CINXE.COM

Search results for: official secrecy

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: official secrecy</title> <meta name="description" content="Search results for: official secrecy"> <meta name="keywords" content="official secrecy"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="official secrecy" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="official secrecy"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 570</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: official secrecy</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">570</span> Official Secrecy and Confidentiality in Tax Administration and Its Impact on Right to Access Information: Nigerian Perspectives</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kareem%20Adedokun">Kareem Adedokun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Official secrecy is one of the colonial vestiges which upholds non – disclosure of essential information for public consumption. Information, though an indispensable tool in tax administration, is not to be divulged by any person in an official duty of the revenue agency. As a matter o fact, the Federal Inland Revenue Service (Establishment) Act, 2007 emphasizes secrecy and confidentiality in dealing with tax payer’s document, information, returns and assessment in a manner reminiscent of protecting tax payer’s privacy in all situations. It is so serious that any violation attracts criminal sanction. However, Nigeria, being a democratic and egalitarian state recently enacted Freedom of Information Act which heralded in openness in governance and takes away the confidentialities associated with official secrets Laws. Official secrecy no doubts contradicts the philosophy of freedom of information but maintaining a proper balance between protected rights of tax payers and public interest which revenue agency upholds is an uphill task. Adopting the Doctrinal method, therefore, the author of this paper probes into the real nature of the relationship between taxpayers and Revenue Agencies. It also interfaces official secrecy with the doctrine of Freedom of Information and consequently queries the retention of non – disclosure clause under Federal Inland Revenue Service (Establishment) Act (FIRSEA) 2007. The paper finds among others that non – disclosure provision in tax statutes particularly as provided for in FIRSEA is not absolute; so also is the constitutional rights and freedom of information and unless the non – disclosure clause finds justification under any recognized exemption provided under the Freedom of Information Act, its retention is antithesis to democratic ethos and beliefs as it may hinder public interest and public order. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title="confidentiality">confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=official%20secrecy" title=" official secrecy"> official secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=tax%20administration" title=" tax administration"> tax administration</a> </p> <a href="https://publications.waset.org/abstracts/71846/official-secrecy-and-confidentiality-in-tax-administration-and-its-impact-on-right-to-access-information-nigerian-perspectives" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71846.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">341</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">569</span> Achievable Average Secrecy Rates over Bank of Parallel Independent Fading Channels with Friendly Jamming</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Munnujahan%20Ara">Munnujahan Ara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we investigate the effect of friendly jamming power allocation strategies on the achievable average secrecy rate over a bank of parallel fading wiretap channels. We investigate the achievable average secrecy rate in parallel fading wiretap channels subject to Rayleigh and Rician fading. The achievable average secrecy rate, due to the presence of a line-of-sight component in the jammer channel is also evaluated. Moreover, we study the detrimental effect of correlation across the parallel sub-channels, and evaluate the corresponding decrease in the achievable average secrecy rate for the various fading configurations. We also investigate the tradeoff between the transmission power and the jamming power for a fixed total power budget. Our results, which are applicable to current orthogonal frequency division multiplexing (OFDM) communications systems, shed further light on the achievable average secrecy rates over a bank of parallel fading channels in the presence of friendly jammers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fading%20parallel%20channels" title="fading parallel channels">fading parallel channels</a>, <a href="https://publications.waset.org/abstracts/search?q=wire-tap%20channel" title=" wire-tap channel"> wire-tap channel</a>, <a href="https://publications.waset.org/abstracts/search?q=OFDM" title=" OFDM"> OFDM</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy%20capacity" title=" secrecy capacity"> secrecy capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20allocation" title=" power allocation"> power allocation</a> </p> <a href="https://publications.waset.org/abstracts/25080/achievable-average-secrecy-rates-over-bank-of-parallel-independent-fading-channels-with-friendly-jamming" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25080.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">512</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">568</span> Security Over OFDM Fading Channels with Friendly Jammer</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Munnujahan%20Ara">Munnujahan Ara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we investigate the effect of friendly jamming power allocation strategies on the achievable average secrecy rate over a bank of parallel fading wiretap channels. We investigate the achievable average secrecy rate in parallel fading wiretap channels subject to Rayleigh and Rician fading. The achievable average secrecy rate, due to the presence of a line-of-sight component in the jammer channel is also evaluated. Moreover, we study the detrimental effect of correlation across the parallel sub-channels, and evaluate the corresponding decrease in the achievable average secrecy rate for the various fading configurations. We also investigate the tradeoff between the transmission power and the jamming power for a fixed total power budget. Our results, which are applicable to current orthogonal frequency division multiplexing (OFDM) communications systems, shed further light on the achievable average secrecy rates over a bank of parallel fading channels in the presence of friendly jammers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fading%20parallel%20channels" title="fading parallel channels">fading parallel channels</a>, <a href="https://publications.waset.org/abstracts/search?q=wire-tap%20channel" title=" wire-tap channel"> wire-tap channel</a>, <a href="https://publications.waset.org/abstracts/search?q=OFDM" title=" OFDM"> OFDM</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy%20capacity" title=" secrecy capacity"> secrecy capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20allocation" title=" power allocation"> power allocation</a> </p> <a href="https://publications.waset.org/abstracts/25078/security-over-ofdm-fading-channels-with-friendly-jammer" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25078.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">503</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">567</span> The Secrecy Capacity of the Semi-Deterministic Wiretap Channel with Three State Information</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mustafa%20El-Halabi">Mustafa El-Halabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A general model of wiretap channel with states is considered, where the legitimate receiver and the wiretapper’s observations depend on three states S1, S2 and S3. State S1 is non-causally known to the encoder, S2 is known to the receiver, and S3 remains unknown. A secure coding scheme, based using structured-binning, is proposed, and it is shown to achieve the secrecy capacity when the signal at legitimate receiver is a deterministic function of the input. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=physical%20layer%20security" title="physical layer security">physical layer security</a>, <a href="https://publications.waset.org/abstracts/search?q=interference" title=" interference"> interference</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20information" title=" side information"> side information</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy%20capacity" title=" secrecy capacity"> secrecy capacity</a> </p> <a href="https://publications.waset.org/abstracts/48861/the-secrecy-capacity-of-the-semi-deterministic-wiretap-channel-with-three-state-information" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48861.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">388</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">566</span> Combating Money Laundering and Inroads into Banking Secrecy: Evidence from Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aspalella%20A.%20Rahman">Aspalella A. Rahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is widely accepted that the investigation of money laundering and the tracing and confiscation of criminal proceeds have intruded into the principles of banking secrecy. The inroads into banking secrecy present serious threats to democracy, and more importantly, to the traditional banker-customer relationship. It is generally accepted that the fight against money laundering is in conflict with the secrecy rule. Banking secrecy is a customer privilege whereas combating crime is critical for public safety and security. Indeed, achieving a proper balance is a desirable goal. But how we go about achieving such a balance is a question encountered by many law enforcement authorities. Therefore, this paper examines the effect of disclosure under the Malaysian anti-money laundering laws on the traditional duty of banks to keep the customer’s information confidential. It also analyzes whether the Malaysian laws provide a right balance between a duty to keep customer’s information secret and a duty to disclose such information in the fight against money laundering. On closer inspection, it is submitted that the Malaysian laws provide sufficient safeguards to ensure that the disclosure of customer’s information is carried out in a manner that is not prejudicial to the interest of legitimate customers. This is a positive approach that could protect the innocent customers from being mistreated by the law. Ultimately, it can be said that the growing threat of global money laundering and terrorism makes the overriding of banking secrecy justified because without a flow of information from the banks, the effective prevention of the menace is not possible. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-money%20laundering%20law" title="anti-money laundering law">anti-money laundering law</a>, <a href="https://publications.waset.org/abstracts/search?q=banker-customer%20relationship" title=" banker-customer relationship"> banker-customer relationship</a>, <a href="https://publications.waset.org/abstracts/search?q=banking%20secrecy" title=" banking secrecy"> banking secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title=" money laundering"> money laundering</a> </p> <a href="https://publications.waset.org/abstracts/4993/combating-money-laundering-and-inroads-into-banking-secrecy-evidence-from-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4993.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">428</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">565</span> Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahdi%20Rahimi">Mahdi Rahimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Mahdi%20Mojahedian"> Mohammad Mahdi Mojahedian</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Reza%20Aref"> Mohammad Reza Aref</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=physical%20layer%20security" title="physical layer security">physical layer security</a>, <a href="https://publications.waset.org/abstracts/search?q=stochastic%20geometry" title=" stochastic geometry"> stochastic geometry</a>, <a href="https://publications.waset.org/abstracts/search?q=device-to-device" title=" device-to-device"> device-to-device</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware%20impairment" title=" hardware impairment"> hardware impairment</a> </p> <a href="https://publications.waset.org/abstracts/148278/secrecy-analysis-in-downlink-cellular-networks-in-the-presence-of-d2d-pairs-and-hardware-impairment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148278.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">180</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">564</span> A History of Knowledge Management: A Chronological Account from the 1970s to 2017</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alexslis%20N.%20Maindze">Alexslis N. Maindze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Knowledge management (KM) has become an imperative to modern business growth, competitive edge, and sustainability. Though there has been extensive research in the field, this literature overview showcases massive gaps that exist on the coverage of the field’s rich and fascinating history. Particularly, accounts of the history of KM are inconsistent and fragmentary in breadth and depth. This paper presents new insights into the history of KM from the early 70s when the actual coinage ‘knowledge management’ entered the literature. It reveals how knowledge over the years was shrouded in secrecy and subsumed by technology. It makes a clear distinction between the histories of the debate around knowledge and that of KM. The paper also finds a history of KM filled with skepticisms and engulfed by an ‘intellectual paradox’. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management%20history" title="knowledge management history">knowledge management history</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy" title=" secrecy"> secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=skepticism" title=" skepticism"> skepticism</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20paradox" title=" intellectual paradox"> intellectual paradox</a> </p> <a href="https://publications.waset.org/abstracts/74333/a-history-of-knowledge-management-a-chronological-account-from-the-1970s-to-2017" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74333.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">220</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">563</span> Position of the Constitutional Court of the Russian Federation on the Matter of Restricting Constitutional Rights of Citizens Concerning Banking Secrecy </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20V.%20Shashkova">A. V. Shashkova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the present article is to analyze the position of the Constitutional Court of the Russian Federation on the matter of restricting the constitutional rights of citizens to inviolability of professional and banking secrecy in effecting controlling activities. The methodological ground of the present Article represents the dialectic scientific method of the socio-political, legal and organizational processes with the principles of development, integrity, and consistency, etc. The consistency analysis method is used while researching the object of the analysis. Some public-private research methods are also used: the formally-logical method or the comparative legal method, are used to compare the understanding of the &lsquo;secrecy&rsquo; concept. The aim of the present article is to find the root of the problem and to give recommendations for the solution of the problem. The result of the present research is the author&rsquo;s conclusion on the necessity of the political will to improve Russian legislation with the aim of compliance with the provisions of the Constitution. It is also necessary to establish a clear balance between the constitutional rights of the individual and the limit of these rights when carrying out various control activities by public authorities. Attempts by the banks to &quot;overdo&quot; an anti-money laundering law under threat of severe sanctions by the regulators actually led to failures in the execution of normal economic activity. Therefore, individuals face huge problems with payments on the basis of clearing, in addition to problems with cash withdrawals. The Bank of Russia sets requirements for banks to execute Federal Law No. 115-FZ too high. It is high place to attract political will here. As well, recent changes in Russian legislation, e.g. allowing banks to refuse opening of accounts unilaterally, simplified banking activities in the country. The article focuses on different theoretical approaches towards the concept of &ldquo;secrecy&rdquo;. The author gives an overview of the practices of Spain, Switzerland and the United States of America on the matter of restricting the constitutional rights of citizens to inviolability of professional and banking secrecy in effecting controlling activities. The Constitutional Court of the Russian Federation basing on the Constitution of the Russian Federation has its special understanding of the issue, which should be supported by further legislative development in the Russian Federation<em>. </em> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constitutional%20court" title="constitutional court">constitutional court</a>, <a href="https://publications.waset.org/abstracts/search?q=restriction%20of%20constitutional%20rights" title=" restriction of constitutional rights"> restriction of constitutional rights</a>, <a href="https://publications.waset.org/abstracts/search?q=bank%20secrecy" title=" bank secrecy"> bank secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=control%20measures" title=" control measures"> control measures</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title=" money laundering"> money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20control" title=" financial control"> financial control</a>, <a href="https://publications.waset.org/abstracts/search?q=banking%20information" title=" banking information"> banking information</a> </p> <a href="https://publications.waset.org/abstracts/75334/position-of-the-constitutional-court-of-the-russian-federation-on-the-matter-of-restricting-constitutional-rights-of-citizens-concerning-banking-secrecy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75334.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">562</span> Development of a Data Security Model Using Steganography</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Terungwa%20Simon%20Yange">Terungwa Simon Yange</a>, <a href="https://publications.waset.org/abstracts/search?q=Agana%20Moses%20A."> Agana Moses A.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=steganography" title="steganography">steganography</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=decryption" title=" decryption"> decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy" title=" secrecy"> secrecy</a> </p> <a href="https://publications.waset.org/abstracts/36466/development-of-a-data-security-model-using-steganography" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36466.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">561</span> Comparing Hotels&#039; Official Websites with Their Pages on Booking Sites: An Exploratory Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iman%20Shawky">Iman Shawky</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hotel websites frequently aim at encouraging visitors to become potential guests by completing their booking procedures, and accordingly, they have been proved to be attractive and appealing. That might be due to the consideration of them as one of the direct efficacious tools to promote and sell hotels' facilities, besides building strong communication with guests to create unforgettable brand images. This study tried to find out a step for five-star and four-star hotels to develop their websites to meet their visitors' or guests' requirements for an effective site. In addition, it aimed at exploring to what extent hotels' official websites compared with their pages on hotel booking sites still influence visitors' or guests' desires to book. Besides, it also aimed at investigating to what extent visitors or guests widely trust and use those sites to accomplish their booking. Furthermore, it tried to explore to what extent visitors' or guests' preferences of those sites can influence on hotels' financial performance. To achieve these objectives, the researcher conducted an exploratory study by surfing both hotels' official websites and their pages on booking sites of such hotels in Alexandria city in Egypt to make a comparison between them. Moreover, another separate comparison was made on Arab and foreign guests' views conducted by using a questionnaire during the past seven months to investigate the effectiveness of hotels' official websites against their pages on booking sites to trust and motive them to book. The results indicated that hotels' pages on booking sites represented widely trusted and used sites compared with their official websites for achieving visitors' or guests' booking process, while a few other visitors or guests still trusted official hotel websites for completing their booking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=five-star%20and%20four-star%20hotels" title="five-star and four-star hotels">five-star and four-star hotels</a>, <a href="https://publications.waset.org/abstracts/search?q=hotel%20booking%20sites" title=" hotel booking sites"> hotel booking sites</a>, <a href="https://publications.waset.org/abstracts/search?q=hotels%27%20financial%20performance" title=" hotels&#039; financial performance"> hotels&#039; financial performance</a>, <a href="https://publications.waset.org/abstracts/search?q=hotels%27%20official%20websites" title=" hotels&#039; official websites"> hotels&#039; official websites</a> </p> <a href="https://publications.waset.org/abstracts/123961/comparing-hotels-official-websites-with-their-pages-on-booking-sites-an-exploratory-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123961.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">560</span> Film Censorship and Female Chastity: Exploring State&#039;s Discourses and Patriarchal Values in Reconstructing Chinese Film Stardom of Tang Wei</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xinchen%20Zhu">Xinchen Zhu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rapid fame of the renowned female film star Tang Wei has made her a typical subject (or object) entangled with sensitive issues involving the official ideology, sexuality, and patriarchal values of contemporary China. In 2008, Tang Wei’s official ban has triggered the wave of debates concerning state power and censorship, actor’s rights, sexual ethics, and feminism in the public sphere. Her ban implies that Chinese film censorship acts as a key factor in reconstructing Chinese film stardom. Following the ban, as sensational media texts are re-interpreting the official discourses, the texts also functioned as a crucial vehicle in reconstructing Tang's female image. Therefore, the case study of Tang's film stardom allows us to further explore how female stardom has been entangled with the issues involving official ideology, female sexual ethics, and patriarchal values in contemporary China. This paper argues that Chinese female film stars shoulder the responsibility of film acting which would conform to the official male-dominated values. However, with the development of the Internet, the state no longer remains an absolute control over the new venues. The netizens’ discussion about her ban reshaped Tang’s image as a victim and scapegoat under the unfair oppression of the official authority. Additionally, this paper argues that similar to State’s discourse, netizens’ discourse did not reject patriarchal values, and in turn emphasized Tang Wei’s female chastity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=film%20censorship" title="film censorship">film censorship</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinese%20female%20film%20stardom" title=" Chinese female film stardom"> Chinese female film stardom</a>, <a href="https://publications.waset.org/abstracts/search?q=party-state%E2%80%99s%20power" title=" party-state’s power"> party-state’s power</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20discourses" title=" national discourses"> national discourses</a>, <a href="https://publications.waset.org/abstracts/search?q=Tang%20Wei" title=" Tang Wei"> Tang Wei</a> </p> <a href="https://publications.waset.org/abstracts/108422/film-censorship-and-female-chastity-exploring-states-discourses-and-patriarchal-values-in-reconstructing-chinese-film-stardom-of-tang-wei" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108422.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">559</span> Diplomatic Public Relations Techniques for Official Recognition of Palestine State in Europe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bilgehan%20Gultekin">Bilgehan Gultekin</a>, <a href="https://publications.waset.org/abstracts/search?q=Tuba%20Gultekin"> Tuba Gultekin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Diplomatic public relations gives an ideal concept for recognition of palestine state in all over the europe. The first step of official recognition is approval of palestine state in international political organisations such as United Nations and Nato. So, diplomatic public relations provides a recognition process in communication scale. One of the aims of the study titled “Diplomatic Public Relations Techniques for Recognition of Palestine State in Europe” is to present some communication projects on diplomatic way. The study also aims at showing communication process at diplomatic level. The most important level of such kind of diplomacy is society based diplomacy. Moreover,The study provides a wider perspective that gives some creative diplomatic communication strategies for attracting society. To persuade the public for official recognition also is key element of this process. The study also finds new communication routes including persuasion techniques for society. All creative projects are supporting parts in original persuasive process of official recognition of Palestine. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=diplomatic%20public%20relations" title="diplomatic public relations">diplomatic public relations</a>, <a href="https://publications.waset.org/abstracts/search?q=diplomatic%20communication%20strategies" title=" diplomatic communication strategies"> diplomatic communication strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=diplomatic%20communication" title=" diplomatic communication"> diplomatic communication</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20relations" title=" public relations"> public relations</a> </p> <a href="https://publications.waset.org/abstracts/33218/diplomatic-public-relations-techniques-for-official-recognition-of-palestine-state-in-europe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33218.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">455</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">558</span> On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Behnam%20Zahednejad">Behnam Zahednejad</a>, <a href="https://publications.waset.org/abstracts/search?q=Saeed%20Kosari"> Saeed Kosari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IoT" title="IoT">IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=two-factor%20security" title=" two-factor security"> two-factor security</a>, <a href="https://publications.waset.org/abstracts/search?q=cancelable%20biometric" title=" cancelable biometric"> cancelable biometric</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20compromise%20impersonation%20resilience" title=" key compromise impersonation resilience"> key compromise impersonation resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=perfect%20forward%20secrecy" title=" perfect forward secrecy"> perfect forward secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=database%20attack" title=" database attack"> database attack</a>, <a href="https://publications.waset.org/abstracts/search?q=real-or-random%20model" title=" real-or-random model"> real-or-random model</a>, <a href="https://publications.waset.org/abstracts/search?q=ProVerif" title=" ProVerif"> ProVerif</a> </p> <a href="https://publications.waset.org/abstracts/160983/on-the-design-of-a-secure-two-party-authentication-scheme-for-internet-of-things-using-cancelable-biometrics-and-physically-unclonable-functions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160983.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">557</span> Attitudes towards Bilingualism: The Case of Cameroon</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Patricia%20W.%20Ngassa">Patricia W. Ngassa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Language attitude is an area arousing the interest of linguists who are continuously discovering new methods of detecting attitudes. This paper problematizes Cameroonians’ alleged tendency of neglecting home languages and considering Bilingualism in borrowed languages as more important. 30 questionnaires were used to know attitudes of parents towards bilingualism and our home languages. Results revealed that our borrowed official languages are considered more important than home languages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bilingualism" title="bilingualism">bilingualism</a>, <a href="https://publications.waset.org/abstracts/search?q=mother%20tongue" title=" mother tongue"> mother tongue</a>, <a href="https://publications.waset.org/abstracts/search?q=Cameroon" title=" Cameroon"> Cameroon</a>, <a href="https://publications.waset.org/abstracts/search?q=official%20language" title=" official language"> official language</a> </p> <a href="https://publications.waset.org/abstracts/17761/attitudes-towards-bilingualism-the-case-of-cameroon" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17761.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">623</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">556</span> Emotions in Health Tweets: Analysis of American Government Official Accounts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Garc%C3%ADa%20L%C3%B3pez">García López</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Government Departments of Health have the task of informing and educating citizens about public health issues. For this, they use channels like Twitter, key in the search for health information and the propagation of content. The tweets, important in the virality of the content, may contain emotions that influence the contagion and exchange of knowledge. The goal of this study is to perform an analysis of the emotional projection of health information shared on Twitter by official American accounts: the disease control account <em>CDCgov</em>, National Institutes of Health, <em>NIH</em>, the government agency <em>HHSGov</em>, and the professional organization <em>PublicHealth</em>. For this, we used Tone Analyzer, an International Business Machines Corporation (IBM) tool specialized in emotion detection in text, corresponding to the categorical model of emotion representation. For 15 days, all tweets from these accounts were analyzed with the emotional analysis tool in text. The results showed that their tweets contain an important emotional load, a determining factor in the success of their communications. This exposes that official accounts also use subjective language and contain emotions. The predominance of emotion joy over sadness and the strong presence of emotions in their tweets stimulate the virality of content, a key in the work of informing that government health departments have. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emotions%20in%20tweets" title="emotions in tweets">emotions in tweets</a>, <a href="https://publications.waset.org/abstracts/search?q=emotion%20detection%20in%20the%20text" title=" emotion detection in the text"> emotion detection in the text</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20information%20on%20Twitter" title=" health information on Twitter"> health information on Twitter</a>, <a href="https://publications.waset.org/abstracts/search?q=American%20health%20official%20accounts" title=" American health official accounts"> American health official accounts</a>, <a href="https://publications.waset.org/abstracts/search?q=emotions%20on%20Twitter" title=" emotions on Twitter"> emotions on Twitter</a>, <a href="https://publications.waset.org/abstracts/search?q=emotions%20and%20content" title=" emotions and content"> emotions and content</a> </p> <a href="https://publications.waset.org/abstracts/95743/emotions-in-health-tweets-analysis-of-american-government-official-accounts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95743.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">555</span> The Role of Official Languages and Language Training Policy in Adult Immigrant Integration in Canada</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lillie%20Lum">Lillie Lum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Focusing on the role of official language in immigrant integration, this paper will first report the results of a literature review and demonstrate that there is no doubt on the necessity of adequate language skills for newcomers to successfully settle, adapt, and integrate socially, culturally and economically in Canada. This paper attempts to synthesize the literature in order to shed light on the language policy terrain which is not easy to navigate. Then, by outlining what is currently available in the language policy environment, it will ask if the current state of language training in Canada is adequate to assist newcomers in their language acquisition process. At a deeper level, it aims to continue to raise questions in this policy area. Are current policy responses likely to improve linguistic capabilities in the future, particularly for immigrant workers with poor language proficiency? This paper is timely given the magnitude of the language issue and the value of immigrants for Canada’s economic, social, and political vitality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=official%20language%20education" title="official language education">official language education</a>, <a href="https://publications.waset.org/abstracts/search?q=immigrant%20integration%20into%20Canada" title=" immigrant integration into Canada"> immigrant integration into Canada</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20factors" title=" economic factors"> economic factors</a>, <a href="https://publications.waset.org/abstracts/search?q=policy%20implications" title=" policy implications"> policy implications</a> </p> <a href="https://publications.waset.org/abstracts/46455/the-role-of-official-languages-and-language-training-policy-in-adult-immigrant-integration-in-canada" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46455.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">302</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">554</span> Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rebecca%20Rumbul">Rebecca Rumbul</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital" title="digital">digital</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT" title=" ICT"> ICT</a>, <a href="https://publications.waset.org/abstracts/search?q=transparency" title=" transparency"> transparency</a>, <a href="https://publications.waset.org/abstracts/search?q=civic%20technology" title=" civic technology"> civic technology</a> </p> <a href="https://publications.waset.org/abstracts/23373/tools-for-transparency-the-role-of-civic-technology-in-increasing-the-transparency-of-the-state" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23373.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">662</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">553</span> Towards an Indigenous Language Policy for National Integration</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Odoh%20Dickson%20Akpegi">Odoh Dickson Akpegi </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper is about the need for an indigenous language in order to meaningfully harness both our human and material resources for the nation’s integration. It then examines the notty issue of the national language question and advocates a piece meal approach in solving the problem. This approach allows for the development and use of local languages in minority areas, especially in Benue State, as a way of preparing them for consideration as possible replacement for English language as Nigeria’s national or official language. Finally, an arrangement to follow to prepare the languages for such competition at the national level is presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=indigenous%20language" title="indigenous language">indigenous language</a>, <a href="https://publications.waset.org/abstracts/search?q=English%20language" title=" English language"> English language</a>, <a href="https://publications.waset.org/abstracts/search?q=official%20language" title=" official language"> official language</a>, <a href="https://publications.waset.org/abstracts/search?q=National%20integration" title=" National integration"> National integration</a> </p> <a href="https://publications.waset.org/abstracts/33579/towards-an-indigenous-language-policy-for-national-integration" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33579.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">560</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">552</span> Automatic Checkpoint System Using Face and Card Information</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kriddikorn%20Kaewwongsri">Kriddikorn Kaewwongsri</a>, <a href="https://publications.waset.org/abstracts/search?q=Nikom%20Suvonvorn"> Nikom Suvonvorn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the deep south of Thailand, checkpoints for people verification are necessary for the security management of risk zones, such as official buildings in the conflict area. In this paper, we propose an automatic checkpoint system that verifies persons using information from ID cards and facial features. The methods for a person&rsquo;s information abstraction and verification are introduced based on useful information such as ID number and name, extracted from official cards, and facial images from videos. The proposed system shows promising results and has a real impact on the local society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=face%20comparison" title="face comparison">face comparison</a>, <a href="https://publications.waset.org/abstracts/search?q=card%20recognition" title=" card recognition"> card recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=OCR" title=" OCR"> OCR</a>, <a href="https://publications.waset.org/abstracts/search?q=checkpoint%20system" title=" checkpoint system"> checkpoint system</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a> </p> <a href="https://publications.waset.org/abstracts/40284/automatic-checkpoint-system-using-face-and-card-information" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40284.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">321</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">551</span> Official Game Account Analysis: Factors Influence Users&#039; Judgments in Limited-Word Posts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shanhua%20Hu">Shanhua Hu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social media as a critical propagandizing form of film, video games, and digital products has received substantial research attention, but there exists several critical barriers such as: (1) few studies exploring the internal and external connections of a product as part of the multimodal context that gives rise to readability and commercial return; (2) the lack of study of multimodal analysis in product’s official account of game publishers and its impact on users’ behaviors including purchase intention, social media engagement, and playing time; (3) no standardized ecologically-valid, game type-varying data can be used to study the complexity of official account’s postings within a time period. This proposed research helps to tackle these limitations in order to develop a model of readability study that is more ecologically valid, robust, and thorough. To accomplish this objective, this paper provides a more diverse dataset comprising different visual elements and messages collected from the official Twitter accounts of the Top 20 best-selling games of 2021. Video game companies target potential users through social media, a popular approach is to set up an official account to maintain exposure. Typically, major game publishers would create an official account on Twitter months before the game's release date to update on the game's development, announce collaborations, and reveal spoilers. Analyses of tweets from those official Twitter accounts would assist publishers and marketers in identifying how to efficiently and precisely deploy advertising to increase game sales. The purpose of this research is to determine how official game accounts use Twitter to attract new customers, specifically which types of messages are most effective at increasing sales. The dataset includes the number of days until the actual release date on Twitter posts, the readability of the post (Flesch Reading Ease Score, FRES), the number of emojis used, the number of hashtags, the number of followers of the mentioned users, the categorization of the posts (i.e., spoilers, collaborations, promotions), and the number of video views. The timeline of Twitter postings from official accounts will be compared to the history of pre-orders and sales figures to determine the potential impact of social media posts. This study aims to determine how the above-mentioned characteristics of official accounts' Twitter postings influence the sales of the game and to examine the possible causes of this influence. The outcome will provide researchers with a list of potential aspects that could influence people's judgments in limited-word posts. With the increased average online time, users would adapt more quickly than before in online information exchange and readings, such as the word to use sentence length, and the use of emojis or hashtags. The study on the promotion of official game accounts will not only enable publishers to create more effective promotion techniques in the future but also provide ideas for future research on the influence of social media posts with a limited number of words on consumers' purchasing decisions. Future research can focus on more specific linguistic aspects, such as precise word choice in advertising. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=engagement" title="engagement">engagement</a>, <a href="https://publications.waset.org/abstracts/search?q=official%20account" title=" official account"> official account</a>, <a href="https://publications.waset.org/abstracts/search?q=promotion" title=" promotion"> promotion</a>, <a href="https://publications.waset.org/abstracts/search?q=twitter" title=" twitter"> twitter</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20game" title=" video game"> video game</a> </p> <a href="https://publications.waset.org/abstracts/159347/official-game-account-analysis-factors-influence-users-judgments-in-limited-word-posts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159347.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">550</span> “Voiceless Memory” and Holodomor (Great Famine): The Power of Oral History to Challenge Official Historical Discourse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tetiana%20Boriak">Tetiana Boriak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study is called to test correlation between official sources, preserved in the archives, and “unofficial” oral history regarding the Great Famine of 1932–1933 in Ukraine. The research shows poor preservation of the sources, being deliberately destroyed by the totalitarian regime. It involves analysis of five stages of Holodomor oral history development. It is oral history that provides the mechanism of mass killing. The research proves that using only one type of historical sources leads to a certain line of reading history of the Holodomor, while usage of both types provides in-depth insight in the history of the famine. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=the%20Holodomor%20%28the%20Great%20Famine%29" title="the Holodomor (the Great Famine)">the Holodomor (the Great Famine)</a>, <a href="https://publications.waset.org/abstracts/search?q=oral%20history" title=" oral history"> oral history</a>, <a href="https://publications.waset.org/abstracts/search?q=historical%20source" title=" historical source"> historical source</a>, <a href="https://publications.waset.org/abstracts/search?q=historical%20memory" title=" historical memory"> historical memory</a>, <a href="https://publications.waset.org/abstracts/search?q=totalitarianism." title=" totalitarianism."> totalitarianism.</a> </p> <a href="https://publications.waset.org/abstracts/155694/voiceless-memory-and-holodomor-great-famine-the-power-of-oral-history-to-challenge-official-historical-discourse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155694.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">549</span> Cameroon’s State Bilingualism: Mending Fences between Linguistic Communities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Charles%20Esambe%20Alobwede">Charles Esambe Alobwede</a> </p> <p class="card-text"><strong>Abstract:</strong></p> From the time of the biblical story of the Tower of Babel, languages as well as people have learnt to co-exist. It is obvious that when languages co-exist, there is the inevitable tendency of linguistic influence. This is because a language can either be a unifying factor or a factor of division within a given community, especially in a multicultural and multi-linguistic community where such a situation has led to socio-political and economic tension. Thus, leaders of such communities have a duty to plan and implement a language policy that will meet the needs of all members of the community in order to enhance its corporateness. The present article will focus on some of the major reasons that prompted the government of Cameroon to embark on an official bilingual policy after independence in 1961 and then evaluate the evolution of the linguistic situation. The article will equally look at the consequences, especially on a socio-political platform and what today has been termed 'the Anglophone problem' in Cameroon which has caused a fuse between the country’s minority Anglophone population and the majority Francophone administration. Data for the present article is collected from literature on the state of official bilingualism in Cameroon, newspapers articles on the prevailing situation in the country and interviews with actors on the field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=language%20policy" title="language policy">language policy</a>, <a href="https://publications.waset.org/abstracts/search?q=linguistic%20influence" title=" linguistic influence"> linguistic influence</a>, <a href="https://publications.waset.org/abstracts/search?q=multicultural" title=" multicultural"> multicultural</a>, <a href="https://publications.waset.org/abstracts/search?q=official%20bilingualism" title=" official bilingualism"> official bilingualism</a>, <a href="https://publications.waset.org/abstracts/search?q=socio-political%20tension" title=" socio-political tension"> socio-political tension</a> </p> <a href="https://publications.waset.org/abstracts/73154/cameroons-state-bilingualism-mending-fences-between-linguistic-communities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73154.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">256</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">548</span> Conspiracy Theories and the Right to Believe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zwelenkani%20Mdlalose">Zwelenkani Mdlalose</a> </p> <p class="card-text"><strong>Abstract:</strong></p> From the moment Covid 19 was declared a pandemic it became clear that conspiracy theories would significantly impact our response to the crisis that the virus was to become. Central to the interest in conspiracy theories evoked by a pandemic is a more general concern for the impact they have on society and social harmony. The specific brand of Conspiracy Theory that is in question is not any and all theories about conspiracies but rather those conspiracy theories which contradict official accounts. For example, where the official account on the terrorist attacks of September 11 2001 is of a conspiracy involving 19 militants associated with the Islamic extremist group al-Qaeda against targets in the United States, the nature of conspiracy theory under study is the one contradicting this official account to the extent that its attributes the attacks not to al-Qaeda militants but to actors in the United States government itself. The study is not an investigation into the truth value of conspiracy theories but rather an attempt at observing the essential qualities of the type of belief that is belief in conspiracy theories compared to belief in official accounts provided by authoritative sources such as governments, experts and mainstream media. These qualities include the psychological, epistemic and socio-political foundations on which belief in conspiracy theories are established. Based on a foundational understanding of the sort of belief that are beliefs in conspiracy theories, we may then extrapolate implied ethical demands on both authoritative bodies and actors as well as believers in conspiracy theories. For example: in their unofficial ‘non-factual’ status, is there not some violation of epistemic right in the same way we observe in cases where people are prejudiced because of their religious beliefs? In other words, is there an epistemic injustice suffered by believers in conspiracy theories in the way their beliefs are rejected as illegitimate? Conversely, to what extent do believers bear an epistemic responsibility in their adoption of their beliefs in conspiracy theories. From this position, perhaps we can then develop responses to the problem that foster greater social harmony even in the midst of suspicion and distrust. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conspiracy%20theories" title="conspiracy theories">conspiracy theories</a>, <a href="https://publications.waset.org/abstracts/search?q=subjugated%20knowledge" title=" subjugated knowledge"> subjugated knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=epistemic%20injustice" title=" epistemic injustice"> epistemic injustice</a>, <a href="https://publications.waset.org/abstracts/search?q=epistemic%20responsibility" title=" epistemic responsibility"> epistemic responsibility</a> </p> <a href="https://publications.waset.org/abstracts/153779/conspiracy-theories-and-the-right-to-believe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153779.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">547</span> Images of Spiritism in Brazilian Catholic Discourse (1889-1937)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Frantisek%20Kalenda">Frantisek Kalenda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the ultimate triumph of the republican movement in 1889 in Brazil and adoption of constitution promoting religious freedom, formerly dominant Roman Catholic Church entered a long period of struggle to recover its lost position, fighting both liberal and secular character of the new regime and rising competition on the “market of faith”. Spiritism in its originally Brazilian form proved to be one if its key adversaries during the First (1889-1930) and Second Republic (1930-1937), provoking significant attempt within official Church to discredit and destroy the movement. This paper explores this effort through Catholic portrayal of Spiritism in its official media, focusing, on the creation of stereotypes and both theological and “scientific” arguments used against it. Its core is based on primary sources’ analysis, mainly influential A Ordem and Mensageiro da Fé. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Catholic%20Church" title="Catholic Church">Catholic Church</a>, <a href="https://publications.waset.org/abstracts/search?q=media" title=" media"> media</a>, <a href="https://publications.waset.org/abstracts/search?q=other" title=" other"> other</a>, <a href="https://publications.waset.org/abstracts/search?q=spiritism" title=" spiritism"> spiritism</a>, <a href="https://publications.waset.org/abstracts/search?q=stereotype" title=" stereotype"> stereotype</a> </p> <a href="https://publications.waset.org/abstracts/62999/images-of-spiritism-in-brazilian-catholic-discourse-1889-1937" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62999.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">274</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">546</span> Ranking Priorities for Digital Health in Portugal: Aligning Health Managers’ Perceptions with Official Policy Perspectives</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pedro%20G.%20Rodrigues">Pedro G. Rodrigues</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20J.%20B%C3%A1rrios"> Maria J. Bárrios</a>, <a href="https://publications.waset.org/abstracts/search?q=Sara%20A.%20Ambr%C3%B3sio"> Sara A. Ambrósio</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The digitalisation of health is a profoundly transformative economic, political, and social process. As is often the case, such processes need to be carefully managed if misunderstandings, policy misalignments, or outright conflicts between the government and a wide gamut of stakeholders with competing interests are to be avoided. Thus, ensuring open lines of communication where all parties know what each other’s concerns are is key to good governance, as well as efficient and effective policymaking. This project aims to make a small but still significant contribution in this regard in that we seek to determine the extent to which health managers’ perceptions of what is a priority for digital health in Portugal are aligned with official policy perspectives. By applying state-of-the-art artificial intelligence technology first to the indexed literature on digital health and then to a set of official policy documents on the same topic, followed by a survey directed at health managers working in public and private hospitals in Portugal, we obtain two priority rankings that, when compared, will allow us to produce a synthesis and toolkit on digital health policy in Portugal, with a view to identifying areas of policy convergence and divergence. This project is also particularly peculiar in the sense that sophisticated digital methods related to text analytics are employed to study good governance aspects of digitalisation applied to health care. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20health" title="digital health">digital health</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20informatics" title=" health informatics"> health informatics</a>, <a href="https://publications.waset.org/abstracts/search?q=text%20analytics" title=" text analytics"> text analytics</a>, <a href="https://publications.waset.org/abstracts/search?q=governance" title=" governance"> governance</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20language%20understanding" title=" natural language understanding"> natural language understanding</a> </p> <a href="https://publications.waset.org/abstracts/153137/ranking-priorities-for-digital-health-in-portugal-aligning-health-managers-perceptions-with-official-policy-perspectives" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153137.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">545</span> The Methodology of Out-Migration in Georgia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shorena%20Tsiklauri">Shorena Tsiklauri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Out-migration is an important issue for Georgia as well as since independence has loosed due to emigration one fifth of its population. During Soviet time out-migration from USSR was almost impossible and one of the most important instruments in regulating population movement within the Soviet Union was the system of compulsory residential registrations, so-called “propiska”. Since independent here was not any regulation for migration from Georgia. The majorities of Georgian migrants go abroad by tourist visa and then overstay, becoming the irregular labor migrants. The official statistics on migration published for this period was based on the administrative system of population registration, were insignificant in terms of numbers and did not represent the real scope of these migration movements. This paper discusses the data quality and methodology of migration statistics in Georgia and we are going to answer the questions: what is the real reason of increasing immigration flows according to the official numbers since 2000s? <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20quality" title="data quality">data quality</a>, <a href="https://publications.waset.org/abstracts/search?q=Georgia" title=" Georgia"> Georgia</a>, <a href="https://publications.waset.org/abstracts/search?q=methodology" title=" methodology"> methodology</a>, <a href="https://publications.waset.org/abstracts/search?q=migration" title=" migration"> migration</a> </p> <a href="https://publications.waset.org/abstracts/26911/the-methodology-of-out-migration-in-georgia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26911.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">417</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">544</span> The Flipped Education Case Study on Teacher Professional Learning Community in Technology and Media Implementation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Juei-Hsin%20Wang">Juei-Hsin Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yen-Ting%20Chen"> Yen-Ting Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper examines teacher professional learning community theory and implementation by using technology and media tools in Taiwan. After literature review, the researcher concluded in five elements of teacher professional learning community theory. They are ‘sharing the vision and value', ‘collaborative cooperation’, ‘ to support the situation', ‘to share practice' and 'Pay Attention to Student Learning Effectiveness' five levels by using technology and media in flipped education. Teacher professional learning community is one kind of models for teacher professional development in flipped education. Due to Taiwan education culture, there is no summative evaluation for teachers. So, there are multiple kinds of ways and education practice in teacher professional learning community nowadays. This study used literature review and quality analysis to analyze the connection theory and practice and discussed the official and non‐official strategies on teacher professional learning community by using technology and media in flipped education. The tablet is used as a camera tool for classroom students to solve problems. The students can instantly see and enable other students to watch the whole class discussion by operating the tablet. This would allow teachers and students to focus on discussing the connotation of subjects, especially bottom‐up and non‐official cases from teachers become an important influence in Taiwan. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=professional%20learning%20community" title="professional learning community">professional learning community</a>, <a href="https://publications.waset.org/abstracts/search?q=collaborative%20cooperation" title=" collaborative cooperation"> collaborative cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=flipped%20education" title=" flipped education"> flipped education</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20application" title=" technology application"> technology application</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20application" title=" media application"> media application</a> </p> <a href="https://publications.waset.org/abstracts/94924/the-flipped-education-case-study-on-teacher-professional-learning-community-in-technology-and-media-implementation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94924.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">147</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">543</span> Language Services as a Means of Language Repository for Tuition Support and Facilitation of Learning in Institution of Higher Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mzamani%20Aaron%20Mabasa">Mzamani Aaron Mabasa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The research study examines the reality that the Language Services Directorate can be considered a language repository hub. The study postulates that multilingual education guided by language policy implementation can improve student performance and pass rate. Various documents in the form of style guides, glossaries and tutorial letters may be used to enable students to understand complex words, sentences, phrases and paragraphs when technical vocabularies are used. This paper addresses the way in which quality assurance can transform South African official languages, including Sign Language, as mandated by the Language Policy for Higher Education. The paper further emphasizes that Language Services is unique in the sense that it involves all South African officials as tools for student support and facilitation of learning. This is in line with the Constitution of the Republic of South Africa (1996) and the Unisa Language Policy of 2023, which declares the status, parity and esteem of these official languages regarding usage in formal function domains, namely education, economy, social and politics. The aim of this paper is to ensure that quality assurance is ultimately accomplished in terms of teaching and learning standards. Eventually, all South African languages can be used for official domains to achieve functional multilingualism. This paper furthermore points out that content analysis as a research instrument as far as a qualitative approach is concerned may be used as a data collection technique. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=repository" title="repository">repository</a>, <a href="https://publications.waset.org/abstracts/search?q=multilingualism" title=" multilingualism"> multilingualism</a>, <a href="https://publications.waset.org/abstracts/search?q=policy" title=" policy"> policy</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a> </p> <a href="https://publications.waset.org/abstracts/188292/language-services-as-a-means-of-language-repository-for-tuition-support-and-facilitation-of-learning-in-institution-of-higher-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188292.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">31</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">542</span> Impact of Crises on Official Statistics: Environmental Statistics at Statistical Centre for the Cooperation Council for the Arab Countries of the Gulf during the COVID-19 Pandemic: A Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ibtihaj%20Al-Siyabi">Ibtihaj Al-Siyabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The crisis of COVID-19 posed enormous challenges to the statistical providers. While official statistics were disrupted by the pandemic and related containment measures, there was a growing and pressing need for real-time data and statistics to inform decisions. This paper gives an account of the way the pandemic impacted the operations of the National Statistical Offices (NSOs) in general in terms of data collection and methods used and the main challenges encountered by them based on international surveys. It highlights the performance of the Statistical Centre for the Cooperation Council for the Arab Countries of the Gulf, GCC-STAT, and its responsiveness to the pandemic placing special emphasis on environmental statistics. The paper concludes by confirming the GCC-STAT’s resilience and success in facing the challenges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NSO" title="NSO">NSO</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=statistics" title=" statistics"> statistics</a>, <a href="https://publications.waset.org/abstracts/search?q=crisis" title=" crisis"> crisis</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a> </p> <a href="https://publications.waset.org/abstracts/151995/impact-of-crises-on-official-statistics-environmental-statistics-at-statistical-centre-for-the-cooperation-council-for-the-arab-countries-of-the-gulf-during-the-covid-19-pandemic-a-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151995.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">541</span> Hidden Hot Spots: Identifying and Understanding the Spatial Distribution of Crime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lauren%20C.%20Porter">Lauren C. Porter</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Curtis"> Andrew Curtis</a>, <a href="https://publications.waset.org/abstracts/search?q=Eric%20Jefferis"> Eric Jefferis</a>, <a href="https://publications.waset.org/abstracts/search?q=Susanne%20Mitchell"> Susanne Mitchell</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A wealth of research has been generated examining the variation in crime across neighborhoods. However, there is also a striking degree of crime concentration within neighborhoods. A number of studies show that a small percentage of street segments, intersections, or addresses account for a large portion of crime. Not surprisingly, a focus on these crime hot spots can be an effective strategy for reducing community level crime and related ills, such as health problems. However, research is also limited in an important respect. Studies tend to use official data to identify hot spots, such as 911 calls or calls for service. While the use of call data may be more representative of the actual level and distribution of crime than some other official measures (e.g. arrest data), call data still suffer from the 'dark figure of crime.' That is, there is most certainly a degree of error between crimes that occur versus crimes that are reported to the police. In this study, we present an alternative method of identifying crime hot spots, that does not rely on official data. In doing so, we highlight the potential utility of neighborhood-insiders to identify and understand crime dynamics within geographic spaces. Specifically, we use spatial video and geo-narratives to record the crime insights of 36 police, ex-offenders, and residents of a high crime neighborhood in northeast Ohio. Spatial mentions of crime are mapped to identify participant-identified hot spots, and these are juxtaposed with calls for service (CFS) data. While there are bound to be differences between these two sources of data, we find that one location, in particular, a corner store, emerges as a hot spot for all three groups of participants. Yet it does not emerge when we examine CFS data. A closer examination of the space around this corner store and a qualitative analysis of narrative data reveal important clues as to why this store may indeed be a hot spot, but not generate disproportionate calls to the police. In short, our results suggest that researchers who rely solely on official data to study crime hot spots may risk missing some of the most dangerous places. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime" title="crime">crime</a>, <a href="https://publications.waset.org/abstracts/search?q=narrative" title=" narrative"> narrative</a>, <a href="https://publications.waset.org/abstracts/search?q=video" title=" video"> video</a>, <a href="https://publications.waset.org/abstracts/search?q=neighborhood" title=" neighborhood"> neighborhood</a> </p> <a href="https://publications.waset.org/abstracts/76986/hidden-hot-spots-identifying-and-understanding-the-spatial-distribution-of-crime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76986.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">238</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=18">18</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=19">19</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=official%20secrecy&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10