CINXE.COM
Search results for: influence tactics
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: influence tactics</title> <meta name="description" content="Search results for: influence tactics"> <meta name="keywords" content="influence tactics"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="influence tactics" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="influence tactics"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 7760</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: influence tactics</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7760</span> Follower Upward Influence Tactics: A Review of Quantitative Studies </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Najla%20Alshenaifi">Najla Alshenaifi</a>, <a href="https://publications.waset.org/abstracts/search?q=Nicholas%20Clarke"> Nicholas Clarke</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Interest in how followers may influence their leaders in order to achieve their goals can be traced to studies in the late 1970s. The last major review of the literature was published over a decade ago in 2002. It would seem timely then to take stock of the literature and consider what we have learned since then. In so doing, our aim is to derive an empirically-based framework for understanding the effects of upward influence tactics to underpin future research in the field. Many factors are identified as having a major effect on upward influence processes including goals of influence, culture, gender, leadership style and the outcome of influence. A key conclusion from our review is that although upward influence tactics can result in positive outcomes for followers, the results from many studies are more often than inconclusive. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=upward%20influence%20tactics" title="upward influence tactics">upward influence tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=influence%20tactics" title=" influence tactics"> influence tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=influence%20strategies" title=" influence strategies"> influence strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=followership" title=" followership"> followership</a> </p> <a href="https://publications.waset.org/abstracts/15410/follower-upward-influence-tactics-a-review-of-quantitative-studies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15410.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7759</span> The Influence of Online Marketing Tactics in Tourist Destination Reputation: Egypt as a Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alyaa%20Darwish">Alyaa Darwish</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20Burns"> Peter Burns</a>, <a href="https://publications.waset.org/abstracts/search?q=Sofia%20Reino"> Sofia Reino</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Online marketing has been the key focus of attention for the majority of destinations since the Internet became the primarily information tool for travel marketing. Tourism is a reputation-dependent industry; potential travelers who do not have previous experience with the destination face numerous risks during the process of decision-making. An accurate perception of the destination’s reputation helps to minimize risk against unsatisfying travel experiences. However, there has been limited investigation with regards to the reputation of tourist destination. Taking the importance of reputation to the tourism industry, this research aims to: 1) Develop a destination reputation model; 2) Assess the tourist destination approach towards online marketing tactics; 3) Evaluate the impact of differentiated online marketing tactics on reputation; and 4) Measure the potential for using online marketing tactics to manage the destination’s online reputation. This research follows an interpretivism epistemological research approach through using four research methods; interviews, questionnaire, content analysis, and experiment to achieve the research goals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=destination%20reputation" title="destination reputation">destination reputation</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20marketing" title=" online marketing"> online marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=reputation" title=" reputation"> reputation</a>, <a href="https://publications.waset.org/abstracts/search?q=tactics" title=" tactics"> tactics</a> </p> <a href="https://publications.waset.org/abstracts/58959/the-influence-of-online-marketing-tactics-in-tourist-destination-reputation-egypt-as-a-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58959.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">355</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7758</span> The Effect of Socialization Tactics on Job Satisfaction of Employees, Regarding to Personality Types in Tehran University of Medical Science’s Employees</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Hoorzad">Maryam Hoorzad</a>, <a href="https://publications.waset.org/abstracts/search?q=Narges%20Shokry"> Narges Shokry</a>, <a href="https://publications.waset.org/abstracts/search?q=Mandan%20Momeni"> Mandan Momeni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to importance of socialization in effectiveness of organizations and on the other hand assessing the impact of individual differences on socialization tactics by measuring employees satisfaction, can be assessed for each of the personality types which socialization tactics is the more effective. The aim of this paper is to investigate how organizational socialization tactics affect job satisfaction of employees according to personality types. A survey was conducted using a measurement tool based on Van Maanen and Schein’s theory on organizational socialization tactics and Myers Briggs’ measurement tools of personality types. The respondents were employees with more than 3 years backward in Tehran University of Medical Science. Data collection was performed using both library and field, the data collection instrument was questionnaires and data were analysed using the Spss and Lisrel programs. It was found that investiture and serial tactics has a significant effect on employees satisfaction, any increase in investiture and serial tactics led to increase in job satisfaction and any increase in divestiture and disjunctive tactics led to reduction of job satisfaction. Investiture tactic has the most effect on employees satisfaction. Also based on the results, personality types affect the relationship between socialization tactics and job satisfaction. In the ESFJ personality type the effect of investiture tactic on employee satisfaction is the most. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=organizational%20socialization" title="organizational socialization">organizational socialization</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20socialization%20tactics" title=" organizational socialization tactics"> organizational socialization tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=personality%20types" title=" personality types"> personality types</a>, <a href="https://publications.waset.org/abstracts/search?q=job%20satisfaction" title=" job satisfaction"> job satisfaction</a> </p> <a href="https://publications.waset.org/abstracts/3890/the-effect-of-socialization-tactics-on-job-satisfaction-of-employees-regarding-to-personality-types-in-tehran-university-of-medical-sciences-employees" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3890.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">441</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7757</span> Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ananta%20Kumar%20%20Das">Ananta Kumar Das</a>, <a href="https://publications.waset.org/abstracts/search?q=Sujit%20Kumar%20Chakrabarti"> Sujit Kumar Chakrabarti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20architecture" title="software architecture">software architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=architectural%20tactics" title=" architectural tactics"> architectural tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics" title=" detecting architectural tactics"> detecting architectural tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=program%20analysis" title=" program analysis"> program analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=AST" title=" AST"> AST</a>, <a href="https://publications.waset.org/abstracts/search?q=alias%20analysis" title=" alias analysis"> alias analysis</a> </p> <a href="https://publications.waset.org/abstracts/117825/detecting-heartbeat-architectural-tactic-in-source-code-using-program-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7756</span> Self-Marketing on Line Person-to-Person Social Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chih-Ping%20Chen">Chih-Ping Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, technology does not necessitate change; rather, social media has afforded a new arena and digital tools for users/individuals to be symbolized and marketed in meaningful exchanges of digital identities. We argue that these symbolic interactions may afford individuals the ability to create and present less restricted Line person-to-person (P2P) chats than would be possible in face-to-face communications. Individuals can select flexible influence strategies to market themselves, which enables them to create and present their digital identities and impressions in alternative ways within a dynamic sociocultural context. Therefore, this paper aims to explore the novel phenomenon of how individuals market themselves to manage their digital identities and impressions to connect with other users through the symbolic interactions created by new digital tools (e.g., stickers). A netnographic approach was developed by applying a triangulated methodology consisting of user self-diary reports, in-depth interviews, and observations. Totally, 20 participants (10 females and 10 males) were of Taiwanese origin, and their ages ranged from 20–47 years old. The findings of this research showed that individuals on Line P2P social media where traditional cultural gender norms have shifted. Both male and female participants market their modern digital identities by adopting a combination of flexible influence tactics/strategies when using digital stickers. Some findings showed that their influence tactics/strategies often flouted Taiwanese cultural gender norms or skirted traditional rules to fit individual or P2P needs. Finally, these findings potentially contributed to the literature regarding the consumer culture theory and symbolic interaction theory in digital marketing and social media fields. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Consumer%20culture%20theory" title="Consumer culture theory">Consumer culture theory</a>, <a href="https://publications.waset.org/abstracts/search?q=Digital%20sticker" title=" Digital sticker"> Digital sticker</a>, <a href="https://publications.waset.org/abstracts/search?q=Self-marketing" title=" Self-marketing"> Self-marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=Impression" title=" Impression"> Impression</a>, <a href="https://publications.waset.org/abstracts/search?q=Symbolic%20interaciton" title=" Symbolic interaciton"> Symbolic interaciton</a> </p> <a href="https://publications.waset.org/abstracts/165161/self-marketing-on-line-person-to-person-social-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7755</span> Social Movements and the Diffusion of Tactics and Repertoires: Activists' Network in Anti-Globalism Movement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kyoko%20Tominaga">Kyoko Tominaga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Non-Government Organizations (NGOs), Non-Profit Organizations (NPOs), Social Enterprises and other actors play an important role in political decisions in governments at the international levels. Especially, such organizations’ and activists’ network in civil society is quite important to effect to the global politics. To solve the complex social problems in global era, diverse actors should corporate each other. Moreover, network of protesters is also contributes to diffuse tactics, information and other resources of social movements. Based on the findings from the study of International Trade Fairs (ITFs), the author analyzes the network of activists in anti-globalism movement. This research focuses the transition of 54 activists’ whole network in the “protest event” against 2008 G8 summit in Japan. Their network is examined at the three periods: Before protest event phase, during protest event phase and after event phase. A mixed method is used in this study: the author shows the hypothesis from social network analysis and evaluates that with interview data analysis. This analysis gives the two results. Firstly, the more protesters participate to the various events during the protest event, the more they build the network. After that, active protesters keep their network as well. From interview data, we can understand that the active protesters can build their network and diffuse the information because they communicate with other participants and understand that diverse issues are related. This paper comes to same conclusion with previous researches: protest events activate the network among the political activists. However, some participants succeed to build their network, others do not. “Networked” activists are participated in the various events for short period of time and encourage the diffusion of information and tactics of social movements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20movement" title="social movement">social movement</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20justice%20movement" title=" global justice movement"> global justice movement</a>, <a href="https://publications.waset.org/abstracts/search?q=tactics" title=" tactics"> tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=diffusion" title=" diffusion"> diffusion</a> </p> <a href="https://publications.waset.org/abstracts/10307/social-movements-and-the-diffusion-of-tactics-and-repertoires-activists-network-in-anti-globalism-movement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10307.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">383</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7754</span> Variability of the Speaker's Verbal and Non-Verbal Behaviour in the Process of Changing Social Roles in the English Marketing Discourse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuliia%20Skrynnik">Yuliia Skrynnik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research focuses on the interaction of verbal, non-verbal, and super-verbal communicative components used by the speaker changing social roles in the marketing discourse. The changing/performing of social roles is implemented through communicative strategies and tactics, the structural, semantic, and linguo-pragmatic means of which are characterized by specific features and differ for the performance of either a role of a supplier or a customer. Communication within the marketing discourse is characterized by symmetrical roles’ relation between communicative opponents. The strategy of a supplier’s social role realization and the strategy of a customer’s role realization influence the discursive personality's linguistic repertoire in the marketing discourse. This study takes into account that one person can be both a supplier and a customer under different circumstances, thus, exploring the one individual who can be both a supplier and a customer. Cooperative and non-cooperative tactics are the instruments for the implementation of these strategies. In the marketing discourse, verbal and non-verbal behaviour of the speaker performing a customer’s social role is highly informative for speakers who perform the role of a supplier. The research methods include discourse, context-situational, pragmalinguistic, pragmasemantic analyses, the method of non-verbal components analysis. The methodology of the study includes 5 steps: 1) defining the configurations of speakers’ social roles on the selected material; 2) establishing the type of the discourse (marketing discourse); 3) describing the specific features of a discursive personality as a subject of the communication in the process of social roles realization; 4) selecting the strategies and tactics which direct the interaction in different roles configurations; 5) characterizing the structural, semantic and pragmatic features of the strategies and tactics realization, including the analysis of interaction between verbal and non-verbal components of communication. In the marketing discourse, non-verbal behaviour is usually spontaneous but not purposeful. Thus, the adequate decoding of a partner’s non-verbal behavior provides more opportunities both for the supplier and the customer. Super-verbal characteristics in the marketing discourse are crucial in defining the opponent's social status and social role at the initial stage of interaction. The research provides the scenario of stereotypical situations of the play of a supplier and a customer. The performed analysis has perspectives for further research connected with the study of discursive variativity of speakers' verbal and non-verbal behaviour considering the intercultural factor influencing the process of performing the social roles in the marketing discourse; and the formation of the methods for the scenario construction of non-stereotypical situations of social roles realization/change in the marketing discourse. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discursive%20personality" title="discursive personality">discursive personality</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing%20discourse" title=" marketing discourse"> marketing discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=non-verbal%20component%20of%20communication" title=" non-verbal component of communication"> non-verbal component of communication</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20role" title=" social role"> social role</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy"> strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=super-verbal%20component%20of%20communication" title=" super-verbal component of communication"> super-verbal component of communication</a>, <a href="https://publications.waset.org/abstracts/search?q=tactic" title=" tactic"> tactic</a>, <a href="https://publications.waset.org/abstracts/search?q=verbal%20component%20of%20communication" title=" verbal component of communication"> verbal component of communication</a> </p> <a href="https://publications.waset.org/abstracts/115524/variability-of-the-speakers-verbal-and-non-verbal-behaviour-in-the-process-of-changing-social-roles-in-the-english-marketing-discourse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/115524.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7753</span> Ethics and Military Defections in Nonviolent Resistance Campaigns </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adi%20Levy">Adi Levy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=culpability" title="culpability">culpability</a>, <a href="https://publications.waset.org/abstracts/search?q=defections" title=" defections"> defections</a>, <a href="https://publications.waset.org/abstracts/search?q=nonviolence" title=" nonviolence"> nonviolence</a>, <a href="https://publications.waset.org/abstracts/search?q=permissibility" title=" permissibility"> permissibility</a> </p> <a href="https://publications.waset.org/abstracts/117792/ethics-and-military-defections-in-nonviolent-resistance-campaigns" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117792.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">117</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7752</span> Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cecil%20Blake">Cecil Blake</a>, <a href="https://publications.waset.org/abstracts/search?q=Tolu%20Kayode-Adedeji"> Tolu Kayode-Adedeji</a>, <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Chiluwa"> Innocent Chiluwa</a>, <a href="https://publications.waset.org/abstracts/search?q=Charles%20Iruonagbe"> Charles Iruonagbe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism" title="counter-terrorism">counter-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=discourse" title=" discourse"> discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/26075/engaging-the-terrorism-problematique-in-africa-discursive-and-non-discursive-approaches-to-counter-terrorism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26075.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">486</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7751</span> The Paradox of Decentralization and Civic Culture: An Exploratory Study Applied to Local Governments in Papua New Guinea</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francis%20Wargirai">Francis Wargirai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since gaining independence in 1975, Papua New Guinea`s core challenge has been the consolidation of democracy against a backdrop of enormous social, political and territorial diversity. Consequently, the government has implemented several political reforms including decentralization. Constitutional planners believed that national unity, would be better achieved by sharing state power over centralization. They anticipated that this would institutionalize a democratic civic culture by providing opportunities to groups and individuals to make political decisions within their jurisdiction. This would then eventually lead to confidence and participation in the larger entity of the state. In retrospect, civil society and community based groups are largely underrated and have had minimal influence on decisions at the local level, consequently contributing to nepotism, patronism and cynicism. By applying an elitist approach to analyze how national political leaders exert their influence and power within the local government system and local communities, this paper argues that decentralization has fragmented local communities. With an absence of political party roots and deeply divided ethnic groups, national political leaders have used divide and rule tactics resulting in mistrust among citizens. Through their influence and power within local governments to dictate projects and services to certain areas, this has resulted in skepticism and divisions among civil society along different cultural cleavages. This has been a contributing factor to anomalies in democratic consolidation and democratic political culture in Papua New Guinea. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=civic%20culture" title="civic culture">civic culture</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20cleavages" title=" cultural cleavages"> cultural cleavages</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralization" title=" decentralization"> decentralization</a>, <a href="https://publications.waset.org/abstracts/search?q=democratic%20consolidation" title=" democratic consolidation"> democratic consolidation</a> </p> <a href="https://publications.waset.org/abstracts/86432/the-paradox-of-decentralization-and-civic-culture-an-exploratory-study-applied-to-local-governments-in-papua-new-guinea" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86432.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">174</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7750</span> A Contemporary Advertising Strategy on Social Networking Sites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20S.%20Aparna">M. S. Aparna</a>, <a href="https://publications.waset.org/abstracts/search?q=Pushparaj%20Shetty%20D."> Pushparaj Shetty D. </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays social networking sites have become so popular that the producers or the sellers look for these sites as one of the best options to target the right audience to market their products. There are several tools available to monitor or analyze the social networks. Our task is to identify the right community web pages and find out the behavior analysis of the members by using these tools and formulate an appropriate strategy to market the products or services to achieve the set goals. The advertising becomes more effective when the information of the product/ services come from a known source. The strategy explores great buying influence in the audience on referral marketing. Our methodology proceeds with critical budget analysis and promotes viral influence propagation. In this context, we encompass the vital bits of budget evaluation such as the number of optimal seed nodes or primary influential users activated onset, an estimate coverage spread of nodes and maximum influence propagating distance from an initial seed to an end node. Our proposal for Buyer Prediction mathematical model arises from the urge to perform complex analysis when the probability density estimates of reliable factors are not known or difficult to calculate. Order Statistics and Buyer Prediction mapping function guarantee the selection of optimal influential users at each level. We exercise an efficient tactics of practicing community pages and user behavior to determine the product enthusiasts on social networks. Our approach is promising and should be an elementary choice when there is little or no prior knowledge on the distribution of potential buyers on social networks. In this strategy, product news propagates to influential users on or surrounding networks. By applying the same technique, a user can search friends who are capable to advise better or give referrals, if a product interests him. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=viral%20marketing" title="viral marketing">viral marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20network%20analysis" title=" social network analysis"> social network analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=community%20web%20pages" title=" community web pages"> community web pages</a>, <a href="https://publications.waset.org/abstracts/search?q=buyer%20prediction" title=" buyer prediction"> buyer prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=influence%20propagation" title=" influence propagation"> influence propagation</a>, <a href="https://publications.waset.org/abstracts/search?q=budget%20constraints" title=" budget constraints"> budget constraints</a> </p> <a href="https://publications.waset.org/abstracts/30985/a-contemporary-advertising-strategy-on-social-networking-sites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30985.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">262</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7749</span> Comparing and Contrasting Western and Eastern Ways of War: Building a Universal Strategic Theory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adam%20Kok%20Wey%20Leong">Adam Kok Wey Leong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The comparison between the Western ways of war and Eastern ways of war has raised contemporary debates on the validity of these arguments. The Western way of war is popularly propounded by Victor Davis Hanson as originating from the Greek hoplite tactics, direct military maneuvers, democratic principles and social freedom and cohesion that has continued to yield military success for the Western powers for centuries. On the other hand, the Eastern way of war has been deemed as relying on indirect tactics, deception, and ruses. This often accepted notion of the divide between Western and Eastern style does not sustain in view of the available classical strategic texts from both sides from the same period that has proposed similar principles of warfare. This paper analyses the similarities between classical strategic texts on war from the Eastern perspective namely Sun Tzu’s Art of War with a similar temporal strategic text from the West which is Sextus Iuluis Frontinus’s Stratagematon, and deduces answers to this core research question - Does the hypothesis of the existence of distinctive Western and Eastern ways of warfare stands? The main thesis advanced by this research is that ways of warfare share universal principles, and it transcends cultural and spatial boundaries. Warfare is a human endeavour, and the same moral actions guide humans from different geo-cultural spheres in warfare’s objectives, which are winning over an enemy in the most economical way and serve as a mean to an end. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ways%20of%20warfare" title="ways of warfare">ways of warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20culture" title=" strategic culture"> strategic culture</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy"> strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=Sun%20Tzu" title=" Sun Tzu"> Sun Tzu</a>, <a href="https://publications.waset.org/abstracts/search?q=frontinus" title=" frontinus"> frontinus</a> </p> <a href="https://publications.waset.org/abstracts/72152/comparing-and-contrasting-western-and-eastern-ways-of-war-building-a-universal-strategic-theory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72152.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">471</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7748</span> Integrated Risk Management as a Framework for Organisational Success</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olakunle%20Felix%20Adekunle">Olakunle Felix Adekunle</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Risk management is recognised as an essential tool to tackle the inevitable uncertainty associated with business and projects at all levels. But it frequently fails to meet expectations, with projects continuing to run late, over budget or under performing, and business is not gaining the expected benefits. The evident disconnect which often occurs between strategic vision and tactical project delivery typically arises from poorly defined project objectives and inadequate attention to the proactive management of risks that could affect those objectives. One of the main failings in the traditional approach to risk management arises from a narrow focus on the downside, restricted to the technical or operational field, addressing tactical threats to processes, performance or people. This shortcoming can be overcome by widening the scope of risk management to encompass both strategic risks and upside opportunities, creating an integrated approach which can bridge the gap between strategy and tactics. Integrated risk management addresses risk across a variety of levels in the organisation, including strategy and tactics, and covering both opportunity and threat. Effective implementation of integrated risk management can produce a number of benefits to the organisation which are not available from the typical limited-scope risk process. This paper explores how to expand risk management to deliver strategic advantage while retaining its use as a tactical tool. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=risk%20management" title="risk management">risk management</a>, <a href="https://publications.waset.org/abstracts/search?q=success" title=" success"> success</a>, <a href="https://publications.waset.org/abstracts/search?q=organization" title=" organization"> organization</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy"> strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=project" title=" project"> project</a>, <a href="https://publications.waset.org/abstracts/search?q=tactis" title=" tactis"> tactis</a>, <a href="https://publications.waset.org/abstracts/search?q=vision" title=" vision"> vision</a> </p> <a href="https://publications.waset.org/abstracts/40821/integrated-risk-management-as-a-framework-for-organisational-success" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40821.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">397</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7747</span> Football Smart Coach: Analyzing Corner Kicks Using Computer Vision</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arth%20Bohra">Arth Bohra</a>, <a href="https://publications.waset.org/abstracts/search?q=Marwa%20Mahmoud"> Marwa Mahmoud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we utilize computer vision to develop a tool for youth coaches to formulate set-piece tactics for their players. We used the Soccernet database to extract the ResNet features and camera calibration data for over 3000 corner kick across 500 professional matches in the top 6 European leagues (English Premier League, UEFA Champions League, Ligue 1, La Liga, Serie A, Bundesliga). Leveraging the provided homography matrix, we construct a feature vector representing the formation of players on these corner kicks. Additionally, labeling the videos manually, we obtained the pass-trajectory of each of the 3000+ corner kicks by segmenting the field into four zones. Next, after determining the localization of the players and ball, we used event data to give the corner kicks a rating on a 1-4 scale. By employing a Convolutional Neural Network, our model managed to predict the success of a corner kick given the formations of players. This suggests that with the right formations, teams can optimize the way they approach corner kicks. By understanding this, we can help coaches formulate set-piece tactics for their own teams in order to maximize the success of their play. The proposed model can be easily extended; our method could be applied to even more game situations, from free kicks to counterattacks. This research project also gives insight into the myriad of possibilities that artificial intelligence possesses in transforming the domain of sports. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=soccer" title="soccer">soccer</a>, <a href="https://publications.waset.org/abstracts/search?q=corner%20kicks" title=" corner kicks"> corner kicks</a>, <a href="https://publications.waset.org/abstracts/search?q=AI" title=" AI"> AI</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20vision" title=" computer vision"> computer vision</a> </p> <a href="https://publications.waset.org/abstracts/146233/football-smart-coach-analyzing-corner-kicks-using-computer-vision" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146233.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">174</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7746</span> Understanding the Influence of Sensory Attributes on Wine Price</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jingxian%20An">Jingxian An</a>, <a href="https://publications.waset.org/abstracts/search?q=Wei%20Yu"> Wei Yu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The commercial value (retail price) of wine is mostly determined by the wine quality, ageing potential, and oak influence. This paper reveals that wine quality, ageing potential, and oak influence are favourably correlated, hence positively influencing the commercial value of Pinot noir wines. Oak influence is the most influential of these three sensory attributes on the price set by wine traders and estimated by experienced customers. In the meanwhile, this study gives winemakers with chemical instructions for raising total phenolics, which can improve wine quality, ageing potential, and oak influence, all of which can increase a wine’s economic worth. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=retail%20price" title="retail price">retail price</a>, <a href="https://publications.waset.org/abstracts/search?q=ageing%20potential" title=" ageing potential"> ageing potential</a>, <a href="https://publications.waset.org/abstracts/search?q=wine%20quality" title=" wine quality"> wine quality</a>, <a href="https://publications.waset.org/abstracts/search?q=oak%20influence" title=" oak influence"> oak influence</a> </p> <a href="https://publications.waset.org/abstracts/154270/understanding-the-influence-of-sensory-attributes-on-wine-price" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154270.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7745</span> Emotional Intelligence: A Panacea in the Management and Marketing of Hospitality and Tourism Good and Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Azugama">M. Azugama</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Okoro%20Ugo%20Chigozie"> P. Okoro Ugo Chigozie</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20O.%20Nnamocha"> A. O. Nnamocha </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Emotional Intelligence constitutes powerful psychological forces that can strongly influence performance in behaviour, interaction and relationship management. Surprisingly how emotions are interpreted and employed in marketing of hospitality experience have had limited comprehension. Marketing of hospitality experiences have important emotional dimensions which the traditional marketing techniques tend to underplay. Guest and host relationship are challenged by mutual hospitableness obligations; suggesting that the commercial practice of delivering satisfactory guest experience has much to gain from traditional understanding of hospitality. By understanding the emotion-based hospitality transaction between guests and hosts, customers’ experiences can be delivered over and against competitor pressure. In this paper, marketing strategies and tactics in hospitality and tourism are principally concerned with adjusting each of the 6P & T elements (i.e. product, place, price and promotion; and adding people, processes and Time in service contexts), to provide a competitive offer (experience) to customers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emotional%20intelligence" title="Emotional intelligence">Emotional intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=hospitality%20and%20tourism" title=" hospitality and tourism"> hospitality and tourism</a>, <a href="https://publications.waset.org/abstracts/search?q=relationship%20management" title=" relationship management"> relationship management</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing" title=" marketing "> marketing </a> </p> <a href="https://publications.waset.org/abstracts/21084/emotional-intelligence-a-panacea-in-the-management-and-marketing-of-hospitality-and-tourism-good-and-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21084.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">472</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7744</span> Human Trafficking the Kosovar Perspective of Fighting the Phenomena through Police and Civil Society Cooperation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samedin%20Mehmeti">Samedin Mehmeti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rationale behind this study is considering combating and preventing the phenomenon of trafficking in human beings from a multidisciplinary perspective that involves many layers of the society. Trafficking in human beings is an abhorrent phenomenon highly affecting negatively the victims and their families in both human and material aspect, sometimes causing irreversible damages. The longer term effects of this phenomenon, in countries with a weak economic development and extremely young and dynamic population, such as Kosovo, without proper measures to prevented and control can cause tremendous damages in the society. Given the fact that a complete eradication of this phenomenon is almost impossible, efforts should be concentrated at least on the prevention and controlling aspects. Treating trafficking in human beings based on traditional police tactics, methods and proceedings cannot bring satisfactory results. There is no doubt that a multi-disciplinary approach is an irreplaceable requirement, in other words, a combination of authentic and functional proactive and reactive methods, techniques and tactics. Obviously, police must exercise its role in preventing and combating trafficking in human beings, a role sanctioned by the law, however, police role and contribution cannot by any means considered complete if all segments of the society are not included in these efforts. Naturally, civil society should have an important share in these collaborative and interactive efforts especially in preventive activities such as: awareness on trafficking risks and damages, proactive engagement in drafting appropriate legislation and strategies, law enforcement monitoring and direct or indirect involvement in protective and supporting activities which benefit the victims of trafficking etc. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=civil%20society" title="civil society">civil society</a>, <a href="https://publications.waset.org/abstracts/search?q=cooperation" title=" cooperation"> cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=police" title=" police"> police</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20trafficking" title=" human trafficking"> human trafficking</a> </p> <a href="https://publications.waset.org/abstracts/23296/human-trafficking-the-kosovar-perspective-of-fighting-the-phenomena-through-police-and-civil-society-cooperation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23296.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">364</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7743</span> Influence Maximization in Dynamic Social Networks and Graphs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gkolfo%20I.%20Smani">Gkolfo I. Smani</a>, <a href="https://publications.waset.org/abstracts/search?q=Vasileios%20Megalooikonomou"> Vasileios Megalooikonomou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social influence and influence diffusion have been studied in social networks. However, most existing tasks on this subject focus on static networks. In this paper, the problem of maximizing influence diffusion in dynamic social networks, i.e., the case of networks that change over time, is studied. The DM algorithm is an extension of the MATI algorithm and solves the influence maximization (IM) problem in dynamic networks and is proposed under the linear threshold (LT) and independent cascade (IC) models. Experimental results show that our proposed algorithm achieves a diffusion performance better by 1.5 times than several state-of-the-art algorithms and comparable results in diffusion scale with the Greedy algorithm. Also, the proposed algorithm is 2.4 times faster than previous methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=influence%20maximization" title="influence maximization">influence maximization</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20social%20networks" title=" dynamic social networks"> dynamic social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=diffusion" title=" diffusion"> diffusion</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20influence" title=" social influence"> social influence</a>, <a href="https://publications.waset.org/abstracts/search?q=graphs" title=" graphs"> graphs</a> </p> <a href="https://publications.waset.org/abstracts/142457/influence-maximization-in-dynamic-social-networks-and-graphs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142457.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">239</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7742</span> Impact of the Currency Devaluation on Contractors in Egypt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mariam%20Zahwy">Mariam Zahwy</a>, <a href="https://publications.waset.org/abstracts/search?q=Waleed%20El%20Nemr"> Waleed El Nemr</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Samer%20Ezeldin"> A. Samer Ezeldin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In 2016, the depreciation of the Egyptian pound (EGP) had a substantial impact on Egypt's construction industry. Studies assessing this influence are scarce, though. The impact of devaluation on contractors is measured in this study using empirical data. The difficulties contractors have as a result of rising import material costs, limited financing alternatives, and inflationary pressures are also determined by analyzing survey responses from contractors and industry experts. The approaches contractors utilize to lessen the impact of devaluation are also examined in the research. The survey results show how currency depreciation directly affects contractors in the Egyptian construction industry in terms of financial consequences. Inflationary pressures, fewer financing alternatives, and rising expenses have all affected contractors. To minimize losses, contractors have, nonetheless, put a number of tactics into practice. These findings highlight the importance of understanding and managing the impact of devaluation on the construction industry to ensure its resilience and development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construction" title="construction">construction</a>, <a href="https://publications.waset.org/abstracts/search?q=devaluation" title=" devaluation"> devaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=contractors" title=" contractors"> contractors</a>, <a href="https://publications.waset.org/abstracts/search?q=material%20costs" title=" material costs"> material costs</a>, <a href="https://publications.waset.org/abstracts/search?q=inflationary%20pressures" title=" inflationary pressures"> inflationary pressures</a>, <a href="https://publications.waset.org/abstracts/search?q=empirical%20data" title=" empirical data"> empirical data</a>, <a href="https://publications.waset.org/abstracts/search?q=quantitative%20research" title=" quantitative research"> quantitative research</a> </p> <a href="https://publications.waset.org/abstracts/192557/impact-of-the-currency-devaluation-on-contractors-in-egypt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192557.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7741</span> A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raya%20Al%20Khayari">Raya Al Khayari</a>, <a href="https://publications.waset.org/abstracts/search?q=Rasha%20Al%20Jassim"> Rasha Al Jassim</a>, <a href="https://publications.waset.org/abstracts/search?q=Muna%20Al%20Balushi"> Muna Al Balushi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Al%20Moqbali"> Fatma Al Moqbali</a>, <a href="https://publications.waset.org/abstracts/search?q=Said%20El%20Hajjar"> Said El Hajjar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=civil-id%20disclosure" title="civil-id disclosure">civil-id disclosure</a>, <a href="https://publications.waset.org/abstracts/search?q=awareness" title=" awareness"> awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=linear%20regression" title=" linear regression"> linear regression</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20regression" title=" multiple regression"> multiple regression</a> </p> <a href="https://publications.waset.org/abstracts/185886/a-study-of-user-awareness-and-attitudes-towards-civil-id-authentication-in-omans-electronic-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185886.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">57</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7740</span> Fuzzy Multi-Criteria Decision-Making Based on Ignatian Discernment Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pathinathan%20Theresanathan">Pathinathan Theresanathan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ajay%20Minj"> Ajay Minj</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ignatian Discernment Process (IDP) is an intense decision-making tool to decide on life-issues. Decisions are influenced by various factors outside of the decision maker and inclination within. This paper develops IDP in the context of Fuzzy Multi-criteria Decision Making (FMCDM) process. Extended VIKOR method is a decision-making method which encompasses even conflict situations and accommodates weightage to various issues. Various aspects of IDP, namely three ways of decision making and tactics of inner desires, are observed, analyzed and articulated within the frame work of fuzzy rules. The decision-making situations are broadly categorized into two types. The issues outside of the decision maker influence the person. The inner feeling also plays vital role in coming to a conclusion. IDP integrates both the categories using Extended VIKOR method. Case studies are carried out and analyzed with FMCDM process. Finally, IDP is verified with an illustrative case study and results are interpreted. A confused person who could not come to a conclusion is able to take decision on a concrete way of life through IDP. The proposed IDP model recommends an integrated and committed approach to value-based decision making. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AHP" title="AHP">AHP</a>, <a href="https://publications.waset.org/abstracts/search?q=FMCDM" title=" FMCDM"> FMCDM</a>, <a href="https://publications.waset.org/abstracts/search?q=IDP" title=" IDP"> IDP</a>, <a href="https://publications.waset.org/abstracts/search?q=ignatian%20discernment" title=" ignatian discernment"> ignatian discernment</a>, <a href="https://publications.waset.org/abstracts/search?q=MCDM" title=" MCDM"> MCDM</a>, <a href="https://publications.waset.org/abstracts/search?q=VIKOR" title=" VIKOR"> VIKOR</a> </p> <a href="https://publications.waset.org/abstracts/89096/fuzzy-multi-criteria-decision-making-based-on-ignatian-discernment-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89096.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">260</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7739</span> Modeling Influence on Petty Corruption Attitudes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nina%20Bijedic">Nina Bijedic</a>, <a href="https://publications.waset.org/abstracts/search?q=Drazena%20Gaspar"> Drazena Gaspar</a>, <a href="https://publications.waset.org/abstracts/search?q=Mirsad%20Hadzikadic"> Mirsad Hadzikadic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Corruption is an influential and widespread problem. One part of it is so-called petty corruption, related to large-scale bribe giving by ordinary citizens trying to influence the works of public administration or public services. As it is with all means of corruption, petty corruption is related to the level of democracy (or administration efficiency) in a society. The developed model captures some of the factors related to corruptive behavior, as well as people’s attitude towards petty corruption. It has four basic elements: user’s perception of corruption in the society of interest, the influence of social interactions, the influence of penalizing mechanism, and influence of campaigns against petty corruption. The model is agent-based, developed in NetLogo, with a lot of random settings that provide a wider scope of responses. Interactions of different settings for variables of elements provide insight into the influence of each element on attitude towards petty corruption, as well as petty corruptive behavior. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=agent-based%20model" title="agent-based model">agent-based model</a>, <a href="https://publications.waset.org/abstracts/search?q=attitude" title=" attitude"> attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=influence" title=" influence"> influence</a>, <a href="https://publications.waset.org/abstracts/search?q=petty%20corruption" title=" petty corruption"> petty corruption</a>, <a href="https://publications.waset.org/abstracts/search?q=society" title=" society"> society</a> </p> <a href="https://publications.waset.org/abstracts/93444/modeling-influence-on-petty-corruption-attitudes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93444.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">199</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7738</span> Closing down the Loop Holes: How North Korea and Other Bad Actors Manipulate Global Trade in Their Favor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Leo%20Byrne">Leo Byrne</a>, <a href="https://publications.waset.org/abstracts/search?q=Neil%20Watts"> Neil Watts</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the complex and evolving landscape of global trade, maritime sanctions emerge as a critical tool wielded by the international community to curb illegal activities and alter the behavior of non-compliant states and entities. These sanctions, designed to restrict or prohibit trade by sea with sanctioned jurisdictions, entities, or individuals, face continuous challenges due to the sophisticated evasion tactics employed by countries like North Korea. As the Democratic People's Republic of Korea (DPRK) diverts significant resources to circumvent these measures, understanding the nuances of their methodologies becomes imperative for maintaining the integrity of global trade systems. The DPRK, one of the most sanctioned nations globally, has developed an intricate network to facilitate its trade in illicit goods, ensuring the flow of revenue from designated activities continues unabated. Given its geographic and economic conditions, North Korea predominantly relies on maritime routes, utilizing foreign ports to route its illicit trade. This reliance on the sea is exploited through various sophisticated methods, including the use of front companies, falsification of documentation, commingling of bulk cargos, and physical alterations to vessels. These tactics enable the DPRK to navigate through the gaps in regulatory frameworks and lax oversight, effectively undermining international sanctions regimes Maritime sanctions carry significant implications for global trade, imposing heightened risks in the maritime domain. The deceptive practices employed not only by the DPRK but also by other high-risk jurisdictions, necessitate a comprehensive understanding of UN targeted sanctions. For stakeholders in the maritime sector—including maritime authorities, vessel owners, shipping companies, flag registries, and financial institutions serving the shipping industry—awareness and compliance are paramount. Violations can lead to severe consequences, including reputational damage, sanctions, hefty fines, and even imprisonment. To mitigate risks associated with these deceptive practices, it is crucial for maritime sector stakeholders to employ rigorous due diligence and regulatory compliance screening measures. Effective sanctions compliance serves as a protective shield against legal, financial, and reputational risks, preventing exploitation by international bad actors. This requires not only a deep understanding of the sanctions landscape but also the capability to identify and manage risks through informed decision-making and proactive risk management practices. As the DPRK and other sanctioned entities continue to evolve their sanctions evasion tactics, the international community must enhance its collective efforts to demystify and counter these practices. By leveraging more stringent compliance measures, stakeholders can safeguard against the illicit use of the maritime domain, reinforcing the effectiveness of maritime sanctions as a tool for global security. This paper seeks to dissect North Korea's adaptive strategies in the face of maritime sanctions. By examining up-to-date, geographically, and temporally relevant case studies, it aims to shed light on the primary nodes through which Pyongyang evades sanctions and smuggles goods via third-party ports. The goal is to propose multi-level interaction strategies, ranging from governmental interventions to localized enforcement mechanisms, to counteract these evasion tactics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=maritime" title="maritime">maritime</a>, <a href="https://publications.waset.org/abstracts/search?q=maritime%20sanctions" title=" maritime sanctions"> maritime sanctions</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20sanctions" title=" international sanctions"> international sanctions</a>, <a href="https://publications.waset.org/abstracts/search?q=compliance" title=" compliance"> compliance</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a> </p> <a href="https://publications.waset.org/abstracts/183003/closing-down-the-loop-holes-how-north-korea-and-other-bad-actors-manipulate-global-trade-in-their-favor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183003.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">70</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7737</span> The Effects of the “War on Drugs” on Black and Latino Youth</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aniya%20Everette">Aniya Everette</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In June of 1971, President Richard Nixon made his first public declaration regarding the “War on Drugs,” deeming it America’s number one public enemy. Since then, the drug war has been a divisive topic in the US. Black and brown children have been unfairly targeted and imprisoned at alarming rates as a result of this policy, which has had a negative effect on them. Black and Latino youth have faced significant obstacles that have impacted their educational opportunities, employment prospects, and general quality of life due to harsh mandatory sentences, aggressive policing tactics, and racial profiling. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=war" title="war">war</a>, <a href="https://publications.waset.org/abstracts/search?q=drugs" title=" drugs"> drugs</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=racial%20profiling" title=" racial profiling"> racial profiling</a> </p> <a href="https://publications.waset.org/abstracts/166787/the-effects-of-the-war-on-drugs-on-black-and-latino-youth" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166787.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7736</span> Hidden Truths of Advertising: An Unspoken Fact in Making Ethical Diffusions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mustafa%20Hyder">Mustafa Hyder</a>, <a href="https://publications.waset.org/abstracts/search?q=Shamaila%20Burney"> Shamaila Burney</a>, <a href="https://publications.waset.org/abstracts/search?q=Roohi%20Mumtaz"> Roohi Mumtaz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study is to determine the consequences of silent or hidden messages and their effectiveness in deteriorating or altering our ethical norms and values. The study also focuses the repercussions of subconscious messages and possibilities of ethical diffusion in our society. The research based on the question that what are the different factors that motivate advertisers to include subliminal messages and how much these unspoken truths affecting our ethical values silently. What are the causes and effects of the subliminal messages in general and the level of ethical diffusion and its acceptance? The concept of advertising is to promote and highlight the salient features of the products and services, a company offers. Advertising is the best option nowadays to convey the related information to the consumers so that they attracted more towards the products or services proposed. The other thing advertisers concentrate, is the psychological characteristics using to persuade consumers choice. Using skills and tactics of advertising to promote a product in such a way that it creates a sensation, controversy or brand consciousness among the consumers or customers. The purpose to have increase purchase or to gain popularity in comparison to their competitors, they sometimes use such tactics and techniques, which is highly unethical and immoral for any society. These kinds of stuff used very smartly within the ads that only the conscious mind subconsciously catches the meaning of those glittery images, posters, phrases, tag lines and non-verbal clues. This study elucidates the subliminal advertising their repercussions and impact on consumer’s behaviour in our society with the help of few ads embedded subliminally and the trends of profitability. The methods used to accomplish our research are based on qualitative research along with the research articles, books and feedback from focused groups regarding the topic. The basic objective of this study was that, there is no significant change in the behaviour and attitude observed. These messages capture very short-term life on the viewer’s subconscious mind but in long run people get used to it and hence not only have the diffusion power but also has the high level of acceptance as well that reflects mostly through their social behaviours and attitudes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20diffusion" title="ethical diffusion">ethical diffusion</a>, <a href="https://publications.waset.org/abstracts/search?q=subconscious" title=" subconscious"> subconscious</a>, <a href="https://publications.waset.org/abstracts/search?q=subliminal%20advertising" title=" subliminal advertising"> subliminal advertising</a>, <a href="https://publications.waset.org/abstracts/search?q=unspoken%20facts" title=" unspoken facts"> unspoken facts</a> </p> <a href="https://publications.waset.org/abstracts/33596/hidden-truths-of-advertising-an-unspoken-fact-in-making-ethical-diffusions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33596.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7735</span> Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=John%20Hardy">John Hardy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counter%20terrorism" title="counter terrorism">counter terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=homeland%20security" title=" homeland security"> homeland security</a>, <a href="https://publications.waset.org/abstracts/search?q=insurgency" title=" insurgency"> insurgency</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20coercion" title=" political coercion"> political coercion</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20movement%20theory" title=" social movement theory"> social movement theory</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/96082/political-coercion-from-within-theoretical-convergence-in-the-strategies-of-terrorist-groups-insurgencies-and-social-movements" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96082.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">174</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7734</span> Digital Health During a Pandemic: Critical Analysis of the COVID-19 Contact Tracing Apps </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohanad%20Elemary">Mohanad Elemary</a>, <a href="https://publications.waset.org/abstracts/search?q=Imose%20Itua"> Imose Itua</a>, <a href="https://publications.waset.org/abstracts/search?q=Rajeswari%20B.%20Matam"> Rajeswari B. Matam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Virologists and public health experts have been predicting potential pandemics from coronaviruses for decades. The viruses which caused the SARS and MERS pandemics and the Nipah virus led to many lost lives, but still, the COVID-19 pandemic caused by the SARS-CoV2 virus surprised many scientific communities, experts, and governments with its ease of transmission and its pathogenicity. Governments of various countries reacted by locking down entire populations to their homes to combat the devastation caused by the virus, which led to a loss of livelihood and economic hardship to many individuals and organizations. To revive national economies and support their citizens in resuming their lives, governments focused on the development and use of contact tracing apps as a digital way to track and trace exposure. Google and Apple introduced the Exposure Notification Systems (ENS) framework. Independent organizations and countries also developed different frameworks for contact tracing apps. The efficiency, popularity, and adoption rate of these various apps have been different across countries. In this paper, we present a critical analysis of the different contact tracing apps with respect to their efficiency, adoption rate and general perception, and the governmental strategies and policies, which led to the development of the applications. When it comes to the European countries, each of them followed an individualistic approach to the same problem resulting in different realizations of a similarly functioning application with differing results of use and acceptance. The study conducted an extensive review of existing literature, policies, and reports across multiple disciplines, from which a framework was developed and then validated through interviews with six key stakeholders in the field, including founders and executives in digital health startups and corporates as well as experts from international organizations like The World Health Organization. A framework of best practices and tactics is the result of this research. The framework looks at three main questions regarding the contact tracing apps; how to develop them, how to deploy them, and how to regulate them. The findings are based on the best practices applied by governments across multiple countries, the mistakes they made, and the best practices applied in similar situations in the business world. The findings include multiple strategies when it comes to the development milestone regarding establishing frameworks for cooperation with the private sector and how to design the features and user experience of the app for a transparent, effective, and rapidly adaptable app. For the deployment section, several tactics were discussed regarding communication messages, marketing campaigns, persuasive psychology, and the initial deployment scale strategies. The paper also discusses the data privacy dilemma and how to build for a more sustainable system of health-related data processing and utilization. This is done through principles-based regulations specific for health data to allow for its avail for the public good. This framework offers insights into strategies and tactics that could be implemented as protocols for future public health crises and emergencies whether global or regional. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=contact%20tracing%20apps" title="contact tracing apps">contact tracing apps</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20health%20applications" title=" digital health applications"> digital health applications</a>, <a href="https://publications.waset.org/abstracts/search?q=exposure%20notification%20system" title=" exposure notification system"> exposure notification system</a> </p> <a href="https://publications.waset.org/abstracts/131599/digital-health-during-a-pandemic-critical-analysis-of-the-covid-19-contact-tracing-apps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131599.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7733</span> Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Elham%20Rajabian">Elham Rajabian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20resilience" title="cyber resilience">cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20factors" title=" human factors"> human factors</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20behavior" title=" cybersecurity behavior"> cybersecurity behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=attitude" title=" attitude"> attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=usability" title=" usability"> usability</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20culture" title=" security culture"> security culture</a> </p> <a href="https://publications.waset.org/abstracts/146960/importance-of-human-factors-on-cybersecurity-within-organizations-a-study-of-attitudes-and-behaviours" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146960.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">97</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7732</span> Multimedia Design in Tactical Play Learning and Acquisition for Elite Gaelic Football Practitioners</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michael%20McMahon">Michael McMahon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of media (video/animation/graphics) has long been used by athletes, coaches, and sports scientists to analyse and improve performance in technical skills and team tactics. Sports educators are increasingly open to the use of technology to support coach and learner development. However, an overreliance is a concern., This paper is part of a larger Ph.D. study looking into these new challenges for Sports Educators. Most notably, how to exploit the deep-learning potential of Digital Media among expert learners, how to instruct sports educators to create effective media content that fosters deep learning, and finally, how to make the process manageable and cost-effective. Central to the study is Richard Mayers Cognitive Theory of Multimedia Learning. Mayers Multimedia Learning Theory proposes twelve principles that shape the design and organization of multimedia presentations to improve learning and reduce cognitive load. For example, the Prior Knowledge principle suggests and highlights different learning outcomes for Novice and Non-Novice learners, respectively. Little research, however, is available to support this principle in modified domains (e.g., sports tactics and strategy). As a foundation for further research, this paper compares and contrasts a range of contemporary multimedia sports coaching content and assesses how they perform as learning tools for Strategic and Tactical Play Acquisition among elite sports practitioners. The stress tests applied are guided by Mayers's twelve Multimedia Learning Principles. The focus is on the elite athletes and whether current coaching digital media content does foster improved sports learning among this cohort. The sport of Gaelic Football was selected as it has high strategic and tactical play content, a wide range of Practitioner skill levels (Novice to Elite), and also a significant volume of Multimedia Coaching Content available for analysis. It is hoped the resulting data will help identify and inform the future instructional content design and delivery for Sports Practitioners and help promote best design practices optimal for different levels of expertise. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multimedia%20learning" title="multimedia learning">multimedia learning</a>, <a href="https://publications.waset.org/abstracts/search?q=e-learning" title=" e-learning"> e-learning</a>, <a href="https://publications.waset.org/abstracts/search?q=design%20for%20learning" title=" design for learning"> design for learning</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT" title=" ICT"> ICT</a> </p> <a href="https://publications.waset.org/abstracts/147163/multimedia-design-in-tactical-play-learning-and-acquisition-for-elite-gaelic-football-practitioners" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147163.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7731</span> The Effect of Role Conflict, Role Ambiguity and Job Satisfaction on Auditor Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Binti%20Shofiatul%20Jannah">Binti Shofiatul Jannah</a>, <a href="https://publications.waset.org/abstracts/search?q=Hans%20Wakhida%20Rakhmatullah"> Hans Wakhida Rakhmatullah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to examine the influence of role conflict, role ambiguity and job satisfaction on auditor performance. This study uses survey method using a questionnaire to collect the data. The questionnaires distributes were 104 respondents. The respondents are auditors who work for public accounting firms in East Java. Partial Least Square (PLS) with program SmartPLS version 2.0 were used to hypothesis testing. The result shows that: (1) there is no negative influence of role conflict on auditor performance; (2) there is negative influence of role ambiguity on auditor performance; (3) there is positive influence of job satisfaction on auditor performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=role%20conflict" title="role conflict">role conflict</a>, <a href="https://publications.waset.org/abstracts/search?q=role%20ambiguity" title=" role ambiguity"> role ambiguity</a>, <a href="https://publications.waset.org/abstracts/search?q=job%20satisfaction" title=" job satisfaction"> job satisfaction</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a> </p> <a href="https://publications.waset.org/abstracts/71004/the-effect-of-role-conflict-role-ambiguity-and-job-satisfaction-on-auditor-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71004.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">469</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=258">258</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=259">259</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=influence%20tactics&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>