CINXE.COM
Search results for: perpetrators
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: perpetrators</title> <meta name="description" content="Search results for: perpetrators"> <meta name="keywords" content="perpetrators"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="perpetrators" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="perpetrators"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 101</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: perpetrators</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">101</span> Social and Psychological Contexts of Male-Perpetrators of Violence against Women</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mythri%20Kukkaje">Mythri Kukkaje</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information about the social and psychological contexts that operate as a breeding ground for perpetrators of violence against women in India is scarce. To understand the social and psychological contexts that form the bases of violent behaviour in male-perpetrators against women, interviews were conducted with 13 men above the age of 18 years, who were convicted for their crimes against women. Using thematic analysis, the nurturance and the social background of the perpetrators, determined by their social relationships, the socio-economic status, the extent of substance abuse, the history of experiencing and witnessing violence and their cultural context, were found to define the social context. The nature and the psychological background of the perpetrators determined by the thoughts and beliefs regarding gender and violence, the motivation behind their violent behaviour and a few specific personality traits were found to define the psychological context. These factors on their own, as well as an interaction between them, could be responsible for varying degrees of violence against women. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=perpetrator" title="perpetrator">perpetrator</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological" title=" psychological"> psychological</a>, <a href="https://publications.waset.org/abstracts/search?q=social" title=" social"> social</a>, <a href="https://publications.waset.org/abstracts/search?q=violence%20against%20women" title=" violence against women"> violence against women</a> </p> <a href="https://publications.waset.org/abstracts/88294/social-and-psychological-contexts-of-male-perpetrators-of-violence-against-women" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88294.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">227</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">100</span> Complicating Representations of Domestic Violence Perpetration through a Qualitative Content Analysis and Socio-Ecological Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Charlotte%20Lucke">Charlotte Lucke</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study contributes to the body of literature that analyzes and complicates oversimplified and sensationalized representations of trauma and violence through a close examination and complication of representations of perpetrators of domestic violence in the mass media. This study determines the ways the media frames perpetrators of domestic violence through a qualitative content analysis and socio-ecological approach to the perpetration of violence. While the qualitative analysis has not been carried out, through preliminary research, this study hypothesizes that the media represents perpetrators through tropes such as the 'predator' or 'offender,' or as a demonized 'other.' It is necessary to expose and work through such stereotypes because cultivation theory demonstrates that the mass media determines societal beliefs about and perceptions of the world. Thus, representations of domestic violence in the mass media can lead people to believe that perpetrators of violence are mere animals or criminals and overlook the trauma that many perpetrators experience. When the media represents perpetrators as pure evil, monsters, or absolute 'others,' it leaves out the complexities of what moves people to commit domestic violence. By analyzing and placing media representations of perpetrators into conversation with the socio-ecological approach to violence perpetration, this study complicates domestic violence stereotypes. The socio-ecological model allows researchers to consider the way the interplay between individuals and their families, friends, communities, and cultures can move people to act violently. Using this model, along with psychological and psychoanalytic approaches to the etiology of domestic violence, this paper argues that media stereotypes conceal the way people’s experiences of trauma, along with community and cultural norms, perpetuates the cycle of systemic trauma and violence in the home. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=domestic%20violence" title="domestic violence">domestic violence</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20images" title=" media images"> media images</a>, <a href="https://publications.waset.org/abstracts/search?q=representing%20trauma" title=" representing trauma"> representing trauma</a>, <a href="https://publications.waset.org/abstracts/search?q=theorising%20trauma" title=" theorising trauma"> theorising trauma</a> </p> <a href="https://publications.waset.org/abstracts/98628/complicating-representations-of-domestic-violence-perpetration-through-a-qualitative-content-analysis-and-socio-ecological-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98628.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">239</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">99</span> De/Reconstructing the Notion of Women as Perpetrators of Terrorism: The Case of Boko Haram</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Damilohun%20D.%20Ayoyo">Damilohun D. Ayoyo</a>, <a href="https://publications.waset.org/abstracts/search?q=Anthony%20Mpiani"> Anthony Mpiani</a>, <a href="https://publications.waset.org/abstracts/search?q=Temitope%20B.%20Oriola"> Temitope B. Oriola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The debate on women’s roles in insurgencies and terrorist organizations continues to garner scholarly attention. While some scholars view women insurgents and terrorists as perpetrators, others have argued that they are non-agents and victims. This paper de/reconstructs the notion of ‘women as perpetrators’ of terrorism. Drawing on the narratives of rescued female Boko Haram operatives, and Boko Haram’s tactics for recruiting and deploying women and girls, the paper advances three main arguments. First, the growing social construction of women as perpetrators of terrorism – particularly radical Islamic terrorism – downplays the socio-cultural and structural processes leading to women’s involvement with terrorist organizations. Second, women agency in Boko Haram activities is better understood when grounded in the cultural and structural contexts of Northern Nigeria, Boko Haram’s construction of ‘female,’ and the experiences of female Boko Haram operatives. Third, the mechanisms through which female Boko Haram operatives are recruited and deployed make them more of non-agents and victims than perpetrators of terrorism. The paper draws on the agency-structure approach and argues that the gendered power asymmetries embedded in the cultures and structures of Northern Nigeria –the base of Boko Haram– contribute to the nature and dynamics of women’s involvement in the insurgency. Although the paper does not negate the agency of women in terrorism, it aligns with the studies that consider women insurgents as more victims than perpetrators of terror. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Boko%20Haram" title="Boko Haram">Boko Haram</a>, <a href="https://publications.waset.org/abstracts/search?q=female%20agency" title=" female agency"> female agency</a>, <a href="https://publications.waset.org/abstracts/search?q=Northern%20Nigeria" title=" Northern Nigeria"> Northern Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=patriarchy" title=" patriarchy"> patriarchy</a>, <a href="https://publications.waset.org/abstracts/search?q=perpetrator%20of%20terror" title=" perpetrator of terror"> perpetrator of terror</a>, <a href="https://publications.waset.org/abstracts/search?q=radical%20Islamic%20terrorism" title=" radical Islamic terrorism"> radical Islamic terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=sharia" title=" sharia"> sharia</a>, <a href="https://publications.waset.org/abstracts/search?q=victim%20of%20terror" title=" victim of terror"> victim of terror</a>, <a href="https://publications.waset.org/abstracts/search?q=women%20insurgents" title=" women insurgents"> women insurgents</a> </p> <a href="https://publications.waset.org/abstracts/99728/dereconstructing-the-notion-of-women-as-perpetrators-of-terrorism-the-case-of-boko-haram" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99728.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">98</span> Subdued Electrodermal Response to Empathic Induction Task in Intimate Partner Violence (IPV) Perpetrators</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Javier%20Comes%20Fayos">Javier Comes Fayos</a>, <a href="https://publications.waset.org/abstracts/search?q=Isabel%20Rodr%C3%ADguez%20Moreno"> Isabel Rodríguez Moreno</a>, <a href="https://publications.waset.org/abstracts/search?q=Sara%20Bressanutti"> Sara Bressanutti</a>, <a href="https://publications.waset.org/abstracts/search?q=Marisol%20Lila"> Marisol Lila</a>, <a href="https://publications.waset.org/abstracts/search?q=Angel%20Romero%20Mart%C3%ADnez"> Angel Romero Martínez</a>, <a href="https://publications.waset.org/abstracts/search?q=Luis%20Moya%20Albiol"> Luis Moya Albiol</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Empathy is a cognitive-affective capacity whose deterioration is associated with aggressive behaviour. Deficient affective processing is one of the predominant risk factors in men convicted of intimate partner violence (IPV perpetrators), since it makes their capacity to empathize very difficult. The objective of this study is to compare the response of electrodermal activity (EDA), as an indicator of emotionality, to an empathic induction task, between IPV perpetrators and men without a history of violence. The sample was composed of 51 men who attended the CONTEXTO program, with penalties for gender violence under two years, and 47 men with no history of violence. Empathic induction was achieved through the visualization of 4 negative emotional-eliciting videos taken from an emotional induction battery of videos validated for the Spanish population. The participants were asked to actively empathize with the video characters (previously pointed out). The psychophysiological recording of the EDA was accomplished by the "Vrije Universiteit Ambulatory Monitoring System (VU-AMS)." An analysis of repeated measurements was carried out with 10 intra-subject measurements (time) and "group" (IPV perpetrators and non-violent perpetrators) as the inter-subject factor. First, there were no significant differences between groups in the baseline AED levels. Yet, a significant interaction between the “time” and “group” was found with IPV perpetrators exhibiting lower EDA response than controls after the empathic induction task. These findings provide evidence of a subdued EDA response after an empathic induction task in IPV perpetrators with respect to men without a history of violence. Therefore, the lower psychophysiological activation would be indicative of difficulties in the emotional processing and response, functions that are necessary for the empathic function. Consequently, the importance of addressing possible empathic difficulties in IPV perpetrator psycho-educational programs is reinforced, putting special emphasis on the affective dimension that could hinder the empathic function. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electrodermal%20activity" title="electrodermal activity">electrodermal activity</a>, <a href="https://publications.waset.org/abstracts/search?q=emotional%20induction" title=" emotional induction"> emotional induction</a>, <a href="https://publications.waset.org/abstracts/search?q=empathy" title=" empathy"> empathy</a>, <a href="https://publications.waset.org/abstracts/search?q=intimate%20partner%20violence" title=" intimate partner violence"> intimate partner violence</a> </p> <a href="https://publications.waset.org/abstracts/135109/subdued-electrodermal-response-to-empathic-induction-task-in-intimate-partner-violence-ipv-perpetrators" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135109.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">200</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">97</span> The Instrumentalization of Digital Media in the Context of Sexualized Violence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Katharina%20Kargel">Katharina Kargel</a>, <a href="https://publications.waset.org/abstracts/search?q=Frederic%20Vobbe"> Frederic Vobbe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sexual online grooming is generally defined as digital interactions for the purpose of sexual exploitation of children or minors, i.e. as a process for preparing and framing sexual child abuse. Due to its conceptual history, sexual online grooming is often associated with perpetrators who are previously unknown to those affected. While the strategies of perpetrators and the perception of those affected are increasingly being investigated, the instrumentalisation of digital media has not yet been researched much. Therefore, the present paper aims at contributing to this research gap by examining in what kind of ways perpetrators instrumentalise digital media. Our analyses draw on 46 case documentations and 18 interviews with those affected. The cases and the partly narrative interviews were collected by ten cooperating specialist centers working on sexualized violence in childhood and youth. For this purpose, we designed a documentation grid allowing for a detailed case reconstruction i.e. including information on the violence, digital media use and those affected. By using Reflexive Grounded Theory, our analyses emphasize a) the subjective benchmark of professional practitioners as well as those affected and b) the interpretative implications resulting from our researchers’ subjective and emotional interaction with the data material. It should first be noted that sexualized online grooming can result in both online and offline sexualized violence as well as hybrid forms. Furthermore, the perpetrators either come from the immediate social environment of those affected or are unknown to them. The perpetrator-victim relationship plays a more important role with regard to the question of the instrumentalisation of digital media than the question of the space (on vs. off) in which the primary violence is committed. Perpetrators unknown to those affected instrumentalise digital media primarily to establish a sexualized system of norms, which is usually embedded in a supposed love relationship. In some cases, after an initial exchange of sexualized images or video recordings, a latent play on the position of power takes place. In the course of the grooming process, perpetrators from the immediate social environment increasingly instrumentalise digital media to establish an explicit relationship of power and dependence, which is directly determined by coercion, threats and blackmail. The knowledge of possible vulnerabilities is strategically used in the course of maintaining contact. The above explanations lead to the conclusion that the motive for the crime plays an essential role in the question of the instrumentalisation of digital media. It is therefore not surprising that it is mostly the near-field perpetrators without commercial motives who initiate a spiral of violence and stress by digitally distributing sexualized (violent) images and video recordings within the reference system of those affected. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sexualized%20violence" title="sexualized violence">sexualized violence</a>, <a href="https://publications.waset.org/abstracts/search?q=children%20and%20youth" title=" children and youth"> children and youth</a>, <a href="https://publications.waset.org/abstracts/search?q=grooming" title=" grooming"> grooming</a>, <a href="https://publications.waset.org/abstracts/search?q=offender%20strategies" title=" offender strategies"> offender strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20media" title=" digital media"> digital media</a> </p> <a href="https://publications.waset.org/abstracts/139521/the-instrumentalization-of-digital-media-in-the-context-of-sexualized-violence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139521.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">96</span> The Influence of Gender and Sexual Orientation on Police Decisions in Intimate Partner Violence Cases</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Brenda%20Russell">Brenda Russell</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Police officers spend a great deal of time responding to domestic violence calls. Recent research has found that men and women in heterosexual and same-sex relationships are equally likely to initiate intimate partner violence IPV) and likewise susceptible to victimization, yet police training tends to focus primarily on male perpetration and female victimization. Criminal justice studies have found that male perpetrators of IPV are blamed more than female perpetrators who commit the same offense. While previous research has examined officer’s response in IPV cases with male and female heterosexual offenders, research has yet to investigate police response in same-sex relationships. This study examined officers’ decisions to arrest, perceptions of blame, perceived danger to others, disrespect, and beliefs in prosecution, guilt and sentencing. Officers in the U.S. (N = 248) were recruited using word of mouth and access to police association websites where a link to an online study was made available. Officers were provided with one of 4 experimentally manipulated scenarios depicting a male or female perpetrator (heterosexual or same-sex) in a clear domestic assault situation. Officer age, experience with IPV and IPV training were examined as possible covariates. Training in IPV was not correlated to any dependent variable of interest. Age was correlated with perpetrator arrest and blame (.14 and .16, respectively) and years of experience was correlated to arrest, offering informal advice, and mediating the incident (.14 to -.17). A 2(perpetrator gender) X 2 (victim gender) factorial design was conducted. Results revealed that officers were more likely to provide informal advice and mediate in gay male relationships, and were less likely to arrest perpetrators in same-sex relationships. When officer age and years of experience with domestic violence were statistically controlled, effects for perpetrator arrest and providing informal advice were no longer significant. Officers perceived heterosexual male perpetrators as more dangerous, blameworthy, disrespectful, and believed they would receive significantly longer sentences than all other conditions. When officer age and experience were included as covariates in the analyses perpetrator blame was no longer statistically significant. Age, experience and training in IPV were not related to perceptions of victims. Police perceived victims as more truthful and believable when the perpetrator was a male. Police also believed victims of female perpetrators were more responsible for their own victimization. Victims were more likely to be perceived as a danger to their family when the perpetrator was female. Female perpetrators in same-sex relationships and heterosexual males were considered to experience more mental illness than heterosexual female or gay male perpetrators. These results replicate previous research suggesting male perpetrators are more blameworthy and responsible for their own victimization, yet expands upon previous research by identifying potential biases in police response to IPV in same-sex relationships. This study brings to the forefront the importance of evidence-based officer training in IPV and provides insight into the need for a gender inclusive approach as well as addressing the necessity of the practical applications for police. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=domestic%20violence" title="domestic violence">domestic violence</a>, <a href="https://publications.waset.org/abstracts/search?q=heterosexual" title=" heterosexual"> heterosexual</a>, <a href="https://publications.waset.org/abstracts/search?q=intimate%20partner%20violence" title=" intimate partner violence"> intimate partner violence</a>, <a href="https://publications.waset.org/abstracts/search?q=officer%20response" title=" officer response"> officer response</a>, <a href="https://publications.waset.org/abstracts/search?q=police%20officer" title=" police officer"> police officer</a>, <a href="https://publications.waset.org/abstracts/search?q=same-sex" title=" same-sex"> same-sex</a> </p> <a href="https://publications.waset.org/abstracts/44303/the-influence-of-gender-and-sexual-orientation-on-police-decisions-in-intimate-partner-violence-cases" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44303.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">347</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">95</span> Criminal Liability for Criminal Tax</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Theresia%20Simatupang%20dan%20Rahmayanti">Theresia Simatupang dan Rahmayanti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tax Law is a legal product and therefore should be subject to the legal norms, both about this actions, implementation, and about the material. Law has always aimed at providing justice, and besides that the law as a tool used to organize the order or rule of law. tax classification of a crime in this is very necessary, because the crime of taxation is very detrimental to the country and is still very high in society and socialization associated with punishment in sentencing that would have to provide a deterrent for the perpetrators, so refer to the this, these criminal offenses can endanger the stability of the nation's economy and the country that require special snacks. The application of legal sanctions against the perpetrators of the crime of taxation already has a strong legal basis, namely UU KUP. UU KUP have loaded threat (sanctions) severe punishment for tax payers who commit offenses and crimes in the field of taxation, which is contained in Article 38, and Article 39, Article 41, Article 41 A, and 41 B as well as Article 43 of Law and Law No. 12 KUP about 1985 Land Tax and Building. Criminal sanctions against violators of the tax provision are important because tax payers sanctions for violating tax laws. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=accountability" title="accountability">accountability</a>, <a href="https://publications.waset.org/abstracts/search?q=tax%20crime" title=" tax crime"> tax crime</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20liability" title=" criminal liability"> criminal liability</a>, <a href="https://publications.waset.org/abstracts/search?q=taxation" title=" taxation"> taxation</a> </p> <a href="https://publications.waset.org/abstracts/15774/criminal-liability-for-criminal-tax" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15774.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">341</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">94</span> ‘Honour’ Crime and the Need for Differentiation from Domestic Violence in UK Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mariam%20Shah">Mariam Shah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> ‘Honour’ crime has commonly been perceived in the UK as being a ‘domestic violence’ related issue due to incidents perceived to take place within a domestic context, and commonly by familial perpetrators. The lack of differentiation between domestic violence and ‘honour’ related incidents has several negative implications. Firstly, the prevalence and extent of ‘honour’ related crime within the UK cannot be accurately quantified due to ‘honour’ incidents being classed statistically as domestic violence incidents. Secondly, lack of differentiation means that the negative stereotypical attitudes ascribed to domestic violence which has resulted in lower criminal conviction rates that are also impacting the conviction of perpetrators of ‘honour’ crime. Thirdly, ‘honour’ related crime is innately distinct from domestic violence due to the perpetrator’s resolute intent of cleansing perceived ‘shame’ in any way possible, often with the involvement and collusion of multiple perpetrators from within the family and/or community. Domestic violence is typically restricted to the ‘home’, but ‘honour’ crime can operate between national and international boundaries. This paper critically examines the current academic literature and concludes that the few similarities between domestic violence and ‘honour’ related crime are not sufficient to warrant identical treatment under UK criminal law. ‘Honour’ related crime is a distinct and stand-alone offence which should be recognised as such. The appropriate identification and treatment of ‘honour’ crime are crucial, particularly in light of the UK’s first ‘white’ honour killing which saw a young English woman murdered after being deemed to have brought ‘shame’ on her ex-boyfriend’s family. This incident highlights the possibility of ‘honour’ crime extending beyond its perceived ‘ethnic minority’ roots and becoming more of a ‘mainstream’ issue for the multi-cultural and multi-racial UK. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=differentiation" title="differentiation">differentiation</a>, <a href="https://publications.waset.org/abstracts/search?q=domestic%20violence" title=" domestic violence"> domestic violence</a>, <a href="https://publications.waset.org/abstracts/search?q=honour%20crime" title=" honour crime"> honour crime</a>, <a href="https://publications.waset.org/abstracts/search?q=United%20Kingdom" title=" United Kingdom"> United Kingdom</a> </p> <a href="https://publications.waset.org/abstracts/76169/honour-crime-and-the-need-for-differentiation-from-domestic-violence-in-uk-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76169.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">235</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">93</span> Behavioral Similarities between Perpetrators of School Violence and Having a Parent Incarcerated during Adolescence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Darynne%20Madison%20Dela%20Gente">Darynne Madison Dela Gente</a>, <a href="https://publications.waset.org/abstracts/search?q=Panayiota%20Courelli"> Panayiota Courelli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Similarities in behavior between perpetrators of school violence and those with a parent in prison raise concern when considering the root causes of a student’s violent behavior. Dealing with parental incarceration is highly consequential on a student’s emotional well-being and may cause aggressive behavior that can lead to them becoming a perpetrator of school violence. These students are more likely to have interpersonal issues, antisocial tendencies, and a hostile demeanor, which are factors that closely align with indicators of an offender of violence. Developmental risk factors of parental incarceration are heavily understudied and often overlooked. This literature review aims to analyze the correlation between having a parent in prison and exhibiting physical or verbal aggression in a school environment. Furthermore, it strives to bring awareness to the inconsistencies in existing research and encourage a greater depth of study of the behavioral impacts, specifically in an academic setting. Furthermore, it will elaborate on the effectiveness of current intervention programs, such as Project Avary, Hope House, Kids Mates Inc., and Girl Scouts Beyond Bars, which provide immense support, as well as proposed methods of implementation in a school environment. Creating a space for these students to cope ultimately aids in the prevention of violent behaviors and intergenerational incarceration. Access to intervention programs, especially in schools located in areas with high rates of incarceration, would greatly reduce the risk of these students becoming perpetrators of school violence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adolescent%20behavior" title="adolescent behavior">adolescent behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescent%20mental%20health" title=" adolescent mental health"> adolescent mental health</a>, <a href="https://publications.waset.org/abstracts/search?q=parental%20incarceration" title=" parental incarceration"> parental incarceration</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20violence%20prevention" title=" school violence prevention"> school violence prevention</a> </p> <a href="https://publications.waset.org/abstracts/160872/behavioral-similarities-between-perpetrators-of-school-violence-and-having-a-parent-incarcerated-during-adolescence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160872.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">94</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">92</span> Lived Experiences and Perspectives of Adult Survivors of Incest-Related Childhood Sexual Abuse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Varsha%20Puri">Varsha Puri</a>, <a href="https://publications.waset.org/abstracts/search?q=Sharon%20Hudson"> Sharon Hudson</a>, <a href="https://publications.waset.org/abstracts/search?q=Ian%20Kim"> Ian Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Incest-related childhood sexual abuse (IRCSA) is challenging to study due to the shame and secrecy experienced by its survivors. Ramifications of IRCSA worsen when it is unidentified, and interventions are not made. IRCSA perspectives are essential for future prevention and intervention strategies. However, there is limited understanding of this population’s experiences, perspectives, and long-term struggles. To date, research for IRCSA has utilized data from treatment programs and qualitative research with cohorts of 10-20 people, much of the data is from 10-40 years prior. Methods. In June 2018, an anonymous online survey was posted to multiple social media sites (e.g., Facebook IRCSA groups) and sexual abuse resource sites. Survey responses were collected for a year. The survey collected non-identifying demographics, IRCSA experiences, and outcomes data. Results: We obtained 1310 completed surveys. Demographics of all ages, racial backgrounds, financial backgrounds, and genders were obtained; the majority identified as white (81%) and female (76%). Childhood sexual abuse (CSA) started before the age of 6 in 49% and was endured for more than one year in 84% of respondents, and 39% reported ten or more years of abuse. CSA by multiple perpetrators occurred in 58%, while 8% had ten or more perpetrators. CSA by perpetrators under 21 years old was reported by 46%. Female perpetrators were reported by 28% of respondents. Fathers were the highest reported sexual abusers at 60%, and mothers were reported at 17%. Only 16% reported that at least one of their perpetrators was prosecuted for sexual abuse of a minor. Respondents confirmed that 54% of the time, they informed an adult of the abuse; only 2% agreed that “an intervention was made by the family that protected me.” A majority reported that IRCSA has negatively impacted their intimate/sexual relationships (96%) and mental health (96%). A majority reported negative impacts on biological family relationships (88%), physical health (73%), finances (59%), educational achievement (57%), and employment (56%). When asked about suffering from addiction, 85% of respondents answered yes. Prevention strategies selected most by respondents include early school education around CSA prevention (67%), removing the statute of limitations for reporting CSA (69%), and improved laws protecting IRCSA survivors (63%). Conclusion: The data document that IRCSA can be pervasive, and the dearth of intervention and support for survivors have major lasting impacts. Survivors have a unique and valuable perspective on what interventions are needed to prevent IRCSA and support survivors; their voice has long been unheard in crafting prevention and intervention policies and services. These results thus provide an important call to action from these critical stakeholders. Pediatricians should recognize that perpetrators can be pediatric patients, women, and parents. Pediatricians can advocate for more early CSA prevention education and policy changes that remove the statute of limitations for reporting CSA. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=incest" title="incest">incest</a>, <a href="https://publications.waset.org/abstracts/search?q=childhood%20sexual%20abuse" title=" childhood sexual abuse"> childhood sexual abuse</a>, <a href="https://publications.waset.org/abstracts/search?q=incest-related%20childhood%20sexual%20abuse" title=" incest-related childhood sexual abuse"> incest-related childhood sexual abuse</a>, <a href="https://publications.waset.org/abstracts/search?q=incest%20survivor" title=" incest survivor"> incest survivor</a> </p> <a href="https://publications.waset.org/abstracts/165983/lived-experiences-and-perspectives-of-adult-survivors-of-incest-related-childhood-sexual-abuse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165983.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">91</span> Effectiveness of Video Interventions for Perpetrators of Domestic Violence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zeynep%20Turhan">Zeynep Turhan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital tools can improve knowledge and awareness of strategies and skills for healthy and respectful intimate relationships. The website of the Healthy and Respectful Relationship Program has been developed and included five key videos about how to build healthy intimate relationships. This study examined the perspectives about informative videos by focusing on how individuals learn new information or challenge their preconceptions or attitudes regarding male privilege and women's oppression. Five individuals who received no-contact orders and attended group intervention were the sample of this study. The observation notes were the major methodology examining how participants responded to video tools. The data analysis method was the interpretative phenomenological analysis. The results showed that many participants found the tools useful in learning the types of violence and communication strategies. Nevertheless, obstacles to implementing some techniques were found in their relationships. These digital tools might enhance healthy and respectful relationships despite some limitations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=healthy%20relationship" title="healthy relationship">healthy relationship</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20tools" title=" digital tools"> digital tools</a>, <a href="https://publications.waset.org/abstracts/search?q=intimate%20partner%20violence" title=" intimate partner violence"> intimate partner violence</a>, <a href="https://publications.waset.org/abstracts/search?q=perpetrators" title=" perpetrators"> perpetrators</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20interventions" title=" video interventions"> video interventions</a> </p> <a href="https://publications.waset.org/abstracts/165028/effectiveness-of-video-interventions-for-perpetrators-of-domestic-violence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165028.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">90</span> Comparison of Clinical Profiles of Patients Seen in a Women and Children Protection Unit in a Local Government Hospital in Makati, Philippines Before and During the COVID-19 Pandemic Between January 2018 to February 2020 and March 2020 to December 2021</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Margaret%20Denise%20P.%20Del%20Rosario">Margaret Denise P. Del Rosario</a>, <a href="https://publications.waset.org/abstracts/search?q=Geraldine%20Alcantara"> Geraldine Alcantara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: The declaration of the COVID-19 pandemic has impacted hospital visits of child abuse cases with less consults but more severe injuries. Objective: The study aims to identify the clinical profiles of patients seen in the hospital ng Makati Women and Children Protection Unit before and during the pandemic. Design: A cross-sectional analytic study design through review of records that underwent quantitative analysis. Results: 264 cases pre-pandemic and 208 cases during the pandemic were reviewed. Most reported cases were neglect comprising of 47% of the pre-pandemic cases and 68% of cases during the pandemic. Supervisory neglect was most commonly reported. An equal distribution between males and females were seen among victims and alleged perpetrators. The age group of both victims and alleged perpetrators during the pandemic was significantly younger compared to the pre-pandemic period. Children belonging to larger family groups were commonly encountered with most of them being the eldest amongst siblings. Alleged perpetrators were mostly secondary graduates for both time periods. A significant increase of cases during the pandemic occurred at home. More patients required hospitalization during the pandemic period with 37% compared to the 23% of admissions prior to the pandemic. Furthermore, a three-fold increase of injuries sustained during the pandemic required intensive care. Conclusion: The study reflects increased severity of injuries related to abuse during the pandemic compared to pre-pandemic times. A significant increase in injuries requiring intensive care were also seen despite less reported cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=child%20abuse" title="child abuse">child abuse</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=violence%20against%20children" title=" violence against children"> violence against children</a>, <a href="https://publications.waset.org/abstracts/search?q=WCPU" title=" WCPU"> WCPU</a>, <a href="https://publications.waset.org/abstracts/search?q=neglect" title=" neglect"> neglect</a> </p> <a href="https://publications.waset.org/abstracts/176549/comparison-of-clinical-profiles-of-patients-seen-in-a-women-and-children-protection-unit-in-a-local-government-hospital-in-makati-philippines-before-and-during-the-covid-19-pandemic-between-january-2018-to-february-2020-and-march-2020-to-december-2021" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176549.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">55</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">89</span> Perpetrator Trauma in Current World Cinema</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raya%20Morag">Raya Morag</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes a new paradigm for cinema/trauma studies - the trauma of the perpetrator. Canonical trauma research from Freud’s Aetiology of Hysteria to the present has been carried out from the perspective of identification with the victim, as have cinema trauma research and contemporary humanities-based trauma studies, climaxing during the 1990s in widespread interest in the victim vis-à-vis the Holocaust, war, and domestic violence. Breaking over 100 years of repression of the abhorrent and rejected concept of the perpetrator in psychoanalytic-based research proposes an uncanny shift in our conception of psychoanalysis' trajectory from women's 'hysteria' to 'post-traumatic stress disorder'. This new paradigm is driven by the global emergence of new waves of films (2007-2015) representing trauma suffered by perpetrators involved in the new style of war entailing deliberate targeting of non-combatants. Analyzing prominent examples from Israeli post-second Intifada documentaries (e.g., Ari Folman’s Waltz with Bashir), and post post-Iraq (and Afghanistan) War American documentaries (e.g., Errol Morris' Standard Operating Procedure), the paper discusses the limitations of victim trauma by the firm boundaries it (rightly) set in order to defend such victims of nineteenth and especially twentieth-century catastrophes; the epistemological processes needed in order to consider perpetrators’ trauma as an inevitable part of psychiatric-psychological and cultural perspectives on trauma, and, thus, the definition of perpetrators' trauma in contrast to victims'. It also analyzes the perpetrator's figure in order to go beyond the limitation of current trauma theory's relation to the Real, thus transgressing the 'unspeakableness' of the trauma itself. The paper seeks an exploration of what perpetrator trauma teaches us not only as a counter-paradigm to victim trauma, but as a reflection on the complex intertwining of the two paradigms in the twenty-first century collective new war unconscious, and on what psychoanalysis might offer us in the first decade of this terrorized-ethnicized century. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=American%20war%20documentaries" title="American war documentaries">American war documentaries</a>, <a href="https://publications.waset.org/abstracts/search?q=Israeli%20war%20documentaries" title=" Israeli war documentaries"> Israeli war documentaries</a>, <a href="https://publications.waset.org/abstracts/search?q=%27new%20war%27" title=" 'new war'"> 'new war'</a>, <a href="https://publications.waset.org/abstracts/search?q=perpetrator%20trauma" title=" perpetrator trauma"> perpetrator trauma</a> </p> <a href="https://publications.waset.org/abstracts/40545/perpetrator-trauma-in-current-world-cinema" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40545.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">297</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">88</span> Gender Differences in the Impact and Subjective Interpretation of Childhood Sexual Abuse Survivors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Borja-Alvarez">T. Borja-Alvarez</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Jim%C3%A9nez-Borja"> V. Jiménez-Borja</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Jim%C3%A9nez%20Borja"> M. Jiménez Borja</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20J.%20Jim%C3%A9nez-Mosquera"> C. J. Jiménez-Mosquera</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Research on child sexual abuse has predominantly focused on female survivors. This has resulted in less research looking at the particular context in which this abuse takes place for boys and the impact this abuse may have on male survivors. The aim of this study is to examine the sex and age of the perpetrators of child sexual abuse and explore gender differences in the impact along with the subjective interpretation that survivors attribute to these experiences. The data for this study was obtained from Ecuadorian university students (M = 230, F = 293) who reported sexual abuse using the ISPCAN Child Abuse Screening Tool Retrospective version (ICAST-R). Participants completed Horowitz's Impact of Event Scale (IES) and were also requested to choose among neutral, positive, and negative adjectives to describe these experiences. The results indicate that in the case of males, perpetrators were both males (adults =27%, peers =20%, relatives =10.3%, cousins =7.4%) and young females (girlfriends or ex-girlfriends =25.6%, neighborhood =20.7%, school =16.7%, cousins =15.3%, strangers =12.8%). In contrast, almost all females reported that adult males were the perpetrators (relatives =29.6%, neighborhood =11.9%, strangers =19.9%, family friends =9.7%). Regarding the impact of these events, significant gender differences emerged. More females (50%) than males (20%) presented symptoms of post-traumatic stress disorder (PTSD). Gender differences also surfaced in the way survivors interpret their experiences. Almost half of the male participants selected the word “consensual” followed by the words “normal”, “helped me to mature”, “shameful”, “confusing”, and “traumatic”. In contrast, almost all females chose the word “non-consensual” followed by the words “shameful”, “traumatic”, “scary”, and “confusing”. In conclusion, the findings of this study suggest that young females and adult males were the most common perpetrators of sexually abused boys whereas adult males were the most common perpetrators of sexually abused girls. The impact and the subjective interpretation of these experiences were more negative for girls than for boys. The factors that account for the gender differences in the impact and the interpretation of these experiences need further exploration. It is likely that the cultural expectations of sexual behaviors for boys and girls in Latin American societies may partially explain the differential impact in the way these childhood sexual abuse experiences are interpreted in adulthood. In Ecuador, as is the case in other Latin American countries, the machismo culture not only accepts but encourages early sexual behaviors in boys and negatively judges premature sexual behavior in females. The result of these different sexual expectations may be that sexually abused boys may re-define these experiences as “consensual” and “normal” in adulthood, even though these were not consensual at the time of occurrence. Future studies are needed to more deeply understand the different contexts of sexual abuse for boys and girls in order to analyze the long-term impact of these experiences. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=abuse" title="abuse">abuse</a>, <a href="https://publications.waset.org/abstracts/search?q=child" title=" child"> child</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20differences" title=" gender differences"> gender differences</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual" title=" sexual"> sexual</a> </p> <a href="https://publications.waset.org/abstracts/145551/gender-differences-in-the-impact-and-subjective-interpretation-of-childhood-sexual-abuse-survivors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145551.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">104</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">87</span> International Criminal Prosecution and Core International Crimes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ikediobi%20Lottanna%20Samuel">Ikediobi Lottanna Samuel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Days are gone when perpetrators of core international crimes hide under the cloak of sovereignty to go with impunity. The principle of international criminal responsibility is a reality. This move to end impunity for violation of human rights has led to the creation of international and hybrid tribunals, a permanent international criminal court, and increased prosecution of human rights violations in domestic courts. This article examines the attempts by the international community to bring perpetrators of heinous crimes to book. The work reveals the inadequacy of the current international mechanism for prosecuting core international crimes in order to end the culture of impunity and entrench the culture of accountability. It also identifies that ad hoc international criminal tribunals and the international criminal court face similar challenges ranging from lack of cooperation by nation states, non-existence of hierarchy of crimes, lack of effective enforcement mechanism, limited prosecutorial capacity and agenda, difficulty in apprehending suspects, difficulty in blending different legal tradition, absence of a coherent sentencing guideline, distant location of courts, selective indictment, etc. These challenges adversely affect the functioning of these courts. It is suggested that a more helpful way to end impunity would be to have a more robust and synergistic relationship between national, regional, and international approaches to prosecuting core international crimes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=prosecution" title="prosecution">prosecution</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal" title=" criminal"> criminal</a>, <a href="https://publications.waset.org/abstracts/search?q=international" title=" international"> international</a>, <a href="https://publications.waset.org/abstracts/search?q=tribunal" title=" tribunal"> tribunal</a>, <a href="https://publications.waset.org/abstracts/search?q=justice" title=" justice"> justice</a>, <a href="https://publications.waset.org/abstracts/search?q=ad%20hoc" title=" ad hoc"> ad hoc</a> </p> <a href="https://publications.waset.org/abstracts/158644/international-criminal-prosecution-and-core-international-crimes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158644.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">216</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">86</span> Mob Justice in Ghana: Implication for Peace</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ishaq%20Alhassan%20Meriga">Ishaq Alhassan Meriga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examined the phenomenon of mob violence and its implication for peace in Ghana. The study used the archival study of media reports and content analysis of other secondary data as well as eyewitness accounts. The study examined trends and patterns of vigilante violence within the Ghanaian context. Results showed a considerable increase in the occurrence of mob violence within the last 10 years. Theft and robbery emerged as the most frequently suspected crimes for which victims were attacked, while the LGBT community is not left out. Cases of mob violence were most frequently reported in urban areas. This study has shown that the patterns, scope, nature, and implication of mob justice in Ghana are fairly and comparatively similar to those found in other parts of Africa and the globe. Mob violence is identified as undermining the rule of law and thereby infringing on the fundamental human rights of the victims. It is confirmed to have a cycle of effects that is an impediment to the peace of the country. The study underscores the implications of mob violence in terms of disdaining human life and dignity, revisiting our justice systems and punishment procedures, resourcing, and empowering law enforcers to fight the menace of vigilantism. First, the archival study had a limitation regarding missing data. The majority of the cases used for the study lack information mostly on perpetrators and the steps taken by public authorities and security agencies after reports of a mob attack have been lodged with them. The study recommends for further research to be undertaken on the perpetrators and survivors of mob actions in order to get a holistic understanding of the phenomenon. This will give a more comprehensive view of the issue of mob violence in Ghana. From the findings, it can be concluded that mob justice is a social canker in Ghanaian communities, which has a great impact on the peace of the country. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=LGBT" title="LGBT">LGBT</a>, <a href="https://publications.waset.org/abstracts/search?q=mob%20justice" title=" mob justice"> mob justice</a>, <a href="https://publications.waset.org/abstracts/search?q=peace" title=" peace"> peace</a>, <a href="https://publications.waset.org/abstracts/search?q=vigilantism" title=" vigilantism"> vigilantism</a> </p> <a href="https://publications.waset.org/abstracts/144028/mob-justice-in-ghana-implication-for-peace" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144028.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">85</span> The Targeting Logic of Terrorist Groups in the Sahel</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mathieu%20Bere">Mathieu Bere</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Al-Qaeda and Islamic State-affiliated groups such as Ja’amat Nusra al Islam Wal Muslimim (JNIM) and the Islamic State-Greater Sahara Faction, which is now part of the Boko Haram splinter group, Islamic State in West Africa, were responsible, between 2018 and 2020, for at least 1.333 violent incidents against both military and civilian targets, including the assassination and kidnapping for ransom of Western citizens in Mali, Burkina Faso and Niger, the Central Sahel. Protecting civilians from the terrorist violence that is now spreading from the Sahel to the coastal countries of West Africa has been very challenging, mainly because of the many unknowns that surround the perpetrators. To contribute to a better protection of civilians in the region, this paper aims to shed light on the motivations and targeting logic of jihadist perpetrators of terrorist violence against civilians in the central Sahel region. To that end, it draws on relevant secondary data retrieved from datasets, the media, and the existing literature, but also on primary data collected through interviews and surveys in Burkina Faso. An analysis of the data with the support of qualitative and statistical analysis software shows that military and rational strategic motives, more than purely ideological or religious motives, have been the main drivers of terrorist violence that strategically targeted government symbols and representatives as well as local leaders in the central Sahel. Behind this targeting logic, the jihadist grand strategy emerges: wiping out the Western-inspired legal, education and governance system in order to replace it with an Islamic, sharia-based political, legal, and educational system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=jihadism" title=" jihadism"> jihadism</a>, <a href="https://publications.waset.org/abstracts/search?q=Sahel" title=" Sahel"> Sahel</a>, <a href="https://publications.waset.org/abstracts/search?q=targeting%20logic" title=" targeting logic"> targeting logic</a> </p> <a href="https://publications.waset.org/abstracts/147717/the-targeting-logic-of-terrorist-groups-in-the-sahel" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147717.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">84</span> An Exploration of Parenting By Perpetrator Fathers and Victim Mothers in the Context of Domestic Violence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gunendra%20Rathnawali%20Kumarihamy%20Dissanayake">Gunendra Rathnawali Kumarihamy Dissanayake</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Research on parenting of both perpetrators and victims of domestic violence (DV) is growing but limited. Further, much of this research in the Asian context is limited to explorations of victim mothers' parenting capacities, not shedding much light on the parenting of the perpetrator fathers. The current qualitative study aimed to explore how both the perpetrators and victims of DV engaged in parenting in the Sri Lankan cultural context. Twenty case studies were conducted with a sample of help-seeking women aged 20 to 40 years representing working to upper-middle social class. Participants have interviewed about their own as well as their partners´ parenting behaviors. The majority of women reported that their partners were often aggressive, controlling and authoritarian, less consistent, and engaged in a variety of manipulative behaviors intending to harm the relationship between their child and them. Further, victim mothers' styles of parenting and authority as parents have been severely undermined by their partners through frequent criticism, ridicule, and insulting in front of the children. As a result, mothers experienced great difficulty specifically trying to discipline their adolescent children as the children have started to disregard the mothers' authority. Most of the children also have shown treatment similar to that of their fathers', treating the mother as a personal servant not worthy of being listened to, thereby increasing the mothers' parenting stress. The mothers were often blamed and held responsible for the problems of the children by their partners, encouraging the children to disrespect and blame the mother for their problems leading them to take the side of the father who had more power. Findings are similar to those of the western context. This study highlights the intersection between domestic violence and parenting, and specific implications and recommendations for DV service providers are offered. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=parenting" title="parenting">parenting</a>, <a href="https://publications.waset.org/abstracts/search?q=domestic%20violence" title=" domestic violence"> domestic violence</a>, <a href="https://publications.waset.org/abstracts/search?q=impact" title=" impact"> impact</a>, <a href="https://publications.waset.org/abstracts/search?q=children" title=" children"> children</a> </p> <a href="https://publications.waset.org/abstracts/141816/an-exploration-of-parenting-by-perpetrator-fathers-and-victim-mothers-in-the-context-of-domestic-violence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141816.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">83</span> Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Angela%20Mathias%20Kavishe">Angela Mathias Kavishe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberstalking" title="cyberstalking">cyberstalking</a>, <a href="https://publications.waset.org/abstracts/search?q=embodiment" title=" embodiment"> embodiment</a>, <a href="https://publications.waset.org/abstracts/search?q=gender-based%20violence" title=" gender-based violence"> gender-based violence</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a> </p> <a href="https://publications.waset.org/abstracts/186888/cyberstalking-as-an-online-sexual-harassment-evidence-from-experience-from-female-university-students-in-tanzanian-institutions-of-higher-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186888.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">50</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">82</span> From Sympathizers to Perpetrators: Examining the Involvement of Rural Women in Bangladesh in Violent Extremism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shantanu%20Majumder">Shantanu Majumder</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper attempts to explain the factors contribute in attracting and engaging rural women in Bangladesh toward political Islam that in many cases manifests itself in the form of violent extremism (VE). Bangladesh, the fourth largest Muslim majority country in the world, has been confronting the problem of VE in the name of Islam since a long. The political Islamists, explaining the events like military operations in Afghanistan and Iraq, anti-Muslim politics in neighboring India and Myanmar, Islamophobia in the West, and several other issues in their own way, have become to a vast extent successful in creating a high level of emotion, anger and a feeling of being oppressed worldwide among the ordinary Muslims masses. Half-hearted role of public intellectuals and political expediency of liberal political forces in explaining these events in a secular democratic way also facilitate the extremists to earn political dividend. VE was perceived as an all-male activism of the political Islamists’ in the past in Bangladesh. However, evidence in the recent times shows that there are sympathizers, recruiters, and perpetrators as well among the womenfolk in favor of VE-based political Islam. The first section in this paper sheds light on the way the political Islamists build rapport with and win over the heart of target women in countryside under the camouflage of preaching authentic Islam. This section also describes the role of family in involvement of women in VE. The second section discusses wide-ranging use of websites, facebook, laptop, mobile phones and several other means in the way to motivate and radicalize women. How the involvement with political Islamists brings changes in thinking process, lifestyle and family life of motivated women has been focused in the third section. The final section deals briefly with the way out relying on the argument that law and order forces alone cannot tackle this problem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bangladesh" title="Bangladesh">Bangladesh</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20Islam" title=" political Islam"> political Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=violent%20extremism" title=" violent extremism"> violent extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a> </p> <a href="https://publications.waset.org/abstracts/80996/from-sympathizers-to-perpetrators-examining-the-involvement-of-rural-women-in-bangladesh-in-violent-extremism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80996.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">195</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">81</span> Legal Theories Underpinning Access to Justice for Victims of Sexual Violence in Refugee Camps in Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=O.%20E.%20Eberechi">O. E. Eberechi</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20P.%20Stevens"> G. P. Stevens</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Legal theory has been referred to as the explanation of why things do or do not happen. It also describes situations and why they ensue. It provides a normative framework by which things are regulated and a foundation for the establishment of legal mechanisms/institutions that can bring about a desired change in a society. Furthermore, it offers recommendations in resolving practical problems and describes what the law is, what the law ought to be and defines the legal landscape generally. Some legal theories provide a universal standard, e.g. human rights, while others are capable of organizing and streamlining the collective use, and, by extension, bring order to society. Legal theory is used to explain how the world works and how it does not work. This paper will argue for the application of the principles of legal theory in the achievement of access to justice for female victims of sexual violence in refugee camps in Africa through the analysis of legal theories underpinning the access to justice for these women. It is a known fact that female refugees in camps in Africa often experience some form of sexual violation. The perpetrators of these incidents may never be apprehended, prosecuted, convicted or sentenced. Where prosecution does occur, the perpetrators are either acquitted as a result of poor investigation, inept prosecution, a lack of evidence, or the case may be dismissed owing to tardiness on the part of the prosecutor, which accounts for the culture of impunity in refugee camps. In other words, victims do not have access to the justice that could ameliorate the plight of the victims. There is, thus, a need for a legal framework that will facilitate access to justice for these victims. This paper will start with an introduction, and be followed by the definition of legal theory, its functions and its application in law. Secondly, it will provide a brief explanation of the problems faced by female refugees who are victims of sexual violence in refugee camps in Africa. Thirdly, it will embark on an analysis of theories which will be a help to an understanding of the precarious situation of female refugees, why they are violated, the need for access to justice for these victims, and the principles of legal theory in its usefulness in resolving access to justice for these victims. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20to%20justice" title="access to justice">access to justice</a>, <a href="https://publications.waset.org/abstracts/search?q=underpinning%20legal%20theory" title=" underpinning legal theory"> underpinning legal theory</a>, <a href="https://publications.waset.org/abstracts/search?q=refugee" title=" refugee"> refugee</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20violence" title=" sexual violence"> sexual violence</a> </p> <a href="https://publications.waset.org/abstracts/46718/legal-theories-underpinning-access-to-justice-for-victims-of-sexual-violence-in-refugee-camps-in-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46718.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">429</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">80</span> Perpetrators of Ableist Sexual Violence: Understanding Who They Are and Why They Target People with Intellectual Disabilities in Australia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michael%20Rahme">Michael Rahme</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the past decade, there is an overwhelming consensus spanning across academia, government commissions, and civil societies that concede that individuals with disabilities (IWDs), particularly those with intellectual differences, are a demographic most ‘vulnerable’ to experiences of sexual violence. From this global accord, numerous policies have sprouted in the protection of this ‘pregnable’ sector of society, primarily framed around liberal obligations of stewardship over the ‘defenceless.’ As such, these initiatives mainly target post-incident or victim-based factors of sexual violence, which is apparent in proposals for more inclusive sexual education and accessible contact lines for IWDs. Yet despite the necessity of these initiatives, sexual incidents among this demographic persist and, in nations such as Australia, continue to rise. Culture of Violence theory reveals that such discrepancies in theory and practice stem from societal structures that frame individuals as ‘vulnerable’, ‘impregnable’, or ‘defenceless’ because of their disability, thus propagating their own likelihood of abuse. These structures, as embodied by the Australian experience, allow these sexual violences to endure through cultural ideologies that place the IWDs ‘failures’ at fault while sidelining the institutions that permit this abuse. Such is representative of the initiatives of preventative organizations like People with Disabilities Australia, which have singularly strengthened victim protection networks, despite abuse continuing to rise dramatically among individuals with intellectual disabilities alone. Yet regardless of this rise, screenings of families and workers remain inadequate and practically untouched, a reflection of a tremendous societal warp in understanding surrounding the lived experiences of IWDs. This theory is also representative of broader literature, where the study of the perpetrators of disability rights, particularly sexual rights, is almost unapparent in a field that is already seldom studied. Therefore, placing power on the abuser via stripping that of the victims. As such, the Culture of Violence theory (CVT) sheds light on the institutions that allow these perpetrators to prosper. This paper, taking a CVT approach, aims to dissipate this discrepancy in the Australian experience by way of a qualitative analysis of all available court proceedings and tribunals between 2020-2022. Through an analysis of the perpetrator, their relation to the IWD, and the motives for their actions granted by court and tribunal transcripts and the psychological, and behavioural reports, among other material, that have been presented and consulted during these proceedings. All of which would be made available under the 1982 Freedom of Information Act. The findings from this study, through the incorporation of CVT, determine the institutions in which these abusers function and the ideologies which motivate such behaviour; while being conscious of the issue of re-traumatization and language barriers of the abusees. Henceforth, this study aims to be a potential policy guide on strengthening support institutions that provide IWDs with their basic rights. In turn, undermining sexual violence among individuals with intellectual disabilities at its roots. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminal%20profiling" title="criminal profiling">criminal profiling</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20disabilities" title=" intellectual disabilities"> intellectual disabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20violence" title=" sexual violence"> sexual violence</a> </p> <a href="https://publications.waset.org/abstracts/160055/perpetrators-of-ableist-sexual-violence-understanding-who-they-are-and-why-they-target-people-with-intellectual-disabilities-in-australia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160055.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">79</span> Predicting Mass-School-Shootings: Relevance of the FBI’s ‘Threat Assessment Perspective’ Two Decades Later</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Frazer%20G.%20Thompson">Frazer G. Thompson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The 1990s in America ended with a mass-school-shooting (at least four killed by gunfire excluding the perpetrator(s)) at Columbine High School in Littleton, Colorado. Post-event, many demanded that government and civilian experts develop a ‘profile’ of the potential school shooter in order to identify and preempt likely future acts of violence. This grounded theory research study seeks to explore the validity of the original hypotheses proposed by the Federal Bureau of Investigation (FBI) in 2000, as it relates to the commonality of disclosure by perpetrators of mass-school-shootings, by evaluating fourteen mass-school-shooting events between 2000 and 2019 at locations around the United States. Methods: The strategy of inquiry seeks to investigate case files, public records, witness accounts, and available psychological profiles of the shooter. The research methodology is inclusive of one-on-one interviews with members of the FBI’s Critical Incident Response Group seeking perspective on commonalities between individuals; specifically, disclosure of intent pre-event. Results: The research determined that school shooters do not ‘unfailingly’ notify others of their plans. However, in nine of the fourteen mass-school-shooting events analyzed, the perpetrator did inform the third party of their intent pre-event in some form of written, oral, or electronic communication. In the remaining five instances, the so-called ‘red-flag’ indicators of the potential for an event to occur were profound, and unto themselves, might be interpreted as notification to others of an imminent deadly threat. Conclusion: Data indicates that conclusions drawn in the FBI’s threat assessment perspective published in 2000 are relevant and current. There is evidence that despite potential ‘red-flag’ indicators which may or may not include a variety of other characteristics, perpetrators of mass-school-shooting events are likely to share their intentions with others through some form of direct or indirect communication. More significantly, implications of this research might suggest that society is often informed of potential danger pre-event but lacks any equitable means by which to disseminate, prevent, intervene, or otherwise act in a meaningful way considering said revelation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=columbine" title="columbine">columbine</a>, <a href="https://publications.waset.org/abstracts/search?q=FBI%20profiling" title=" FBI profiling"> FBI profiling</a>, <a href="https://publications.waset.org/abstracts/search?q=guns" title=" guns"> guns</a>, <a href="https://publications.waset.org/abstracts/search?q=mass%20shooting" title=" mass shooting"> mass shooting</a>, <a href="https://publications.waset.org/abstracts/search?q=mental%20health" title=" mental health"> mental health</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20violence" title=" school violence"> school violence</a> </p> <a href="https://publications.waset.org/abstracts/109810/predicting-mass-school-shootings-relevance-of-the-fbis-threat-assessment-perspective-two-decades-later" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/109810.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">118</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">78</span> Responding to and Preventing Sexual and Gender Based Violence Related to Ragging, in University of Kelaniya: A Case Study </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anuruddhi%20Edirisinghe">Anuruddhi Edirisinghe</a>, <a href="https://publications.waset.org/abstracts/search?q=Anusha%20Edirisinghe"> Anusha Edirisinghe</a>, <a href="https://publications.waset.org/abstracts/search?q=Maithree%20Wicramasinghe"> Maithree Wicramasinghe</a>, <a href="https://publications.waset.org/abstracts/search?q=Sagarika%20Kannangara"> Sagarika Kannangara</a>, <a href="https://publications.waset.org/abstracts/search?q=Annista%20Wijayanayake"> Annista Wijayanayake</a> </p> <p class="card-text"><strong>Abstract:</strong></p> SGBV which refer to acts of inflicting physical, mental or sexual harm or sufferings that deprive a person’s liberty based on one’s gender or sexuality is known to occur in various forms. Ragging in educational institutions can often be one such form of SGBV. Ragging related SGBV is a growing problem despite various legal, policy and programme initiatives introduced over the years. While the punishment of perpetrators through the criminal justice system is expected to bring a deterrent effect, other strategies such as awareness-raising, attitudinal changes, and the empowerment of students to say no to ragging and SGBV will lead to enlightened attitudes about the practice in universities. Thus, effective regular prevention programmes are the need of the hour. The objectives of the paper are to engage with the case of a female fresher subjected to verbal abuse, physical assault and sexual harassment due to events which started as a result of wearing a trouser to the university during the ragging season. The case came to the limelight since a complaint was made to the police and 10 students were arrested under the anti-ragging act. This led to dividend opinions among the student population and a backlash from the student union. Simultaneously, this resulted in the society demanding the stricter implementation of laws and the punishment of perpetrators. The university authority appointed a task force comprising of academics, non-academics, parents, community leaders, stakeholders and students to draw up an action plan to respond to the immediate situation as well as future prevention. The paper will also discuss the implementation of task force plan. The paper is based on interviews with those involved with the issue and the experiences of the task force members and is expected to provide an in-depth understanding of the intricacies and complications associated with dealing with a contentious problem such as ragging. Given the political and ethical issues involved with insider research as well as the sensationalism of the topic, maximum care will be taken to safeguard the interests of those concerned. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fresher" title="fresher">fresher</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20and%20gender%20based%20violence%20%28SGBV%29" title=" sexual and gender based violence (SGBV)"> sexual and gender based violence (SGBV)</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20harassment" title=" sexual harassment"> sexual harassment</a>, <a href="https://publications.waset.org/abstracts/search?q=ragging" title=" ragging "> ragging </a> </p> <a href="https://publications.waset.org/abstracts/66300/responding-to-and-preventing-sexual-and-gender-based-violence-related-to-ragging-in-university-of-kelaniya-a-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66300.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">236</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">77</span> The Anatomy and Characteristics of Online Romance Scams</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Danuvasin%20Charoen">Danuvasin Charoen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Online romance scams are conducted by criminals using social networks and dating sites. These criminals use love to deceive the victims to send them money. The victims not only lose money to the criminals, but they are also heartbroken. This study investigates how online romance scams work and why people become victims to them. The researcher also identifies the characteristics of the perpetrators and victims. The data were collected from in-depth interviews with former victims and police officers responsible for the cases. By studying the methods and characteristics of the online romance scam, we can develop effective methods and policies to reduce the rates of such crimes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=romance%20scam" title="romance scam">romance scam</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20scam" title=" online scam"> online scam</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing" title=" phishing"> phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title=" cybercrime"> cybercrime</a> </p> <a href="https://publications.waset.org/abstracts/134736/the-anatomy-and-characteristics-of-online-romance-scams" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134736.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">157</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">76</span> Human Security and Human Trafficking Related Corruption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ekin%20D.%20Horzum">Ekin D. Horzum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the proposal is to examine the relationship between human trafficking related corruption and human security. The proposal suggests that the human trafficking related corruption is about willingness of the states to turn a blind eye to the human trafficking cases. Therefore, it is important to approach human trafficking related corruption in terms of human security and human rights violation to find an effective way to fight against human trafficking. In this context, the purpose of this proposal is to examine the human trafficking related corruption as a safe haven in which trafficking thrives for perpetrators. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20trafficking" title="human trafficking">human trafficking</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20security" title=" human security"> human security</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=corruption" title=" corruption"> corruption</a>, <a href="https://publications.waset.org/abstracts/search?q=organized%20crime" title=" organized crime"> organized crime</a> </p> <a href="https://publications.waset.org/abstracts/5546/human-security-and-human-trafficking-related-corruption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5546.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">475</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">75</span> Community Policing: Exploring the Police and Community Participation for Crime Control in Bia West of Ghana</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bertha%20Korang%20Gyimah">Bertha Korang Gyimah</a>, <a href="https://publications.waset.org/abstracts/search?q=Obed%20Asamoah"> Obed Asamoah</a>, <a href="https://publications.waset.org/abstracts/search?q=Kenross"> Kenross</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Asamoah"> T. Asamoah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In every human community, crimes or offenses cannot be eliminated, but as crimes are expected, there should be bodies that will control and prevent the crimes. There has been an increasing rate of crime, such as armed robbery, kidnapping, murder, and other forms of violence in the country. Community participation in crime control cannot be left out in Ghana. Several works have been conducted to deal with the importance of community participation in policing, but the causes of communities not fully participating in community policing have been left out. The main aim of the research was to assess the impact of community policing and why the communities are reluctant to partake in community policing to help control crime in Bia West. There have been perceptions about Police that, they expose informant after they give the police tip-off which put the whistleblower life in danger. This has made the community not to get involved in security issues in the community they live in. This situation has posed a serious threat to the Ghana Police Service and its ability to position itself strategically in order to carry out a perfect investigation to bring the perpetrators into custody and to protect their lives and property, as well as the maintenance of law and order. Due to less data on community participation in the Ghana Police Service, the research adopted an interpretative framework to assess the meaning connoted to community policing from the perspectives of the stakeholders themselves. The qualitative research method was used. There was an engagement of the police and community where focus group discussions and individual in-depth interviews were organized in the randomly selected communities in the district. Key informant interviews were used to solicit views of the people why they are reluctant to give information to the police to help them take the perpetrators to book. In the data collected, it was observed that most of the people have been under threats of offenders after they come back from the prisons, it was also observed that some of the unprofessional police personnel’s expose the whistleblowers who put their lives in danger. The data obtained were analyzed using simple Analytical tool SPSS and Excel. Based on the analysis, it was observed that a high number of people in the communities contacted had not made their mind to participate in any security issues. Based on the views of the community, there should be a high level of professionalism in the recruitment system of the Ghana police service to come out with professional police officers who can abide by the rules and regulations governing the profession. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community" title="community">community</a>, <a href="https://publications.waset.org/abstracts/search?q=bia%20west" title=" bia west"> bia west</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghana" title=" Ghana"> Ghana</a>, <a href="https://publications.waset.org/abstracts/search?q=participation" title=" participation"> participation</a>, <a href="https://publications.waset.org/abstracts/search?q=police" title=" police"> police</a> </p> <a href="https://publications.waset.org/abstracts/124118/community-policing-exploring-the-police-and-community-participation-for-crime-control-in-bia-west-of-ghana" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/124118.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">74</span> A Qualitative Study on Cyberbullying and Traditional Bullying among Taiwanese High School Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-Wen%20Wang">Chia-Wen Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Patou%20Masika%20Musumari"> Patou Masika Musumari</a>, <a href="https://publications.waset.org/abstracts/search?q=Teeranee%20Techasrivichien"> Teeranee Techasrivichien</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Pilar%20Suguimoto"> S. Pilar Suguimoto</a>, <a href="https://publications.waset.org/abstracts/search?q=Chang-Chuan%20Chan"> Chang-Chuan Chan</a>, <a href="https://publications.waset.org/abstracts/search?q=Masako%20Ono-Kihara"> Masako Ono-Kihara</a>, <a href="https://publications.waset.org/abstracts/search?q=Masahiro%20Kihara"> Masahiro Kihara </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: In recent years, a particular form of bullying, referred to as 'cyberbullying' has emerged along with the rapid expansion of the Internet, social network services (SNSs) and smart phones. Many Asian countries, including Taiwan, are faced with both the cyberbullying and the traditional form of bullying. This study aims to explore Taiwanese adolescents’ experiences, perceptions and opinions regarding cyberbullying and traditional bullying through the perspective of victim, perpetrator, or witness. Method: This is a qualitative study using face-to-face in-depth interviews guided by a semi-structured questionnaire among high school students -aged 16 to 18 years- in Taipei, Taiwan. The participants were recruited through convenience sampling from five high schools between June and November 2016. Interviews were digitally recorded, transcribed, and analyzed using the thematic analysis approach. Results: Forty-eight participants were recruited, of which, 14 (29.2%) reported had ever experienced bullying. Specifically, 7 participants (14.6%) reported had ever been victims of cyberbullying, 1 (2%) had been victims of traditional bullying, and 6 (12.5%) had been victims of both cyber and traditional bullying. The majority (70.8%) reported had ever witnessed acts of bullying; however, none of the participants recognized had ever been a perpetrator of bullying. Cyberbullying mostly happens on social media (Facebook and Instagram) or LINE instant messaging application, and included upload and sharing of degrading pictures and videos of victims, as well as gossip and mean messages by the perpetrators. The anonymous and public nature of social media groups in schools made it easier to perpetrate bullying. The victim of traditional bullying reported being the target of verbal attack because of his physical appearance. Regardless of the type of bullying, victims reported feeling bad, angry, or depressed as a result of being bullied. Witnesses of both cyber- and traditional bullying cited physical appearance (e.g. having the big/flat bust or big butt, or overweight or obese) and disability as the most reasons of being a bullying victim. Conclusion: Both cyberbullying and traditional bullying had negative emotional and psychological impacts on victims. This study warrants further research to assess the extent of this phenomenon and understand the characteristics of perpetrators, victims, and witnesses to inform the design of tailored interventions using appropriate channels of dissemination. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20bullying" title=" traditional bullying"> traditional bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescents" title=" adolescents"> adolescents</a> </p> <a href="https://publications.waset.org/abstracts/65802/a-qualitative-study-on-cyberbullying-and-traditional-bullying-among-taiwanese-high-school-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65802.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">345</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">73</span> Weight Regulation Mechanism on Bridges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Siddharth">S. Siddharth</a>, <a href="https://publications.waset.org/abstracts/search?q=Saravana%20Kumar"> Saravana Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> All Metros across the world tend to have a large number of bridges and there have been concerns about the safety of these bridges. As the traffic in most cities in India is heterogeneous, Trucks and Heavy vehicles traverse on our roads on an everyday basis this will lead to structural damage on the long run. All bridges are designed with a maximum Load limit and this limit is seldom checked. We have hence come up with an idea to check the load of all the vehicles entering the bridge and block the bridge with barricades if the vehicle surpasses the maximum load , this is done to catch hold of the perpetrators. By doing this we can avoid further structural damage and also provide an effective way to enforce the law. If our solution is put in place structural damage and accidents would be reduced to a great deal and it would also make the law enforcement job easier. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heterogeneous" title="heterogeneous">heterogeneous</a>, <a href="https://publications.waset.org/abstracts/search?q=structural" title=" structural"> structural</a>, <a href="https://publications.waset.org/abstracts/search?q=load" title=" load"> load</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=heavy" title=" heavy"> heavy</a>, <a href="https://publications.waset.org/abstracts/search?q=vehicles" title=" vehicles"> vehicles</a> </p> <a href="https://publications.waset.org/abstracts/16613/weight-regulation-mechanism-on-bridges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16613.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">452</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">72</span> The Diverse Experiences of Men Living with Disabilities Participating in Violence Prevention Interventions in Africa and Asia: Men as Victims; Men as Perpetrators</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ingrid%20van%20der%20Heijden">Ingrid van der Heijden</a>, <a href="https://publications.waset.org/abstracts/search?q=Kristen%20Dunkle"> Kristen Dunkle</a>, <a href="https://publications.waset.org/abstracts/search?q=Rachel%20Jewkes"> Rachel Jewkes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Emerging literature on prevalence shows that men with disabilities are four more times likely than men without disabilities to experience sexual violence during their lifetime. However, compared to women with disabilities, men with disabilities still have lesser experiences of violence. While empirical evidence on the prevalence of victimization of men with disabilities is emerging, there is scarcer evidence highlighting disabled men’s perpetration of different forms of violence, particularly intimate partner violence. We can assume that men are likely to be both perpetrators and victims of violence, making more complex the causes and risks of violence. Gender norms and disability stigma play important roles in men’s experiences of violence. Men may be stigmatized because of their inability to attain hegemonic masculine ideals of strength, control over women and sexual conquest, which makes them more susceptible to emotional, physical and sexual abuse. Little to no evidence exists of men with disabilities’ experiences of perpetration of intimate partner violence, family violence or community violence. So far studies on male victimization do not succeed to offer contextual evidence that would highlight why and how men with disabilities perpetrate and/or are victims of sexual or other forms of violence. Objective: The overall aim to highlight men with disabilities’ experiences of both victimization and perpetration, and how living up to normative and hegemonic ideals of masculinity and ‘ability’ shape their experiences. It will include: identifying how gender and impairments intersect and shape their experiences of violence; identifying the contexts of and risks for violence; identifying the impacts and consequences of violence on their lives (including mental health impacts), and identifying obstacles and enablers to support and interventions to prevent violence. Methodology: In-depth qualitative interviews with 20 men with disabilities participating in interventions conducted by the What Works Global Programme for violence prevention (DIFD) in Africa and Asia. Men with a range of disabilities will be invited to share their lifetime experiences of violence. Implications for Practice: The data from this study will be used to start thinking about strategies to include men with disabilities in violence prevention strategies for both men and women. Limitations: Because men will be participating in interventions, it is assumed that they will not have severe impairments that hamper their cognitive or physical ability to participate in the intervention activities - and therefore will be able to participate in the in-depth interviews. Of course, this is a limitation of the study as it does not include those men with severe disabilities – measured by the World Health Organization’s International Classification of Functioning - who may be more vulnerable and at higher risk of experiencing violence, and who are less likely to be able to access services and interventions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gender" title="gender">gender</a>, <a href="https://publications.waset.org/abstracts/search?q=men%20with%20disabilities" title=" men with disabilities"> men with disabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=perpetration%20of%20violence" title=" perpetration of violence"> perpetration of violence</a>, <a href="https://publications.waset.org/abstracts/search?q=victimization" title=" victimization"> victimization</a> </p> <a href="https://publications.waset.org/abstracts/69356/the-diverse-experiences-of-men-living-with-disabilities-participating-in-violence-prevention-interventions-in-africa-and-asia-men-as-victims-men-as-perpetrators" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69356.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">323</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=perpetrators&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=perpetrators&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=perpetrators&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=perpetrators&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>