CINXE.COM

Search results for: victim of crime

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: victim of crime</title> <meta name="description" content="Search results for: victim of crime"> <meta name="keywords" content="victim of crime"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="victim of crime" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="victim of crime"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 614</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: victim of crime</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">614</span> Conceptual Model Providing More Information on the Contact Situation between Crime Victim and the Police</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Inzunza">M. Inzunza</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In contemporary society, victims of crime has been given more recognition, which have contributed to advancing the knowledge on the effects of crime. There exists a complexity of who gets the status of victim and that the typology of good versus bad can interfere with the contact situation of the victim with the police. The aim of this study is to identify the most central areas affecting the contact situation between crime victims and the police to develop a conceptual model to be useful empirically. By considering previously documented problem areas and different theoretical domains, a conceptual model has been developed. Preliminary findings suggest that an area that should be given attention is to get a better understanding of the victim, not only in terms of demographics but also in terms of risk behavior and social network. This area has been considered to influence the status of the crime victim. Another domain of value is the type of crime and the context of the incident in more detail. The police officer approach style in the contact situation is also a pertinent area that is influenced by how the police based victim services are organized and how individual police officers are suited for the mission. Suitability includes constructs from empathy models adapted to the police context and especially focusing on sub-constructs such as perspective taking. Discussion will focus on how these findings can be operationalized in practice and how they are used in ongoing empirical studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=empathy" title="empathy">empathy</a>, <a href="https://publications.waset.org/abstracts/search?q=perspective%20taking" title=" perspective taking"> perspective taking</a>, <a href="https://publications.waset.org/abstracts/search?q=police%20contact" title=" police contact"> police contact</a>, <a href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime" title=" victim of crime"> victim of crime</a> </p> <a href="https://publications.waset.org/abstracts/121112/conceptual-model-providing-more-information-on-the-contact-situation-between-crime-victim-and-the-police" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/121112.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">613</span> The Active Subject and the Victim of Trafficking in Human Beings: Material and Procedural Criminal Law Approaches</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andrei%20Nastas">Andrei Nastas</a>, <a href="https://publications.waset.org/abstracts/search?q=Sergiu%20Cernomopret"> Sergiu Cernomopret</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research addresses trafficking in human beings, in terms of the active subject and the victim of this crime, through the prism of national and international regulations in material and procedural criminal matters. For the correlative approach of both mentioned aspects, the active subject and the victim of trafficking in human beings, the research addresses both its constituent elements and the way to prevent and combat this phenomenon through criminal proceedings. As follows, trafficking in human beings, from a material criminal point of view, involves two subjects of this crime (active subject - offender and passive subject - victim), while their procedural status differs depending on the case (victim or injured party). The result of the research highlights some clarifications, which find a theoretical-practical basis in the legal provisions, the specialized doctrine, and the judicial practice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=victim" title="victim">victim</a>, <a href="https://publications.waset.org/abstracts/search?q=active%20subject" title=" active subject"> active subject</a>, <a href="https://publications.waset.org/abstracts/search?q=abuse" title=" abuse"> abuse</a>, <a href="https://publications.waset.org/abstracts/search?q=injured%20party" title=" injured party"> injured party</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a> </p> <a href="https://publications.waset.org/abstracts/148635/the-active-subject-and-the-victim-of-trafficking-in-human-beings-material-and-procedural-criminal-law-approaches" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148635.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">130</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">612</span> Compensation for Victims of Crime and Abuse of Power in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kolawole%20Oyekan%20Jamiu">Kolawole Oyekan Jamiu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Nigerian criminal law, a victim of an offence plays little or no role in the prosecution of an offender. The state concentrates only on imposing punishment on the offender while the victims of crime and abuse of power by security agencies are abandoned without any compensation either from the State or the offender. It has been stated that the victim of crime is the forgotten man in our criminal justice system. He sets the criminal law in motion but then goes into oblivion. Our present criminal law does not recognise the right of the victim to take part in the prosecution of the case or his right to compensation. The victim is merely a witness in a state versus case. This paper examines the meaning of the phrase ‘the victims of crime and abuse of power’. It needs to be noted that there is no definition of these two categories of victims in any statute in Nigeria. The paper also considers the United Nations General Assembly Declaration of Basic Principle of Justice for Victims and abuse of power. This declaration was adopted by the United Nations General Assembly on the 25th of November 1985. The declaration contains copious provisions on compensation for the victims of crime and abuse of power. Unfortunately, the declaration is not, in itself a legally binding instrument and has been given little or no attention since the coming into effect in1985. This paper examines the role of the judiciary in ensuring that victims of crime and abuse of power in Nigeria are compensated. While some Judges found it difficult to award damages to victims of abuse of power others have given some landmark rulings and awarded substantial damages. The criminal justice ( victim’s remedies) Bill shall also be examined. The Bill comprises of 74 sections and it spelt out the procedures for compensating the victims of crime and abuse of power in Nigeria. Finally, the paper also examines the practicability of awarding damages to victims of crime whether the offender is convicted or not and in addition, the possibility of granting all equitable remedies available in civil cases to victims of crime and abuse of power so that the victims will be restored to the earlier position before the crime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=compensation" title="compensation">compensation</a>, <a href="https://publications.waset.org/abstracts/search?q=damages" title=" damages"> damages</a>, <a href="https://publications.waset.org/abstracts/search?q=restitution" title=" restitution"> restitution</a>, <a href="https://publications.waset.org/abstracts/search?q=victims" title=" victims"> victims</a> </p> <a href="https://publications.waset.org/abstracts/37192/compensation-for-victims-of-crime-and-abuse-of-power-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37192.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">727</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">611</span> Boosting Crime Scene Investigations Capabilities through Crime Script Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benoit%20Leclerc">Benoit Leclerc</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The concept of scripts and the role that crime scripts has been playing in criminology during the last decade is reviewed. Particularly illuminating is the potential use of scripts not only to understand and disrupt offender scripts (e.g., commonly referred as crime scripts) but to capture victim and guardian scripts to increase the likelihood of preventing crime. Similarly, the concept of scripts is applied to forensic science – another field that can benefit from script analysis. First, similar to guardian scripts, script analysis can illuminate the process of completing crime scene investigations for those who investigate (crime scene investigators or other professionals involved in crime scene investigations), and as a result, provide a range of intervention-points to improve the success of these investigations. Second, script analysis can also provide valuable information on offenders’ crime-commission processes for crime scene investigators and highlight a number of ‘contact points’ that could be targeted during investigations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime%20scripts" title="crime scripts">crime scripts</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20scene%20investigation" title=" crime scene investigation"> crime scene investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=script%20analysis" title=" script analysis"> script analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20crime%20prevention" title=" situational crime prevention"> situational crime prevention</a> </p> <a href="https://publications.waset.org/abstracts/68702/boosting-crime-scene-investigations-capabilities-through-crime-script-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68702.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">275</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">610</span> Victim and Active Subject of the Crime of Violence in Family Reflected in the Criminal Code of the Republic of Moldova</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nastas%20Andrei">Nastas Andrei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ensuring accessible and functional justice is one of the priority objectives of judicial reform, and protecting the family against any acts that may harm its existence is one of the first priorities that have determined the need to defend the social order. In this context, the correlative approach of the victim and the aggressor becomes relevant as a subject of the crime of domestic violence. Domestic violence is a threat of physical, moral, or material harm, externalized now or in the past, or its provocation, which is characterized by a constant tendency to escalate and a high probability of repetitiveness in the relationship between the social partners, regardless of their legal status or domicile.Studying the legal support to identify the particularities of the victim and the subject of the crime of domestic violence facilitates the identification of the determinants of this crime, therefore, the development of means to prevent domestic violence. The scientific research has been effectuated on the base of the proper and authentic empirical data obtained from the analysis of the judicial practice in the matter of domestic violence, as well as being based on the most recent scientific issues in the field of the Substantive Criminal Law and other branches of science (criminology, psychology, sociology, pedagogy). As a result of the study performed, there have been formulated conclusions and interpretations able to be used in the science of the Substantive Criminal law, as well as in the practice of application of the legal norm in the matter of domestic violence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=family%20violence" title="family violence">family violence</a>, <a href="https://publications.waset.org/abstracts/search?q=victim" title=" victim"> victim</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=violence" title=" violence"> violence</a> </p> <a href="https://publications.waset.org/abstracts/148610/victim-and-active-subject-of-the-crime-of-violence-in-family-reflected-in-the-criminal-code-of-the-republic-of-moldova" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148610.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">609</span> Testifying in Court as a Victim of Crime for Persons with Little or No Functional Speech: Vocabulary Implications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Robyn%20White">Robyn White</a>, <a href="https://publications.waset.org/abstracts/search?q=Juan%20Bornman"> Juan Bornman</a>, <a href="https://publications.waset.org/abstracts/search?q=Ensa%20Johnson"> Ensa Johnson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> People with disabilities are at a high risk of becoming victims of crime. Individuals with little or no functional speech (LNFS) face an even higher risk. One way of reducing the risk of remaining a victim of crime is to face the alleged perpetrator in court as a witness – therefore it is important for a person with LNFS who has been a victim of crime to have the required vocabulary to testify in court. The aim of this study was to identify and describe the core and fringe legal vocabulary required by illiterate victims of crime, who have little or no functional speech, to testify in court as witnesses. A mixed-method, the exploratory sequential design consisting of two distinct phases was used to address the aim of the research. The first phase was of a qualitative nature and included two different data sources, namely in-depth semi-structured interviews and focus group discussions. The overall aim of this phase was to identify and describe core and fringe legal vocabulary and to develop a measurement instrument based on these results. Results from Phase 1 were used in Phase 2, the quantitative phase, during which the measurement instrument (a custom-designed questionnaire) was socially validated. The results produced six distinct vocabulary categories that represent the legal core vocabulary and 99 words that represent the legal fringe vocabulary. The findings suggested that communication boards should be individualised to the individual and the specific crime. It is believed that the vocabulary lists developed in this study act as a valid and reliable springboard from which communication boards can be developed. Recommendations were therefore made to develop an Alternative and Augmentative Communication Resource Tool Kit to assist the legal justice system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=augmentative%20and%20alternative%20communication" title="augmentative and alternative communication">augmentative and alternative communication</a>, <a href="https://publications.waset.org/abstracts/search?q=person%20with%20little%20or%20no%20functional%20speech" title=" person with little or no functional speech"> person with little or no functional speech</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20crimes" title=" sexual crimes"> sexual crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=testifying%20in%20court" title=" testifying in court"> testifying in court</a>, <a href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime" title=" victim of crime"> victim of crime</a>, <a href="https://publications.waset.org/abstracts/search?q=witness%20competency" title=" witness competency"> witness competency</a> </p> <a href="https://publications.waset.org/abstracts/35754/testifying-in-court-as-a-victim-of-crime-for-persons-with-little-or-no-functional-speech-vocabulary-implications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35754.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">480</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">608</span> Oath Taking-An Approach to Combating Criminality: Challenges and Implication to the Victim Centered Approach in Human Trafficking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faith%20G.%20Ehiemua">Faith G. Ehiemua</a>, <a href="https://publications.waset.org/abstracts/search?q=Chandra%20E.%20Ulinfun"> Chandra E. Ulinfun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work presents two approaches that use competing models to combat criminality in human trafficking. It argues that oath-taking is an approach used to combat and repress crime by natives of African descent. Therefore, certain value choices reflected explicitly or implicitly in its habitual functioning are features of crime control, a model of the criminal process used to repress and prevent crime. By pitting the approaches against each other, the work examines the utility of the purpose of each approach with the aim of assessing moral worthiness. The approaches adopted are descriptive, normative, and theoretical. The findings reveal that oath-taking is effective in human trafficking mainly because Africans believe that the African traditional system is efficient. However, the utilitarian ethical theory applied to the use of oath-taking in human trafficking shows oath-taking as protecting the interest of human traffickers against the general good of society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title="human rights">human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20trafficking" title=" human trafficking"> human trafficking</a>, <a href="https://publications.waset.org/abstracts/search?q=oath%20taking" title=" oath taking"> oath taking</a>, <a href="https://publications.waset.org/abstracts/search?q=utilitarianism" title=" utilitarianism"> utilitarianism</a>, <a href="https://publications.waset.org/abstracts/search?q=victim-centered%20approach" title=" victim-centered approach"> victim-centered approach</a> </p> <a href="https://publications.waset.org/abstracts/123735/oath-taking-an-approach-to-combating-criminality-challenges-and-implication-to-the-victim-centered-approach-in-human-trafficking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123735.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">216</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">607</span> Crime Prevention with Artificial Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehrnoosh%20Abouzari">Mehrnoosh Abouzari</a>, <a href="https://publications.waset.org/abstracts/search?q=Shahrokh%20Sahraei"> Shahrokh Sahraei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, with the increase in quantity and quality and variety of crimes, the discussion of crime prevention has faced a serious challenge that human resources alone and with traditional methods will not be effective. One of the developments in the modern world is the presence of artificial intelligence in various fields, including criminal law. In fact, the use of artificial intelligence in criminal investigations and fighting crime is a necessity in today's world. The use of artificial intelligence is far beyond and even separate from other technologies in the struggle against crime. Second, its application in criminal science is different from the discussion of prevention and it comes to the prediction of crime. Crime prevention in terms of the three factors of the offender, the offender and the victim, following a change in the conditions of the three factors, based on the perception of the criminal being wise, and therefore increasing the cost and risk of crime for him in order to desist from delinquency or to make the victim aware of self-care and possibility of exposing him to danger or making it difficult to commit crimes. While the presence of artificial intelligence in the field of combating crime and social damage and dangers, like an all-seeing eye, regardless of time and place, it sees the future and predicts the occurrence of a possible crime, thus prevent the occurrence of crimes. The purpose of this article is to collect and analyze the studies conducted on the use of artificial intelligence in predicting and preventing crime. How capable is this technology in predicting crime and preventing it? The results have shown that the artificial intelligence technologies in use are capable of predicting and preventing crime and can find patterns in the data set. find large ones in a much more efficient way than humans. In crime prediction and prevention, the term artificial intelligence can be used to refer to the increasing use of technologies that apply algorithms to large sets of data to assist or replace police. The use of artificial intelligence in our debate is in predicting and preventing crime, including predicting the time and place of future criminal activities, effective identification of patterns and accurate prediction of future behavior through data mining, machine learning and deep learning, and data analysis, and also the use of neural networks. Because the knowledge of criminologists can provide insight into risk factors for criminal behavior, among other issues, computer scientists can match this knowledge with the datasets that artificial intelligence uses to inform them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=criminology" title=" criminology"> criminology</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=prediction" title=" prediction"> prediction</a> </p> <a href="https://publications.waset.org/abstracts/159626/crime-prevention-with-artificial-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159626.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">606</span> Crime Victim Support Services in Bangladesh: An Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Shahjahan">Mohammad Shahjahan</a>, <a href="https://publications.waset.org/abstracts/search?q=Md.%20Monoarul%20Haque"> Md. Monoarul Haque</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the research work information and data were collected from both types of sources, direct and indirect. Numerological, qualitative and participatory analysis methods have been followed. There were two principal sources of collecting information and data. Firstly, the data provided by the service recipients (300 nos. of women and children victims) in the Victim Support Centre and service providing policemen, executives and staffs (60 nos.). Secondly, data collected from Specialists, Criminologists and Sociologists involved in victim support services through Consultative Interview, KII, Case Study and FGD etc. The initial data collection has been completed with the help of questionnaires as per strategic variations and with the help of guidelines. It is to be noted that the main objective of this research was to determine whether services provided to the victims for their facilities, treatment/medication and rehabilitation by different government/non-government organizations was veritable at all. At the same time socio-economic background and demographic characteristics of the victims have also been revealed through this research. The results of the study show that although the number of victims has increased gradually due to socio-economic, political and cultural realities in Bangladesh, the number of victim support centers has not increased as expected. Awareness among the victims about the effectiveness of the 8 centers working in this regard is also not up to the mark. Two thirds of the victims coming to get service were not cognizant regarding the victim support services at all before getting the service. Most of those who have finally been able to come under the services of the Victim Support Center through various means, have received sheltering (15.5%), medical services (13.32%), counseling services (13.10%) and legal aid (12.66%). The opportunity to stay in security custody and psycho-physical services were also notable. Usually, women and children from relatively poor and marginalized families of the society come to victim support center for getting services. Among the women, young unmarried women are the biggest victims of crime. Again, women and children employed as domestic workers are more affected. A number of serious negative impacts fall on the lives of the victims. Being deprived of employment opportunities (26.62%), suffering from psycho-somatic disorder (20.27%), carrying sexually transmitted diseases (13.92%) are among them. It seems apparent to urgently enact distinct legislation, increase the number of Victim Support Centers, expand the area and purview of services and take initiative to increase public awareness and to create mass movement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime" title="crime">crime</a>, <a href="https://publications.waset.org/abstracts/search?q=victim" title=" victim"> victim</a>, <a href="https://publications.waset.org/abstracts/search?q=support" title=" support"> support</a>, <a href="https://publications.waset.org/abstracts/search?q=Bangladesh" title=" Bangladesh"> Bangladesh</a> </p> <a href="https://publications.waset.org/abstracts/168673/crime-victim-support-services-in-bangladesh-an-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168673.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">89</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">605</span> Persistence of DNA on Clothes Contaminated by Semen Stains after Washing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashraf%20Shebl">Ashraf Shebl</a>, <a href="https://publications.waset.org/abstracts/search?q=Bassam%20Garah"> Bassam Garah</a>, <a href="https://publications.waset.org/abstracts/search?q=Radah%20Youssef"> Radah Youssef</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sexual assault is usually a hidden crime where the only witnesses are the victim and the assailant. For a variety of reasons, even the victim may be unable to provide a detailed account of the assault or the identity of the perpetrator. Often the case history deteriorates into one person’s word against another. With such limited initial information, the physical and biological evidence collected from the victim, from the crime scene, and from the suspect will play a pivotal role in the objective and scientific reconstruction of the events in question. The aim of work is to examine whether DNA profiles could be recovered from repeated washed clothes after contaminated by semen stains. Fresh semen about 1ml. ( <1 h old) taken from donor was deposited on four types of clothes (cotton, silk, polyester, and jeans). Then leave to dry in room temperature and washed by washing machine at temperature (30°C-60°C) and by hand washing. Some items of clothing were washed once, some twice and others three times. DNA could be extracted from some of these samples even after multiple washing. This study demonstrates that complete DNA profiles can be obtained from washed semen stains on different types of clothes, even after many repeated washing. These results indicated that clothes of the victims must be examined even if they were washed many times. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sexual%20assault" title="sexual assault">sexual assault</a>, <a href="https://publications.waset.org/abstracts/search?q=DNA" title=" DNA"> DNA</a>, <a href="https://publications.waset.org/abstracts/search?q=persistence" title=" persistence"> persistence</a>, <a href="https://publications.waset.org/abstracts/search?q=clothes" title=" clothes"> clothes</a> </p> <a href="https://publications.waset.org/abstracts/86168/persistence-of-dna-on-clothes-contaminated-by-semen-stains-after-washing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86168.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">199</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">604</span> A Goal-Driven Crime Scripting Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hashem%20Dehghanniri">Hashem Dehghanniri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attack%20modelling" title="attack modelling">attack modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20commission%20process" title=" crime commission process"> crime commission process</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20script" title=" crime script"> crime script</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20crime%20prevention" title=" situational crime prevention"> situational crime prevention</a> </p> <a href="https://publications.waset.org/abstracts/129407/a-goal-driven-crime-scripting-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129407.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">603</span> Nature of Traffic Robbery Victimisation Experience 2015-2023</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Idenyi%20Goshen%20Peter">Idenyi Goshen Peter</a>, <a href="https://publications.waset.org/abstracts/search?q=Oludayo%20Tade"> Oludayo Tade</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Traffic robbery is a prevalent issue in Lagos State, impacting commuters and transport workers, necessitating an examination of victimization experiences and offender-victim dynamics. The research aim is to investigate the nature of traffic robbery victimization experiences, strategies employed by offenders, and the extent of the crime as reported in newspapers. Utilizing content analysis, the study examines 167 traffic robbery cases from 2015 to 2023 reported in five newspapers using the routine activity theory to understand the dynamics between offenders and victims. The research discusses the victimization experience and convergence of the offenders and victims, it documents the extent of the crime as captured by various newspapers (Vanguard, Punch. Tribune, Sun and Guardian ), and it also interrogates the strategies, methods deployed by traffic robbers. The study addresses the nature, strategies, and extent of traffic robbery victimization experiences, shedding light on the dynamics of the crime over an eight-year period. The paper implored secondary research from newspaper publications, and also content analysis for the research. Routine activity theory was used to explain the phenomenon that exists between the offender and the victim. Consequently, the common method used by offenders is dispossessing victims of their valuables, leading to fear-driven victim experiences, with spikes in incidents observed in June and December, particularly in Vanguard and Punch publications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=traffic%20robbery" title="traffic robbery">traffic robbery</a>, <a href="https://publications.waset.org/abstracts/search?q=victimisation%20experience" title=" victimisation experience"> victimisation experience</a>, <a href="https://publications.waset.org/abstracts/search?q=offender" title=" offender"> offender</a>, <a href="https://publications.waset.org/abstracts/search?q=routine%20activity" title=" routine activity"> routine activity</a> </p> <a href="https://publications.waset.org/abstracts/192641/nature-of-traffic-robbery-victimisation-experience-2015-2023" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192641.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">602</span> Offenders and Victims in Public Focus: Media Coverage about Crime and Its Consequences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Melanie%20Verhovnik">Melanie Verhovnik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Media shape the image of crime, peoples’ believes, attitudes and sometimes also behaviors. Media not only gives the impression that crime is increasing, it also suggest that very violent crime is more common than it actually is. It is also no wonder that humans are more afraid of being involved in a crime committed by strangers than committed by somebody they know – because this is the media construct. With the help of three case studies, the paper analyzes how media frames crime and criminals and gives valuable hints as to what better reporting could look like. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=court%20reporting" title="court reporting">court reporting</a>, <a href="https://publications.waset.org/abstracts/search?q=offenders%20in%20media" title=" offenders in media"> offenders in media</a>, <a href="https://publications.waset.org/abstracts/search?q=quantitative%20content%20analysis" title=" quantitative content analysis"> quantitative content analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=victims%20in%20media" title=" victims in media "> victims in media </a> </p> <a href="https://publications.waset.org/abstracts/31791/offenders-and-victims-in-public-focus-media-coverage-about-crime-and-its-consequences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31791.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">601</span> Artificial Intelligence and Police</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehrnoosh%20Abouzari">Mehrnoosh Abouzari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Artificial intelligence has covered all areas of human life and has helped or replaced many jobs. One of the areas of application of artificial intelligence in the police is to detect crime, identify the accused or victim and prove the crime. It will play an effective role in implementing preventive justice and creating security in the community, and improving judicial decisions. This will help improve the performance of the police, increase the accuracy of criminal investigations, and play an effective role in preventing crime and high-risk behaviors in society. This article presents and analyzes the capabilities and capacities of artificial intelligence in police and similar examples used worldwide to prove the necessity of using artificial intelligence in the police. The main topics discussed include the performance of artificial intelligence in crime detection and prediction, the risk capacity of criminals and the ability to apply arbitray institutions, and the introduction of artificial intelligence programs implemented worldwide in the field of criminal investigation for police. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=police" title="police">police</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=forecasting" title=" forecasting"> forecasting</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=software" title=" software"> software</a> </p> <a href="https://publications.waset.org/abstracts/141793/artificial-intelligence-and-police" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141793.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">206</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">600</span> Criminal Exhibit the Feminine Violent Victim within Thai Newspaper</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Supaporn%20Wimonchailerk">Supaporn Wimonchailerk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research aims to critical analyze the feminine violent within Thai daily newspaper. This study was qualitative base; content analysis from two popular newspapers (Thairath and Dailynews) two qualitative newspapers (Thaipost and Mathichon). Purposive sampling was used to select eleven specialize news reporters to do in-depth interview. The result found that, popular newspapers, Thairath and dailynews have presented feminine violent news in their paper more than Thaipost and Mathichon the qualitative newspaper. Beside, majority of sample present the feminine violent within news under the code of ethic, The National Press Council of Thailand. Interesting, the age of feminine violent victim was the information that has been focused most. The popular newspaper have illustrated crime scene photo on their first-page while qualitative newspaper used only headline to present the same news. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethic" title="ethic">ethic</a>, <a href="https://publications.waset.org/abstracts/search?q=feminine" title=" feminine"> feminine</a>, <a href="https://publications.waset.org/abstracts/search?q=journalism" title=" journalism"> journalism</a>, <a href="https://publications.waset.org/abstracts/search?q=newspaper" title=" newspaper"> newspaper</a>, <a href="https://publications.waset.org/abstracts/search?q=violent%20victim" title=" violent victim"> violent victim</a> </p> <a href="https://publications.waset.org/abstracts/8172/criminal-exhibit-the-feminine-violent-victim-within-thai-newspaper" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8172.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">191</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">599</span> Spatial and Temporal Analysis of Violent Crime in Washington, DC</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pallavi%20Roe">Pallavi Roe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Violent crime is a significant public safety concern in urban areas across the United States, and Washington, DC, is no exception. This research discusses the prevalence and types of crime, particularly violent crime, in Washington, DC, along with the factors contributing to the high rate of violent crime in the city, including poverty, inequality, access to guns, and racial disparities. The organizations working towards ensuring safety in neighborhoods are also listed. The proposal to perform spatial and temporal analysis on violent crime and the use of guns in crime analysis is presented to identify patterns and trends to inform evidence-based interventions to reduce violent crime and improve public safety in Washington, DC. The stakeholders for crime analysis are also discussed, including law enforcement agencies, prosecutors, judges, policymakers, and the public. The anticipated result of the spatial and temporal analysis is to provide stakeholders with valuable information to make informed decisions about preventing and responding to violent crimes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime%20analysis" title="crime analysis">crime analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20analysis" title=" spatial analysis"> spatial analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=temporal%20analysis" title=" temporal analysis"> temporal analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=violent%20crime" title=" violent crime"> violent crime</a> </p> <a href="https://publications.waset.org/abstracts/167107/spatial-and-temporal-analysis-of-violent-crime-in-washington-dc" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167107.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">598</span> Police and Crime Scene Management Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Najaf%20Hamadzadeh%20Arbabi">Najaf Hamadzadeh Arbabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Crime scene management is the first and most critical step in criminal investigations and all the criminal investigations are based on the ability of the crime scene investigation officers for diagnosing the importance and the role of physical evidence at the crime scene. According to the role of available physical evidence at the scene to prove the crime and identify the perpetrator and prove the innocence of those accused have been unduly and also impossible due to the rejection of these reasons, the maintenance and investigation of crime scene and collect evidence are very important in the crime scene. This research, by identifying the factors affecting the management of the crime scene, looking for presenting the effective and efficient indigenous pattern for managing of the crime scene in Iran. Method: This study is an applied and development research. Wilcoxon signed-rank test and the Friedman test for ranking, were used for analyzing the data and all hypotheses were tested at 95% confidence level. The target population is 50 judges and experts in Tehran. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime%20scene" title="crime scene">crime scene</a>, <a href="https://publications.waset.org/abstracts/search?q=identification" title=" identification"> identification</a>, <a href="https://publications.waset.org/abstracts/search?q=designation" title=" designation"> designation</a>, <a href="https://publications.waset.org/abstracts/search?q=individualization" title=" individualization"> individualization</a>, <a href="https://publications.waset.org/abstracts/search?q=reconstruction" title=" reconstruction"> reconstruction</a> </p> <a href="https://publications.waset.org/abstracts/37161/police-and-crime-scene-management-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">276</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">597</span> Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vanda%20Bo%C5%BEi%C4%87">Vanda Božić</a>, <a href="https://publications.waset.org/abstracts/search?q=%C5%BDeljko%20Nika%C4%8D"> Željko Nikač</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=trafficking%20in%20children" title="trafficking in children">trafficking in children</a>, <a href="https://publications.waset.org/abstracts/search?q=trafficking%20in%20human%20beings" title=" trafficking in human beings"> trafficking in human beings</a>, <a href="https://publications.waset.org/abstracts/search?q=child%20as%20a%20victim%20of%20human%20trafficking" title=" child as a victim of human trafficking"> child as a victim of human trafficking</a>, <a href="https://publications.waset.org/abstracts/search?q=children%E2%80%99s%20rights" title=" children’s rights"> children’s rights</a> </p> <a href="https://publications.waset.org/abstracts/67529/trafficking-in-children-as-a-qualified-form-of-the-crime-of-trafficking-in-human-beings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67529.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">596</span> Mapping Crime against Women in India: Spatio-Temporal Analysis, 2001-2012</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ritvik%20Chauhan">Ritvik Chauhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Vijay%20Kumar%20Baraik"> Vijay Kumar Baraik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Women are most vulnerable to crime despite occupying central position in shaping a society as the first teacher of children. In India too, having equal rights and constitutional safeguards, the incidences of crime against them are large and grave. In this context of crime against women, especially rape has been increasing over time. This paper explores the spatial and temporal aspects of crime against women in India with special reference to rape. It also examines the crime against women with its spatial, socio-economic and demographic associates using related data obtained from the National Crime Records Bureau India, Indian Census and other government sources of the Government of India. The simple statistical, choropleth mapping and other cartographic representation methods have been used to see the crime rates, spatio-temporal patterns of crime, and association of crime with its correlates.  The major findings are visible spatial variations across the country and are also in the rising trends in terms of incidence and rates over the reference period. The study also indicates that the geographical associations are somewhat observed. However, selected indicators of socio-economic factors seem to have no significant bearing on crime against women at this level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime%20against%20women" title="crime against women">crime against women</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20mapping" title=" crime mapping"> crime mapping</a>, <a href="https://publications.waset.org/abstracts/search?q=trend%20analysis" title=" trend analysis"> trend analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=society" title=" society"> society</a> </p> <a href="https://publications.waset.org/abstracts/46243/mapping-crime-against-women-in-india-spatio-temporal-analysis-2001-2012" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46243.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">333</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">595</span> The Relationship between Adolescent Self Well Being and Cyber Bully/Victim Being</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nesrin%20Demir">Nesrin Demir</a>, <a href="https://publications.waset.org/abstracts/search?q=Bet%C3%BCl%20Demirba%C4%9F"> Betül Demirbağ</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, the type and content of bullying in schools changes together with technological development. Many studies attribute bullying movement to virtual platform to the widespread use of social media and internet. The main goal of this research is to determine if there is a correlation between subjective well-being as a popular conception of Positive Psychology and being cyber bully/victim. For this purpose, 287 students from various public high schools in Malatya have reached. As assessment tool, Cyber Bully/Victim Scale and Self Well Being Scale for Adolescents were used. Results were discussed in the relevant literature. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20bully" title="cyber bully">cyber bully</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20victim" title=" cyber victim"> cyber victim</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20counseling" title=" school counseling"> school counseling</a>, <a href="https://publications.waset.org/abstracts/search?q=subjective%20well-being" title=" subjective well-being"> subjective well-being</a> </p> <a href="https://publications.waset.org/abstracts/25591/the-relationship-between-adolescent-self-well-being-and-cyber-bullyvictim-being" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">414</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">594</span> Development of an Interagency Crime Management System for Nigeria’s Law Enforcement Agencies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Abba%20Jallo">Muhammad Abba Jallo</a>, <a href="https://publications.waset.org/abstracts/search?q=Fred%20Fudah%20Moveh"> Fred Fudah Moveh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study addresses the challenges faced by Nigerian law enforcement agencies due to the lack of an integrated crime management system. While various agencies use ICT-based systems, the absence of interoperability creates barriers to effective collaboration and information sharing. The research proposes the development of an Interagency Crime Management System (ICMS), which integrates the Crime Management Systems (CMS) of different agencies through an Application Program Interface (API). The system is designed to allow all law enforcement agencies to input data using a standardized format, improving crime tracking, reporting, and management across Nigeria. This paper details the design and implementation process, highlighting the benefits of enhanced collaboration for crime management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime%20management" title="crime management">crime management</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=law%20enforcement" title=" law enforcement"> law enforcement</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT" title=" ICT"> ICT</a> </p> <a href="https://publications.waset.org/abstracts/192231/development-of-an-interagency-crime-management-system-for-nigerias-law-enforcement-agencies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192231.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">19</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">593</span> The Value of Online News: Addressing the Problem of Online Investment Fraud Crimes in Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Thapthep%20Paprach">Thapthep Paprach</a>, <a href="https://publications.waset.org/abstracts/search?q=Benya%20Lertsuwan"> Benya Lertsuwan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Investment fraud is not a new criminal, but there are still more victims during the Internet of Things era. This kind of criminal has been classified as a national and transnational financial crime problem all over the world. In Thailand, the country has also been attacked by this kind of crime. This research concerns whether the mass media that is supposed to cover news about online investment scams realized and warned Thais about this crime. Thus, this study explores the value of news about investment fraud in terms of frequency. The methodology uses web crawling from the top 5 news agency websites that have the most access. We pull out all information reporting about investment fraud. The findings revealed that the ‘Khaosod’ news agency was the first rank in reporting on investment crime. On the other hand, ‘Matichon’ was the least reported. Thairat news agencies frequently reported such criminals from midnight to very early in the morning, while other news agencies reported during the daytime. The results between the frequency of news reporting about investment fraud and the monthly number of victim reports are not correlated. Although the most cases reported to Thai police were in February 2023, but the most news reported was in January 2023. In conclusion, there might be a negative correlation between the amount of investment fraud news reported and the number of victims. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=investment%20fraud" title="investment fraud">investment fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=news%20value" title=" news value"> news value</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20news%20report" title=" online news report"> online news report</a>, <a href="https://publications.waset.org/abstracts/search?q=Ponzi%20schemes" title=" Ponzi schemes"> Ponzi schemes</a>, <a href="https://publications.waset.org/abstracts/search?q=Romance%20scam" title=" Romance scam"> Romance scam</a> </p> <a href="https://publications.waset.org/abstracts/170639/the-value-of-online-news-addressing-the-problem-of-online-investment-fraud-crimes-in-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170639.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">77</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">592</span> Computer Fraud from the Perspective of Iran&#039;s Law and International Documents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Babak%20Pourghahramani">Babak Pourghahramani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the modern crimes against property and ownership in the cyber-space is the computer fraud. Despite being modern, the aforementioned crime has its roots in the principles of religious jurisprudence. In some cases, this crime is compatible with the traditional regulations and that is when the computer is considered as a crime commitment device and also some computer frauds that take place in the context of electronic exchanges are considered as crime based on the E-commerce Law (approved in 2003) but the aforementioned regulations are flawed and until recent years there was no comprehensive law in this regard; yet after some years the Computer Crime Act was approved in 2009/26/5 and partly solved the problem of legal vacuum. The present study intends to investigate the computer fraud according to Iran's Computer Crime Act and by taking into consideration the international documents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fraud" title="fraud">fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20fraud" title=" cyber fraud"> cyber fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20fraud" title=" computer fraud"> computer fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=classic%20fraud" title=" classic fraud"> classic fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20crime" title=" computer crime"> computer crime</a> </p> <a href="https://publications.waset.org/abstracts/72041/computer-fraud-from-the-perspective-of-irans-law-and-international-documents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72041.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">591</span> Detecting of Crime Hot Spots for Crime Mapping</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Somayeh%20Nezami">Somayeh Nezami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The management of financial and human resources of police in metropolitans requires many information and exact plans to reduce a rate of crime and increase the safety of the society. Geographical Information Systems have an important role in providing crime maps and their analysis. By using them and identification of crime hot spots along with spatial presentation of the results, it is possible to allocate optimum resources while presenting effective methods for decision making and preventive solutions. In this paper, we try to explain and compare between some of the methods of hot spots analysis such as Mode, Fuzzy Mode and Nearest Neighbour Hierarchical spatial clustering (NNH). Then the spots with the highest crime rates of drug smuggling for one province in Iran with borderline with Afghanistan are obtained. We will show that among these three methods NNH leads to the best result. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=GIS" title="GIS">GIS</a>, <a href="https://publications.waset.org/abstracts/search?q=Hot%20spots" title=" Hot spots"> Hot spots</a>, <a href="https://publications.waset.org/abstracts/search?q=nearest%20neighbor%20hierarchical%20spatial%20clustering" title=" nearest neighbor hierarchical spatial clustering"> nearest neighbor hierarchical spatial clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=NNH" title=" NNH"> NNH</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20analysis%20of%20crime" title=" spatial analysis of crime"> spatial analysis of crime</a> </p> <a href="https://publications.waset.org/abstracts/68172/detecting-of-crime-hot-spots-for-crime-mapping" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68172.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">329</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">590</span> Crime and Class: A Study on Violent Crime in Dhaka City </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20B.%20M.%20Najmus%20Sakib">A. B. M. Najmus Sakib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Being one of the most densely populated cities in the world, Dhaka is facing diversified types of crimes every day. Limitations of resources insert serious strains among the inhabitants of this city. This paper aims to analyze the correlation between crime and class, more especially the violent crime in connection with social class. Following the stratified random sampling technique, one of the police divisions among eight of the Dhaka Metropolitan Police (DMP) will be selected. The data will be collected by evaluating the case files found in the police report. First, this paper discusses the nature and pattern of violent crimes in Dhaka city. Then, it assesses the socio-economic status of the accused persons considering their professions. Furthermore, by testing hypothesis, it will identify how the social classes are connected with violent crimes. Finally, the paper will ascertain the particular class that has an impact on violent crime in Dhaka City and will be ended by suggesting possible measures should take by the law enforcement agencies of Bangladesh. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20class" title="social class">social class</a>, <a href="https://publications.waset.org/abstracts/search?q=violent%20crime" title=" violent crime"> violent crime</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20prevention" title=" crime prevention"> crime prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=nature%20of%20crime" title=" nature of crime"> nature of crime</a> </p> <a href="https://publications.waset.org/abstracts/110745/crime-and-class-a-study-on-violent-crime-in-dhaka-city" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110745.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">145</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">589</span> Terrorism Is a Crime under International Law </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Miguel%20Manero%20De%20Lemos">Miguel Manero De Lemos</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The ‘innovative and creative’ seminal decision of the Special Tribunal for Lebanon (STL) was not welcomed by academic opinion. The court recognized that terrorism is a crime under international law in times of peace. Scholars widely – and sometimes aggressively – criticize this conclusion. This article asserts that, while some aspects of the decision of the STL might be defective, the basic premise, that it is indeed such a crime, is sound. This article delves into the method that the court used to attain such an outcome and explains why the conclusion of the court is correct, albeit the use of a different method is to be preferred. It also argues that subsequent developments leave little room to keep arguing that there is no international crime of terrorism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=STL" title=" STL"> STL</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20criminal%20law" title=" international criminal law"> international criminal law</a> </p> <a href="https://publications.waset.org/abstracts/58270/terrorism-is-a-crime-under-international-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58270.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">588</span> Negative Self-Awareness and Its Effect on Crime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Guinevere%20Servis">Guinevere Servis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper hypothesizes that withdrawal from positive self-awareness, and the increase of counterfactual-thinking and self-handicapping can help provide ample justification for an individual before, during and/or after committing a crime. The understanding of who someone is, one’s perspective on the world, and why they think the way they do is key to therapy in preventing recidivism. Developing habits to escape self-awareness, by using self-handicapping and counterfactual ideologies, may provide the necessary thinking patterns to decide disobeying the law is a worthy act to pursue. An increase in self-awareness is hypothesized to decrease the likelihood of recidivism, and ways of thinking that withdraw from self awareness can increase the likelihood of it. Especially for those who have been disadvantaged in life and disobeyed the law, self-handicapping and counterfactual thinking can also help to justify one's wrongdoing. The understanding of how a criminal views their disadvantages in the world, and one’s thinking patterns are hypothesized to help one better understand the entire scope on why a crime was committed and thus reduce the likelihood of recidivism. Utilizing therapy for prisoners to increase self-awareness of both thought and action can lead to a healthy, happier life and reduce the likelihood of reoffending. By discussing the terms associated with self-awareness theory and other psychological topics such as self-handicapping, counterfactual thinking, this paper argues the actions towards increasing positive self-awareness can help decrease likelihood of recidivism. Adversely, hypothesizing that increasing the ways of thinking that withdraw one from self-awareness, through counterfactual thinking and self-handicapping, can inherently increase the likelihood of recidivism. Evaluating these findings to further understand the needed changes in correctional institutions is fundamental to reducing crime, benefiting the criminal, the victim(s) and their family, and the state. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime" title="crime">crime</a>, <a href="https://publications.waset.org/abstracts/search?q=self-awareness%20theory" title=" self-awareness theory"> self-awareness theory</a>, <a href="https://publications.waset.org/abstracts/search?q=correctional%20institutions" title=" correctional institutions"> correctional institutions</a>, <a href="https://publications.waset.org/abstracts/search?q=self-regulate" title=" self-regulate"> self-regulate</a>, <a href="https://publications.waset.org/abstracts/search?q=counterfactual%20thinking" title=" counterfactual thinking"> counterfactual thinking</a>, <a href="https://publications.waset.org/abstracts/search?q=recidivism" title=" recidivism"> recidivism</a> </p> <a href="https://publications.waset.org/abstracts/176590/negative-self-awareness-and-its-effect-on-crime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176590.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">99</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">587</span> The Historical Framework of International Crime in International Criminal Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tahraoui%20Boualem">Tahraoui Boualem</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Researching the historical framework of international crime means examining the historical facts that have contributed to uncovering this serious crime affecting international interests, and the law by which the study of the subject of international crime is determined is international criminal law, which is a branch of public international law. In this context, the historical study of international crime means recognizing the existence of an international community governed by international law, which makes us acknowledge that ancient societies lacked such stable and recurring international relations. Therefore, an attempt to monitor international crime in those ancient societies is only to demonstrate a historical fact that those societies have known some features of this crime, and have contributed in one way or another to the development of international criminal law without defining its concept or legal nature. The international community has affirmed the principle of establishing peace, achieving security, and respecting human rights. As a basis for friendly relations between the people of the international community and in case of prejudice, such as the aggressors breaching the obligations imposed on them, whether in time of peace or war. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=historical%20framework" title="historical framework">historical framework</a>, <a href="https://publications.waset.org/abstracts/search?q=of%20international%20crime" title=" of international crime"> of international crime</a>, <a href="https://publications.waset.org/abstracts/search?q=peace%20or%20war." title=" peace or war."> peace or war.</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20law" title=" international law"> international law</a> </p> <a href="https://publications.waset.org/abstracts/170984/the-historical-framework-of-international-crime-in-international-criminal-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170984.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">100</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">586</span> The Moderating Effect of Pathological Narcissism in the Relationship between Victim Justice Sensitivity and Anger Rumination</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Isil%20Coklar-Okutkan">Isil Coklar-Okutkan</a>, <a href="https://publications.waset.org/abstracts/search?q=Miray%20Akyunus"> Miray Akyunus</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Victim sensitivity is a form of justice sensitivity that reflects the tendency to perceive injustice to one’s disadvantage. Victim sensitivity is considered as a dysfunctional trait that predicts anger, aggression, uncooperative behavior, depression and anxiety. Indeed, exploring the mechanism of association between victim sensitivity and anger is clinically important since it can lead to externalizing and internalizing problems. This study aims to investigate the moderating role of pathological narcissism in the relationship between victim sensitivity and anger rumination. Through testing different models where subtypes of narcissism and anger rumination components are included independently, the specific mechanism of different ruminative processes in anger is investigated. The sample consisted of 311 undergraduate students from Turkey, 107 of whom were males, and 204 were females. Participants completed Justice Sensitivity Inventory-Victim Subscale, Pathological Narcissism Inventory and Anger Rumination Scale. In the proposed double moderation model, vulnerable and grandiose narcissism was the moderators in the relationship between victim justice sensitivity and anger rumination. Four separate models were tested where one of the four components of anger rumination (angry afterthoughts, thoughts of revenge, angry memories, understanding of causes) were the dependent variable in each model. Results revealed that two of the moderation models are significant. Firstly, grandiose narcissism is the only moderator in the relationship between victim sensitivity and thoughts of revenge. Secondly, vulnerable narcissism is the only moderator in the relationship between victim sensitivity and understanding causes. Accordingly, grandiose narcissism is positively associated with the thoughts of revenge, and vulnerable narcissism is positively associated with understanding causes, only when the level of victim sensitivity is high. To summarize, increased victim sensitivity leads to ruminative thoughts of revenge in individuals with grandiose narcissism, whereas it leads to rumination on causes of the incident in individuals with vulnerable narcissism. The clinical implications of the findings are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anger%20rumination" title="anger rumination">anger rumination</a>, <a href="https://publications.waset.org/abstracts/search?q=victim%20sensitivity" title=" victim sensitivity"> victim sensitivity</a>, <a href="https://publications.waset.org/abstracts/search?q=grandiose%20narcissism" title=" grandiose narcissism"> grandiose narcissism</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerable%20narcissism" title=" vulnerable narcissism"> vulnerable narcissism</a> </p> <a href="https://publications.waset.org/abstracts/134066/the-moderating-effect-of-pathological-narcissism-in-the-relationship-between-victim-justice-sensitivity-and-anger-rumination" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134066.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">585</span> Strengthening Deradicalizing Islamist Extremism in Indonesia: A Victim-Centred Approach </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Milda%20Istiqomah">Milda Istiqomah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Deradicalization program has long been the subject of investigation. There is a steadily growing interest in examining the results on how Islamist terrorists agree to abandon violence and leave radicalism; however, it is argued that de-radicalization program on terrorism in many countries is still questionable for its effectiveness. This article aims to provide an overview of the deradicalization program specifically related to the victim-centred approach conducted by the Indonesian government and investigates critical issues surrounding the analysis of their effectiveness and outcomes. This research employs several case studies of a victim-centred approach conducted by the Indonesian Witness and Victim Protection Agency as well as the Indonesian Counter-terrorism Agency. This paper argues that the victim-centred approach to de-radicalize former terrorist prisoners faces several implemental challenges; however, the initiative may offer promise for future successful de-radicalization program. Furthermore, until more data surrounding the efficacy of this initiative available, the victim-centred approach may also constitute a significant and essential component of disengagement, de-radicalisation, and reintegration of terrorist prisoners. In conclusion, this paper suggests that further empirical research concerning prevention policies and disengagement interventions related to victim-centred approach need to be explored to give more inputs to the Indonesian government to achieve the effectiveness of de-radicalization program. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=victim-centred%20approach" title=" victim-centred approach"> victim-centred approach</a>, <a href="https://publications.waset.org/abstracts/search?q=de-radicalization" title=" de-radicalization"> de-radicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamist%20extremism" title=" Islamist extremism"> Islamist extremism</a> </p> <a href="https://publications.waset.org/abstracts/55736/strengthening-deradicalizing-islamist-extremism-in-indonesia-a-victim-centred-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55736.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">308</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=20">20</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=21">21</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=victim%20of%20crime&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10