CINXE.COM
Search results for: secrecy
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <script> var _paq = window._paq = window._paq || []; /* tracker methods like "setCustomDimension" should be called before "trackPageView" */ _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="//matomo.waset.org/"; _paq.push(['setTrackerUrl', u+'matomo.php']); _paq.push(['setSiteId', '2']); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s); })(); </script> <!-- End Matomo Code --> <title>Search results for: secrecy</title> <meta name="description" content="Search results for: secrecy"> <meta name="keywords" content="secrecy"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="secrecy" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2025/2026/2027">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="secrecy"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 32</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: secrecy</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> Achievable Average Secrecy Rates over Bank of Parallel Independent Fading Channels with Friendly Jamming</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Munnujahan%20Ara">Munnujahan Ara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we investigate the effect of friendly jamming power allocation strategies on the achievable average secrecy rate over a bank of parallel fading wiretap channels. We investigate the achievable average secrecy rate in parallel fading wiretap channels subject to Rayleigh and Rician fading. The achievable average secrecy rate, due to the presence of a line-of-sight component in the jammer channel is also evaluated. Moreover, we study the detrimental effect of correlation across the parallel sub-channels, and evaluate the corresponding decrease in the achievable average secrecy rate for the various fading configurations. We also investigate the tradeoff between the transmission power and the jamming power for a fixed total power budget. Our results, which are applicable to current orthogonal frequency division multiplexing (OFDM) communications systems, shed further light on the achievable average secrecy rates over a bank of parallel fading channels in the presence of friendly jammers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fading%20parallel%20channels" title="fading parallel channels">fading parallel channels</a>, <a href="https://publications.waset.org/abstracts/search?q=wire-tap%20channel" title=" wire-tap channel"> wire-tap channel</a>, <a href="https://publications.waset.org/abstracts/search?q=OFDM" title=" OFDM"> OFDM</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy%20capacity" title=" secrecy capacity"> secrecy capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20allocation" title=" power allocation"> power allocation</a> </p> <a href="https://publications.waset.org/abstracts/25080/achievable-average-secrecy-rates-over-bank-of-parallel-independent-fading-channels-with-friendly-jamming" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25080.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">517</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> Security Over OFDM Fading Channels with Friendly Jammer</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Munnujahan%20Ara">Munnujahan Ara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we investigate the effect of friendly jamming power allocation strategies on the achievable average secrecy rate over a bank of parallel fading wiretap channels. We investigate the achievable average secrecy rate in parallel fading wiretap channels subject to Rayleigh and Rician fading. The achievable average secrecy rate, due to the presence of a line-of-sight component in the jammer channel is also evaluated. Moreover, we study the detrimental effect of correlation across the parallel sub-channels, and evaluate the corresponding decrease in the achievable average secrecy rate for the various fading configurations. We also investigate the tradeoff between the transmission power and the jamming power for a fixed total power budget. Our results, which are applicable to current orthogonal frequency division multiplexing (OFDM) communications systems, shed further light on the achievable average secrecy rates over a bank of parallel fading channels in the presence of friendly jammers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fading%20parallel%20channels" title="fading parallel channels">fading parallel channels</a>, <a href="https://publications.waset.org/abstracts/search?q=wire-tap%20channel" title=" wire-tap channel"> wire-tap channel</a>, <a href="https://publications.waset.org/abstracts/search?q=OFDM" title=" OFDM"> OFDM</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy%20capacity" title=" secrecy capacity"> secrecy capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20allocation" title=" power allocation"> power allocation</a> </p> <a href="https://publications.waset.org/abstracts/25078/security-over-ofdm-fading-channels-with-friendly-jammer" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25078.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">509</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> The Secrecy Capacity of the Semi-Deterministic Wiretap Channel with Three State Information</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mustafa%20El-Halabi">Mustafa El-Halabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A general model of wiretap channel with states is considered, where the legitimate receiver and the wiretapper’s observations depend on three states S1, S2 and S3. State S1 is non-causally known to the encoder, S2 is known to the receiver, and S3 remains unknown. A secure coding scheme, based using structured-binning, is proposed, and it is shown to achieve the secrecy capacity when the signal at legitimate receiver is a deterministic function of the input. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=physical%20layer%20security" title="physical layer security">physical layer security</a>, <a href="https://publications.waset.org/abstracts/search?q=interference" title=" interference"> interference</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20information" title=" side information"> side information</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy%20capacity" title=" secrecy capacity"> secrecy capacity</a> </p> <a href="https://publications.waset.org/abstracts/48861/the-secrecy-capacity-of-the-semi-deterministic-wiretap-channel-with-three-state-information" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48861.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">29</span> Combating Money Laundering and Inroads into Banking Secrecy: Evidence from Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aspalella%20A.%20Rahman">Aspalella A. Rahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is widely accepted that the investigation of money laundering and the tracing and confiscation of criminal proceeds have intruded into the principles of banking secrecy. The inroads into banking secrecy present serious threats to democracy, and more importantly, to the traditional banker-customer relationship. It is generally accepted that the fight against money laundering is in conflict with the secrecy rule. Banking secrecy is a customer privilege whereas combating crime is critical for public safety and security. Indeed, achieving a proper balance is a desirable goal. But how we go about achieving such a balance is a question encountered by many law enforcement authorities. Therefore, this paper examines the effect of disclosure under the Malaysian anti-money laundering laws on the traditional duty of banks to keep the customer’s information confidential. It also analyzes whether the Malaysian laws provide a right balance between a duty to keep customer’s information secret and a duty to disclose such information in the fight against money laundering. On closer inspection, it is submitted that the Malaysian laws provide sufficient safeguards to ensure that the disclosure of customer’s information is carried out in a manner that is not prejudicial to the interest of legitimate customers. This is a positive approach that could protect the innocent customers from being mistreated by the law. Ultimately, it can be said that the growing threat of global money laundering and terrorism makes the overriding of banking secrecy justified because without a flow of information from the banks, the effective prevention of the menace is not possible. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-money%20laundering%20law" title="anti-money laundering law">anti-money laundering law</a>, <a href="https://publications.waset.org/abstracts/search?q=banker-customer%20relationship" title=" banker-customer relationship"> banker-customer relationship</a>, <a href="https://publications.waset.org/abstracts/search?q=banking%20secrecy" title=" banking secrecy"> banking secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title=" money laundering"> money laundering</a> </p> <a href="https://publications.waset.org/abstracts/4993/combating-money-laundering-and-inroads-into-banking-secrecy-evidence-from-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4993.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">436</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahdi%20Rahimi">Mahdi Rahimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Mahdi%20Mojahedian"> Mohammad Mahdi Mojahedian</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Reza%20Aref"> Mohammad Reza Aref</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=physical%20layer%20security" title="physical layer security">physical layer security</a>, <a href="https://publications.waset.org/abstracts/search?q=stochastic%20geometry" title=" stochastic geometry"> stochastic geometry</a>, <a href="https://publications.waset.org/abstracts/search?q=device-to-device" title=" device-to-device"> device-to-device</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware%20impairment" title=" hardware impairment"> hardware impairment</a> </p> <a href="https://publications.waset.org/abstracts/148278/secrecy-analysis-in-downlink-cellular-networks-in-the-presence-of-d2d-pairs-and-hardware-impairment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148278.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">192</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> Official Secrecy and Confidentiality in Tax Administration and Its Impact on Right to Access Information: Nigerian Perspectives</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kareem%20Adedokun">Kareem Adedokun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Official secrecy is one of the colonial vestiges which upholds non – disclosure of essential information for public consumption. Information, though an indispensable tool in tax administration, is not to be divulged by any person in an official duty of the revenue agency. As a matter o fact, the Federal Inland Revenue Service (Establishment) Act, 2007 emphasizes secrecy and confidentiality in dealing with tax payer’s document, information, returns and assessment in a manner reminiscent of protecting tax payer’s privacy in all situations. It is so serious that any violation attracts criminal sanction. However, Nigeria, being a democratic and egalitarian state recently enacted Freedom of Information Act which heralded in openness in governance and takes away the confidentialities associated with official secrets Laws. Official secrecy no doubts contradicts the philosophy of freedom of information but maintaining a proper balance between protected rights of tax payers and public interest which revenue agency upholds is an uphill task. Adopting the Doctrinal method, therefore, the author of this paper probes into the real nature of the relationship between taxpayers and Revenue Agencies. It also interfaces official secrecy with the doctrine of Freedom of Information and consequently queries the retention of non – disclosure clause under Federal Inland Revenue Service (Establishment) Act (FIRSEA) 2007. The paper finds among others that non – disclosure provision in tax statutes particularly as provided for in FIRSEA is not absolute; so also is the constitutional rights and freedom of information and unless the non – disclosure clause finds justification under any recognized exemption provided under the Freedom of Information Act, its retention is antithesis to democratic ethos and beliefs as it may hinder public interest and public order. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title="confidentiality">confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=official%20secrecy" title=" official secrecy"> official secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=tax%20administration" title=" tax administration"> tax administration</a> </p> <a href="https://publications.waset.org/abstracts/71846/official-secrecy-and-confidentiality-in-tax-administration-and-its-impact-on-right-to-access-information-nigerian-perspectives" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71846.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> A History of Knowledge Management: A Chronological Account from the 1970s to 2017</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alexslis%20N.%20Maindze">Alexslis N. Maindze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Knowledge management (KM) has become an imperative to modern business growth, competitive edge, and sustainability. Though there has been extensive research in the field, this literature overview showcases massive gaps that exist on the coverage of the field’s rich and fascinating history. Particularly, accounts of the history of KM are inconsistent and fragmentary in breadth and depth. This paper presents new insights into the history of KM from the early 70s when the actual coinage ‘knowledge management’ entered the literature. It reveals how knowledge over the years was shrouded in secrecy and subsumed by technology. It makes a clear distinction between the histories of the debate around knowledge and that of KM. The paper also finds a history of KM filled with skepticisms and engulfed by an ‘intellectual paradox’. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management%20history" title="knowledge management history">knowledge management history</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy" title=" secrecy"> secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=skepticism" title=" skepticism"> skepticism</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20paradox" title=" intellectual paradox"> intellectual paradox</a> </p> <a href="https://publications.waset.org/abstracts/74333/a-history-of-knowledge-management-a-chronological-account-from-the-1970s-to-2017" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74333.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">226</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> Position of the Constitutional Court of the Russian Federation on the Matter of Restricting Constitutional Rights of Citizens Concerning Banking Secrecy </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20V.%20Shashkova">A. V. Shashkova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the present article is to analyze the position of the Constitutional Court of the Russian Federation on the matter of restricting the constitutional rights of citizens to inviolability of professional and banking secrecy in effecting controlling activities. The methodological ground of the present Article represents the dialectic scientific method of the socio-political, legal and organizational processes with the principles of development, integrity, and consistency, etc. The consistency analysis method is used while researching the object of the analysis. Some public-private research methods are also used: the formally-logical method or the comparative legal method, are used to compare the understanding of the ‘secrecy’ concept. The aim of the present article is to find the root of the problem and to give recommendations for the solution of the problem. The result of the present research is the author’s conclusion on the necessity of the political will to improve Russian legislation with the aim of compliance with the provisions of the Constitution. It is also necessary to establish a clear balance between the constitutional rights of the individual and the limit of these rights when carrying out various control activities by public authorities. Attempts by the banks to "overdo" an anti-money laundering law under threat of severe sanctions by the regulators actually led to failures in the execution of normal economic activity. Therefore, individuals face huge problems with payments on the basis of clearing, in addition to problems with cash withdrawals. The Bank of Russia sets requirements for banks to execute Federal Law No. 115-FZ too high. It is high place to attract political will here. As well, recent changes in Russian legislation, e.g. allowing banks to refuse opening of accounts unilaterally, simplified banking activities in the country. The article focuses on different theoretical approaches towards the concept of “secrecy”. The author gives an overview of the practices of Spain, Switzerland and the United States of America on the matter of restricting the constitutional rights of citizens to inviolability of professional and banking secrecy in effecting controlling activities. The Constitutional Court of the Russian Federation basing on the Constitution of the Russian Federation has its special understanding of the issue, which should be supported by further legislative development in the Russian Federation<em>. </em> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constitutional%20court" title="constitutional court">constitutional court</a>, <a href="https://publications.waset.org/abstracts/search?q=restriction%20of%20constitutional%20rights" title=" restriction of constitutional rights"> restriction of constitutional rights</a>, <a href="https://publications.waset.org/abstracts/search?q=bank%20secrecy" title=" bank secrecy"> bank secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=control%20measures" title=" control measures"> control measures</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title=" money laundering"> money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20control" title=" financial control"> financial control</a>, <a href="https://publications.waset.org/abstracts/search?q=banking%20information" title=" banking information"> banking information</a> </p> <a href="https://publications.waset.org/abstracts/75334/position-of-the-constitutional-court-of-the-russian-federation-on-the-matter-of-restricting-constitutional-rights-of-citizens-concerning-banking-secrecy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75334.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">189</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">24</span> Development of a Data Security Model Using Steganography</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Terungwa%20Simon%20Yange">Terungwa Simon Yange</a>, <a href="https://publications.waset.org/abstracts/search?q=Agana%20Moses%20A."> Agana Moses A.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=steganography" title="steganography">steganography</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=decryption" title=" decryption"> decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy" title=" secrecy"> secrecy</a> </p> <a href="https://publications.waset.org/abstracts/36466/development-of-a-data-security-model-using-steganography" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36466.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">270</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> A Quantum Resistant Remote E-voting Protocol for Computationally Unbounded Adversary</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zemenfes%20Hailemariam%20Gebremedhin">Zemenfes Hailemariam Gebremedhin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This dissertation presents a comprehensive examination of e-voting protocols with a specific focus on their robustness against quantum computing threats. Our study introduces an evoting protocol designed to provide enhanced security through quantum-resistant cryptographic techniques. Extensive Monte Carlo simulations were conducted across various electoral conditions to evaluate the effectiveness of our proposed protocol compared to the Helios system. In standard electoral settings, our protocol demonstrated superior performance with notable improvements in ballot secrecy and dispute resolution, achieving a higher overall satisfaction rate than Helios. Particularly, it outperformed Helios in ballot secrecy (93% versus 91%) and dispute resolution (91% versus 90%). In high-security risk scenarios, it excelled in maintaining ballot secrecy and effectively managing dispute resolutions under stress, demonstrating robustness against cyber threats. The proposed system also proved highly adaptable in low voter turnout scenarios, ensuring the integrity and availability of the voting process, and outperforming existing systems in universal verifiability and eligibility. Through these evaluations, the protocol demonstrated potential to significantly enhance the security and reliability of e-voting systems in facing quantum computational threats. Our findings contribute to the ongoing discourse on digital democracy, emphasizing the importance of developing secure, transparent, and resilient voting systems. The study not only underscores the necessity for future e-voting systems to integrate quantum-resistant mechanisms but also provides a foundational framework for the enhancement of electoral integrity in the age of quantum computing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=quantum-resistant" title="quantum-resistant">quantum-resistant</a>, <a href="https://publications.waset.org/abstracts/search?q=e-voting" title=" e-voting"> e-voting</a>, <a href="https://publications.waset.org/abstracts/search?q=Monte%20Carlo%20simulation" title=" Monte Carlo simulation"> Monte Carlo simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20democracy" title=" digital democracy"> digital democracy</a> </p> <a href="https://publications.waset.org/abstracts/198595/a-quantum-resistant-remote-e-voting-protocol-for-computationally-unbounded-adversary" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/198595.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">3</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">22</span> Enhancement of Energy Harvesting-Enabled Decode and Forward Cooperative Cognitive Radio System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ojo%20Samson%20Iyanda">Ojo Samson Iyanda</a>, <a href="https://publications.waset.org/abstracts/search?q=Adeleke%20Oluseye%20A."> Adeleke Oluseye A.</a>, <a href="https://publications.waset.org/abstracts/search?q=Ojo%20Oluwaseun%20A."> Ojo Oluwaseun A.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recent developments in the Wireless communication (WC) community has necessitated a paradigm shift in the effective usage of network resources to provide better Quality of Service (QoS) to wireless subscribers. However, the daily increase in the number of users accessing WC services makes frequency spectrum a valuable yet limited resource. Energy harvesting-enabled Decode and Forward Cooperative Cognitive Radio (DFCCR) used to solve this problem faced significant challenges in achieving efficient performance and signal insecurity due to channel fading and broadcast nature of the transmitted signal. Hence, this paper enhanced the performance of the existing DFCCR. PU signal is propagated from the source at different time slots using time diversity. The different versions of the transmitted signal are received at the SU’s transceiver. The received signal at the SU transceiver is decoded and SU superimposes its own information on the decoded signal using exclusive OR (XOR) rule. Jamming signal is created at the SU node and added to the SU transmitting signal. Outage Probability (OP) and Secrecy Capacity (SC) are derived to evaluate the performance of the proposed technique. The proposed energy harvesting-enabled DFCCR enhanced the performance of existing technique with 65% reduction in OP and 50% improvement in SC. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cognitive%20radio" title="cognitive radio">cognitive radio</a>, <a href="https://publications.waset.org/abstracts/search?q=RF%20energy%20harvesting" title=" RF energy harvesting"> RF energy harvesting</a>, <a href="https://publications.waset.org/abstracts/search?q=decode%20and%20forward" title=" decode and forward"> decode and forward</a>, <a href="https://publications.waset.org/abstracts/search?q=secrecy%20capacity" title=" secrecy capacity"> secrecy capacity</a> </p> <a href="https://publications.waset.org/abstracts/195951/enhancement-of-energy-harvesting-enabled-decode-and-forward-cooperative-cognitive-radio-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/195951.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">22</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">21</span> On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Behnam%20Zahednejad">Behnam Zahednejad</a>, <a href="https://publications.waset.org/abstracts/search?q=Saeed%20Kosari"> Saeed Kosari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IoT" title="IoT">IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=two-factor%20security" title=" two-factor security"> two-factor security</a>, <a href="https://publications.waset.org/abstracts/search?q=cancelable%20biometric" title=" cancelable biometric"> cancelable biometric</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20compromise%20impersonation%20resilience" title=" key compromise impersonation resilience"> key compromise impersonation resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=perfect%20forward%20secrecy" title=" perfect forward secrecy"> perfect forward secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=database%20attack" title=" database attack"> database attack</a>, <a href="https://publications.waset.org/abstracts/search?q=real-or-random%20model" title=" real-or-random model"> real-or-random model</a>, <a href="https://publications.waset.org/abstracts/search?q=ProVerif" title=" ProVerif"> ProVerif</a> </p> <a href="https://publications.waset.org/abstracts/160983/on-the-design-of-a-secure-two-party-authentication-scheme-for-internet-of-things-using-cancelable-biometrics-and-physically-unclonable-functions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160983.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">107</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">20</span> Robust Image Design Based Steganographic System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sadiq%20J.%20Abou-Loukh">Sadiq J. Abou-Loukh</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanan%20M.%20Habbi"> Hanan M. Habbi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a steganography to hide the transmitted information without excite suspicious and also illustrates the level of secrecy that can be increased by using cryptography techniques. The proposed system has been implemented firstly by encrypted image file one time pad key and secondly encrypted message that hidden to perform encryption followed by image embedding. Then the new image file will be created from the original image by using four triangles operation, the new image is processed by one of two image processing techniques. The proposed two processing techniques are thresholding and differential predictive coding (DPC). Afterwards, encryption or decryption keys are generated by functional key generator. The generator key is used one time only. Encrypted text will be hidden in the places that are not used for image processing and key generation system has high embedding rate (0.1875 character/pixel) for true color image (24 bit depth). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=encryption" title="encryption">encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=thresholding" title=" thresholding"> thresholding</a>, <a href="https://publications.waset.org/abstracts/search?q=differential%0D%0Apredictive%20coding" title=" differential predictive coding"> differential predictive coding</a>, <a href="https://publications.waset.org/abstracts/search?q=four%20triangles%20operation" title=" four triangles operation "> four triangles operation </a> </p> <a href="https://publications.waset.org/abstracts/16654/robust-image-design-based-steganographic-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16654.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">499</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">19</span> Secure Transmission Scheme in Device-to-Device Multicast Communications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bangwon%20Seo">Bangwon Seo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we consider multicast device-to-device (D2D) direct communication systems in cellular networks. In multicast D2D communications, nearby mobile devices exchanges, their data directly without going through a base station and a D2D transmitter send its data to multiple D2D receivers that compose of D2D multicast group. We consider wiretap channel where there is an eavesdropper that attempts to overhear the transmitted data of the D2D transmitter. In this paper, we propose a secure transmission scheme in D2D multicast communications in cellular networks. In order to prevent the eavesdropper from overhearing the transmitted data of the D2D transmitter, a precoding vector is employed at the D2D transmitter in the proposed scheme. We perform computer simulations to evaluate the performance of the proposed scheme. Through the simulation, we show that the secrecy rate performance can be improved by selecting an appropriate precoding vector. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=device-to-device%20communications" title="device-to-device communications">device-to-device communications</a>, <a href="https://publications.waset.org/abstracts/search?q=wiretap%20channel" title=" wiretap channel"> wiretap channel</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20transmission" title=" secure transmission"> secure transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=precoding" title=" precoding"> precoding</a> </p> <a href="https://publications.waset.org/abstracts/64163/secure-transmission-scheme-in-device-to-device-multicast-communications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64163.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">298</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18</span> Anti-Language in Jordanian Spoken Arabic: A Sociolinguistic Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Mohammad%20Al-Harahsheh">Ahmad Mohammad Al-Harahsheh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Anti-language reflects anti-society; it is a restricted spoken code used among a group of interlocutors because of anti-society. This study aims to shed light on the sociolinguistic characteristics of anti-language used by prisoners in Jordan. The participants included were 15 male-Jordanian prisoners who have recently been released. The data were written, transliterated, and analyzed on the basis of sociolinguistics and discourse analysis. This study draws on sociolinguistic theory of language codes as the theoretical framework. The study concludes that anti-language is a male language and is used for secrecy, as the prisoners' tendency to protect themselves from the police; it is a verbal competition, contest and display. In addition, it is employed to express obnoxious ideas and acts by using more pleasant or blurred words and expressions. Also, the anti-language used by prisoners has six linguistic characteristics in JSA (Jordanian Spoken Arabic), such as relexicalization, neologism, rhyme formation, semantic change, derivation, and metaphorical expressions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-language" title="anti-language">anti-language</a>, <a href="https://publications.waset.org/abstracts/search?q=Jordanian%20Spoken%20Arabic" title=" Jordanian Spoken Arabic"> Jordanian Spoken Arabic</a>, <a href="https://publications.waset.org/abstracts/search?q=sociolinguistics" title=" sociolinguistics"> sociolinguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=prisoners" title=" prisoners"> prisoners</a> </p> <a href="https://publications.waset.org/abstracts/50307/anti-language-in-jordanian-spoken-arabic-a-sociolinguistic-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50307.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">372</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17</span> Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Masese%20Chuma%20Benard">Masese Chuma Benard</a>, <a href="https://publications.waset.org/abstracts/search?q=Martin%20Onsiro%20Ronald"> Martin Onsiro Ronald</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20security" title="data security">data security</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=small%20and%20medium-sized%20firms%20%28SMEs%29" title=" small and medium-sized firms (SMEs)"> small and medium-sized firms (SMEs)</a> </p> <a href="https://publications.waset.org/abstracts/164082/survey-on-data-security-issues-through-cloud-computing-amongst-smes-in-nairobi-county-kenya" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164082.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">90</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> Emotional and Embodied Knowledge and Responses</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Salman%20Khokhar">Salman Khokhar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The geopolitical landscape in Pakistan has become shrouded with suspicion between the state and the Ahmadiyya Muslim Community. The study argues that the social mobility of the community has become severely compromised, especially after the inception of the blasphemy laws and their subsequent enhancements in later years. The securitization of the community has ensured that the daily lives of Ahmadi Muslims have become severely restricted as their integration and assimilation into society become defined through their religious identity and beliefs. Consequently, performing congregational prayers or engaging in any other community activity is carried out secretly as the repercussions of such actions may lead to incarceration or, in some cases, even more extreme apprehension measures. The securitization of Ahmadis, and their daily lives are severely curtailed in Pakistan; however, due to transnational approaches, the community must implement specific measures to ensure the safety of its members, even in the West. The eyes of suspicion are always on the activities of the Ahmadiyya Muslim Community, and the community’s headquarters in Rabwah is always being viewed with suspicious lenses. The study considers how secrecy has enveloped the everyday life of the Ahmadi Muslim community and how it embodies characteristics which we thought had come to an end many years ago. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=freedom" title="freedom">freedom</a>, <a href="https://publications.waset.org/abstracts/search?q=ideology" title=" ideology"> ideology</a>, <a href="https://publications.waset.org/abstracts/search?q=Islam" title=" Islam"> Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=persecution" title=" persecution"> persecution</a> </p> <a href="https://publications.waset.org/abstracts/150406/emotional-and-embodied-knowledge-and-responses" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150406.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> Design and Implementation of Pseudorandom Number Generator Using Android Sensors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mochamad%20Beta%20Auditama">Mochamad Beta Auditama</a>, <a href="https://publications.waset.org/abstracts/search?q=Yusuf%20Kurniawan"> Yusuf Kurniawan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A smartphone or tablet require a strong randomness to establish secure encrypted communication, encrypt files, etc. Therefore, random number generation is one of the main keys to provide secrecy. Android devices are equipped with hardware-based sensors, such as accelerometer, gyroscope, etc. Each of these sensors provides a stochastic process which has a potential to be used as an extra randomness source, in addition to /dev/random and /dev/urandom pseudorandom number generators. Android sensors can provide randomness automatically. To obtain randomness from Android sensors, each one of Android sensors shall be used to construct an entropy source. After all entropy sources are constructed, output from these entropy sources are combined to provide more entropy. Then, a deterministic process is used to produces a sequence of random bits from the combined output. All of these processes are done in accordance with NIST SP 800-22 and the series of NIST SP 800-90. The operation conditions are done 1) on Android user-space, and 2) the Android device is placed motionless on a desk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Android%20hardware-based%20sensor" title="Android hardware-based sensor">Android hardware-based sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=deterministic%20process" title=" deterministic process"> deterministic process</a>, <a href="https://publications.waset.org/abstracts/search?q=entropy%20source" title=" entropy source"> entropy source</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20number%20generation%2Fgenerators" title=" random number generation/generators"> random number generation/generators</a> </p> <a href="https://publications.waset.org/abstracts/64995/design-and-implementation-of-pseudorandom-number-generator-using-android-sensors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64995.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">379</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> Spontaneous Message Detection of Annoying Situation in Community Networks Using Mining Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Senthil%20Kumari">P. Senthil Kumari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Main concerns in data mining investigation are social controls of data mining for handling ambiguity, noise, or incompleteness on text data. We describe an innovative approach for unplanned text data detection of community networks achieved by classification mechanism. In a tangible domain claim with humble secrecy backgrounds provided by community network for evading annoying content is presented on consumer message partition. To avoid this, mining methodology provides the capability to unswervingly switch the messages and similarly recover the superiority of ordering. Here we designated learning-centered mining approaches with pre-processing technique to complete this effort. Our involvement of work compact with rule-based personalization for automatic text categorization which was appropriate in many dissimilar frameworks and offers tolerance value for permits the background of comments conferring to a variety of conditions associated with the policy or rule arrangements processed by learning algorithm. Remarkably, we find that the choice of classifier has predicted the class labels for control of the inadequate documents on community network with great value of effect. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=text%20mining" title="text mining">text mining</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20classification" title=" data classification"> data classification</a>, <a href="https://publications.waset.org/abstracts/search?q=community%20network" title=" community network"> community network</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20algorithm" title=" learning algorithm"> learning algorithm</a> </p> <a href="https://publications.waset.org/abstracts/27184/spontaneous-message-detection-of-annoying-situation-in-community-networks-using-mining-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27184.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">514</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Naveed%20Ghani">Naveed Ghani</a>, <a href="https://publications.waset.org/abstracts/search?q=Samreen%20Javed"> Samreen Javed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20worms" title="network worms">network worms</a>, <a href="https://publications.waset.org/abstracts/search?q=malware%20infection%20propagating%20malicious%20code" title=" malware infection propagating malicious code"> malware infection propagating malicious code</a>, <a href="https://publications.waset.org/abstracts/search?q=virus" title=" virus"> virus</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=VPN" title=" VPN"> VPN</a> </p> <a href="https://publications.waset.org/abstracts/2550/survey-based-data-security-evaluation-in-pakistan-financial-institutions-against-malicious-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2550.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">362</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> The Problem of Reconciling the Principle of Confidentiality in Foreign Investment Arbitration with the Public Interest</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=B%C3%A1rbara%20Magalh%C3%A3es%20Bravo">Bárbara Magalhães Bravo</a>, <a href="https://publications.waset.org/abstracts/search?q=Cl%C3%A1udia%20Figueiras"> Cláudia Figueiras</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The economical globalization through the liberalization of the markets and capitals boosted the economical development of the nations and the needs for sorting out the disputes arising from the foreign investment. The arbitration, for all the inherent advantages, such as swiftness, arbitrators’ specialise skills and impartiality sets a pacifier tool for the interest in account. Safeguarded the public interest, we face the problem of the confidentiality in the arbitration. The urgent development of impelling mechanisms concerning transparency, guaranty and protection of the interest in account, reveals itself urgent. Through a bibliography review, we will dense the state of art, by going through the several solutions concerning, and pointing out the most suitable. Through the jurisprudential analysis we will point out the solution for the conflict confidentiality/public interest. The transparency, inextricable from the public interest, imposes the arbitration process can be open to all citizens. Transparency rules have been considered at the UNCITRAL in attempting to conciliate the necessity of publicity and the public interest, however still insufficient. The arbitration of foreign investment carries consequences to the citizens of the State. Articulating mechanisms between the arbitral procedures secrecy and the public interest should be adopted. The arbitration of foreign investment, being a <em>tertius genius </em>between the international arbitration and the administrative arbitration would claim its own regulation in each and every States where the confidentiality rules and its exceptions could be identified. One should enquiry where the limit of the citizens’ individual rights protection and the public interest should give way to the principle of transparency <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arbitration" title="arbitration">arbitration</a>, <a href="https://publications.waset.org/abstracts/search?q=foreign%20investment" title=" foreign investment"> foreign investment</a>, <a href="https://publications.waset.org/abstracts/search?q=transparency" title=" transparency"> transparency</a>, <a href="https://publications.waset.org/abstracts/search?q=confidenciality" title=" confidenciality"> confidenciality</a>, <a href="https://publications.waset.org/abstracts/search?q=International%20Centre%20for%20Settlement%20of%20Investment%20Disputes%20UNCITRAL" title=" International Centre for Settlement of Investment Disputes UNCITRAL"> International Centre for Settlement of Investment Disputes UNCITRAL</a> </p> <a href="https://publications.waset.org/abstracts/90432/the-problem-of-reconciling-the-principle-of-confidentiality-in-foreign-investment-arbitration-with-the-public-interest" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90432.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">222</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Role of International Organizations towards Good Governance: Recent Trends</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20Prema%20Shyam">E. Prema Shyam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The role of international organizations has contributed in various ways for the good governance in the world at large. Since the beginning of the 1990s international organizations, particularly those active in the areas of human rights, trade and economic etc., have embraced a 'good governance'. It is also pertinent to mention that the application of the concept of good governance to international organizations themselves and not exclusively to national or regional polities is a more recent phenomenon. Especially since the second half of the 1990s, a number of international organizations have carried out major governance reforms, assuming that their calls for governments to heed higher standards of good governance will be all the more credible provided that they develop a good governance standard for themselves. In addition to this number of organizations such as the United Nations (UN), Organisation for Economic Co-operation and Development (OECD), European Union (EU), International Committee of the Red Cross and World Trade Organization (WTO). OECD has been specifically mobilized to fight corruption. The World Bank was the first international organization to address the issue of good governance when it attributed the African development crisis to a crisis of governance in a 1989 report. International organizations are often denounced for their lack of transparency and democracy. However, in the last few years, a number of them have pushed through impressive reforms aimed at enhancing good governance standards within their own organizations, especially in the light of their long-standing secrecy. This is a remnant of the traditional conception of international organizations, which renders them merely answerable to their Members. International organizations have already gone quite some way in the areas of good management and opening up to the public. However, as far as participatory governance is concerned, lot to be done for the larger interest of society. In this paper, an attempt has been made to focus the issues on international organisations with regard to good governance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=good%20governance" title="good governance">good governance</a>, <a href="https://publications.waset.org/abstracts/search?q=World%20Trade%20Organisation" title=" World Trade Organisation"> World Trade Organisation</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20organisation" title=" international organisation"> international organisation</a>, <a href="https://publications.waset.org/abstracts/search?q=governance%20reforms" title=" governance reforms"> governance reforms</a> </p> <a href="https://publications.waset.org/abstracts/24152/role-of-international-organizations-towards-good-governance-recent-trends" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24152.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">460</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> From Ritual to Entertainment: Echoes of Realism and Creativity in Costumes of Masquerades in New Nigerian Festivals</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bernard%20Eze%20Orji">Bernard Eze Orji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The masquerade, which is the most popular indigenous art form in Africa, is obviously identified by its elaborate, weird, and opulent costumes. The costume is the major essential accouterments in the art of the masquerade. From time past, masquerades have performed and enjoyed the freedom associated with its inscrutability and mystification solely because of its costumes. Noninitiates and women watched masquerades from a distance due to the reverence attached to its costumes and performances. In fact, whether in performance or as an item of art, the masquerade costume was seen as an embodiment of a tradition of liveliness, showiness, secrecy, and sacredness. This liveliness and showiness transformed masked characters who are believed to be possessed by spirits of ancestors and animals that inhabited the costumes. However, with the translocation of masquerade in new festivals such as carnival and state-sponsored cultural days, its costumes have been reduced to a mere item of entertainment and aesthetic values. The sacredness and reverence which hitherto elevated masquerade art to the point of wonderment have given way to an aesthetic appreciation of ingenious and individual creativity deployed in these festivals. This is as a result of the realistic and artistic creations that pervade masquerade costumes and masks in these festivals. It is a common sight to see such masquerades of animal and human genera like a lion, elephant, hippopotamus, and antelope; Agbogho Mmuo, Adamma, and Nchiekwa, respectively. This creative flair has emerged to expunge the ritual narratives associated with masquerades in the past. The study utilized performance analysis and aesthetic theory to establish that the creative ingenuity deployed by fine artists and mask designers who combine traditional artifacts to achieve modern masterpieces for the masquerades of the new festivals have reduced the ritual trappings and hype ascribed to masquerades in indigenous societies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=costume%20and%20mask%20designs" title="costume and mask designs">costume and mask designs</a>, <a href="https://publications.waset.org/abstracts/search?q=entertainment" title=" entertainment"> entertainment</a>, <a href="https://publications.waset.org/abstracts/search?q=masquerade" title=" masquerade"> masquerade</a>, <a href="https://publications.waset.org/abstracts/search?q=ritual" title=" ritual"> ritual</a> </p> <a href="https://publications.waset.org/abstracts/113845/from-ritual-to-entertainment-echoes-of-realism-and-creativity-in-costumes-of-masquerades-in-new-nigerian-festivals" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/113845.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> Right to Information in Egypt and the Prospects of Renegotiating a New Social Order</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farida%20Ibrahim">Farida Ibrahim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Right to information is the public's right to know through having access to public information held by state bodies. Recognized as a cornerstone in transparent, participatory and open democracies, the right to information is increasingly perceived today as an emerging human right on the international level. While this right is conceptualized in a range of different contexts, the paper focuses on its conceptualization as a force for socio-economic change for disadvantaged groups. The paper's goal is study the instrumental capacity of this right in empowering the public to access state-held information pertinent to their socio-economic rights. In this regard, the paper views the right to information as an inclusionary tool that is capable of spurring inclusion for individuals excluded from the ambits of both: public participation and social justice. For exploring this, the paper examines the advocacy role played by civil society groups in furthering this instrumental capacity. In particular, the paper presents a focused account on the Egyptian case. While Egypt has recently adopted its constitutional provision on access to information, doubts arise on Egyptian citizens' genuine ability to access information held by state bodies. The politico-economic environment, long term culture of bureaucratic secrecy, and legal framework do not provide promising outcomes on access to public information. Within the particular context of the Egyptian case, this paper questions the extent to which civil society in Egypt is capable of instrumentally employing the political opportunity offered by the constitutional entitlement to information access for pressuring public authorities to disclose information. Through four lawsuits brought by civil society groups in Egypt, the paper argues that the right to information has instrumentally provided civil society actors with new domains of mobilization for furthering the realization of social and economic rights, and ultimately, for renegotiating a new social order lining the relationship between the Egyptian state and its citizens marginalized by socio-economic imbalances. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=civil%20society" title="civil society">civil society</a>, <a href="https://publications.waset.org/abstracts/search?q=Egypt" title=" Egypt"> Egypt</a>, <a href="https://publications.waset.org/abstracts/search?q=right%20to%20information" title=" right to information"> right to information</a>, <a href="https://publications.waset.org/abstracts/search?q=socio-economic%20rights" title=" socio-economic rights"> socio-economic rights</a> </p> <a href="https://publications.waset.org/abstracts/69521/right-to-information-in-egypt-and-the-prospects-of-renegotiating-a-new-social-order" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69521.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> Formal Development of Electronic Identity Card System Using Event-B</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tomokazu%20Nagata">Tomokazu Nagata</a>, <a href="https://publications.waset.org/abstracts/search?q=Jawid%20Ahmad%20Baktash"> Jawid Ahmad Baktash</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The goal of this paper is to explore the use of formal methods for Electronic Identity Card System. Nowadays, one of the core research directions in a constantly growing distributed environment is the improvement of the communication process. The responsibility for proper verification becomes crucial. Formal methods can play an essential role in the development and testing of systems. The thesis presents two different methodologies for assessing correctness. Our first approach employs abstract interpretation techniques for creating a trace based model for Electronic Identity Card System. The model was used for building a semi decidable procedure for verifying the system model. We also developed the code for the eID System and can cover three parts login to system sending of Acknowledgment from user side, receiving of all information from server side and log out from system. The new concepts of impasse and spawned sessions that we introduced led our research to original statements about the intruder’s knowledge and eID system coding with respect to secrecy. Furthermore, we demonstrated that there is a bound on the number of sessions needed for the analysis of System.Electronic identity (eID) cards promise to supply a universal, nation-wide mechanism for user authentication. Most European countries have started to deploy eID for government and private sector applications. Are government-issued electronic ID cards the proper way to authenticate users of online services? We use the eID project as a showcase to discuss eID from an application perspective. The new eID card has interesting design features, it is contact-less, it aims to protect people’s privacy to the extent possible, and it supports cryptographically strong mutual authentication between users and services. Privacy features include support for pseudonymous authentication and per service controlled access to individual data items. The article discusses key concepts, the eID infrastructure, observed and expected problems, and open questions. The core technology seems ready for prime time and government projects deploy it to the masses. But application issues may hamper eID adoption for online applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=eID" title="eID">eID</a>, <a href="https://publications.waset.org/abstracts/search?q=event-B" title=" event-B"> event-B</a>, <a href="https://publications.waset.org/abstracts/search?q=Pro-B" title=" Pro-B"> Pro-B</a>, <a href="https://publications.waset.org/abstracts/search?q=formal%20method" title=" formal method"> formal method</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20passing" title=" message passing"> message passing</a> </p> <a href="https://publications.waset.org/abstracts/10886/formal-development-of-electronic-identity-card-system-using-event-b" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10886.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">238</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Christopher%20Holroyd">Christopher Holroyd</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20trafficking" title="human trafficking">human trafficking</a>, <a href="https://publications.waset.org/abstracts/search?q=reconstruction" title=" reconstruction"> reconstruction</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/127631/human-trafficking-and-terrorism-a-study-on-the-security-challenges-imposed-upon-countries-in-conflict" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127631.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> Tommy: Communication in Education about Disability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Karen%20V.%20Lee">Karen V. Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The background and significance of this study involve communication in education by a faculty advisor exploring story and music that informs others about a disabled teacher. Social issues draw deep reflection about the emotional turmoil. As a musician becoming a teacher is a passionate yet complex endeavor, the faculty advisor shares a poetic but painful story about a disabled teacher being inducted into the teaching profession. The qualitative research method as theoretical framework draws on autoethnography of music and story where the faculty advisor approaches a professor for advice. His musicianship shifts her forward, backward, and sideways through feelings that evoke and provoke curriculum to remove communication barriers in education. They discover they do not transfer knowledge from educational method classes. Instead, the autoethnography embeds musical language as a metaphorical conduit for removing communication barriers in teacher education. Sub-themes involve communication barriers and educational technologies to ensure teachers receive social, emotional, physical, spiritual, and intervention disability resources that evoke visceral, emotional responses from the audience. Major findings of the study discover how autoethnography of music and story bring the authors to understand wider political issues of the practicum internship for teachers with disabilities. An epiphany reveals the irony of living in a culture of both uniformity and diversity. They explore the constructs of secrecy, ideology, abnormality, and marginalization by evoking visceral and emotional responses from the audience. As the voices harmonize plot, climax, characterization, and denouement, they dramatize meaning that is episodic yet incomplete to highlight the circumstances surrounding the disabled protagonist’s life. In conclusion, the qualitative research method argues for embracing storied experiences that depict communication in education. Scholarly significance embraces personal thoughts and feelings as a way of understanding social phenomena while highlighting the importance of removing communication barriers in education. The circumstance about a teacher with a disability is not uncommon in society. Thus, the authors resolve to removing barriers in education by using stories to transform the personal and cultural influences that provoke new ways of thinking about the curriculum for a disabled teacher. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=communication%20in%20education" title="communication in education">communication in education</a>, <a href="https://publications.waset.org/abstracts/search?q=communication%20barriers" title=" communication barriers"> communication barriers</a>, <a href="https://publications.waset.org/abstracts/search?q=autoethnography" title=" autoethnography"> autoethnography</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching" title=" teaching"> teaching</a> </p> <a href="https://publications.waset.org/abstracts/42900/tommy-communication-in-education-about-disability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42900.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">244</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> The Emergence of Cold War Heritage: United Kingdom Cold War Bunkers and Sites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Peter%20Robinson">Peter Robinson</a>, <a href="https://publications.waset.org/abstracts/search?q=Milka%20Ivanova"> Milka Ivanova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Despite the growing interest in the Cold War period and heritage, little attention has been paid to the presentation and curatorship of Cold War heritage in eastern or western Europe. In 2021 Leeds Beckett University secured a British Academy Grant to explore visitor experiences, curatorship, emotion, and memory at Cold War-related tourist sites, comparing the perspectives of eastern and western European sites through research carried out in the UK and Bulgaria. The research explores the themes of curatorship, experience, and memory. Many of the sites included in the research in the UK-based part of the project are nuclear bunkers that have been decommissioned and are now open to visitors. The focus of this conference abstract is one of several perspectives drawn from a British Academy Grant-funded project exploring curatorship, visitor experience and nostalgia and memory in former cold war spaces in the UK, bringing together critical comparisons between western and eastern European sites. The project identifies specifically the challenges of ownership, preservation and presentation and discusses the challenges facing those who own, manage, and provide access to cold war museums and sites. The research is underpinned by contested issues of authenticity and ownership, discussing narrative accounts of those involved in caring for and managing these sites. The research project draws from interviews with key stakeholders, site observations, visitor surveys, and content analysis of Trip advisor posts. Key insights from the project include the external challenges owners and managers face from a lack of recognition of and funding for important Cold War sites in the UK that are at odds with interest shown in cold war sites by visitors to Cold War structures and landmarks. The challenges center on the lack of consistent approaches toward cold war heritage conservation, management, and ownership, lack of curatorial expertise and over-reliance on no-expert interpretation and presentation of heritage, the effect of the passage of time on personal connections to cold war heritage sites, the dissipating technological knowledge base, the challenging structure that does not lend themselves easily as visitor attractions or museums, the questionable authenticity of artifacts, the limited archival material, and quite often limited budgets. A particularly interesting insight focusing on nuclear bunkers has been on the difficulties in site reinterpretation because of the impossibility of fully exploring the enormity of nuclear war as a consistent threat of the Cold War. Further insights from the research highlight the secrecy of many of the sites as a key marketing strategy, particularly in relation to the nuclear bunker sites included in the project. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cold%20war" title="cold war">cold war</a>, <a href="https://publications.waset.org/abstracts/search?q=curatorship" title=" curatorship"> curatorship</a>, <a href="https://publications.waset.org/abstracts/search?q=heritage" title=" heritage"> heritage</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20bunkers." title=" nuclear bunkers."> nuclear bunkers.</a> </p> <a href="https://publications.waset.org/abstracts/165234/the-emergence-of-cold-war-heritage-united-kingdom-cold-war-bunkers-and-sites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165234.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">84</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4</span> Coping with Incompatible Identities in Russia: Case of Orthodox Gays</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Siuzan%20Uorner">Siuzan Uorner</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The era of late modernity is characterized, on the one hand, by social disintegration, values of personal freedom, tolerance, and self-expression. Boundaries between the accessible and the elitist, normal and abnormal are blurring. On the other hand, traditional social institutions, such as religion (especially Russian Orthodox Church), exist, criticizing lifestyle and worldview other than conventionally structured canons. Despite the declared values and opportunities in late modern society, people's freedom is ambivalent. Personal identity and its aspects are becoming a subject of choice. Hence, combinations of identity aspects can be incompatible. Our theoretical framework is based on P. Ricoeur's concept of narrative identity and hermeneutics, E. Goffman’s theory of social stigma, self-presentation, discrepant roles and W. James lectures about varieties of religious experience. This paper aims to reconstruct ways of coping with incompatible identities of Orthodox gays (an extreme sampling of a combination of sexual orientation and religious identity in a heteronormative society). This study focuses on the discourse of Orthodox gay parishioners and ROC gay priests in Russia (sampling ‘hard to reach’ populations because of the secrecy of gay community in ROC and sensitivity of the topic itself). We conducted a qualitative research design, using in-depth personal semi-structured online-interviews. Recruiting of informants took place in 'Nuntiare et Recreare' (Russian movement of religious LGBT) page in VKontakte through the post with an invitation to participate in the research. In this work, we analyzed interview transcripts using axial coding. We chose the Grounded Theory methodology to construct a theory from empirical data and contribute to the growing body of knowledge in ways of harmonizing incompatible identities in late modern societies. The research has found that there are two types of conflicts Orthodox gays meet with: canonic contradictions (postulates of Scripture and its interpretations) and problems in social interaction, mainly with ROC priests and Orthodox parishioners. We have revealed semantic meanings of most commonly used words that appear in the narratives (words such as ‘love’, ‘sin’, ‘religion’ etc.). Finally, we have reconstructed biographical patterns of LGBT social movements’ involvement. This paper argues that all incompatibilities are harmonizing in the narrative itself. As Ricoeur has suggested, the narrative configuration allows the speaker to gather facts and events together and to compose causal relationships between them. Sexual orientation and religious identity are getting along and harmonizing in the narrative. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gay%20priests" title="gay priests">gay priests</a>, <a href="https://publications.waset.org/abstracts/search?q=incompatible%20identities" title=" incompatible identities"> incompatible identities</a>, <a href="https://publications.waset.org/abstracts/search?q=narrative%20identity" title=" narrative identity"> narrative identity</a>, <a href="https://publications.waset.org/abstracts/search?q=Orthodox%20gays" title=" Orthodox gays"> Orthodox gays</a>, <a href="https://publications.waset.org/abstracts/search?q=religious%20identity" title=" religious identity"> religious identity</a>, <a href="https://publications.waset.org/abstracts/search?q=ROC" title=" ROC"> ROC</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20orientation" title=" sexual orientation"> sexual orientation</a> </p> <a href="https://publications.waset.org/abstracts/107931/coping-with-incompatible-identities-in-russia-case-of-orthodox-gays" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107931.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3</span> Lived Experiences and Perspectives of Adult Survivors of Incest-Related Childhood Sexual Abuse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Varsha%20Puri">Varsha Puri</a>, <a href="https://publications.waset.org/abstracts/search?q=Sharon%20Hudson"> Sharon Hudson</a>, <a href="https://publications.waset.org/abstracts/search?q=Ian%20Kim"> Ian Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Incest-related childhood sexual abuse (IRCSA) is challenging to study due to the shame and secrecy experienced by its survivors. Ramifications of IRCSA worsen when it is unidentified, and interventions are not made. IRCSA perspectives are essential for future prevention and intervention strategies. However, there is limited understanding of this population’s experiences, perspectives, and long-term struggles. To date, research for IRCSA has utilized data from treatment programs and qualitative research with cohorts of 10-20 people, much of the data is from 10-40 years prior. Methods. In June 2018, an anonymous online survey was posted to multiple social media sites (e.g., Facebook IRCSA groups) and sexual abuse resource sites. Survey responses were collected for a year. The survey collected non-identifying demographics, IRCSA experiences, and outcomes data. Results: We obtained 1310 completed surveys. Demographics of all ages, racial backgrounds, financial backgrounds, and genders were obtained; the majority identified as white (81%) and female (76%). Childhood sexual abuse (CSA) started before the age of 6 in 49% and was endured for more than one year in 84% of respondents, and 39% reported ten or more years of abuse. CSA by multiple perpetrators occurred in 58%, while 8% had ten or more perpetrators. CSA by perpetrators under 21 years old was reported by 46%. Female perpetrators were reported by 28% of respondents. Fathers were the highest reported sexual abusers at 60%, and mothers were reported at 17%. Only 16% reported that at least one of their perpetrators was prosecuted for sexual abuse of a minor. Respondents confirmed that 54% of the time, they informed an adult of the abuse; only 2% agreed that “an intervention was made by the family that protected me.” A majority reported that IRCSA has negatively impacted their intimate/sexual relationships (96%) and mental health (96%). A majority reported negative impacts on biological family relationships (88%), physical health (73%), finances (59%), educational achievement (57%), and employment (56%). When asked about suffering from addiction, 85% of respondents answered yes. Prevention strategies selected most by respondents include early school education around CSA prevention (67%), removing the statute of limitations for reporting CSA (69%), and improved laws protecting IRCSA survivors (63%). Conclusion: The data document that IRCSA can be pervasive, and the dearth of intervention and support for survivors have major lasting impacts. Survivors have a unique and valuable perspective on what interventions are needed to prevent IRCSA and support survivors; their voice has long been unheard in crafting prevention and intervention policies and services. These results thus provide an important call to action from these critical stakeholders. Pediatricians should recognize that perpetrators can be pediatric patients, women, and parents. Pediatricians can advocate for more early CSA prevention education and policy changes that remove the statute of limitations for reporting CSA. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=incest" title="incest">incest</a>, <a href="https://publications.waset.org/abstracts/search?q=childhood%20sexual%20abuse" title=" childhood sexual abuse"> childhood sexual abuse</a>, <a href="https://publications.waset.org/abstracts/search?q=incest-related%20childhood%20sexual%20abuse" title=" incest-related childhood sexual abuse"> incest-related childhood sexual abuse</a>, <a href="https://publications.waset.org/abstracts/search?q=incest%20survivor" title=" incest survivor"> incest survivor</a> </p> <a href="https://publications.waset.org/abstracts/165983/lived-experiences-and-perspectives-of-adult-survivors-of-incest-related-childhood-sexual-abuse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165983.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">99</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=secrecy&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=secrecy&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2025 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>