CINXE.COM
Search results for: anonymity data
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: anonymity data</title> <meta name="description" content="Search results for: anonymity data"> <meta name="keywords" content="anonymity data"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="anonymity data" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="anonymity data"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 25168</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: anonymity data</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25168</span> Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tao%20Feng">Tao Feng</a>, <a href="https://publications.waset.org/abstracts/search?q=Fei%20Xing"> Fei Xing</a>, <a href="https://publications.waset.org/abstracts/search?q=Ye%20Lu"> Ye Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jun%20Li%20Fang"> Jun Li Fang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NDN" title="NDN">NDN</a>, <a href="https://publications.waset.org/abstracts/search?q=mutual%20anonymity" title=" mutual anonymity"> mutual anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymous%20routing" title=" anonymous routing"> anonymous routing</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20coding" title=" network coding"> network coding</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication%20mechanism" title=" authentication mechanism"> authentication mechanism</a> </p> <a href="https://publications.waset.org/abstracts/28422/secure-network-coding-based-named-data-network-mutual-anonymity-transfer-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28422.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25167</span> The Veil of Virtuality: Anonymity and Trust in the Metaverse's New Frontier</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cheng%20Xu">Cheng Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Rui%20Zhong"> Rui Zhong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Utilizing a preregistered randomized experiment, this study explores the effects of anonymity and curated identity on trust within the Metaverse. Participants were randomly assigned to different conditions of anonymity and identity curation and engaged in a series of tasks designed to mirror the complexities of trust in real-world social interactions. Trust was measured using the classical trust game, allowing for a nuanced understanding of how these factors interact and influence trust. The findings reveal that higher levels of anonymity negatively impact trust, while identity curation can moderate this effect. Mechanism analysis uncovers how anonymity influences perceived reciprocity and group cohesion, and how curation can moderate these relationships. The results demonstrate a nuanced interaction between anonymity and trust, with variations across different curation levels. These insights provide a multifaceted understanding of trust within virtual environments, contributing valuable knowledge to the design, policy-making, and ethical considerations of the Metaverse <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=metaverse" title="metaverse">metaverse</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=curated%20identity" title=" curated identity"> curated identity</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20behavior" title=" social behavior"> social behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a> </p> <a href="https://publications.waset.org/abstracts/171236/the-veil-of-virtuality-anonymity-and-trust-in-the-metaverses-new-frontier" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171236.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25166</span> The Role of Virtual Group Anonymity in the Generation, Selection, and Refinement of Ideas</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jonali%20Baruah">Jonali Baruah</a>, <a href="https://publications.waset.org/abstracts/search?q=Keesha%20Green"> Keesha Green</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This experimental study examines the effects of anonymity in video meeting groups across the stages of innovation (idea generation, selection, and refinement) on various measures of creativity. A sample of 92 undergraduate students participated in small groups of three to four members to complete creativity, decision-making, and idea-refinement task in either anonymous or identified conditions. The study followed two anonymity (anonymous and identified) X 3 stages of innovation (idea generation, idea selection, and idea refinement) in a mixed factorial design. Results revealed that the anonymous groups produced ideas of the highest average quality in the refinement phase of innovation. The results of this study enhanced our understanding of the productivity and creativity of groups in computer-mediated communication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=creativity" title="creativity">creativity</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=idea-generation" title=" idea-generation"> idea-generation</a>, <a href="https://publications.waset.org/abstracts/search?q=idea-refinement" title=" idea-refinement"> idea-refinement</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a> </p> <a href="https://publications.waset.org/abstracts/152534/the-role-of-virtual-group-anonymity-in-the-generation-selection-and-refinement-of-ideas" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152534.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25165</span> Privacy Preserving Data Publishing Based on Sensitivity in Context of Big Data Using Hive</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Srinivasa%20Rao">P. Srinivasa Rao</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Venkatesh%20Sharma"> K. Venkatesh Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20Sadhya%20Devi"> G. Sadhya Devi</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Nagesh"> V. Nagesh </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Privacy Preserving Data Publication is the main concern in present days because the data being published through the internet has been increasing day by day. This huge amount of data was named as Big Data by its size. This project deals the privacy preservation in the context of Big Data using a data warehousing solution called hive. We implemented Nearest Similarity Based Clustering (NSB) with Bottom-up generalization to achieve (v,l)-anonymity. (v,l)-Anonymity deals with the sensitivity vulnerabilities and ensures the individual privacy. We also calculate the sensitivity levels by simple comparison method using the index values, by classifying the different levels of sensitivity. The experiments were carried out on the hive environment to verify the efficiency of algorithms with Big Data. This framework also supports the execution of existing algorithms without any changes. The model in the paper outperforms than existing models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sensitivity" title="sensitivity">sensitivity</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitive%20level" title=" sensitive level"> sensitive level</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=Privacy%20Preserving%20Data%20Publication%20%28PPDP%29" title=" Privacy Preserving Data Publication (PPDP)"> Privacy Preserving Data Publication (PPDP)</a>, <a href="https://publications.waset.org/abstracts/search?q=bottom-up%20generalization" title=" bottom-up generalization"> bottom-up generalization</a>, <a href="https://publications.waset.org/abstracts/search?q=Big%20Data" title=" Big Data"> Big Data</a> </p> <a href="https://publications.waset.org/abstracts/71445/privacy-preserving-data-publishing-based-on-sensitivity-in-context-of-big-data-using-hive" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71445.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25164</span> A Contribution to Blockchain Privacy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malika%20Yaici">Malika Yaici</a>, <a href="https://publications.waset.org/abstracts/search?q=Feriel%20Lalaoui"> Feriel Lalaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Lydia%20Belhoul"> Lydia Belhoul</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As a new distributed point-to-point (P2P) technology, blockchain has become a very broad field of research, addressing various challenges, including privacy preserving, as is the case in all other technologies. In this work, a study of the existing solutions to the problems related to private life in general and in blockchains in particular is performed. User anonymity and transaction confidentiality are the two main challenges to the protection of privacy in blockchains. Mixing mechanisms and cryptographic solutions respond to this problem but remain subject to attacks and suffer from shortcomings. Taking into account these imperfections and the synthesis of our study, we present a mixing model without trusted third parties, based on group signatures, allowing reinforcing the anonymity of the users, the confidentiality of the transactions, with minimal turnaround time and without mixing costs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=mixing%20coins" title=" mixing coins"> mixing coins</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a> </p> <a href="https://publications.waset.org/abstracts/194226/a-contribution-to-blockchain-privacy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194226.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">12</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25163</span> Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Parveen%20Begam">H. Parveen Begam</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Maluk%20Mohamed"> M. A. Maluk Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=grid%20computing" title="grid computing">grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=onion%20routing" title=" onion routing"> onion routing</a>, <a href="https://publications.waset.org/abstracts/search?q=ECC" title=" ECC"> ECC</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a> </p> <a href="https://publications.waset.org/abstracts/28834/performance-analysis-of-elliptic-curve-cryptography-using-onion-routing-to-enhance-the-privacy-and-anonymity-in-grid-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25162</span> Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shadi%20Janbabaei">Shadi Janbabaei</a>, <a href="https://publications.waset.org/abstracts/search?q=Hossein%20Gharaee%20Garakani"> Hossein Gharaee Garakani</a>, <a href="https://publications.waset.org/abstracts/search?q=Naser%20Mohammadzadeh"> Naser Mohammadzadeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=lightweight" title=" lightweight"> lightweight</a>, <a href="https://publications.waset.org/abstracts/search?q=un-traceability" title=" un-traceability"> un-traceability</a> </p> <a href="https://publications.waset.org/abstracts/72724/mutual-authentication-for-sensor-to-sensor-communications-in-iot-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25161</span> Fears of Strangers: Causes of Anonymity Rejection on Virtual World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Proud%20Arunrangsiwed">Proud Arunrangsiwed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymous" title="anonymous">anonymous</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20identity" title=" online identity"> online identity</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20message" title=" trust message"> trust message</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a> </p> <a href="https://publications.waset.org/abstracts/10507/fears-of-strangers-causes-of-anonymity-rejection-on-virtual-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10507.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25160</span> Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zainurrasyid%20Abdullah">Zainurrasyid Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Fadzlee%20Sulaiman"> Mohamed Fadzlee Sulaiman</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Fadzlan%20Zainal"> Muhammad Fadzlan Zainal</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Zabri%20Adil%20Talib"> M. Zabri Adil Talib</a>, <a href="https://publications.waset.org/abstracts/search?q=Aswami%20Fadillah%20M.%20Ariffin"> Aswami Fadillah M. Ariffin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artifacts%20analysis" title="artifacts analysis">artifacts analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20analysis" title=" forensic analysis"> forensic analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20analysis" title=" memory analysis"> memory analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=registry%20analysis" title=" registry analysis"> registry analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=tor%20browser" title=" tor browser"> tor browser</a>, <a href="https://publications.waset.org/abstracts/search?q=Windows%2010" title=" Windows 10"> Windows 10</a> </p> <a href="https://publications.waset.org/abstracts/89769/digital-forensics-analysis-focusing-on-the-onion-router-browser-artifacts-in-windows-10" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89769.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25159</span> An Exploratory Study on the Difference between Online and Offline Conformity Behavior among Chinese College Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xinyue%20Ma">Xinyue Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Dishen%20Zhang"> Dishen Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yijun%20Liu"> Yijun Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yutian%20Jiang"> Yutian Jiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Huiyan%20Yu"> Huiyan Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=Chufeng%20Gu"> Chufeng Gu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Conformity is defined as one in a social group changing his or her behavior to match the others’ behavior in the group. It is used to find that people show a higher level of online conformity behavior than offline. However, as anonymity can decrease the level of online conformity behavior, the difference between online and offline conformity behavior among Chinese college students still needs to be tested. In this study, college students (N = 60) have been randomly assigned into three groups: control group, offline experimental group, and online experimental group. Through comparing the results of offline experimental group and online experimental group with the Mann-Whitney U test, this study verified the results of Asch’s experiment, and found out that people show a lower level of online conformity behavior than offline, which contradicted the previous finding found in China. These results can be used to explain why some people make a lot of vicious remarks and radical ideas on the Internet but perform normally in their real life: the anonymity of the network makes the online group pressure less than offline, so people are less likely to conform to social norms and public opinions on the Internet. What is more, these results support the importance and relevance of online voting, because fewer online group pressures make it easier for people to expose their true ideas, thus gathering more comprehensive and truthful views and opinions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=Asch%E2%80%99s%20group%20conformity" title=" Asch’s group conformity"> Asch’s group conformity</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinese%20college%20students" title=" Chinese college students"> Chinese college students</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20conformity" title=" online conformity"> online conformity</a> </p> <a href="https://publications.waset.org/abstracts/134894/an-exploratory-study-on-the-difference-between-online-and-offline-conformity-behavior-among-chinese-college-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134894.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25158</span> Data Collection Based on the Questionnaire Survey In-Hospital Emergencies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nouha%20Mhimdi">Nouha Mhimdi</a>, <a href="https://publications.waset.org/abstracts/search?q=Wahiba%20Ben%20Abdessalem%20Karaa"> Wahiba Ben Abdessalem Karaa</a>, <a href="https://publications.waset.org/abstracts/search?q=Henda%20Ben%20Ghezala"> Henda Ben Ghezala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The methods identified in data collection are diverse: electronic media, focus group interviews and short-answer questionnaires [1]. The collection of poor-quality data resulting, for example, from poorly designed questionnaires, the absence of good translators or interpreters, and the incorrect recording of data allow conclusions to be drawn that are not supported by the data or to focus only on the average effect of the program or policy. There are several solutions to avoid or minimize the most frequent errors, including obtaining expert advice on the design or adaptation of data collection instruments; or use technologies allowing better "anonymity" in the responses [2]. In this context, we opted to collect good quality data by doing a sizeable questionnaire-based survey on hospital emergencies to improve emergency services and alleviate the problems encountered. At the level of this paper, we will present our study, and we will detail the steps followed to achieve the collection of relevant, consistent and practical data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20collection" title="data collection">data collection</a>, <a href="https://publications.waset.org/abstracts/search?q=survey" title=" survey"> survey</a>, <a href="https://publications.waset.org/abstracts/search?q=questionnaire" title=" questionnaire"> questionnaire</a>, <a href="https://publications.waset.org/abstracts/search?q=database" title=" database"> database</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20analysis" title=" data analysis"> data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=hospital%20emergencies" title=" hospital emergencies"> hospital emergencies</a> </p> <a href="https://publications.waset.org/abstracts/140605/data-collection-based-on-the-questionnaire-survey-in-hospital-emergencies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140605.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25157</span> Implementation of an Online-Platform at the University of Freiburg to Help Medical Students Cope with Stress</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zolt%C3%A1n%20H%C3%B6hling">Zoltán Höhling</a>, <a href="https://publications.waset.org/abstracts/search?q=Sarah-Lu%20Oberschelp"> Sarah-Lu Oberschelp</a>, <a href="https://publications.waset.org/abstracts/search?q=Niklas%20Gilsdorf"> Niklas Gilsdorf</a>, <a href="https://publications.waset.org/abstracts/search?q=Michael%20Wirsching"> Michael Wirsching</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrea%20Kuhnert"> Andrea Kuhnert</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A majority of medical students at the University of Freiburg reported stress-related psychosomatic symptoms which are often associated with their studies. International research supports these findings, as medical students worldwide seem to be at special risk for mental health problems. In some countries and institutions, psychologically based interventions that assist medical students in coping with their stressors have been implemented. It turned out that anonymity is an important aspect here. Many students fear a potential damage of reputation when being associated with mental health problems, which may be due to a high level of competitiveness in classes. Therefore, we launched an online-platform where medical students could anonymously seek help and exchange their experiences with fellow students and experts. Medical students of all semesters have access to it through the university’s learning management system (called “ILIAS”). The informative part of the platform consists of exemplary videos showing medical students (actors) who act out scenes that demonstrate the antecedents of stress-related psychosomatic disorders. These videos are linked to different expert comments, describing the exhibited symptoms in an understandable and normalizing way. The (inter-)active part of the platform consists of self-help tools (such as meditation exercises or general tips for stress-coping) and an anonymous interactive forum where students can describe their stress-related problems and seek guidance from experts and/or share their experiences with fellow students. Besides creating an immediate proposal to help affected students, we expect that competitiveness between students might be diminished and bondage improved through mutual support between them. In the initial phase after the platform’s launch, it was accessed by a considerable number of medical students. On a closer look it appeared that platform sections like general information on psychosomatic-symptoms and self-treatment tools were accessed far more often than the online-forum during the first months after the platform launch. Although initial acceptance of the platform was relatively high, students showed a rather passive way of using our platform. While user statistics showed a clear demand for information on stress-related psychosomatic symptoms and its possible remedies, active engagement in the interactive online-forum was rare. We are currently advertising the platform intensively and trying to point out the assured anonymity of the platform and its interactive forum. Our plans, to assure students their anonymity through the use of an e-learning facility and promote active engagement in the online forum, did not (yet) turn out as expected. The reasons behind this may be manifold and based on either e-learning related issues or issues related to students’ individual needs. Students might, for example, question the assured anonymity due to a lack of trust in the technological functioning university’s learning management system. However, one may also conclude that reluctance to discuss stress-related psychosomatic symptoms with peer medical students may not be solely based on anonymity concerns, but could be rooted in more complex issues such as general mistrust between students. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-tutoring" title="e-tutoring">e-tutoring</a>, <a href="https://publications.waset.org/abstracts/search?q=stress-coping" title=" stress-coping"> stress-coping</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20support" title=" student support"> student support</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20forum" title=" online forum"> online forum</a> </p> <a href="https://publications.waset.org/abstracts/29074/implementation-of-an-online-platform-at-the-university-of-freiburg-to-help-medical-students-cope-with-stress" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29074.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25156</span> HPPDFIM-HD: Transaction Distortion and Connected Perturbation Approach for Hierarchical Privacy Preserving Distributed Frequent Itemset Mining over Horizontally-Partitioned Dataset</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fuad%20Ali%20Mohammed%20Al-Yarimi">Fuad Ali Mohammed Al-Yarimi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Many algorithms have been proposed to provide privacy preserving in data mining. These protocols are based on two main approaches named as: the perturbation approach and the Cryptographic approach. The first one is based on perturbation of the valuable information while the second one uses cryptographic techniques. The perturbation approach is much more efficient with reduced accuracy while the cryptographic approach can provide solutions with perfect accuracy. However, the cryptographic approach is a much slower method and requires considerable computation and communication overhead. In this paper, a new scalable protocol is proposed which combines the advantages of the perturbation and distortion along with cryptographic approach to perform privacy preserving in distributed frequent itemset mining on horizontally distributed data. Both the privacy and performance characteristics of the proposed protocol are studied empirically. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity%20data" title="anonymity data">anonymity data</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20frequent%20itemset%20mining" title=" distributed frequent itemset mining"> distributed frequent itemset mining</a>, <a href="https://publications.waset.org/abstracts/search?q=gaussian%20perturbation" title=" gaussian perturbation"> gaussian perturbation</a>, <a href="https://publications.waset.org/abstracts/search?q=perturbation%20approach" title=" perturbation approach"> perturbation approach</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20preserving%20data%20mining" title=" privacy preserving data mining"> privacy preserving data mining</a> </p> <a href="https://publications.waset.org/abstracts/20805/hppdfim-hd-transaction-distortion-and-connected-perturbation-approach-for-hierarchical-privacy-preserving-distributed-frequent-itemset-mining-over-horizontally-partitioned-dataset" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20805.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">505</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25155</span> Analyzing Speech Acts in Reddit Posts of Formerly Incarcerated Youths</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yusra%20Ibrahim">Yusra Ibrahim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores the online discourse of justice-involved youth on Reddit, focusing on how anonymity and asynchronicity influence their ability to share and reflect on their incarceration experiences within the "Ask Me Anything" (AMA) community. The study utilizes a quantitative analysis of speech acts to examine the varied communication patterns exhibited by youths and commenters across two AMA threads. The results indicate that, although Reddit is not specifically designed for formerly incarcerated youths, its features provide a supportive environment for them to share their incarceration experiences with non-incarcerated individuals. The level of empathy and support from the audience varies based on the audience’s perspectives on incarceration and related traumatic experiences. Additionally, the study identifies a reciprocal relationship where youths benefit from community support while offering insights into the juvenile justice system and helping the audience understand the experience of incarceration. The study also reveals cultural shocks in physical and digital environments that youth experience after release and when using social media platforms and the internet. The study has implications for juvenile justice personnel, policymakers, and researchers in the juvenile justice system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=juvenile%20justice" title="juvenile justice">juvenile justice</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20discourse" title=" online discourse"> online discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=reddit%20AMA" title=" reddit AMA"> reddit AMA</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=speech%20acts%20taxonomy" title=" speech acts taxonomy"> speech acts taxonomy</a>, <a href="https://publications.waset.org/abstracts/search?q=reintegration" title=" reintegration"> reintegration</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20community%20support" title=" online community support"> online community support</a> </p> <a href="https://publications.waset.org/abstracts/187825/analyzing-speech-acts-in-reddit-posts-of-formerly-incarcerated-youths" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">42</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25154</span> Blockchain for IoT Security and Privacy in Healthcare Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umair%20Shafique">Umair Shafique</a>, <a href="https://publications.waset.org/abstracts/search?q=Hafiz%20Usman%20Zia"> Hafiz Usman Zia</a>, <a href="https://publications.waset.org/abstracts/search?q=Fiaz%20Majeed"> Fiaz Majeed</a>, <a href="https://publications.waset.org/abstracts/search?q=Samina%20Naz"> Samina Naz</a>, <a href="https://publications.waset.org/abstracts/search?q=Javeria%20Ahmed"> Javeria Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Maleeha%20Zainab"> Maleeha Zainab</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IoT" title="IoT">IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title=" cryptocurrency"> cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=consensus" title=" consensus"> consensus</a>, <a href="https://publications.waset.org/abstracts/search?q=data" title=" data"> data</a> </p> <a href="https://publications.waset.org/abstracts/148647/blockchain-for-iot-security-and-privacy-in-healthcare-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">180</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25153</span> Secure E-Voting Using Blockchain Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Barkha%20Ramteke">Barkha Ramteke</a>, <a href="https://publications.waset.org/abstracts/search?q=Sonali%20Ridhorkar"> Sonali Ridhorkar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=AMV%20chain" title=" AMV chain"> AMV chain</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title=" electronic voting"> electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralized" title=" decentralized"> decentralized</a> </p> <a href="https://publications.waset.org/abstracts/145724/secure-e-voting-using-blockchain-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25152</span> Anonymity and Irreplaceability: Gross Anatomical Practices in Japanese Medical Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ayami%20Umemura">Ayami Umemura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Without exception, all the bodies dissected in the gross anatomical practices are bodies that have lived irreplaceable lives, laughing and talking with family and friends. While medical education aims to cultivate medical knowledge that is universally applicable to all human bodies, it relies on a unique, irreplaceable, and singular entity. In this presentation, we will explore the ``irreplaceable relationship'' that is cultivated between medical students and anonymous cadavers during gross anatomical practices, drawing on Emmanuel Levinas's ``ethics of the face'' and Martin Buber's discussion of “I-Thou.'' Through this, we aim to present ``a different ethic'' that emerges only in the context of face-to-face relationships, which differs from the generalized, institutionalized, mass-produced ethics like seen in so-called ``ethics codes.'' Since the 1990s, there has been a movement around the world to use gross anatomical practices as an "educational tool" for medical professionalism and medical ethics, and some educational institutions have started disclosing the actual names, occupations, and places of birth of corpses to medical students. These efforts have also been criticized because they lack medical calmness. In any case, the issue here is that this information is all about the past that medical students never know directly. The critical fact that medical students are building relationships from scratch and spending precious time together without any information about the corpses before death is overlooked. Amid gross anatomical practices, a medical student is exposed to anonymous cadavers with faces and touching and feeling them. In this presentation, we will examine a collection of essays written by medical students on gross anatomical practices collected by the Japanese Association for Volunteer Body Donation from medical students across the country since 1978. There, we see the students calling out to the corpse, being called out to, being encouraged, superimposing the carcasses on their own immediate family, regretting parting, and shedding tears. Then, medical students can be seen addressing the dead body in the second person singular, “you.” These behaviors reveal an irreplaceable relationship between the anonymous cadavers and the medical students. The moment they become involved in an irreplaceable relationship between “I and you,” an accidental and anonymous encounter becomes inevitable. When medical students notice being the inevitable takers of voluntary and addressless gifts, they pledge to become “Good Doctors” owing the anonymous persons. This presentation aims to present “a different ethic” based on uniqueness and irreplaceability that comes from the faces of the others embedded in each context, which is different from “routine” and “institutionalized” ethics. That can only be realized ``because of anonymity''. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=irreplaceability" title=" irreplaceability"> irreplaceability</a>, <a href="https://publications.waset.org/abstracts/search?q=uniqueness" title=" uniqueness"> uniqueness</a>, <a href="https://publications.waset.org/abstracts/search?q=singularlity" title=" singularlity"> singularlity</a>, <a href="https://publications.waset.org/abstracts/search?q=emanuel%20levinas" title=" emanuel levinas"> emanuel levinas</a>, <a href="https://publications.waset.org/abstracts/search?q=martin%20buber" title=" martin buber"> martin buber</a>, <a href="https://publications.waset.org/abstracts/search?q=alain%20badiou" title=" alain badiou"> alain badiou</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20education" title=" medical education"> medical education</a> </p> <a href="https://publications.waset.org/abstracts/175836/anonymity-and-irreplaceability-gross-anatomical-practices-in-japanese-medical-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175836.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">62</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25151</span> Utilising an Online Data Collection Platform for the Development of a Community Engagement Database: A Case Study on Building Inter-Institutional Partnerships at UWC</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Daniels">P. Daniels</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Adonis"> T. Adonis</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20September-Brown"> P. September-Brown</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Comalie"> R. Comalie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The community engagement unit at the University of the Western Cape was tasked with establishing a community engagement database. The database would store information of all community engagement projects related to the university. The wealth of knowledge obtained from the various disciplines would be used to facilitate interdisciplinary collaboration within the university, as well as facilitating community university partnership opportunities. The purpose of this qualitative study was to explore electronic data collection through the development of a database. Two types of electronic data collection platforms were used, namely online questionnaire and email. The semi structured questionnaire was used to collect data related to community engagement projects from different faculties and departments at the university. There are many benefits for using an electronic data collection platform, such as reduction of costs and time, ease in reaching large numbers of potential respondents, and the possibility of providing anonymity to participants. Despite all the advantages of using the electronic platform, there were as many challenges, as depicted in our findings. The findings suggest that certain barriers existed by using an electronic platform for data collection, even though it was in an academic environment, where knowledge and resources were in abundance. One of the challenges experienced in this process was the lack of dissemination of information via email to staff within faculties. The actual online software used for the questionnaire had its own limitations, such as only being able to access the questionnaire from the same electronic device. In a few cases, academics only completed the questionnaire after a telephonic prompt or face to face meeting about "Is higher education in South Africa ready to embrace electronic platform in data collection?" <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20engagement" title="community engagement">community engagement</a>, <a href="https://publications.waset.org/abstracts/search?q=database" title=" database"> database</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20collection" title=" data collection"> data collection</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20platform" title=" electronic platform"> electronic platform</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20tools" title=" electronic tools"> electronic tools</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20sharing" title=" knowledge sharing"> knowledge sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=university" title=" university"> university</a> </p> <a href="https://publications.waset.org/abstracts/37745/utilising-an-online-data-collection-platform-for-the-development-of-a-community-engagement-database-a-case-study-on-building-inter-institutional-partnerships-at-uwc" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37745.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">264</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25150</span> First 1000 Days: Mothers’ Understanding of an Attachment Bond and the Role That It Plays in Early Childhood</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Athena%20Pedro">Athena Pedro</a>, <a href="https://publications.waset.org/abstracts/search?q=Carushca%20de%20Beer"> Carushca de Beer</a>, <a href="https://publications.waset.org/abstracts/search?q=Erin%20Cupido"> Erin Cupido</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarryn%20Johnson"> Tarryn Johnson</a>, <a href="https://publications.waset.org/abstracts/search?q=Tawana%20Keneilwe"> Tawana Keneilwe</a>, <a href="https://publications.waset.org/abstracts/search?q=Crystal%20Stoffels"> Crystal Stoffels</a>, <a href="https://publications.waset.org/abstracts/search?q=Carinne%20Annfred%20Lorraine%20Petersen"> Carinne Annfred Lorraine Petersen</a>, <a href="https://publications.waset.org/abstracts/search?q=Kuan%20Michael%20Truskey"> Kuan Michael Truskey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The early experiences of children during their first 1000 days of life are the main determining factor of their development. Therefore, the aim of this study was to explore mothers' understanding of an attachment bond and the role that it plays in early childhood. A qualitative exploratory research design guided this study. Ethics approval was granted by appropriate ethics committees. Data were gathered through the use of semi-structured interviews with 15 participants within the Cape Town area, South Africa. Participants completed informed consents and were informed of confidentiality, anonymity, their rights, and voluntary participation. Thematically analysed data revealed that many participants were unaware of the term ‘the first 1000 days of a child’s life’; however, they were aware of the methods to be used for forming an attachment bond with their children. There is a need for more awareness on the subject matter within South Africa. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=awareness" title="awareness">awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=children" title=" children"> children</a>, <a href="https://publications.waset.org/abstracts/search?q=first%201000%20days" title=" first 1000 days"> first 1000 days</a>, <a href="https://publications.waset.org/abstracts/search?q=milestones" title=" milestones"> milestones</a>, <a href="https://publications.waset.org/abstracts/search?q=South%20Africa" title=" South Africa"> South Africa</a>, <a href="https://publications.waset.org/abstracts/search?q=understanding" title=" understanding"> understanding</a> </p> <a href="https://publications.waset.org/abstracts/121829/first-1000-days-mothers-understanding-of-an-attachment-bond-and-the-role-that-it-plays-in-early-childhood" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/121829.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">202</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25149</span> Fear of Isolation, Online Efficacy, and Selective Exposure in Online Political Discourse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kyujin%20Shim">Kyujin Shim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores how individual motivations in political psychology will lead to political expression and online discourse, and how those online political discourses result in individuals’ exposure to extreme/ personally-entertaining/ disinhibiting content. This study argues that a new framework beyond the conventional paradigm (e.g., selective exposure based on partisanship/ ideology) is needed for better grasp of non-ideological/ anarchic, and/or of nonpartisan yet anonymity-/ extremity-/ disinhibition-related online behaviors regarding political conversations. Further, this study proposes a new definition of ‘selective exposure,’ with special attention to online efficacy and psychological motivations/gratifications sought in the online sphere. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=selective%20exposure" title="selective exposure">selective exposure</a>, <a href="https://publications.waset.org/abstracts/search?q=fear%20of%20isolation" title=" fear of isolation"> fear of isolation</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20psychology" title=" political psychology"> political psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20discourse" title=" online discourse"> online discourse</a> </p> <a href="https://publications.waset.org/abstracts/57638/fear-of-isolation-online-efficacy-and-selective-exposure-in-online-political-discourse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57638.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">433</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25148</span> Efficacy of Clickers in L2 Interaction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ryoo%20Hye%20Jin%20Agnes">Ryoo Hye Jin Agnes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to investigate the efficacy of clickers in fostering L2 class interaction. In an L2 classroom, active learner-to-learner interactions and learner-to-teacher interactions play an important role in language acquisition. In light of this, introducing learning tools that promote such interactions would benefit L2 classroom by fostering interaction. This is because the anonymity of clickers allows learners to express their needs without the social risks associated with speaking up in the class. clickers therefore efficiently help learners express their level of understanding during the process of learning itself. This allows for an evaluative feedback loop where both learners and teachers understand the level of progress of the learners, better enabling classrooms to adapt to the learners’ needs. Eventually this tool promotes participation from learners. This, in turn, is believed to be effective in fostering classroom interaction, allowing learning to take place in a more comfortable yet vibrant way. This study is finalized by presenting the result of an experiment conducted to verify the effectiveness of this approach when teaching pragmatic aspect of Korean expressions with similar semantic functions. The learning achievement of learners in the experimental group was found higher than the learners’ in a control group. A survey was distributed to the learners, questioning them regarding the efficacy of clickers, and how it contributed to their learning in areas such as motivation, self-assessment, increasing participation, as well as giving feedback to teachers. Analyzing the data collected from the questionnaire given to the learners, the study presented data suggesting that this approach increased the scope of interactivity in the classroom, thus not only increasing participation but enhancing the type of classroom participation among learners. This participation in turn led to a marked improvement in their communicative abilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=second%20language%20acquisition" title="second language acquisition">second language acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=interaction" title=" interaction"> interaction</a>, <a href="https://publications.waset.org/abstracts/search?q=clickers" title=" clickers"> clickers</a>, <a href="https://publications.waset.org/abstracts/search?q=learner%20response%20system" title=" learner response system"> learner response system</a>, <a href="https://publications.waset.org/abstracts/search?q=output%20from%20learners" title=" output from learners"> output from learners</a>, <a href="https://publications.waset.org/abstracts/search?q=learner%E2%80%99s%20cognitive%20process" title=" learner’s cognitive process"> learner’s cognitive process</a> </p> <a href="https://publications.waset.org/abstracts/7494/efficacy-of-clickers-in-l2-interaction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7494.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">521</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25147</span> A Proposal for an Excessivist Social Welfare Ordering</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20De%20Sandi">V. De Sandi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we characterize a class of rank-weighted social welfare orderings that we call ”Excessivist.” The Excessivist Social Welfare Ordering (eSWO) judges incomes above a fixed threshold θ as detrimental to society. To accomplish this, the identification of a richness or affluence line is necessary. We employ a fixed, exogenous line of excess. We define an eSWF in the form of a weighted sum of individual’s income. This requires introducing n+1 vectors of weights, one for all possible numbers of individuals below the threshold. To do this, the paper introduces a slight modification of the class of rank weighted class of social welfare function. Indeed, in our excessivist social welfare ordering, we allow the weights to be both positive (for individuals below the line) and negative (for individuals above). Then, we introduce ethical concerns through an axiomatic approach. The following axioms are required: continuity above and below the threshold (Ca, Cb), anonymity (A), absolute aversion to excessive richness (AER), pigou dalton positive weights preserving transfer (PDwpT), sign rank preserving full comparability (SwpFC) and strong pareto below the threshold (SPb). Ca, Cb requires that small changes in two income distributions above and below θ do not lead to changes in their ordering. AER suggests that if two distributions are identical in any respect but for one individual above the threshold, who is richer in the first, then the second should be preferred by society. This means that we do not care about the waste of resources above the threshold; the priority is the reduction of excessive income. According to PDwpT, a transfer from a better-off individual to a worse-off individual despite their relative position to the threshold, without reversing their ranks, leads to an improved distribution if the number of individuals below the threshold is the same after the transfer or the number of individuals below the threshold has increased. SPb holds only for individuals below the threshold. The weakening of strong pareto and our ethics need to be justified; we support them through the notion of comparative egalitarianism and income as a source of power. SwpFC is necessary to ensure that, following a positive affine transformation, an individual does not become excessively rich in only one distribution, thereby reversing the ordering of the distributions. Given the axioms above, we can characterize the class of the eSWO, getting the following result through a proof by contradiction and exhaustion: Theorem 1. A social welfare ordering satisfies the axioms of continuity above and below the threshold, anonymity, sign rank preserving full comparability, aversion to excessive richness, Pigou Dalton positive weight preserving transfer, and strong pareto below the threshold, if and only if it is an Excessivist-social welfare ordering. A discussion about the implementation of different threshold lines reviewing the primary contributions in this field follows. What the commonly implemented social welfare functions have been overlooking is the concern for extreme richness at the top. The characterization of Excessivist Social Welfare Ordering, given the axioms above, aims to fill this gap. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=comparative%20egalitarianism" title="comparative egalitarianism">comparative egalitarianism</a>, <a href="https://publications.waset.org/abstracts/search?q=excess%20income" title=" excess income"> excess income</a>, <a href="https://publications.waset.org/abstracts/search?q=inequality%20aversion" title=" inequality aversion"> inequality aversion</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20welfare%20ordering" title=" social welfare ordering"> social welfare ordering</a> </p> <a href="https://publications.waset.org/abstracts/177679/a-proposal-for-an-excessivist-social-welfare-ordering" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177679.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25146</span> A Study of the Effects of Zimbabwean Youth Migration on Musina Area, South Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Chinyakata">R. Chinyakata</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20R.%20Raselekoane"> N. R. Raselekoane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Migration has always been part of human history. Migration is spurred by globalisation which connects nations by encouraging the flow of goods, services, ideas and people across borders. Migration does not only involve movement of adults from one country to another. It also affects and involves the youth as they are the most mobile group. Musina area, like many other border areas, experiences a variety of challenges as a result of the influx of people from the neighbouring Zimbabwe and other African countries. Of great concern about this migration is the fact that the host country or area may become unsafe and unstable as a result of huge influx of migrants. There may also be tensions between local people and migrants over the resources. The study sought to investigate the effects of the Zimbabwean youth migration on Musina area. The study was undertaken in Musina area which is situated 18km from the Beit-Bridge border post. A qualitative research approach was used. Semi-structured interviews were used to collect data. Non-probability quota sampling technique was used to select the respondents. The study sample consisted of sixteen female and male respondents. Thematic coding was used to analyse the data. Ethical considerations such as informed consent, confidentiality, anonymity and voluntary participation were taken into account to protect the participants. The study found that the effects of the Zimbabwean youth migration on the Musina area include, among others, tensions between locals and the Zimbabwean youth migrants over resources, job and business opportunities, overcrowding and crime. Multi-pronged strategies which involve different stakeholders should be applied to address tensions over job and business opportunities, overcrowding and crime in the Musina area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=host%20country" title="host country">host country</a>, <a href="https://publications.waset.org/abstracts/search?q=effects" title=" effects"> effects</a>, <a href="https://publications.waset.org/abstracts/search?q=migrant" title=" migrant"> migrant</a>, <a href="https://publications.waset.org/abstracts/search?q=migration" title=" migration"> migration</a>, <a href="https://publications.waset.org/abstracts/search?q=Musina" title=" Musina"> Musina</a>, <a href="https://publications.waset.org/abstracts/search?q=youth" title=" youth"> youth</a>, <a href="https://publications.waset.org/abstracts/search?q=Zimbabwe" title=" Zimbabwe"> Zimbabwe</a> </p> <a href="https://publications.waset.org/abstracts/43903/a-study-of-the-effects-of-zimbabwean-youth-migration-on-musina-area-south-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43903.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">244</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25145</span> Socio-Ecological Factors Characterising Migrants and Refugee Youth’s Sexual and Reproductive Health and Rights</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michaels%20Aibangbee">Michaels Aibangbee</a>, <a href="https://publications.waset.org/abstracts/search?q=Sowbhagya%20Micheal"> Sowbhagya Micheal</a>, <a href="https://publications.waset.org/abstracts/search?q=Pranee%20Liamputtong"> Pranee Liamputtong</a>, <a href="https://publications.waset.org/abstracts/search?q=Elias%20Mpofu"> Elias Mpofu</a>, <a href="https://publications.waset.org/abstracts/search?q=Tinashe%20Dune"> Tinashe Dune</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: The challenges migrants and refugee youth (MRY) experience in maintaining their sexual and reproductive health and rights (SRHR) continues to be a global public health issue. Consequently, MRY is more likely to encounter adverse SRH experiences due to limited access to and knowledge of SRH services. Using a socio-ecological framework, this study examined the MRY’s SRHR micro-level experiences to macro-levels analyses of SRH-related social systems and constructions. Methods: Eighteen focus groups were conducted using participatory action research (PAR) methodology to understand the phenomena. The focus groups included MRY participants (ages 16-26) living in Greater Western Sydney and facilitated by youth project liaisons (YPL). The data was afterward synthesised and analysed using the thematic-synthesis method. Results: In total, 86 MRY (male n= 25, female n= 61) MRY (across 20 different cultural backgrounds) participated in the focus groups. The findings identified socio-ecological factors characterising MRY SRHR, highlighting facilitators such as social media and significant barriers such as lack of access to services and socio-cultural dissonance, and the under-implementation of SRHR support and services by MRY. Key themes from the data included traditional and institutional stigma, lack of SRH education, high reliance on social media for SRH information, anonymity, and privacy concerns. Conclusion: The data shows a limited extent to which MRY SRHR is considered and the intergenerational understanding and stigma affecting the rights of MRY. Therefore, these findings suggest a need for policies and practices to empower MRY’s agency through a collaborative SRHR strategy and policy design to maintain relevance in multicultural contexts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=migrant%20and%20refugee%20youth" title="migrant and refugee youth">migrant and refugee youth</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20health" title=" sexual health"> sexual health</a>, <a href="https://publications.waset.org/abstracts/search?q=reproductive%20health" title=" reproductive health"> reproductive health</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20and%20reproductive%20health%20and%20rights" title=" sexual and reproductive health and rights"> sexual and reproductive health and rights</a>, <a href="https://publications.waset.org/abstracts/search?q=culture" title=" culture"> culture</a>, <a href="https://publications.waset.org/abstracts/search?q=agency" title=" agency"> agency</a> </p> <a href="https://publications.waset.org/abstracts/162263/socio-ecological-factors-characterising-migrants-and-refugee-youths-sexual-and-reproductive-health-and-rights" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162263.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25144</span> Personality as a Predictor of Knowledge Hiding Behavior: Case Study of Alpha Electronics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sadeeqa%20Khan">Sadeeqa Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Usman"> Muhammad Usman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Employees’ knowledge hiding behaviors can be detrimental to employees’ interpersonal relationships and individual and organizational learning and creativity. However, to the best of the authors’ knowledge, the literature on the contingencies, antecedents and outcomes of employees’ knowledge hiding behaviors is still in its infancy. On the other hand, not everyone who hides knowledge hides it the same way, as individuals are different, so do their behaviors. This study explores the links between employees’ personality traits and their knowledge hiding behaviors. By using a single case study as a research methodology and collecting data through 28 semi-structured interviews from employees working in Alpha Electronics (the pseudo name of the company to ascertain anonymity) operating in Pakistan, we foreground the patterns of relationships between employees’ personality traits and knowledge hiding behaviors – rationalized hiding, evasive hiding and playing dumb. Our findings suggest that employees high on extraversion involve in evasive knowledge hiding; while employees low on extraversion (introverts) demonstrate rationalized hiding. Moreover, both extrovert and introvert employees involve in playing dumb in situations that involve risk for their jobs and careers. For instance, when knowledge is requested from their managers, both extrovert and introvert employees tend to play dumb, as in such cases, evasive and rationalized hiding can be harmful to their job and career-related interests and motives. Other than theoretical contributions, the study offers important implications for organizations faced with the challenges of shortage of skills and knowledge. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=knowledge%20hiding" title="knowledge hiding">knowledge hiding</a>, <a href="https://publications.waset.org/abstracts/search?q=personality" title=" personality"> personality</a>, <a href="https://publications.waset.org/abstracts/search?q=rationalized%20hiding" title=" rationalized hiding"> rationalized hiding</a>, <a href="https://publications.waset.org/abstracts/search?q=playing%20dumb" title=" playing dumb"> playing dumb</a>, <a href="https://publications.waset.org/abstracts/search?q=evasive%20hiding" title=" evasive hiding"> evasive hiding</a> </p> <a href="https://publications.waset.org/abstracts/95392/personality-as-a-predictor-of-knowledge-hiding-behavior-case-study-of-alpha-electronics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95392.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">215</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25143</span> Data Transformations in Data Envelopment Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mansour%20Mohammadpour">Mansour Mohammadpour</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data transformation refers to the modification of any point in a data set by a mathematical function. When applying transformations, the measurement scale of the data is modified. Data transformations are commonly employed to turn data into the appropriate form, which can serve various functions in the quantitative analysis of the data. This study addresses the investigation of the use of data transformations in Data Envelopment Analysis (DEA). Although data transformations are important options for analysis, they do fundamentally alter the nature of the variable, making the interpretation of the results somewhat more complex. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20transformation" title="data transformation">data transformation</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20envelopment%20analysis" title=" data envelopment analysis"> data envelopment analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=undesirable%20data" title=" undesirable data"> undesirable data</a>, <a href="https://publications.waset.org/abstracts/search?q=negative%20data" title=" negative data"> negative data</a> </p> <a href="https://publications.waset.org/abstracts/192236/data-transformations-in-data-envelopment-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192236.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">20</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25142</span> Web Proxy Detection via Bipartite Graphs and One-Mode Projections</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhipeng%20Chen">Zhipeng Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Peng%20Zhang"> Peng Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Qingyun%20Liu"> Qingyun Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Guo"> Li Guo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bipartite%20graph" title="bipartite graph">bipartite graph</a>, <a href="https://publications.waset.org/abstracts/search?q=one-mode%20projection" title=" one-mode projection"> one-mode projection</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20proxy%20detection" title=" web proxy detection"> web proxy detection</a> </p> <a href="https://publications.waset.org/abstracts/87483/web-proxy-detection-via-bipartite-graphs-and-one-mode-projections" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87483.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">245</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25141</span> Survey on Malware Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Doaa%20Wael">Doaa Wael</a>, <a href="https://publications.waset.org/abstracts/search?q=Naswa%20Abdelbaky"> Naswa Abdelbaky</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=malware%20analysis" title="malware analysis">malware analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=malware%20attacks" title=" malware attacks"> malware attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=malware%20detection%20approaches" title=" malware detection approaches"> malware detection approaches</a> </p> <a href="https://publications.waset.org/abstracts/164823/survey-on-malware-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164823.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25140</span> Drugs, Silk Road, Bitcoins</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lali%20Khurtsia">Lali Khurtsia</a>, <a href="https://publications.waset.org/abstracts/search?q=Vano%20Tsertsvadze"> Vano Tsertsvadze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Georgian drug policy is directed to reduce the supply of drugs. Retrospective analysis has shown that law enforcement activities have been followed by the expulsion of particular injecting drugs. The demand remains unchanged and drugs are substituted by the hand-made, even more dangerous homemade drugs entered the market. To find out expected new trends on the Georgian drug market, qualitative study was conducted with Georgian drug users to determine drug supply routes. It turned out that drug suppliers and consumers for safety reasons and to protect their anonymity, use Skype to make deals. IT in illegal drug trade is even more sophisticated in the worldwide. Trading with Bitcoins in the Darknet ensures high confidentiality of money transactions and the safe circulation of drugs. In 2014 largest Bitcoin mining enterprise in the world was built in Georgia. We argue that the use of Bitcoins and Darknet by Georgian drug consumers and suppliers will be an incentive to response adequately to the government's policy of restricting supply in order to satisfy market demand for drugs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bitcoin" title="bitcoin">bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=darknet" title=" darknet"> darknet</a>, <a href="https://publications.waset.org/abstracts/search?q=drugs" title=" drugs"> drugs</a>, <a href="https://publications.waset.org/abstracts/search?q=policy" title=" policy "> policy </a> </p> <a href="https://publications.waset.org/abstracts/32113/drugs-silk-road-bitcoins" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32113.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">439</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25139</span> Investigating Suicide Cases in Attica, Greece: Insight from an Autopsy-Based Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ioannis%20N.%20Sergentanis">Ioannis N. Sergentanis</a>, <a href="https://publications.waset.org/abstracts/search?q=Stavroula%20Papadodima"> Stavroula Papadodima</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20Tsellou"> Maria Tsellou</a>, <a href="https://publications.waset.org/abstracts/search?q=Dimitrios%20Vlachodimitropoulos"> Dimitrios Vlachodimitropoulos</a>, <a href="https://publications.waset.org/abstracts/search?q=Sotirios%20Athanaselis"> Sotirios Athanaselis</a>, <a href="https://publications.waset.org/abstracts/search?q=Chara%20Spiliopoulou"> Chara Spiliopoulou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: The aim of this study is the investigation of characteristics of suicide, as documented in autopsies during a five-year interval in the greater area of Attica, including the city of Athens. This could reveal possible protective or aggravating factors for suicide risk during a period strongly associated with the Greek debt crisis. Materials and Methods: Data was obtained following registration of suicide cases among autopsies performed in the Forensic Medicine and Toxicology Department, School of Medicine, National and Kapodistrian University of Athens, Greece, during the time interval from January 2011 to December 2015. Anonymity and medical secret were respected. A series of demographic and social factors in addition to special characteristics of suicide were entered into a specially established pre-coded database. These factors include social data as well as psychiatric background and certain autopsy characteristics. Data analysis was performed using descriptive statistics and Fisher’s exact test. The software used was STATA/SE 13 (Stata Corp., College Station, TX, USA). Results: A total of 162 cases were studied, 128 men and 34 women. Age ranged from 14 to 97 years old with an average of 53 years, presenting two peaks around 40 and 60 years. A 56% of cases were single/ divorced/ widowed. 25% of cases occurred during the weekend, and 66% of cases occurred in the house. A predominance of hanging as the leading method of suicide (41.4%) followed by jumping from a height (22.8%) and firearms (19.1%) was noted. Statistical analysis showed an association was found between suicide method and gender (P < 0.001, Fisher’s exact test); specifically, no woman used a firearm while only one man used medication overdose (against four women). Discussion: Greece has historically been one of the countries with the lowest suicide rates in Europe. Given a possible change in suicide trends during the financial crisis, further research seems necessary in order to establish risk factors. According to our study, suicide is more frequent in men who are not married, inside their house. Gender seems to be a factor affecting the method of suicide. These results seem in accordance with the international literature. Stronger than expected predominance in male suicide can be associated with failure to live up to social and family expectations for financial reasons. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=autopsy" title="autopsy">autopsy</a>, <a href="https://publications.waset.org/abstracts/search?q=Greece" title=" Greece"> Greece</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20factors" title=" risk factors"> risk factors</a>, <a href="https://publications.waset.org/abstracts/search?q=suicide" title=" suicide"> suicide</a> </p> <a href="https://publications.waset.org/abstracts/74683/investigating-suicide-cases-in-attica-greece-insight-from-an-autopsy-based-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74683.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">220</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=838">838</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=839">839</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity%20data&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>