CINXE.COM
Search results for: anonymity
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: anonymity</title> <meta name="description" content="Search results for: anonymity"> <meta name="keywords" content="anonymity"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="anonymity" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="anonymity"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 59</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: anonymity</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">59</span> The Veil of Virtuality: Anonymity and Trust in the Metaverse's New Frontier</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cheng%20Xu">Cheng Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Rui%20Zhong"> Rui Zhong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Utilizing a preregistered randomized experiment, this study explores the effects of anonymity and curated identity on trust within the Metaverse. Participants were randomly assigned to different conditions of anonymity and identity curation and engaged in a series of tasks designed to mirror the complexities of trust in real-world social interactions. Trust was measured using the classical trust game, allowing for a nuanced understanding of how these factors interact and influence trust. The findings reveal that higher levels of anonymity negatively impact trust, while identity curation can moderate this effect. Mechanism analysis uncovers how anonymity influences perceived reciprocity and group cohesion, and how curation can moderate these relationships. The results demonstrate a nuanced interaction between anonymity and trust, with variations across different curation levels. These insights provide a multifaceted understanding of trust within virtual environments, contributing valuable knowledge to the design, policy-making, and ethical considerations of the Metaverse <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=metaverse" title="metaverse">metaverse</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=curated%20identity" title=" curated identity"> curated identity</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20behavior" title=" social behavior"> social behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a> </p> <a href="https://publications.waset.org/abstracts/171236/the-veil-of-virtuality-anonymity-and-trust-in-the-metaverses-new-frontier" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171236.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">58</span> Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tao%20Feng">Tao Feng</a>, <a href="https://publications.waset.org/abstracts/search?q=Fei%20Xing"> Fei Xing</a>, <a href="https://publications.waset.org/abstracts/search?q=Ye%20Lu"> Ye Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jun%20Li%20Fang"> Jun Li Fang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NDN" title="NDN">NDN</a>, <a href="https://publications.waset.org/abstracts/search?q=mutual%20anonymity" title=" mutual anonymity"> mutual anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymous%20routing" title=" anonymous routing"> anonymous routing</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20coding" title=" network coding"> network coding</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication%20mechanism" title=" authentication mechanism"> authentication mechanism</a> </p> <a href="https://publications.waset.org/abstracts/28422/secure-network-coding-based-named-data-network-mutual-anonymity-transfer-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28422.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">57</span> The Role of Virtual Group Anonymity in the Generation, Selection, and Refinement of Ideas</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jonali%20Baruah">Jonali Baruah</a>, <a href="https://publications.waset.org/abstracts/search?q=Keesha%20Green"> Keesha Green</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This experimental study examines the effects of anonymity in video meeting groups across the stages of innovation (idea generation, selection, and refinement) on various measures of creativity. A sample of 92 undergraduate students participated in small groups of three to four members to complete creativity, decision-making, and idea-refinement task in either anonymous or identified conditions. The study followed two anonymity (anonymous and identified) X 3 stages of innovation (idea generation, idea selection, and idea refinement) in a mixed factorial design. Results revealed that the anonymous groups produced ideas of the highest average quality in the refinement phase of innovation. The results of this study enhanced our understanding of the productivity and creativity of groups in computer-mediated communication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=creativity" title="creativity">creativity</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=idea-generation" title=" idea-generation"> idea-generation</a>, <a href="https://publications.waset.org/abstracts/search?q=idea-refinement" title=" idea-refinement"> idea-refinement</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a> </p> <a href="https://publications.waset.org/abstracts/152534/the-role-of-virtual-group-anonymity-in-the-generation-selection-and-refinement-of-ideas" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152534.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">56</span> A Contribution to Blockchain Privacy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malika%20Yaici">Malika Yaici</a>, <a href="https://publications.waset.org/abstracts/search?q=Feriel%20Lalaoui"> Feriel Lalaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Lydia%20Belhoul"> Lydia Belhoul</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As a new distributed point-to-point (P2P) technology, blockchain has become a very broad field of research, addressing various challenges including privacy preserving as is the case in all other technologies. In this work, a study of the existing solutions to the problems related to private life in general and in blockchains in particular is performed. User anonymity and transaction confidentiality are the two main challenges for the protection of privacy in blockchains. Mixing mechanisms and cryptographic solutions respond to this problem but remain subject to attacks and suffer from shortcomings. Taking into account these imperfections and the synthesis of our study, we present a mixing model without trusted third parties, based on group signatures allowing reinforcing the anonymity of the users, the confidentiality of the transactions, with minimal turnaround time and without mixing costs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=mixing%20coins" title=" mixing coins"> mixing coins</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a> </p> <a href="https://publications.waset.org/abstracts/194226/a-contribution-to-blockchain-privacy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194226.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">8</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">55</span> Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Parveen%20Begam">H. Parveen Begam</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Maluk%20Mohamed"> M. A. Maluk Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=grid%20computing" title="grid computing">grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=onion%20routing" title=" onion routing"> onion routing</a>, <a href="https://publications.waset.org/abstracts/search?q=ECC" title=" ECC"> ECC</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a> </p> <a href="https://publications.waset.org/abstracts/28834/performance-analysis-of-elliptic-curve-cryptography-using-onion-routing-to-enhance-the-privacy-and-anonymity-in-grid-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">54</span> Fears of Strangers: Causes of Anonymity Rejection on Virtual World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Proud%20Arunrangsiwed">Proud Arunrangsiwed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymous" title="anonymous">anonymous</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20identity" title=" online identity"> online identity</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20message" title=" trust message"> trust message</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a> </p> <a href="https://publications.waset.org/abstracts/10507/fears-of-strangers-causes-of-anonymity-rejection-on-virtual-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10507.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">53</span> Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zainurrasyid%20Abdullah">Zainurrasyid Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Fadzlee%20Sulaiman"> Mohamed Fadzlee Sulaiman</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Fadzlan%20Zainal"> Muhammad Fadzlan Zainal</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Zabri%20Adil%20Talib"> M. Zabri Adil Talib</a>, <a href="https://publications.waset.org/abstracts/search?q=Aswami%20Fadillah%20M.%20Ariffin"> Aswami Fadillah M. Ariffin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artifacts%20analysis" title="artifacts analysis">artifacts analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20analysis" title=" forensic analysis"> forensic analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20analysis" title=" memory analysis"> memory analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=registry%20analysis" title=" registry analysis"> registry analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=tor%20browser" title=" tor browser"> tor browser</a>, <a href="https://publications.waset.org/abstracts/search?q=Windows%2010" title=" Windows 10"> Windows 10</a> </p> <a href="https://publications.waset.org/abstracts/89769/digital-forensics-analysis-focusing-on-the-onion-router-browser-artifacts-in-windows-10" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89769.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">52</span> Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shadi%20Janbabaei">Shadi Janbabaei</a>, <a href="https://publications.waset.org/abstracts/search?q=Hossein%20Gharaee%20Garakani"> Hossein Gharaee Garakani</a>, <a href="https://publications.waset.org/abstracts/search?q=Naser%20Mohammadzadeh"> Naser Mohammadzadeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=lightweight" title=" lightweight"> lightweight</a>, <a href="https://publications.waset.org/abstracts/search?q=un-traceability" title=" un-traceability"> un-traceability</a> </p> <a href="https://publications.waset.org/abstracts/72724/mutual-authentication-for-sensor-to-sensor-communications-in-iot-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">51</span> An Exploratory Study on the Difference between Online and Offline Conformity Behavior among Chinese College Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xinyue%20Ma">Xinyue Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Dishen%20Zhang"> Dishen Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yijun%20Liu"> Yijun Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yutian%20Jiang"> Yutian Jiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Huiyan%20Yu"> Huiyan Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=Chufeng%20Gu"> Chufeng Gu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Conformity is defined as one in a social group changing his or her behavior to match the others’ behavior in the group. It is used to find that people show a higher level of online conformity behavior than offline. However, as anonymity can decrease the level of online conformity behavior, the difference between online and offline conformity behavior among Chinese college students still needs to be tested. In this study, college students (N = 60) have been randomly assigned into three groups: control group, offline experimental group, and online experimental group. Through comparing the results of offline experimental group and online experimental group with the Mann-Whitney U test, this study verified the results of Asch’s experiment, and found out that people show a lower level of online conformity behavior than offline, which contradicted the previous finding found in China. These results can be used to explain why some people make a lot of vicious remarks and radical ideas on the Internet but perform normally in their real life: the anonymity of the network makes the online group pressure less than offline, so people are less likely to conform to social norms and public opinions on the Internet. What is more, these results support the importance and relevance of online voting, because fewer online group pressures make it easier for people to expose their true ideas, thus gathering more comprehensive and truthful views and opinions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=Asch%E2%80%99s%20group%20conformity" title=" Asch’s group conformity"> Asch’s group conformity</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinese%20college%20students" title=" Chinese college students"> Chinese college students</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20conformity" title=" online conformity"> online conformity</a> </p> <a href="https://publications.waset.org/abstracts/134894/an-exploratory-study-on-the-difference-between-online-and-offline-conformity-behavior-among-chinese-college-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134894.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">50</span> Privacy Preserving Data Publishing Based on Sensitivity in Context of Big Data Using Hive</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Srinivasa%20Rao">P. Srinivasa Rao</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Venkatesh%20Sharma"> K. Venkatesh Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20Sadhya%20Devi"> G. Sadhya Devi</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Nagesh"> V. Nagesh </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Privacy Preserving Data Publication is the main concern in present days because the data being published through the internet has been increasing day by day. This huge amount of data was named as Big Data by its size. This project deals the privacy preservation in the context of Big Data using a data warehousing solution called hive. We implemented Nearest Similarity Based Clustering (NSB) with Bottom-up generalization to achieve (v,l)-anonymity. (v,l)-Anonymity deals with the sensitivity vulnerabilities and ensures the individual privacy. We also calculate the sensitivity levels by simple comparison method using the index values, by classifying the different levels of sensitivity. The experiments were carried out on the hive environment to verify the efficiency of algorithms with Big Data. This framework also supports the execution of existing algorithms without any changes. The model in the paper outperforms than existing models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sensitivity" title="sensitivity">sensitivity</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitive%20level" title=" sensitive level"> sensitive level</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=Privacy%20Preserving%20Data%20Publication%20%28PPDP%29" title=" Privacy Preserving Data Publication (PPDP)"> Privacy Preserving Data Publication (PPDP)</a>, <a href="https://publications.waset.org/abstracts/search?q=bottom-up%20generalization" title=" bottom-up generalization"> bottom-up generalization</a>, <a href="https://publications.waset.org/abstracts/search?q=Big%20Data" title=" Big Data"> Big Data</a> </p> <a href="https://publications.waset.org/abstracts/71445/privacy-preserving-data-publishing-based-on-sensitivity-in-context-of-big-data-using-hive" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71445.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">49</span> Implementation of an Online-Platform at the University of Freiburg to Help Medical Students Cope with Stress</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zolt%C3%A1n%20H%C3%B6hling">Zoltán Höhling</a>, <a href="https://publications.waset.org/abstracts/search?q=Sarah-Lu%20Oberschelp"> Sarah-Lu Oberschelp</a>, <a href="https://publications.waset.org/abstracts/search?q=Niklas%20Gilsdorf"> Niklas Gilsdorf</a>, <a href="https://publications.waset.org/abstracts/search?q=Michael%20Wirsching"> Michael Wirsching</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrea%20Kuhnert"> Andrea Kuhnert</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A majority of medical students at the University of Freiburg reported stress-related psychosomatic symptoms which are often associated with their studies. International research supports these findings, as medical students worldwide seem to be at special risk for mental health problems. In some countries and institutions, psychologically based interventions that assist medical students in coping with their stressors have been implemented. It turned out that anonymity is an important aspect here. Many students fear a potential damage of reputation when being associated with mental health problems, which may be due to a high level of competitiveness in classes. Therefore, we launched an online-platform where medical students could anonymously seek help and exchange their experiences with fellow students and experts. Medical students of all semesters have access to it through the university’s learning management system (called “ILIAS”). The informative part of the platform consists of exemplary videos showing medical students (actors) who act out scenes that demonstrate the antecedents of stress-related psychosomatic disorders. These videos are linked to different expert comments, describing the exhibited symptoms in an understandable and normalizing way. The (inter-)active part of the platform consists of self-help tools (such as meditation exercises or general tips for stress-coping) and an anonymous interactive forum where students can describe their stress-related problems and seek guidance from experts and/or share their experiences with fellow students. Besides creating an immediate proposal to help affected students, we expect that competitiveness between students might be diminished and bondage improved through mutual support between them. In the initial phase after the platform’s launch, it was accessed by a considerable number of medical students. On a closer look it appeared that platform sections like general information on psychosomatic-symptoms and self-treatment tools were accessed far more often than the online-forum during the first months after the platform launch. Although initial acceptance of the platform was relatively high, students showed a rather passive way of using our platform. While user statistics showed a clear demand for information on stress-related psychosomatic symptoms and its possible remedies, active engagement in the interactive online-forum was rare. We are currently advertising the platform intensively and trying to point out the assured anonymity of the platform and its interactive forum. Our plans, to assure students their anonymity through the use of an e-learning facility and promote active engagement in the online forum, did not (yet) turn out as expected. The reasons behind this may be manifold and based on either e-learning related issues or issues related to students’ individual needs. Students might, for example, question the assured anonymity due to a lack of trust in the technological functioning university’s learning management system. However, one may also conclude that reluctance to discuss stress-related psychosomatic symptoms with peer medical students may not be solely based on anonymity concerns, but could be rooted in more complex issues such as general mistrust between students. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-tutoring" title="e-tutoring">e-tutoring</a>, <a href="https://publications.waset.org/abstracts/search?q=stress-coping" title=" stress-coping"> stress-coping</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20support" title=" student support"> student support</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20forum" title=" online forum"> online forum</a> </p> <a href="https://publications.waset.org/abstracts/29074/implementation-of-an-online-platform-at-the-university-of-freiburg-to-help-medical-students-cope-with-stress" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29074.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">48</span> Analyzing Speech Acts in Reddit Posts of Formerly Incarcerated Youths</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yusra%20Ibrahim">Yusra Ibrahim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores the online discourse of justice-involved youth on Reddit, focusing on how anonymity and asynchronicity influence their ability to share and reflect on their incarceration experiences within the "Ask Me Anything" (AMA) community. The study utilizes a quantitative analysis of speech acts to examine the varied communication patterns exhibited by youths and commenters across two AMA threads. The results indicate that, although Reddit is not specifically designed for formerly incarcerated youths, its features provide a supportive environment for them to share their incarceration experiences with non-incarcerated individuals. The level of empathy and support from the audience varies based on the audience’s perspectives on incarceration and related traumatic experiences. Additionally, the study identifies a reciprocal relationship where youths benefit from community support while offering insights into the juvenile justice system and helping the audience understand the experience of incarceration. The study also reveals cultural shocks in physical and digital environments that youth experience after release and when using social media platforms and the internet. The study has implications for juvenile justice personnel, policymakers, and researchers in the juvenile justice system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=juvenile%20justice" title="juvenile justice">juvenile justice</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20discourse" title=" online discourse"> online discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=reddit%20AMA" title=" reddit AMA"> reddit AMA</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=speech%20acts%20taxonomy" title=" speech acts taxonomy"> speech acts taxonomy</a>, <a href="https://publications.waset.org/abstracts/search?q=reintegration" title=" reintegration"> reintegration</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20community%20support" title=" online community support"> online community support</a> </p> <a href="https://publications.waset.org/abstracts/187825/analyzing-speech-acts-in-reddit-posts-of-formerly-incarcerated-youths" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">42</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">47</span> Anonymity and Irreplaceability: Gross Anatomical Practices in Japanese Medical Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ayami%20Umemura">Ayami Umemura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Without exception, all the bodies dissected in the gross anatomical practices are bodies that have lived irreplaceable lives, laughing and talking with family and friends. While medical education aims to cultivate medical knowledge that is universally applicable to all human bodies, it relies on a unique, irreplaceable, and singular entity. In this presentation, we will explore the ``irreplaceable relationship'' that is cultivated between medical students and anonymous cadavers during gross anatomical practices, drawing on Emmanuel Levinas's ``ethics of the face'' and Martin Buber's discussion of “I-Thou.'' Through this, we aim to present ``a different ethic'' that emerges only in the context of face-to-face relationships, which differs from the generalized, institutionalized, mass-produced ethics like seen in so-called ``ethics codes.'' Since the 1990s, there has been a movement around the world to use gross anatomical practices as an "educational tool" for medical professionalism and medical ethics, and some educational institutions have started disclosing the actual names, occupations, and places of birth of corpses to medical students. These efforts have also been criticized because they lack medical calmness. In any case, the issue here is that this information is all about the past that medical students never know directly. The critical fact that medical students are building relationships from scratch and spending precious time together without any information about the corpses before death is overlooked. Amid gross anatomical practices, a medical student is exposed to anonymous cadavers with faces and touching and feeling them. In this presentation, we will examine a collection of essays written by medical students on gross anatomical practices collected by the Japanese Association for Volunteer Body Donation from medical students across the country since 1978. There, we see the students calling out to the corpse, being called out to, being encouraged, superimposing the carcasses on their own immediate family, regretting parting, and shedding tears. Then, medical students can be seen addressing the dead body in the second person singular, “you.” These behaviors reveal an irreplaceable relationship between the anonymous cadavers and the medical students. The moment they become involved in an irreplaceable relationship between “I and you,” an accidental and anonymous encounter becomes inevitable. When medical students notice being the inevitable takers of voluntary and addressless gifts, they pledge to become “Good Doctors” owing the anonymous persons. This presentation aims to present “a different ethic” based on uniqueness and irreplaceability that comes from the faces of the others embedded in each context, which is different from “routine” and “institutionalized” ethics. That can only be realized ``because of anonymity''. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=irreplaceability" title=" irreplaceability"> irreplaceability</a>, <a href="https://publications.waset.org/abstracts/search?q=uniqueness" title=" uniqueness"> uniqueness</a>, <a href="https://publications.waset.org/abstracts/search?q=singularlity" title=" singularlity"> singularlity</a>, <a href="https://publications.waset.org/abstracts/search?q=emanuel%20levinas" title=" emanuel levinas"> emanuel levinas</a>, <a href="https://publications.waset.org/abstracts/search?q=martin%20buber" title=" martin buber"> martin buber</a>, <a href="https://publications.waset.org/abstracts/search?q=alain%20badiou" title=" alain badiou"> alain badiou</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20education" title=" medical education"> medical education</a> </p> <a href="https://publications.waset.org/abstracts/175836/anonymity-and-irreplaceability-gross-anatomical-practices-in-japanese-medical-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175836.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">62</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">46</span> Fear of Isolation, Online Efficacy, and Selective Exposure in Online Political Discourse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kyujin%20Shim">Kyujin Shim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores how individual motivations in political psychology will lead to political expression and online discourse, and how those online political discourses result in individuals’ exposure to extreme/ personally-entertaining/ disinhibiting content. This study argues that a new framework beyond the conventional paradigm (e.g., selective exposure based on partisanship/ ideology) is needed for better grasp of non-ideological/ anarchic, and/or of nonpartisan yet anonymity-/ extremity-/ disinhibition-related online behaviors regarding political conversations. Further, this study proposes a new definition of ‘selective exposure,’ with special attention to online efficacy and psychological motivations/gratifications sought in the online sphere. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=selective%20exposure" title="selective exposure">selective exposure</a>, <a href="https://publications.waset.org/abstracts/search?q=fear%20of%20isolation" title=" fear of isolation"> fear of isolation</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20psychology" title=" political psychology"> political psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20discourse" title=" online discourse"> online discourse</a> </p> <a href="https://publications.waset.org/abstracts/57638/fear-of-isolation-online-efficacy-and-selective-exposure-in-online-political-discourse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57638.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">433</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">45</span> A Proposal for an Excessivist Social Welfare Ordering</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20De%20Sandi">V. De Sandi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we characterize a class of rank-weighted social welfare orderings that we call ”Excessivist.” The Excessivist Social Welfare Ordering (eSWO) judges incomes above a fixed threshold θ as detrimental to society. To accomplish this, the identification of a richness or affluence line is necessary. We employ a fixed, exogenous line of excess. We define an eSWF in the form of a weighted sum of individual’s income. This requires introducing n+1 vectors of weights, one for all possible numbers of individuals below the threshold. To do this, the paper introduces a slight modification of the class of rank weighted class of social welfare function. Indeed, in our excessivist social welfare ordering, we allow the weights to be both positive (for individuals below the line) and negative (for individuals above). Then, we introduce ethical concerns through an axiomatic approach. The following axioms are required: continuity above and below the threshold (Ca, Cb), anonymity (A), absolute aversion to excessive richness (AER), pigou dalton positive weights preserving transfer (PDwpT), sign rank preserving full comparability (SwpFC) and strong pareto below the threshold (SPb). Ca, Cb requires that small changes in two income distributions above and below θ do not lead to changes in their ordering. AER suggests that if two distributions are identical in any respect but for one individual above the threshold, who is richer in the first, then the second should be preferred by society. This means that we do not care about the waste of resources above the threshold; the priority is the reduction of excessive income. According to PDwpT, a transfer from a better-off individual to a worse-off individual despite their relative position to the threshold, without reversing their ranks, leads to an improved distribution if the number of individuals below the threshold is the same after the transfer or the number of individuals below the threshold has increased. SPb holds only for individuals below the threshold. The weakening of strong pareto and our ethics need to be justified; we support them through the notion of comparative egalitarianism and income as a source of power. SwpFC is necessary to ensure that, following a positive affine transformation, an individual does not become excessively rich in only one distribution, thereby reversing the ordering of the distributions. Given the axioms above, we can characterize the class of the eSWO, getting the following result through a proof by contradiction and exhaustion: Theorem 1. A social welfare ordering satisfies the axioms of continuity above and below the threshold, anonymity, sign rank preserving full comparability, aversion to excessive richness, Pigou Dalton positive weight preserving transfer, and strong pareto below the threshold, if and only if it is an Excessivist-social welfare ordering. A discussion about the implementation of different threshold lines reviewing the primary contributions in this field follows. What the commonly implemented social welfare functions have been overlooking is the concern for extreme richness at the top. The characterization of Excessivist Social Welfare Ordering, given the axioms above, aims to fill this gap. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=comparative%20egalitarianism" title="comparative egalitarianism">comparative egalitarianism</a>, <a href="https://publications.waset.org/abstracts/search?q=excess%20income" title=" excess income"> excess income</a>, <a href="https://publications.waset.org/abstracts/search?q=inequality%20aversion" title=" inequality aversion"> inequality aversion</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20welfare%20ordering" title=" social welfare ordering"> social welfare ordering</a> </p> <a href="https://publications.waset.org/abstracts/177679/a-proposal-for-an-excessivist-social-welfare-ordering" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177679.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">44</span> Survey on Malware Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Doaa%20Wael">Doaa Wael</a>, <a href="https://publications.waset.org/abstracts/search?q=Naswa%20Abdelbaky"> Naswa Abdelbaky</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=malware%20analysis" title="malware analysis">malware analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=malware%20attacks" title=" malware attacks"> malware attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=malware%20detection%20approaches" title=" malware detection approaches"> malware detection approaches</a> </p> <a href="https://publications.waset.org/abstracts/164823/survey-on-malware-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164823.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">43</span> Data Collection Based on the Questionnaire Survey In-Hospital Emergencies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nouha%20Mhimdi">Nouha Mhimdi</a>, <a href="https://publications.waset.org/abstracts/search?q=Wahiba%20Ben%20Abdessalem%20Karaa"> Wahiba Ben Abdessalem Karaa</a>, <a href="https://publications.waset.org/abstracts/search?q=Henda%20Ben%20Ghezala"> Henda Ben Ghezala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The methods identified in data collection are diverse: electronic media, focus group interviews and short-answer questionnaires [1]. The collection of poor-quality data resulting, for example, from poorly designed questionnaires, the absence of good translators or interpreters, and the incorrect recording of data allow conclusions to be drawn that are not supported by the data or to focus only on the average effect of the program or policy. There are several solutions to avoid or minimize the most frequent errors, including obtaining expert advice on the design or adaptation of data collection instruments; or use technologies allowing better "anonymity" in the responses [2]. In this context, we opted to collect good quality data by doing a sizeable questionnaire-based survey on hospital emergencies to improve emergency services and alleviate the problems encountered. At the level of this paper, we will present our study, and we will detail the steps followed to achieve the collection of relevant, consistent and practical data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20collection" title="data collection">data collection</a>, <a href="https://publications.waset.org/abstracts/search?q=survey" title=" survey"> survey</a>, <a href="https://publications.waset.org/abstracts/search?q=questionnaire" title=" questionnaire"> questionnaire</a>, <a href="https://publications.waset.org/abstracts/search?q=database" title=" database"> database</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20analysis" title=" data analysis"> data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=hospital%20emergencies" title=" hospital emergencies"> hospital emergencies</a> </p> <a href="https://publications.waset.org/abstracts/140605/data-collection-based-on-the-questionnaire-survey-in-hospital-emergencies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140605.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">42</span> Drugs, Silk Road, Bitcoins</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lali%20Khurtsia">Lali Khurtsia</a>, <a href="https://publications.waset.org/abstracts/search?q=Vano%20Tsertsvadze"> Vano Tsertsvadze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Georgian drug policy is directed to reduce the supply of drugs. Retrospective analysis has shown that law enforcement activities have been followed by the expulsion of particular injecting drugs. The demand remains unchanged and drugs are substituted by the hand-made, even more dangerous homemade drugs entered the market. To find out expected new trends on the Georgian drug market, qualitative study was conducted with Georgian drug users to determine drug supply routes. It turned out that drug suppliers and consumers for safety reasons and to protect their anonymity, use Skype to make deals. IT in illegal drug trade is even more sophisticated in the worldwide. Trading with Bitcoins in the Darknet ensures high confidentiality of money transactions and the safe circulation of drugs. In 2014 largest Bitcoin mining enterprise in the world was built in Georgia. We argue that the use of Bitcoins and Darknet by Georgian drug consumers and suppliers will be an incentive to response adequately to the government's policy of restricting supply in order to satisfy market demand for drugs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bitcoin" title="bitcoin">bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=darknet" title=" darknet"> darknet</a>, <a href="https://publications.waset.org/abstracts/search?q=drugs" title=" drugs"> drugs</a>, <a href="https://publications.waset.org/abstracts/search?q=policy" title=" policy "> policy </a> </p> <a href="https://publications.waset.org/abstracts/32113/drugs-silk-road-bitcoins" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32113.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">439</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> HPPDFIM-HD: Transaction Distortion and Connected Perturbation Approach for Hierarchical Privacy Preserving Distributed Frequent Itemset Mining over Horizontally-Partitioned Dataset</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fuad%20Ali%20Mohammed%20Al-Yarimi">Fuad Ali Mohammed Al-Yarimi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Many algorithms have been proposed to provide privacy preserving in data mining. These protocols are based on two main approaches named as: the perturbation approach and the Cryptographic approach. The first one is based on perturbation of the valuable information while the second one uses cryptographic techniques. The perturbation approach is much more efficient with reduced accuracy while the cryptographic approach can provide solutions with perfect accuracy. However, the cryptographic approach is a much slower method and requires considerable computation and communication overhead. In this paper, a new scalable protocol is proposed which combines the advantages of the perturbation and distortion along with cryptographic approach to perform privacy preserving in distributed frequent itemset mining on horizontally distributed data. Both the privacy and performance characteristics of the proposed protocol are studied empirically. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity%20data" title="anonymity data">anonymity data</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20frequent%20itemset%20mining" title=" distributed frequent itemset mining"> distributed frequent itemset mining</a>, <a href="https://publications.waset.org/abstracts/search?q=gaussian%20perturbation" title=" gaussian perturbation"> gaussian perturbation</a>, <a href="https://publications.waset.org/abstracts/search?q=perturbation%20approach" title=" perturbation approach"> perturbation approach</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20preserving%20data%20mining" title=" privacy preserving data mining"> privacy preserving data mining</a> </p> <a href="https://publications.waset.org/abstracts/20805/hppdfim-hd-transaction-distortion-and-connected-perturbation-approach-for-hierarchical-privacy-preserving-distributed-frequent-itemset-mining-over-horizontally-partitioned-dataset" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20805.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">505</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> Secure E-Voting Using Blockchain Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Barkha%20Ramteke">Barkha Ramteke</a>, <a href="https://publications.waset.org/abstracts/search?q=Sonali%20Ridhorkar"> Sonali Ridhorkar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=AMV%20chain" title=" AMV chain"> AMV chain</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title=" electronic voting"> electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralized" title=" decentralized"> decentralized</a> </p> <a href="https://publications.waset.org/abstracts/145724/secure-e-voting-using-blockchain-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> First 1000 Days: Mothers’ Understanding of an Attachment Bond and the Role That It Plays in Early Childhood</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Athena%20Pedro">Athena Pedro</a>, <a href="https://publications.waset.org/abstracts/search?q=Carushca%20de%20Beer"> Carushca de Beer</a>, <a href="https://publications.waset.org/abstracts/search?q=Erin%20Cupido"> Erin Cupido</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarryn%20Johnson"> Tarryn Johnson</a>, <a href="https://publications.waset.org/abstracts/search?q=Tawana%20Keneilwe"> Tawana Keneilwe</a>, <a href="https://publications.waset.org/abstracts/search?q=Crystal%20Stoffels"> Crystal Stoffels</a>, <a href="https://publications.waset.org/abstracts/search?q=Carinne%20Annfred%20Lorraine%20Petersen"> Carinne Annfred Lorraine Petersen</a>, <a href="https://publications.waset.org/abstracts/search?q=Kuan%20Michael%20Truskey"> Kuan Michael Truskey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The early experiences of children during their first 1000 days of life are the main determining factor of their development. Therefore, the aim of this study was to explore mothers' understanding of an attachment bond and the role that it plays in early childhood. A qualitative exploratory research design guided this study. Ethics approval was granted by appropriate ethics committees. Data were gathered through the use of semi-structured interviews with 15 participants within the Cape Town area, South Africa. Participants completed informed consents and were informed of confidentiality, anonymity, their rights, and voluntary participation. Thematically analysed data revealed that many participants were unaware of the term ‘the first 1000 days of a child’s life’; however, they were aware of the methods to be used for forming an attachment bond with their children. There is a need for more awareness on the subject matter within South Africa. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=awareness" title="awareness">awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=children" title=" children"> children</a>, <a href="https://publications.waset.org/abstracts/search?q=first%201000%20days" title=" first 1000 days"> first 1000 days</a>, <a href="https://publications.waset.org/abstracts/search?q=milestones" title=" milestones"> milestones</a>, <a href="https://publications.waset.org/abstracts/search?q=South%20Africa" title=" South Africa"> South Africa</a>, <a href="https://publications.waset.org/abstracts/search?q=understanding" title=" understanding"> understanding</a> </p> <a href="https://publications.waset.org/abstracts/121829/first-1000-days-mothers-understanding-of-an-attachment-bond-and-the-role-that-it-plays-in-early-childhood" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/121829.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">201</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> The Exploration of Preschool Teachers' Understanding of the Role of Socio-Emotional Development in School Readiness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Pedro">A. Pedro</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Goldschmidt"> T. Goldschmidt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Socio-emotional development is considered to be an essential prerequisite for school readiness. To our best knowledge, research on socio-emotional development specifically from the views of teachers in the South African context is limited. This study explored preschool teachers’ understanding of the role that socio-emotional development plays in preparing the child for school. Using the social learning theory, a qualitative approach with an exploratory design was used for the study. A total of 12 preschool teachers from both community-based and school-based preschools were purposively recruited. Upon receiving ethics clearance from the University of the Western Cape and the Western Cape Education Department, semi-structured interviews were conducted and analysed by utilizing Braun and Clarke’s (2006) six phases of thematic analysis. Participants’ rights, anonymity, and confidentiality were upheld throughout the research process. Findings reveal that preschool teachers emphasise the importance of holistic development for school readiness. Teachers deemed socio-emotional development as absolutely crucial for preparing children for school as it eases the transition to formal schooling and adaptation to the classroom environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=early%20childhood" title="early childhood">early childhood</a>, <a href="https://publications.waset.org/abstracts/search?q=preschool%20teachers" title=" preschool teachers"> preschool teachers</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20readiness" title=" school readiness"> school readiness</a>, <a href="https://publications.waset.org/abstracts/search?q=socio-emotional%20development" title=" socio-emotional development"> socio-emotional development</a> </p> <a href="https://publications.waset.org/abstracts/100878/the-exploration-of-preschool-teachers-understanding-of-the-role-of-socio-emotional-development-in-school-readiness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100878.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">141</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> Blockchain for IoT Security and Privacy in Healthcare Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umair%20Shafique">Umair Shafique</a>, <a href="https://publications.waset.org/abstracts/search?q=Hafiz%20Usman%20Zia"> Hafiz Usman Zia</a>, <a href="https://publications.waset.org/abstracts/search?q=Fiaz%20Majeed"> Fiaz Majeed</a>, <a href="https://publications.waset.org/abstracts/search?q=Samina%20Naz"> Samina Naz</a>, <a href="https://publications.waset.org/abstracts/search?q=Javeria%20Ahmed"> Javeria Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Maleeha%20Zainab"> Maleeha Zainab</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IoT" title="IoT">IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title=" cryptocurrency"> cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=consensus" title=" consensus"> consensus</a>, <a href="https://publications.waset.org/abstracts/search?q=data" title=" data"> data</a> </p> <a href="https://publications.waset.org/abstracts/148647/blockchain-for-iot-security-and-privacy-in-healthcare-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">180</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">36</span> Securing Online Voting With Blockchain and Smart Contracts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anant%20Mehrotra">Anant Mehrotra</a>, <a href="https://publications.waset.org/abstracts/search?q=Krish%20Phagwani"> Krish Phagwani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Democratic voting is vital for any country, but current methods like ballot papers or EVMs have drawbacks, including transparency issues, low voter turnout, and security concerns. Blockchain technology offers a potential solution by providing a secure, decentralized, and transparent platform for e-voting. With features like immutability, security, and anonymity, blockchain combined with smart contracts can enhance trust and prevent vote tampering. This paper explores an Ethereum-based e-voting application using Solidity, showcasing a web app that prevents duplicate voting through a token-based system, while also discussing the advantages and limitations of blockchain in digital voting. Voting is a crucial component of democratic decision-making, yet current methods, like paper ballots, remain outdated and inefficient. This paper reviews blockchain-based voting systems, highlighting strategies and guidelines to create a comprehensive electronic voting system that leverages cryptographic techniques, such as zero-knowledge proofs, to enhance privacy. It addresses limitations of existing e-voting solutions, including cost, identity management, and scalability, and provides key insights for organizations looking to design their own blockchain-based voting systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title="electronic voting">electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts" title=" smart contracts"> smart contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain%20nased%20voting" title=" blockchain nased voting"> blockchain nased voting</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/193842/securing-online-voting-with-blockchain-and-smart-contracts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193842.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">8</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">35</span> Quantitative and Qualitative Analysis: Predicting and Improving Students’ Summative Assessment Math Scores at the National College for Nuclear</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelmenen%20Abobghala">Abdelmenen Abobghala</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahmud%20Ahmed"> Mahmud Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Alwaheshi"> Mohamed Alwaheshi</a>, <a href="https://publications.waset.org/abstracts/search?q=Anwar%20Fanan"> Anwar Fanan</a>, <a href="https://publications.waset.org/abstracts/search?q=Meftah%20Mehdawi"> Meftah Mehdawi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Abuhatira"> Ahmed Abuhatira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research aims to predict academic performance and identify weak points in students to aid teachers in understanding their learning needs. Both quantitative and qualitative methods are used to identify difficult test items and the factors causing difficulties. The study uses interventions like focus group discussions, interviews, and action plans developed by the students themselves. The research questions explore the predictability of final grades based on mock exams and assignments, the student's response to action plans, and the impact on learning performance. Ethical considerations are followed, respecting student privacy and maintaining anonymity. The research aims to enhance student engagement, motivation, and responsibility for learning. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=prediction" title="prediction">prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=academic%20performance" title=" academic performance"> academic performance</a>, <a href="https://publications.waset.org/abstracts/search?q=weak%20points" title=" weak points"> weak points</a>, <a href="https://publications.waset.org/abstracts/search?q=understanding" title=" understanding"> understanding</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a>, <a href="https://publications.waset.org/abstracts/search?q=quantitative%20methods" title=" quantitative methods"> quantitative methods</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20methods" title=" qualitative methods"> qualitative methods</a>, <a href="https://publications.waset.org/abstracts/search?q=formative%20assessments" title=" formative assessments"> formative assessments</a>, <a href="https://publications.waset.org/abstracts/search?q=feedback" title=" feedback"> feedback</a>, <a href="https://publications.waset.org/abstracts/search?q=emotional%20responses" title=" emotional responses"> emotional responses</a>, <a href="https://publications.waset.org/abstracts/search?q=intervention" title=" intervention"> intervention</a>, <a href="https://publications.waset.org/abstracts/search?q=focus%20group%20discussion" title=" focus group discussion"> focus group discussion</a>, <a href="https://publications.waset.org/abstracts/search?q=interview" title=" interview"> interview</a>, <a href="https://publications.waset.org/abstracts/search?q=action%20plan" title=" action plan"> action plan</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20engagement" title=" student engagement"> student engagement</a>, <a href="https://publications.waset.org/abstracts/search?q=motivation" title=" motivation"> motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=responsibility" title=" responsibility"> responsibility</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20considerations" title=" ethical considerations"> ethical considerations</a> </p> <a href="https://publications.waset.org/abstracts/170331/quantitative-and-qualitative-analysis-predicting-and-improving-students-summative-assessment-math-scores-at-the-national-college-for-nuclear" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170331.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">34</span> Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Rasslan">Mohamed Rasslan</a>, <a href="https://publications.waset.org/abstracts/search?q=Doaa%20Abdelrahman"> Doaa Abdelrahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20M.%20Nasreldin"> Mahmoud M. Nasreldin</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghada%20Farouk"> Ghada Farouk</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20K.%20Aslan"> Heba K. Aslan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cryptocurrencies" title="Cryptocurrencies">Cryptocurrencies</a>, <a href="https://publications.waset.org/abstracts/search?q=Blockchain" title=" Blockchain"> Blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=Bitcoin" title=" Bitcoin"> Bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=Smart%20Contracts" title=" Smart Contracts"> Smart Contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=Peer-to-Peer%20Network" title=" Peer-to-Peer Network"> Peer-to-Peer Network</a>, <a href="https://publications.waset.org/abstracts/search?q=Security%20Issues" title=" Security Issues"> Security Issues</a>, <a href="https://publications.waset.org/abstracts/search?q=Privacy%20Techniques" title=" Privacy Techniques"> Privacy Techniques</a> </p> <a href="https://publications.waset.org/abstracts/164642/bitcoin-blockchain-and-smart-contract-attacks-and-mitigations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164642.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">33</span> Personality as a Predictor of Knowledge Hiding Behavior: Case Study of Alpha Electronics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sadeeqa%20Khan">Sadeeqa Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Usman"> Muhammad Usman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Employees’ knowledge hiding behaviors can be detrimental to employees’ interpersonal relationships and individual and organizational learning and creativity. However, to the best of the authors’ knowledge, the literature on the contingencies, antecedents and outcomes of employees’ knowledge hiding behaviors is still in its infancy. On the other hand, not everyone who hides knowledge hides it the same way, as individuals are different, so do their behaviors. This study explores the links between employees’ personality traits and their knowledge hiding behaviors. By using a single case study as a research methodology and collecting data through 28 semi-structured interviews from employees working in Alpha Electronics (the pseudo name of the company to ascertain anonymity) operating in Pakistan, we foreground the patterns of relationships between employees’ personality traits and knowledge hiding behaviors – rationalized hiding, evasive hiding and playing dumb. Our findings suggest that employees high on extraversion involve in evasive knowledge hiding; while employees low on extraversion (introverts) demonstrate rationalized hiding. Moreover, both extrovert and introvert employees involve in playing dumb in situations that involve risk for their jobs and careers. For instance, when knowledge is requested from their managers, both extrovert and introvert employees tend to play dumb, as in such cases, evasive and rationalized hiding can be harmful to their job and career-related interests and motives. Other than theoretical contributions, the study offers important implications for organizations faced with the challenges of shortage of skills and knowledge. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=knowledge%20hiding" title="knowledge hiding">knowledge hiding</a>, <a href="https://publications.waset.org/abstracts/search?q=personality" title=" personality"> personality</a>, <a href="https://publications.waset.org/abstracts/search?q=rationalized%20hiding" title=" rationalized hiding"> rationalized hiding</a>, <a href="https://publications.waset.org/abstracts/search?q=playing%20dumb" title=" playing dumb"> playing dumb</a>, <a href="https://publications.waset.org/abstracts/search?q=evasive%20hiding" title=" evasive hiding"> evasive hiding</a> </p> <a href="https://publications.waset.org/abstracts/95392/personality-as-a-predictor-of-knowledge-hiding-behavior-case-study-of-alpha-electronics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95392.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">215</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aulia%20Dwi%20Nastiti">Aulia Dwi Nastiti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=communication%20pattern" title="communication pattern">communication pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=darknet" title=" darknet"> darknet</a>, <a href="https://publications.waset.org/abstracts/search?q=extremist%20groups" title=" extremist groups"> extremist groups</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/42334/the-rise-of-darknet-a-call-for-understanding-online-communication-of-terrorist-groups-in-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42334.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> Web Proxy Detection via Bipartite Graphs and One-Mode Projections</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhipeng%20Chen">Zhipeng Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Peng%20Zhang"> Peng Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Qingyun%20Liu"> Qingyun Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Guo"> Li Guo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bipartite%20graph" title="bipartite graph">bipartite graph</a>, <a href="https://publications.waset.org/abstracts/search?q=one-mode%20projection" title=" one-mode projection"> one-mode projection</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20proxy%20detection" title=" web proxy detection"> web proxy detection</a> </p> <a href="https://publications.waset.org/abstracts/87483/web-proxy-detection-via-bipartite-graphs-and-one-mode-projections" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87483.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">245</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> Utilising an Online Data Collection Platform for the Development of a Community Engagement Database: A Case Study on Building Inter-Institutional Partnerships at UWC</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Daniels">P. Daniels</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Adonis"> T. Adonis</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20September-Brown"> P. September-Brown</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Comalie"> R. Comalie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The community engagement unit at the University of the Western Cape was tasked with establishing a community engagement database. The database would store information of all community engagement projects related to the university. The wealth of knowledge obtained from the various disciplines would be used to facilitate interdisciplinary collaboration within the university, as well as facilitating community university partnership opportunities. The purpose of this qualitative study was to explore electronic data collection through the development of a database. Two types of electronic data collection platforms were used, namely online questionnaire and email. The semi structured questionnaire was used to collect data related to community engagement projects from different faculties and departments at the university. There are many benefits for using an electronic data collection platform, such as reduction of costs and time, ease in reaching large numbers of potential respondents, and the possibility of providing anonymity to participants. Despite all the advantages of using the electronic platform, there were as many challenges, as depicted in our findings. The findings suggest that certain barriers existed by using an electronic platform for data collection, even though it was in an academic environment, where knowledge and resources were in abundance. One of the challenges experienced in this process was the lack of dissemination of information via email to staff within faculties. The actual online software used for the questionnaire had its own limitations, such as only being able to access the questionnaire from the same electronic device. In a few cases, academics only completed the questionnaire after a telephonic prompt or face to face meeting about "Is higher education in South Africa ready to embrace electronic platform in data collection?" <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20engagement" title="community engagement">community engagement</a>, <a href="https://publications.waset.org/abstracts/search?q=database" title=" database"> database</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20collection" title=" data collection"> data collection</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20platform" title=" electronic platform"> electronic platform</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20tools" title=" electronic tools"> electronic tools</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20sharing" title=" knowledge sharing"> knowledge sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=university" title=" university"> university</a> </p> <a href="https://publications.waset.org/abstracts/37745/utilising-an-online-data-collection-platform-for-the-development-of-a-community-engagement-database-a-case-study-on-building-inter-institutional-partnerships-at-uwc" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37745.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">264</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymity&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>