jeon">Jeonghwan Jeon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the advent of IPTV in the fierce competition with existing broadcasting system, it is emerged as an important issue to predict how much the adoption of IPTV service will be. This paper aims to suggest a prediction model for adopting IPTV using classification and Ranking Belief Simplex (CaRBS). A simplex plot method of representing data allows a clear visual representation to the degree of interaction of the support from the variables to the prediction of the objects. CaRBS is applied to the survey data on the IPTV adoption. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=prediction" title="prediction">prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=adoption" title=" adoption"> adoption</a>, <a href="https://publications.waset.org/abstracts/search?q=IPTV" title=" IPTV"> IPTV</a>, <a href="https://publications.waset.org/abstracts/search?q=CaRBS" title=" CaRBS"> CaRBS</a> </p> <a href="https://publications.waset.org/abstracts/2971/a-prediction-model-of-adopting-iptv" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2971.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">421</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2625</span> Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vanda%20Bo%C5%BEi%C4%87">Vanda Božić</a>, <a href="https://publications.waset.org/abstracts/search?q=%C5%BDeljko%20Nika%C4%8D"> Željko Nikač</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=trafficking%20in%20children" title="trafficking in children">trafficking in children</a>, <a href="https://publications.waset.org/abstracts/search?q=trafficking%20in%20human%20beings" title=" trafficking in human beings"> trafficking in human beings</a>, <a href="https://publications.waset.org/abstracts/search?q=child%20as%20a%20victim%20of%20human%20trafficking" title=" child as a victim of human trafficking"> child as a victim of human trafficking</a>, <a href="https://publications.waset.org/abstracts/search?q=children%E2%80%99s%20rights" title=" children’s rights"> children’s rights</a> </p> <a href="https://publications.waset.org/abstracts/67529/trafficking-in-children-as-a-qualified-form-of-the-crime-of-trafficking-in-human-beings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67529.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">365</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2624</span> Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malaw%20Ndiaye">Malaw Ndiaye</a>, <a href="https://publications.waset.org/abstracts/search?q=Karim%20Konate"> Karim Konate</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts" title=" malicious smart contracts"> malicious smart contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=crypto-currency" title=" crypto-currency"> crypto-currency</a>, <a href="https://publications.waset.org/abstracts/search?q=crimes" title=" crimes"> crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a> </p> <a href="https://publications.waset.org/abstracts/135277/cryptocurrency-crime-behaviors-of-malicious-smart-contracts-in-blockchain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135277.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2623</span> Examining Cyber Crime and Its Impacts on E-Banking in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Auwal%20Nata%27ala">Auwal Nata'ala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20crimes" title="cyber crimes">cyber crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=e-banking" title=" e-banking"> e-banking</a>, <a href="https://publications.waset.org/abstracts/search?q=policies" title=" policies"> policies</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT" title=" ICT"> ICT</a> </p> <a href="https://publications.waset.org/abstracts/18051/examining-cyber-crime-and-its-impacts-on-e-banking-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18051.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">411</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2622</span> Testifying in Court as a Victim of Crime for Persons with Little or No Functional Speech: Vocabulary Implications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Robyn%20White">Robyn White</a>, <a href="https://publications.waset.org/abstracts/search?q=Juan%20Bornman"> Juan Bornman</a>, <a href="https://publications.waset.org/abstracts/search?q=Ensa%20Johnson"> Ensa Johnson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> People with disabilities are at a high risk of becoming victims of crime. Individuals with little or no functional speech (LNFS) face an even higher risk. One way of reducing the risk of remaining a victim of crime is to face the alleged perpetrator in court as a witness – therefore it is important for a person with LNFS who has been a victim of crime to have the required vocabulary to testify in court. The aim of this study was to identify and describe the core and fringe legal vocabulary required by illiterate victims of crime, who have little or no functional speech, to testify in court as witnesses. A mixed-method, the exploratory sequential design consisting of two distinct phases was used to address the aim of the research. The first phase was of a qualitative nature and included two different data sources, namely in-depth semi-structured interviews and focus group discussions. The overall aim of this phase was to identify and describe core and fringe legal vocabulary and to develop a measurement instrument based on these results. Results from Phase 1 were used in Phase 2, the quantitative phase, during which the measurement instrument (a custom-designed questionnaire) was socially validated. The results produced six distinct vocabulary categories that represent the legal core vocabulary and 99 words that represent the legal fringe vocabulary. The findings suggested that communication boards should be individualised to the individual and the specific crime. It is believed that the vocabulary lists developed in this study act as a valid and reliable springboard from which communication boards can be developed. Recommendations were therefore made to develop an Alternative and Augmentative Communication Resource Tool Kit to assist the legal justice system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=augmentative%20and%20alternative%20communication" title="augmentative and alternative communication">augmentative and alternative communication</a>, <a href="https://publications.waset.org/abstracts/search?q=person%20with%20little%20or%20no%20functional%20speech" title=" person with little or no functional speech"> person with little or no functional speech</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20crimes" title=" sexual crimes"> sexual crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=testifying%20in%20court" title=" testifying in court"> testifying in court</a>, <a href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime" title=" victim of crime"> victim of crime</a>, <a href="https://publications.waset.org/abstracts/search?q=witness%20competency" title=" witness competency"> witness competency</a> </p> <a href="https://publications.waset.org/abstracts/35754/testifying-in-court-as-a-victim-of-crime-for-persons-with-little-or-no-functional-speech-vocabulary-implications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35754.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">486</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2621</span> Enhanced Extra Trees Classifier for Epileptic Seizure Prediction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maurice%20Ntahobari">Maurice Ntahobari</a>, <a href="https://publications.waset.org/abstracts/search?q=Levin%20Kuhlmann"> Levin Kuhlmann</a>, <a href="https://publications.waset.org/abstracts/search?q=Mario%20Boley"> Mario Boley</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhinoos%20Razavi%20Hesabi"> Zhinoos Razavi Hesabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For machine learning based epileptic seizure prediction, it is important for the model to be implemented in small implantable or wearable devices that can be used to monitor epilepsy patients; however, current state-of-the-art methods are complex and computationally intensive. We use Shapley Additive Explanation (SHAP) to find relevant intracranial electroencephalogram (iEEG) features and improve the computational efficiency of a state-of-the-art seizure prediction method based on the extra trees classifier while maintaining prediction performance. Results for a small contest dataset and a much larger dataset with continuous recordings of up to 3 years per patient from 15 patients yield better than chance prediction performance (p < 0.004). Moreover, while the performance of the SHAP-based model is comparable to that of the benchmark, the overall training and prediction time of the model has been reduced by a factor of 1.83. It can also be noted that the feature called zero crossing value is the best EEG feature for seizure prediction. These results suggest state-of-the-art seizure prediction performance can be achieved using efficient methods based on optimal feature selection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title="machine learning">machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=seizure%20prediction" title=" seizure prediction"> seizure prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=extra%20tree%20classifier" title=" extra tree classifier"> extra tree classifier</a>, <a href="https://publications.waset.org/abstracts/search?q=SHAP" title=" SHAP"> SHAP</a>, <a href="https://publications.waset.org/abstracts/search?q=epilepsy" title=" epilepsy"> epilepsy</a> </p> <a href="https://publications.waset.org/abstracts/155126/enhanced-extra-trees-classifier-for-epileptic-seizure-prediction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155126.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2620</span> Time of Week Intensity Estimation from Interval Censored Data with Application to Police Patrol Planning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jiahao%20Tian">Jiahao Tian</a>, <a href="https://publications.waset.org/abstracts/search?q=Michael%20D.%20Porter"> Michael D. Porter</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Law enforcement agencies are tasked with crime prevention and crime reduction under limited resources. Having an accurate temporal estimate of the crime rate would be valuable to achieve such a goal. However, estimation is usually complicated by the interval-censored nature of crime data. We cast the problem of intensity estimation as a Poisson regression using an EM algorithm to estimate the parameters. Two special penalties are added that provide smoothness over the time of day and day of the week. This approach presented here provides accurate intensity estimates and can also uncover day-of-week clusters that share the same intensity patterns. Anticipating where and when crimes might occur is a key element to successful policing strategies. However, this task is complicated by the presence of interval-censored data. The censored data refers to the type of data that the event time is only known to lie within an interval instead of being observed exactly. This type of data is prevailing in the field of criminology because of the absence of victims for certain types of crime. Despite its importance, the research in temporal analysis of crime has lagged behind the spatial component. Inspired by the success of solving crime-related problems with a statistical approach, we propose a statistical model for the temporal intensity estimation of crime with censored data. The model is built on Poisson regression and has special penalty terms added to the likelihood. An EM algorithm was derived to obtain maximum likelihood estimates, and the resulting model shows superior performance to the competing model. Our research is in line with the smart policing initiative (SPI) proposed by the Bureau Justice of Assistance (BJA) as an effort to support law enforcement agencies in building evidence-based, data-driven law enforcement tactics. The goal is to identify strategic approaches that are effective in crime prevention and reduction. In our case, we allow agencies to deploy their resources for a relatively short period of time to achieve the maximum level of crime reduction. By analyzing a particular area within cities where data are available, our proposed approach could not only provide an accurate estimate of intensities for the time unit considered but a time-variation crime incidence pattern. Both will be helpful in the allocation of limited resources by either improving the existing patrol plan with the understanding of the discovery of the day of week cluster or supporting extra resources available. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cluster%20detection" title="cluster detection">cluster detection</a>, <a href="https://publications.waset.org/abstracts/search?q=EM%20algorithm" title=" EM algorithm"> EM algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=interval%20censoring" title=" interval censoring"> interval censoring</a>, <a href="https://publications.waset.org/abstracts/search?q=intensity%20estimation" title=" intensity estimation"> intensity estimation</a> </p> <a href="https://publications.waset.org/abstracts/162681/time-of-week-intensity-estimation-from-interval-censored-data-with-application-to-police-patrol-planning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162681.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">73</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2619</span> The Challenges Involved in Investigating and Prosecuting Hate Crime Online</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mark%20Williams">Mark Williams</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The digital revolution has radically transformed our social environment creating vast opportunities for interconnectivity and social interaction. This revolution, however, has also changed the reach and impact of hate crime, with social media providing a new platform to victimize and harass users in their homes. In this way, developments in the information and communication technologies have exacerbated and facilitated the commission of hate crime, increasing its prevalence and impact. Unfortunately, legislators, policymakers and criminal justice professionals have struggled to keep pace with these technological developments, reducing their ability to intervene in, regulate and govern the commission of hate crimes online. This work is further complicated by the global nature of this crime due to the tendency for offenders and victims to reside in multiple different jurisdictions, as well as the need for criminal justice professionals to obtain the cooperation of private companies to access information required for prosecution. Drawing on in-depth interviews with key criminal justice professionals and policymakers with detailed knowledge in this area, this paper examines the specific challenges the police and prosecution services face as they attempt to intervene in and prosecute the commission of hate crimes online. It is argued that any attempt to reduce online othering, such as the commission of hate crimes online, must be multifaceted, collaborative and involve both innovative technological solutions as well as internationally agreed ethical and legal frameworks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title="cybercrime">cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20policing" title=" digital policing"> digital policing</a>, <a href="https://publications.waset.org/abstracts/search?q=hate%20crime" title=" hate crime"> hate crime</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a> </p> <a href="https://publications.waset.org/abstracts/103720/the-challenges-involved-in-investigating-and-prosecuting-hate-crime-online" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/103720.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">235</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2618</span> Spatial Scale of Clustering of Residential Burglary and Its Dependence on Temporal Scale</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20A.%20Alazawi">Mohammed A. Alazawi</a>, <a href="https://publications.waset.org/abstracts/search?q=Shiguo%20Jiang"> Shiguo Jiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Steven%20F.%20Messner"> Steven F. Messner</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Research has long focused on two main spatial aspects of crime: spatial patterns and spatial processes. When analyzing these patterns and processes, a key issue has been to determine the proper spatial scale. In addition, it is important to consider the possibility that these patterns and processes might differ appreciably for different temporal scales and might vary across geographic units of analysis. We examine the spatial-temporal dependence of residential burglary. This dependence is tested at varying geographical scales and temporal aggregations. The analyses are based on recorded incidents of crime in Columbus, Ohio during the 1994-2002 period. We implement point pattern analysis on the crime points using Ripley’s K function. The results indicate that spatial point patterns of residential burglary reveal spatial scales of clustering relatively larger than the average size of census tracts of the study area. Also, spatial scale is independent of temporal scale. The results of our analyses concerning the geographic scale of spatial patterns and processes can inform the development of effective policies for crime control. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=inhomogeneous%20K%20function" title="inhomogeneous K function">inhomogeneous K function</a>, <a href="https://publications.waset.org/abstracts/search?q=residential%20burglary" title=" residential burglary"> residential burglary</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20point%20pattern" title=" spatial point pattern"> spatial point pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20scale" title=" spatial scale"> spatial scale</a>, <a href="https://publications.waset.org/abstracts/search?q=temporal%20scale" title=" temporal scale"> temporal scale</a> </p> <a href="https://publications.waset.org/abstracts/92371/spatial-scale-of-clustering-of-residential-burglary-and-its-dependence-on-temporal-scale" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92371.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">352</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2617</span> An Improved Prediction Model of Ozone Concentration Time Series Based on Chaotic Approach </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nor%20Zila%20Abd%20Hamid">Nor Zila Abd Hamid</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Salmi%20M.%20Noorani"> Mohd Salmi M. Noorani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study is focused on the development of prediction models of the Ozone concentration time series. Prediction model is built based on chaotic approach. Firstly, the chaotic nature of the time series is detected by means of phase space plot and the Cao method. Then, the prediction model is built and the local linear approximation method is used for the forecasting purposes. Traditional prediction of autoregressive linear model is also built. Moreover, an improvement in local linear approximation method is also performed. Prediction models are applied to the hourly ozone time series observed at the benchmark station in Malaysia. Comparison of all models through the calculation of mean absolute error, root mean squared error and correlation coefficient shows that the one with improved prediction method is the best. Thus, chaotic approach is a good approach to be used to develop a prediction model for the Ozone concentration time series. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chaotic%20approach" title="chaotic approach">chaotic approach</a>, <a href="https://publications.waset.org/abstracts/search?q=phase%20space" title=" phase space"> phase space</a>, <a href="https://publications.waset.org/abstracts/search?q=Cao%20method" title=" Cao method"> Cao method</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20linear%20approximation%20method" title=" local linear approximation method"> local linear approximation method</a> </p> <a href="https://publications.waset.org/abstracts/2015/an-improved-prediction-model-of-ozone-concentration-time-series-based-on-chaotic-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2015.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">337</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2616</span> Negative Self-Awareness and Its Effect on Crime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Guinevere%20Servis">Guinevere Servis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper hypothesizes that withdrawal from positive self-awareness, and the increase of counterfactual-thinking and self-handicapping can help provide ample justification for an individual before, during and/or after committing a crime. The understanding of who someone is, one’s perspective on the world, and why they think the way they do is key to therapy in preventing recidivism. Developing habits to escape self-awareness, by using self-handicapping and counterfactual ideologies, may provide the necessary thinking patterns to decide disobeying the law is a worthy act to pursue. An increase in self-awareness is hypothesized to decrease the likelihood of recidivism, and ways of thinking that withdraw from self awareness can increase the likelihood of it. Especially for those who have been disadvantaged in life and disobeyed the law, self-handicapping and counterfactual thinking can also help to justify one's wrongdoing. The understanding of how a criminal views their disadvantages in the world, and one’s thinking patterns are hypothesized to help one better understand the entire scope on why a crime was committed and thus reduce the likelihood of recidivism. Utilizing therapy for prisoners to increase self-awareness of both thought and action can lead to a healthy, happier life and reduce the likelihood of reoffending. By discussing the terms associated with self-awareness theory and other psychological topics such as self-handicapping, counterfactual thinking, this paper argues the actions towards increasing positive self-awareness can help decrease likelihood of recidivism. Adversely, hypothesizing that increasing the ways of thinking that withdraw one from self-awareness, through counterfactual thinking and self-handicapping, can inherently increase the likelihood of recidivism. Evaluating these findings to further understand the needed changes in correctional institutions is fundamental to reducing crime, benefiting the criminal, the victim(s) and their family, and the state. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime" title="crime">crime</a>, <a href="https://publications.waset.org/abstracts/search?q=self-awareness%20theory" title=" self-awareness theory"> self-awareness theory</a>, <a href="https://publications.waset.org/abstracts/search?q=correctional%20institutions" title=" correctional institutions"> correctional institutions</a>, <a href="https://publications.waset.org/abstracts/search?q=self-regulate" title=" self-regulate"> self-regulate</a>, <a href="https://publications.waset.org/abstracts/search?q=counterfactual%20thinking" title=" counterfactual thinking"> counterfactual thinking</a>, <a href="https://publications.waset.org/abstracts/search?q=recidivism" title=" recidivism"> recidivism</a> </p> <a href="https://publications.waset.org/abstracts/176590/negative-self-awareness-and-its-effect-on-crime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176590.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2615</span> Stock Movement Prediction Using Price Factor and Deep Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hy%20Dang">Hy Dang</a>, <a href="https://publications.waset.org/abstracts/search?q=Bo%20Mei"> Bo Mei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The development of machine learning methods and techniques has opened doors for investigation in many areas such as medicines, economics, finance, etc. One active research area involving machine learning is stock market prediction. This research paper tries to consider multiple techniques and methods for stock movement prediction using historical price or price factors. The paper explores the effectiveness of some deep learning frameworks for forecasting stock. Moreover, an architecture (TimeStock) is proposed which takes the representation of time into account apart from the price information itself. Our model achieves a promising result that shows a potential approach for the stock movement prediction problem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=classification" title="classification">classification</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=time%20representation" title=" time representation"> time representation</a>, <a href="https://publications.waset.org/abstracts/search?q=stock%20prediction" title=" stock prediction"> stock prediction</a> </p> <a href="https://publications.waset.org/abstracts/147469/stock-movement-prediction-using-price-factor-and-deep-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147469.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2614</span> The Value of Online News: Addressing the Problem of Online Investment Fraud Crimes in Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Thapthep%20Paprach">Thapthep Paprach</a>, <a href="https://publications.waset.org/abstracts/search?q=Benya%20Lertsuwan"> Benya Lertsuwan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Investment fraud is not a new criminal, but there are still more victims during the Internet of Things era. This kind of criminal has been classified as a national and transnational financial crime problem all over the world. In Thailand, the country has also been attacked by this kind of crime. This research concerns whether the mass media that is supposed to cover news about online investment scams realized and warned Thais about this crime. Thus, this study explores the value of news about investment fraud in terms of frequency. The methodology uses web crawling from the top 5 news agency websites that have the most access. We pull out all information reporting about investment fraud. The findings revealed that the ‘Khaosod’ news agency was the first rank in reporting on investment crime. On the other hand, ‘Matichon’ was the least reported. Thairat news agencies frequently reported such criminals from midnight to very early in the morning, while other news agencies reported during the daytime. The results between the frequency of news reporting about investment fraud and the monthly number of victim reports are not correlated. Although the most cases reported to Thai police were in February 2023, but the most news reported was in January 2023. In conclusion, there might be a negative correlation between the amount of investment fraud news reported and the number of victims. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=investment%20fraud" title="investment fraud">investment fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=news%20value" title=" news value"> news value</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20news%20report" title=" online news report"> online news report</a>, <a href="https://publications.waset.org/abstracts/search?q=Ponzi%20schemes" title=" Ponzi schemes"> Ponzi schemes</a>, <a href="https://publications.waset.org/abstracts/search?q=Romance%20scam" title=" Romance scam"> Romance scam</a> </p> <a href="https://publications.waset.org/abstracts/170639/the-value-of-online-news-addressing-the-problem-of-online-investment-fraud-crimes-in-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170639.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">83</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2613</span> Cellular Traffic Prediction through Multi-Layer Hybrid Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Supriya%20H.%20S.">Supriya H. S.</a>, <a href="https://publications.waset.org/abstracts/search?q=Chandrakala%20B.%20M."> Chandrakala B. M.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Deep learning based models have been recently successful adoption for network traffic prediction. However, training a deep learning model for various prediction tasks is considered one of the critical tasks due to various reasons. This research work develops Multi-Layer Hybrid Network (MLHN) for network traffic prediction and analysis; MLHN comprises the three distinctive networks for handling the different inputs for custom feature extraction. Furthermore, an optimized and efficient parameter-tuning algorithm is introduced to enhance parameter learning. MLHN is evaluated considering the “Big Data Challenge” dataset considering the Mean Absolute Error, Root Mean Square Error and R^2as metrics; furthermore, MLHN efficiency is proved through comparison with a state-of-art approach. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=MLHN" title="MLHN">MLHN</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20traffic%20prediction" title=" network traffic prediction"> network traffic prediction</a> </p> <a href="https://publications.waset.org/abstracts/154887/cellular-traffic-prediction-through-multi-layer-hybrid-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154887.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">97</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2612</span> The Impacts of Foreign Culture on Yoruba Crime Films</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alonge%20Isaac%20Olusola">Alonge Isaac Olusola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper focuses on the evolution and development of Yoruba theatre during the pre-colonial, colonial and post-colonial years and how Yoruba crime films have been influenced by foreign culture. It emphasizes on the transition of theatre from the ground to the stage and from the stage to the screen with emphasis on the contribution of late Chief Hubert Ogunde who is regarded as the doyen of Yoruba and the entire Nigerian theatre. Using the Theory of Post-colonialism, two modern Yoruba crime films are carefully selected from the numerous available ones to highlight and explain the various aspects of Yoruba films that have been greatly influenced by the foreign cultural practices. The questions to be answered here include 'Which attitudes or cultural practices are widely believed to be that of Yoruba?', 'To what extent are they projected in the selected Yoruba crime films?', 'Which attitudes or cultural practices are widely believed to be foreign among the Yoruba people?', 'To what extent are they projected in the selected Yoruba crime films?'. Although, the British colonial masters granted political independence to Nigeria on October 1, 1960, but a seed of multi-culture and counterculture had been sown into the lives of the Yoruba people. Under the literature review, there is an intensive illumination on some scholars’ ideas and views on what constitutes Yoruba culture, the evolution and development of drama, theatre and films in the Yoruba society and the nature of criminals and criminalities in the Yoruba society and the western world in the pre-colonial and post-colonial times. Furthermore, the processes of interaction between man, his values and his thoughts are also highlighted – a situation that procreates criminal or benevolent acts. Consequently, the paper dwells on how colonialism, despite its so-called merits put the gradual process of urbanization and civilization among the originally rustic, cohesive and moralistic Yoruba society on a supersonic speed that culminated in acquisition of attitudes that are alien to the Yoruba culture. Since a drama is nothing but the theatrical replication of what occurs in the real life, the paper then focuses on the submission that Yoruba crime films have experienced a serious foreign influence in form and content as a result of this encounter. In conclusion, the findings of the impact of foreign cultural practices on Yoruba crime films are highlighted and expatiated with a view to recommending a few steps that could be taken to retain the projection of the original Yoruba cultural practices in Yoruba films, especially the ones that have crime as a theme. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=culture" title="culture">culture</a>, <a href="https://publications.waset.org/abstracts/search?q=films" title=" films"> films</a>, <a href="https://publications.waset.org/abstracts/search?q=theatre" title=" theatre"> theatre</a>, <a href="https://publications.waset.org/abstracts/search?q=Yoruba" title=" Yoruba"> Yoruba</a> </p> <a href="https://publications.waset.org/abstracts/34174/the-impacts-of-foreign-culture-on-yoruba-crime-films" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34174.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">310</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2611</span> The Dark Side of the Fight against Organised Crime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ana%20M.%20Prieto%20del%20Pino">Ana M. Prieto del Pino</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As is well known, UN Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances (1988) was a landmark regarding the seizure of proceeds of crime. Depriving criminals of the profits from their activity became a priority at an international level in the fight against organised crime. Enabling confiscation of proceeds of illicit traffic in narcotic drugs and psychotropic substances, criminalising money laundering and confiscating the proceeds thereof are the three measures taken in order to achieve that purpose. The beginning of 21st century brought the declaration of war on corruption and on the illicit enjoyment of the profits thereof onto the international scene. According to the UN Convention against Transnational Organised Crime (2000), States Parties should adopt the necessary measures to enable the confiscation of proceeds of crime derived from offences (or property of equivalent value) and property, equipment and other instrumentalities used in offences covered by that Convention. The UN Convention against Corruption (2003) states asset recovery explicitly as a fundamental principle and sets forth measures aiming at the direct recovery of property through international cooperation in confiscation. Furthermore, European legislation has made many significant strides forward in less than twenty years concerning money laundering, confiscation, and asset recovery. Crime does not pay, let there be no doubt about it. Nevertheless, we must be very careful not to sing out of tune with individual rights and legal guarantees. On the one hand, innocent individuals and businesses must be protected, since they should not pay for the guilty ones’ faults. On the other hand, the rule of law must be preserved and not be tossed aside regarding those who have carried out criminal activities. An in-depth analysis of judicial decisions on money laundering and confiscation of proceeds of crime issued by European national courts and by the European Court of Human Rights in the last decade has been carried out from a human rights, legal guarantees and criminal law basic principles’ perspective. The undertaken study has revealed the violation of the right to property, of the proportionality principle legal and the infringement of basic principles of states’ domestic substantive and procedural criminal law systems. The most relevant ones have to do with the punishment of money laundering committed through negligence, non-conviction based confiscation and a too-far reaching interpretation of the notion of ‘proceeds of crime’. Almost everything in life has a bright and a dark side. Confiscation of criminal proceeds and asset recovery are not an exception to this rule. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=confiscation" title="confiscation">confiscation</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title=" money laundering"> money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=organized%20crime" title=" organized crime"> organized crime</a> </p> <a href="https://publications.waset.org/abstracts/85258/the-dark-side-of-the-fight-against-organised-crime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85258.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">143</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2610</span> The Confiscation of Ill-Gotten Gains in Pollution: The Taiwan Experience and the Interaction between Economic Analysis of Law and Environmental Economics Perspectives</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chiang-Lead%20Woo">Chiang-Lead Woo </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In reply to serious environmental problems, the Taiwan government quickly adjusted some articles to suit the needs of environmental protection recently, such as the amendment to article 190-1 of the Taiwan Criminal Code. The transfer of legislation comes as an improvement which canceled the limitation of ‘endangering public safety’. At the same time, the article 190-1 goes from accumulative concrete offense to abstract crime of danger. Thus, the public looks forward to whether environmental crime following the imposition of fines or penalties works efficiently in anti-pollution by the deterrent effects. However, according to the addition to article 38-2 of the Taiwan Criminal Code, the confiscation system seems controversial legislation to restrain ill-gotten gains. Most prior studies focused on comparisons with the Administrative Penalty Law and the Criminal Code in environmental issue in Taiwan; recently, more and more studies emphasize calculations on ill-gotten gains. Hence, this paper try to examine the deterrent effect in environmental crime by economic analysis of law and environmental economics perspective. This analysis shows that only if there is an extremely high probability (equal to 100 percent) of an environmental crime case being prosecuted criminally by Taiwan Environmental Protection Agency, the deterrent effects will work. Therefore, this paper suggests deliberating the confiscation system from supplementing the System of Environmental and Economic Accounting, reasonable deterrent fines, input management, real-time system for detection of pollution, and whistleblower system, environmental education, and modernization of law. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=confiscation" title="confiscation">confiscation</a>, <a href="https://publications.waset.org/abstracts/search?q=ecosystem%20services" title=" ecosystem services"> ecosystem services</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20crime" title=" environmental crime"> environmental crime</a>, <a href="https://publications.waset.org/abstracts/search?q=ill-gotten%20gains" title=" ill-gotten gains"> ill-gotten gains</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20deterrent%20effect" title=" the deterrent effect"> the deterrent effect</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20system%20of%20environmental%20and%20economic%20accounting" title=" the system of environmental and economic accounting"> the system of environmental and economic accounting</a> </p> <a href="https://publications.waset.org/abstracts/98335/the-confiscation-of-ill-gotten-gains-in-pollution-the-taiwan-experience-and-the-interaction-between-economic-analysis-of-law-and-environmental-economics-perspectives" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98335.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">177</span> </span> </div> </div> <ul class="pagination"> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=2" rel="prev">‹</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=1">1</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=2">2</a></li> <li class="page-item active"><span class="page-link">3</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=89">89</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=90">90</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=crime%20prediction&page=4" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2025 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>