CINXE.COM

Search results for: message strategy

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: message strategy</title> <meta name="description" content="Search results for: message strategy"> <meta name="keywords" content="message strategy"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="message strategy" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="message strategy"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 4120</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: message strategy</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4120</span> Advertising Message Strategy on Ghana’s TV</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aisha%20Iddrisu">Aisha Iddrisu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ferruh%20Uztu%C4%9F"> Ferruh Uztuğ</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study is a quantitative content analysis of advertising message strategies used in Ghana’s TV commercials (2020-2021) using the modified strategy of Wang and Praet (2016) with the objective of exploring the various advertising message strategies used in Ghana’s TV advertisement, its variation according to product category including the most widely used message strategy. The findings indicate that, out of the 220 commercials used in the study, the Affective message strategy (n=122, 55%) was the dominant message strategy used in Ghana’s TV commercials. The most advertised product category in Ghana’s TV commercials (2020-2021) was the food category, and a significant relationship was observed between message strategy and product category as well as message strategy and brand type. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=advertising" title="advertising">advertising</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20strategy" title=" message strategy"> message strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghana" title=" Ghana"> Ghana</a>, <a href="https://publications.waset.org/abstracts/search?q=television" title=" television"> television</a> </p> <a href="https://publications.waset.org/abstracts/170306/advertising-message-strategy-on-ghanas-tv" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170306.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4119</span> Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ejd%20Garba">Ejd Garba</a>, <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin"> Okike Benjamin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arithmetic" title="arithmetic">arithmetic</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20space" title=" cyber space"> cyber space</a>, <a href="https://publications.waset.org/abstracts/search?q=modulo-2" title=" modulo-2"> modulo-2</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security "> information security </a> </p> <a href="https://publications.waset.org/abstracts/30281/application-of-modulo-2-arithmetic-in-securing-communicated-messages-throughout-the-globe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30281.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4118</span> Mathematical Model That Using Scrambling and Message Integrity Methods in Audio Steganography</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Salem%20Atoum">Mohammed Salem Atoum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The success of audio steganography is to ensure imperceptibility of the embedded message in stego file and withstand any form of intentional or un-intentional degradation of message (robustness). Audio steganographic that utilized LSB of audio stream to embed message gain a lot of popularity over the years in meeting the perceptual transparency, robustness and capacity. This research proposes an XLSB technique in order to circumvent the weakness observed in LSB technique. Scrambling technique is introduce in two steps; partitioning the message into blocks followed by permutation each blocks in order to confuse the contents of the message. The message is embedded in the MP3 audio sample. After extracting the message, the permutation codebook is used to re-order it into its original form. Md5sum and SHA-256 are used to verify whether the message is altered or not during transmission. Experimental result shows that the XLSB performs better than LSB. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=XLSB" title="XLSB">XLSB</a>, <a href="https://publications.waset.org/abstracts/search?q=scrambling" title=" scrambling"> scrambling</a>, <a href="https://publications.waset.org/abstracts/search?q=audio%20steganography" title=" audio steganography"> audio steganography</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/42449/mathematical-model-that-using-scrambling-and-message-integrity-methods-in-audio-steganography" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42449.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">363</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4117</span> Exploring Framing Effect and Repetition Effect of the Persuasive Message on Moral Decision Making in Conflict of Interests</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sae-Yeon%20Seong">Sae-Yeon Seong</a>, <a href="https://publications.waset.org/abstracts/search?q=EunSun%20Chung"> EunSun Chung</a>, <a href="https://publications.waset.org/abstracts/search?q=Dongjoo%20Chin"> Dongjoo Chin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Conflict of interest (COI) is one of the dominant circumstantial factors of moral corruption across various fields. Several management strategies have been proposed to prevent self-interested decision making in COIs. Among these strategies, message persuasion has been considered as a practical and effective approach. Framing and repetition are two of the major factors in the persuasion effect of message. Therefore, their effect on moral decision making in COI should be explored systematically. The purpose of this study was to compare the differential effects of positively framed message and negatively framed message, and secondly, to investigate how the effectiveness of persuasive message changes through repetitive exposures. A total of 63 participants were randomly assigned to one of 3 framing conditions: positive framing, negative framing, and no-message condition. Prior to the online experiment involving a consultation task, the differently framed persuasive message was presented to the participants. This process was repeated four times in a row. The results showed that participants with positive-framing message were less likely to provide self-interested consultation than participants in the no-message condition. Also, a U-shaped quadric relation between repetition and self-interest consultation was found. Implications and limitations are further discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conflicts%20of%20interest" title="conflicts of interest">conflicts of interest</a>, <a href="https://publications.waset.org/abstracts/search?q=persuasive%20message" title=" persuasive message"> persuasive message</a>, <a href="https://publications.waset.org/abstracts/search?q=framing%20effect" title=" framing effect"> framing effect</a>, <a href="https://publications.waset.org/abstracts/search?q=repetition%20effect" title=" repetition effect"> repetition effect</a>, <a href="https://publications.waset.org/abstracts/search?q=self-interested%20behavior" title=" self-interested behavior"> self-interested behavior</a> </p> <a href="https://publications.waset.org/abstracts/97223/exploring-framing-effect-and-repetition-effect-of-the-persuasive-message-on-moral-decision-making-in-conflict-of-interests" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97223.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">176</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4116</span> Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin">Okike Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20J.%20D.%20Garba"> E. J. D. Garba </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security" title="information security">information security</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20splitting" title=" message splitting"> message splitting</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern" title=" pattern"> pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=sequence" title=" sequence "> sequence </a> </p> <a href="https://publications.waset.org/abstracts/22633/pattern-in-splitting-sequence-in-okikes-merged-irregular-transposition-cipher-for-encrypting-cyberspace-messages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22633.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">289</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4115</span> When Messages Cause Distraction from Advertising: An Eye-Tracking Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nilamadhab%20Mohanty">Nilamadhab Mohanty</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is essential to use message formats that make communication understandable and correct. It is because; the information format can influence consumer decision on the purchase of a product. This study combines information from qualitative inquiry, media trend analysis, eye tracking experiment, and questionnaire data to examine the impact of specific message format and consumer perceived risk on attention to the information and risk retention. We investigated the influence of message framing (goal framing, attribute framing, and mix framing) on consumer memory, study time, and decisional uncertainty while deciding on the purchase of drugs. Furthermore, we explored the impact of consumer perceived risk (associated with the use of the drug, i.e., RISK-AB and perceived risk associated with the non-use of the drug, i.e., RISK-EB) on message format preference. The study used eye-tracking methods to understand the differences in message processing. Findings of the study suggest that the message format influences information processing, and participants' risk perception impacts message format preference. Eye tracking can be used to understand the format differences and design effective advertisements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=message%20framing" title="message framing">message framing</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20perceived%20risk" title=" consumer perceived risk"> consumer perceived risk</a>, <a href="https://publications.waset.org/abstracts/search?q=advertising" title=" advertising"> advertising</a>, <a href="https://publications.waset.org/abstracts/search?q=eye%20tracking" title=" eye tracking"> eye tracking</a> </p> <a href="https://publications.waset.org/abstracts/109706/when-messages-cause-distraction-from-advertising-an-eye-tracking-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/109706.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4114</span> Use of Personal Rhythm to Authenticate Encrypted Messages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Gonzalez">Carlos Gonzalez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20signature" title=" digital signature"> digital signature</a>, <a href="https://publications.waset.org/abstracts/search?q=keystroke%20dynamics" title=" keystroke dynamics"> keystroke dynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20rhythm" title=" personal rhythm"> personal rhythm</a>, <a href="https://publications.waset.org/abstracts/search?q=public-key%20encryption" title=" public-key encryption"> public-key encryption</a> </p> <a href="https://publications.waset.org/abstracts/66737/use-of-personal-rhythm-to-authenticate-encrypted-messages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66737.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">304</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4113</span> Unsupervised Sentiment Analysis for Indonesian Political Message on Twitter </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omar%20Abdillah">Omar Abdillah</a>, <a href="https://publications.waset.org/abstracts/search?q=Mirna%20Adriani"> Mirna Adriani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, we perform new approach for analyzing public sentiment towards the presidential candidate in the 2014 Indonesian election that expressed in Twitter. In this study we propose such procedure for analyzing sentiment over Indonesian political message by understanding the behavior of Indonesian society in sending message on Twitter. We took different approach from previous works by utilizing punctuation mark and Indonesian sentiment lexicon that completed with the new procedure in determining sentiment towards the candidates. Our experiment shows the performance that yields up to 83.31% of average precision. In brief, this work makes two contributions: first, this work is the preliminary study of sentiment analysis in the domain of political message that has not been addressed yet before. Second, we propose such method to conduct sentiment analysis by creating decision making procedure in which it is in line with the characteristic of Indonesian message on Twitter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=unsupervised%20sentiment%20analysis" title="unsupervised sentiment analysis">unsupervised sentiment analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20message" title=" political message"> political message</a>, <a href="https://publications.waset.org/abstracts/search?q=lexicon%20based" title=" lexicon based"> lexicon based</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20behavior%20understanding" title=" user behavior understanding"> user behavior understanding</a> </p> <a href="https://publications.waset.org/abstracts/20304/unsupervised-sentiment-analysis-for-indonesian-political-message-on-twitter" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20304.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">480</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4112</span> Defining the Term of Strategy within Military Point of View</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ismail%20Menderes%20Sema">Ismail Menderes Sema</a>, <a href="https://publications.waset.org/abstracts/search?q=Murat%20S%C3%B6zen"> Murat Sözen</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20K.%20Bar%C4%B1%C5%9F"> M. K. Barış </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The strategy is about winning or preventing your enemy from winning. The origin of the term comes from the military. After utilizing the strategy for limited military purposes in early ages, soldiers and statesmen used the term together to achieve the goals of states. In ancient times, those people who made strategy and implemented it was the same. With the industrial revolution, the strategy changed like everything and the term “grand strategy” came forward. Today, from business to economy, management to philosophy there is a broad using of the term strategy. Economic strategy, business strategy, trade strategy, irrigation strategy, and even recruitment strategy are used by professionals. The purpose of this study is to analyze the evolution of the strategy and clarify actually what is about. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=strategy" title="strategy">strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=military" title=" military"> military</a>, <a href="https://publications.waset.org/abstracts/search?q=art" title=" art"> art</a>, <a href="https://publications.waset.org/abstracts/search?q=grand%20strategy" title=" grand strategy"> grand strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=strategist" title=" strategist"> strategist</a> </p> <a href="https://publications.waset.org/abstracts/31137/defining-the-term-of-strategy-within-military-point-of-view" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31137.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">454</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4111</span> Carrier Communication through Power Lines</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pavuluri%20Gopikrishna">Pavuluri Gopikrishna</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Neelima"> B. Neelima</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Power line carrier communication means audio power transmission via power line and reception of the amplified audio power at the receiver as in the form of speaker output signal using power line as the channel medium. The main objective of this suggested work is to transmit our message signal after frequency modulation by the help of FM modulator IC LM565 which gives output proportional to the input voltage of the input message signal. And this audio power is received from the power line by the help of isolation circuit and demodulated from IC LM565 which uses the concept of the PLL and produces FM demodulated signal to the listener. Message signal will be transmitted over the carrier signal that will be generated from the FM modulator IC LM565. Using this message signal will not damage because of no direct contact of message signal from the power line, but noise can disturb our information. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=amplification" title="amplification">amplification</a>, <a href="https://publications.waset.org/abstracts/search?q=fm%20demodulator%20ic%20565" title=" fm demodulator ic 565"> fm demodulator ic 565</a>, <a href="https://publications.waset.org/abstracts/search?q=fm%20modulator%20ic%20565" title=" fm modulator ic 565"> fm modulator ic 565</a>, <a href="https://publications.waset.org/abstracts/search?q=phase%20locked%20loop" title=" phase locked loop"> phase locked loop</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20isolation" title=" power isolation"> power isolation</a> </p> <a href="https://publications.waset.org/abstracts/31017/carrier-communication-through-power-lines" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31017.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">552</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4110</span> The Effect of ‘Love Accounting’ on Gift Budgeting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yanan%20Wang">Yanan Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is proposed that when people give a gift they engage in 'love accounting', so that they will spend less on it if they include a written expression of love with it. This hypothesis was tested with college students (N = 308). It was found that participants who wrote a love message to accompany a Mother's Day gift budgeted less for the gift itself than control participants (Experiment 1), and this effect was replicated for a Christmas gift (Experiment 2). The amount of effort expended by the giver on preparing the love message did not account for the effect (Experiment 3). It is concluded that a gift and its accompanying love message are mentally computed as belonging to the same love account, implying that consumers’ excessive splurging on gifts might be controlled by writing a love message before gift shopping. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=expression%20of%20love" title="expression of love">expression of love</a>, <a href="https://publications.waset.org/abstracts/search?q=gift-giving" title=" gift-giving"> gift-giving</a>, <a href="https://publications.waset.org/abstracts/search?q=gift-budgeting" title=" gift-budgeting"> gift-budgeting</a>, <a href="https://publications.waset.org/abstracts/search?q=mental%20accounting" title=" mental accounting"> mental accounting</a> </p> <a href="https://publications.waset.org/abstracts/40374/the-effect-of-love-accounting-on-gift-budgeting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40374.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4109</span> A New Method for Fault Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Hakan%20Karaata">Mehmet Hakan Karaata</a>, <a href="https://publications.waset.org/abstracts/search?q=Ali%20Hamdan"> Ali Hamdan</a>, <a href="https://publications.waset.org/abstracts/search?q=Omer%20Yusuf%20Adam%20Mohamed"> Omer Yusuf Adam Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Byzantine%20faults" title="Byzantine faults">Byzantine faults</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20systems" title=" distributed systems"> distributed systems</a>, <a href="https://publications.waset.org/abstracts/search?q=fault%20detection" title=" fault detection"> fault detection</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20protocols" title=" network protocols"> network protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=node-disjoint%20paths" title=" node-disjoint paths"> node-disjoint paths</a> </p> <a href="https://publications.waset.org/abstracts/21437/a-new-method-for-fault-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21437.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">448</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4108</span> Modifying Byzantine Fault Detection Using Disjoint Paths</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Hakan%20Karaata">Mehmet Hakan Karaata</a>, <a href="https://publications.waset.org/abstracts/search?q=Ali%20Hamdan"> Ali Hamdan</a>, <a href="https://publications.waset.org/abstracts/search?q=Omer%20Yusuf%20Adam%20Mohamed"> Omer Yusuf Adam Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Byzantine%20faults" title="Byzantine faults">Byzantine faults</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20systems" title=" distributed systems"> distributed systems</a>, <a href="https://publications.waset.org/abstracts/search?q=fault%20detection" title=" fault detection"> fault detection</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20pro-%20tocols" title=" network pro- tocols"> network pro- tocols</a>, <a href="https://publications.waset.org/abstracts/search?q=node-disjoint%20paths" title=" node-disjoint paths"> node-disjoint paths</a> </p> <a href="https://publications.waset.org/abstracts/30672/modifying-byzantine-fault-detection-using-disjoint-paths" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30672.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">565</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4107</span> Secure Content Centric Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Syed%20Umair%20Aziz">Syed Umair Aziz</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Faheem"> Muhammad Faheem</a>, <a href="https://publications.waset.org/abstracts/search?q=Sameer%20Hussain"> Sameer Hussain</a>, <a href="https://publications.waset.org/abstracts/search?q=Faraz%20Idris"> Faraz Idris</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=content%20centric%20network" title="content centric network">content centric network</a>, <a href="https://publications.waset.org/abstracts/search?q=client-server" title=" client-server"> client-server</a>, <a href="https://publications.waset.org/abstracts/search?q=host%20security%20threats" title=" host security threats"> host security threats</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20authentication%20code" title=" message authentication code"> message authentication code</a>, <a href="https://publications.waset.org/abstracts/search?q=named%20data%20network" title=" named data network"> named data network</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20caching" title=" network caching"> network caching</a>, <a href="https://publications.waset.org/abstracts/search?q=peer-to-peer" title=" peer-to-peer"> peer-to-peer</a> </p> <a href="https://publications.waset.org/abstracts/32149/secure-content-centric-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32149.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">644</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4106</span> RSU Aggregated Message Delivery for VANET</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Auxeeliya%20Jesudoss">Auxeeliya Jesudoss</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashraph%20Sulaiman"> Ashraph Sulaiman</a>, <a href="https://publications.waset.org/abstracts/search?q=Ratnakar%20Kotnana"> Ratnakar Kotnana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vehicular%20ad-hoc%20networks" title="vehicular ad-hoc networks">vehicular ad-hoc networks</a>, <a href="https://publications.waset.org/abstracts/search?q=V2V" title=" V2V"> V2V</a>, <a href="https://publications.waset.org/abstracts/search?q=V2I" title=" V2I"> V2I</a>, <a href="https://publications.waset.org/abstracts/search?q=VANET%20communication" title=" VANET communication"> VANET communication</a>, <a href="https://publications.waset.org/abstracts/search?q=scalability" title=" scalability"> scalability</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20aggregation" title=" message aggregation"> message aggregation</a> </p> <a href="https://publications.waset.org/abstracts/1449/rsu-aggregated-message-delivery-for-vanet" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1449.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">408</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4105</span> Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin">Okike Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=Garba%20E.%20J.%20D."> Garba E. J. D.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=merged%20irregular%20transposition" title="merged irregular transposition">merged irregular transposition</a>, <a href="https://publications.waset.org/abstracts/search?q=error%20level" title=" error level"> error level</a>, <a href="https://publications.waset.org/abstracts/search?q=model%20estimation" title=" model estimation"> model estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20splitting" title=" message splitting"> message splitting</a> </p> <a href="https://publications.waset.org/abstracts/22331/model-estimation-and-error-level-for-okikes-merged-irregular-transposition-cipher" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22331.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4104</span> The On-Board Critical Message Transmission Design for Navigation Satellite Delay/Disruption Tolerant Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ji-yang%20Yu">Ji-yang Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=Dan%20Huang"> Dan Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Guo-ping%20Feng"> Guo-ping Feng</a>, <a href="https://publications.waset.org/abstracts/search?q=Xin%20Li"> Xin Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Lu-yuan%20Wang"> Lu-yuan Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The navigation satellite network, especially the Beidou MEO Constellation, can relay data effectively with wide coverage and is applied in navigation, detection, and position widely. But the constellation has not been completed, and the amount of satellites on-board is not enough to cover the earth, which makes the data-relay disrupted or delayed in the transition process. The data-relay function needs to tolerant the delay or disruption in some extension, which make the Beidou MEO Constellation a delay/disruption-tolerant network (DTN). The traditional DTN designs mainly employ the relay table as the basic of data path schedule computing. But in practical application, especially in critical condition, such as the war-time or the infliction heavy losses on the constellation, parts of the nodes may become invalid, then the traditional DTN design could be useless. Furthermore, when transmitting the critical message in the navigation system, the maximum priority strategy is used, but the nodes still inquiry the relay table to design the path, which makes the delay more than minutes. Under this circumstances, it needs a function which could compute the optimum data path on-board in real-time according to the constellation states. The on-board critical message transmission design for navigation satellite delay/disruption-tolerant network (DTN) is proposed, according to the characteristics of navigation satellite network. With the real-time computation of parameters in the network link, the least-delay transition path is deduced to retransmit the critical message in urgent conditions. First, the DTN model for constellation is established based on the time-varying matrix (TVM) instead of the time-varying graph (TVG); then, the least transition delay data path is deduced with the parameters of the current node; at last, the critical message transits to the next best node. For the on-board real-time computing, the time delay and misjudges of constellation states in ground stations are eliminated, and the residual information channel for each node can be used flexibly. Compare with the minute’s delay of traditional DTN; the proposed transmits the critical message in seconds, which improves the re-transition efficiency. The hardware is implemented in FPGA based on the proposed model, and the tests prove the validity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20message" title="critical message">critical message</a>, <a href="https://publications.waset.org/abstracts/search?q=DTN" title=" DTN"> DTN</a>, <a href="https://publications.waset.org/abstracts/search?q=navigation%20satellite" title=" navigation satellite"> navigation satellite</a>, <a href="https://publications.waset.org/abstracts/search?q=on-board" title=" on-board"> on-board</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time" title=" real-time"> real-time</a> </p> <a href="https://publications.waset.org/abstracts/67904/the-on-board-critical-message-transmission-design-for-navigation-satellite-delaydisruption-tolerant-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67904.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">343</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4103</span> How Message Framing and Temporal Distance Affect Word of Mouth</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Camille%20Lacan">Camille Lacan</a>, <a href="https://publications.waset.org/abstracts/search?q=Pierre%20Desmet"> Pierre Desmet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the crowdfunding model, a campaign succeeds by collecting the funds required over a predefined duration. The success of a CF campaign depends both on the capacity to attract members of the online communities concerned, and on the community members’ involvement in online word-of-mouth recommendations. To maximize the campaign's success probability, project creators (i.e., an organization appealing for financial resources) send messages to contributors to ask them to issue word of mouth. Internet users relay information about projects through Word of Mouth which is defined as “a critical tool for facilitating information diffusion throughout online communities”. The effectiveness of these messages depends on the message framing and the time at which they are sent to contributors (i.e., at the start of the campaign or close to the deadline). This article addresses the following question: What are the effect of message framing and temporal distance on the willingness to share word of mouth? Drawing on Perspectives Theory and Construal Level Theory, this study examines the interplay between message framing (Gains vs. Losses) and temporal distance (message while the deadline is coming vs. far) on intention to share word of mouth. A between-subject experimental design is conducted to test the research model. Results show significant differences between a loss-framed message (lack of benefits if the campaign fails) associated with a short deadline (ending tomorrow) compared to a gain-framed message (benefits if the campaign succeeds) associated with a distant deadline (ending in three months). However, this effect is moderated by the anticipated regret of a campaign failure and the temporal orientation. These moderating effects contribute to specifying the boundary condition of the framing effect. Handling the message framing and the temporal distance are thus the key decisions to influence the willingness to share word of mouth. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construal%20levels" title="construal levels">construal levels</a>, <a href="https://publications.waset.org/abstracts/search?q=crowdfunding" title=" crowdfunding"> crowdfunding</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20framing" title=" message framing"> message framing</a>, <a href="https://publications.waset.org/abstracts/search?q=word%20of%20mouth" title=" word of mouth"> word of mouth</a> </p> <a href="https://publications.waset.org/abstracts/58854/how-message-framing-and-temporal-distance-affect-word-of-mouth" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58854.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4102</span> Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Colette%20Faucher">Colette Faucher</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=military%20psychological%20operations" title="military psychological operations">military psychological operations</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20identity" title=" social identity"> social identity</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20network" title=" social network"> social network</a>, <a href="https://publications.waset.org/abstracts/search?q=emotion%20propagation" title=" emotion propagation"> emotion propagation</a> </p> <a href="https://publications.waset.org/abstracts/22457/propagation-of-the-effects-of-certain-types-of-military-psychological-operations-in-a-networked-population" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22457.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">409</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4101</span> Effectiveness of Language Learning Strategy Instruction Based on CALLA on Iranian EFL Language Strategy Use</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reza%20Khani">Reza Khani</a>, <a href="https://publications.waset.org/abstracts/search?q=Ziba%20Hosseini"> Ziba Hosseini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ever since the importance of language learning strategy instruction (LLS) has been distinguished, there has been growing interest on how to teach LLS in language learning classrooms. So thus this study attempted to implement language strategy instruction based on CALLA approach for Iranian EFL learners in a real classroom setting. The study was testing the hypothesis that strategy instruction result in improved linguistic strategy of students. The participant of the study were 240 EFL learners who received language learning instruction for four months. The data collected using Oxford strategy inventory for language learning. The results indicated the instruction had statistically significant effect on language strategy use of intervention group who received instruction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CALLA" title="CALLA">CALLA</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20learning%20strategy" title=" language learning strategy"> language learning strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20learning%20strategy%20instruction" title=" language learning strategy instruction"> language learning strategy instruction</a>, <a href="https://publications.waset.org/abstracts/search?q=Iranian%20EFL%20language%20strategy" title=" Iranian EFL language strategy"> Iranian EFL language strategy</a> </p> <a href="https://publications.waset.org/abstracts/23853/effectiveness-of-language-learning-strategy-instruction-based-on-calla-on-iranian-efl-language-strategy-use" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23853.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">570</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4100</span> Prosody of Text Communication: Inducing Synchronization and Coherence in Chat Conversations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Karolina%20Ziembowicz">Karolina Ziembowicz</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrzej%20Nowak"> Andrzej Nowak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the current study, we examined the consequences of adding prosodic cues to text communication by allowing users to observe the process of message creation while engaged in dyadic conversations. In the first condition, users interacted through a traditional chat that requires pressing ‘enter’ to make a message visible to an interlocutor. In another, text appeared on the screen simultaneously as the sender was writing it, letter after letter (Synchat condition), so that users could observe the varying rhythm of message production, precise timing of message appearance, typos and their corrections. The results show that the ability to observe the dynamics of message production had a twofold effect on the social interaction process. First, it enhanced the relational aspect of communication – interlocutors synchronized their emotional states during the interaction, their communication included more statements on relationship building, and they evaluated the Synchat medium as more personal and emotionally engaging. Second, it increased the coherence of communication, reflected in greater continuity of the topics raised in Synchat conversations. The results are discussed from the interaction design (IxD) perspective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chat%20communication" title="chat communication">chat communication</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20conversation" title=" online conversation"> online conversation</a>, <a href="https://publications.waset.org/abstracts/search?q=prosody" title=" prosody"> prosody</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20synchronization" title=" social synchronization"> social synchronization</a>, <a href="https://publications.waset.org/abstracts/search?q=interaction%20incoherence" title=" interaction incoherence"> interaction incoherence</a>, <a href="https://publications.waset.org/abstracts/search?q=relationship%20building" title=" relationship building"> relationship building</a> </p> <a href="https://publications.waset.org/abstracts/97727/prosody-of-text-communication-inducing-synchronization-and-coherence-in-chat-conversations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97727.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">141</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4099</span> Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal &#039;Amman Message&#039;</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adnan%20M.%20Al%20Assaf">Adnan M. Al Assaf</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islam" title="Islam">Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=tolerance" title=" tolerance"> tolerance</a>, <a href="https://publications.waset.org/abstracts/search?q=anti-terrorism" title=" anti-terrorism"> anti-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=coexistence" title=" coexistence"> coexistence</a>, <a href="https://publications.waset.org/abstracts/search?q=Amman%20Message" title=" Amman Message"> Amman Message</a> </p> <a href="https://publications.waset.org/abstracts/83277/islam-tolerance-and-anti-terrorism-a-critical-assessment-with-reference-to-the-royal-amman-message" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83277.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">459</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4098</span> Using Social Media to Amplify Social Entrepreneurial Message</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Irfan%20Khairi">Irfan Khairi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is arguable that today's social media has dramatically redefined human contact, and chiefly because the platforms enable communication opportunities unprecedented. Without question, billions of individuals globally engage in the media, a reality by no means lost on businesses and social entrepreneurs desirous of generating interest in a cause, movement, or other social effort. If, however, the opportunities are immense, so too is the competition. Private persons and entrepreneurial concerns alike virtually saturate the popular sites of Facebook, Twitter, and Instagram, and most are intent on capturing as much external interest as possible. At the same time, however, the social entrepreneur possesses an advantage over the individual concerned only the social aspects of the sites, as they express interests in, and measures applicable to, important causes of which the public at large may be unaware. There is, unfortunately, no single means of assuring success in using the media outlets to generate interest. Nonetheless, a general awareness of how social media sites function, as well as the psychological elements relevant to the functioning, is necessary. It is as important to comprehend basic realities of the platforms and approaches that fail as it is to develop strategy, for the latter relies on knowledge of the former. This awareness in place, the social entrepreneur is then better enabled to determine strategy, in terms of which sites to focus upon and how to most effectively convey their message. What is required is familiarity with the online communities, with attention to the specific advantages each provides. Ultimately, today's social entrepreneur may establish a highly effective platform of promotion and engagement, provided they fully comprehend the social investment necessary for success. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20media" title="social media">social media</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing" title=" marketing"> marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title=" e-commerce"> e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20business" title=" internet business"> internet business</a> </p> <a href="https://publications.waset.org/abstracts/43301/using-social-media-to-amplify-social-entrepreneurial-message" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43301.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">212</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4097</span> Secure Message Transmission Using Meaningful Shares</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ajish%20Sreedharan">Ajish Sreedharan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=visual%20cryptography" title="visual cryptography">visual cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelet%20transform" title=" wavelet transform"> wavelet transform</a>, <a href="https://publications.waset.org/abstracts/search?q=meaningful%20shares" title=" meaningful shares"> meaningful shares</a>, <a href="https://publications.waset.org/abstracts/search?q=grey%20scale%20image" title=" grey scale image"> grey scale image</a> </p> <a href="https://publications.waset.org/abstracts/16629/secure-message-transmission-using-meaningful-shares" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16629.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">455</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4096</span> Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neetesh%20Saxena">Neetesh Saxena</a>, <a href="https://publications.waset.org/abstracts/search?q=Narendra%20S.%20Chaudhari"> Narendra S. Chaudhari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AES" title="AES">AES</a>, <a href="https://publications.waset.org/abstracts/search?q=DES" title=" DES"> DES</a>, <a href="https://publications.waset.org/abstracts/search?q=Diffie-Hellman" title=" Diffie-Hellman"> Diffie-Hellman</a>, <a href="https://publications.waset.org/abstracts/search?q=ECDH" title=" ECDH"> ECDH</a>, <a href="https://publications.waset.org/abstracts/search?q=A5" title=" A5"> A5</a>, <a href="https://publications.waset.org/abstracts/search?q=SMS" title=" SMS"> SMS</a> </p> <a href="https://publications.waset.org/abstracts/7993/proposed-terminal-device-for-end-to-end-secure-sms-in-cellular-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7993.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">417</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4095</span> Data Hiding in Gray Image Using ASCII Value and Scanning Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20K.%20Pateriya">R. K. Pateriya</a>, <a href="https://publications.waset.org/abstracts/search?q=Jyoti%20Bharti"> Jyoti Bharti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents an approach for data hiding methods which provides a secret communication between sender and receiver. The data is hidden in gray-scale images and the boundary of gray-scale image is used to store the mapping information. In this an approach data is in ASCII format and the mapping is in between ASCII value of hidden message and pixel value of cover image, since pixel value of an image as well as ASCII value is in range of 0 to 255 and this mapping information is occupying only 1 bit per character of hidden message as compared to 8 bit per character thus maintaining good quality of stego image. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ASCII%20value" title="ASCII value">ASCII value</a>, <a href="https://publications.waset.org/abstracts/search?q=cover%20image" title=" cover image"> cover image</a>, <a href="https://publications.waset.org/abstracts/search?q=PSNR" title=" PSNR"> PSNR</a>, <a href="https://publications.waset.org/abstracts/search?q=pixel%20value" title=" pixel value"> pixel value</a>, <a href="https://publications.waset.org/abstracts/search?q=stego%20image" title=" stego image"> stego image</a>, <a href="https://publications.waset.org/abstracts/search?q=secret%20message" title=" secret message"> secret message</a> </p> <a href="https://publications.waset.org/abstracts/50472/data-hiding-in-gray-image-using-ascii-value-and-scanning-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50472.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">415</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4094</span> Determination of Complexity Level in Merged Irregular Transposition Cipher</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin">Okike Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=Garba%20Ejd"> Garba Ejd</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=transposition%20cipher" title="transposition cipher">transposition cipher</a>, <a href="https://publications.waset.org/abstracts/search?q=merged%20irregular%20cipher" title=" merged irregular cipher"> merged irregular cipher</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=complexity%20level" title=" complexity level "> complexity level </a> </p> <a href="https://publications.waset.org/abstracts/13713/determination-of-complexity-level-in-merged-irregular-transposition-cipher" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13713.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4093</span> Psychological Reactance to Anti-Piracy Messages Explained by Gender and Attitudes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kate%20Whitman">Kate Whitman</a>, <a href="https://publications.waset.org/abstracts/search?q=Zahra%20Murad"> Zahra Murad</a>, <a href="https://publications.waset.org/abstracts/search?q=Joe%20Cox"> Joe Cox</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital piracy is costly to creative economies across the world. Anti-piracy messages can cause people to pirate more rather than less, suggesting the presence of psychological reactance. Gender differences in message reactance and the moderating impact of attitudes have not been explored. In this paper, we examine whether messages based on real-world anti-piracy campaigns cause reactance and whether this effect is explained by gender and attitudes. An experiment compares two threatening and one prosocial message against a control group, with changes in piracy intention from past behavior for digital TV/film analysed. The results suggest that the prosocial message is ineffective for both genders. However, the threatening messages have significantly opposing effects on men and women. One threatening message influences women to reduce their piracy intentions by over 50% and men to increase it by 18%. Gender effects are moderated by pre-existing attitudes, with men and women who report the most favorable attitudes towards piracy having the most polarised changes in piracy intentions. The results suggest that men and women process threatening messages differently and that the creative industries should take care when targeting their messages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=piracy" title="piracy">piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=reactance" title=" reactance"> reactance</a>, <a href="https://publications.waset.org/abstracts/search?q=persuasive-messages" title=" persuasive-messages"> persuasive-messages</a>, <a href="https://publications.waset.org/abstracts/search?q=TV%2Ffilm" title=" TV/film"> TV/film</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a> </p> <a href="https://publications.waset.org/abstracts/161473/psychological-reactance-to-anti-piracy-messages-explained-by-gender-and-attitudes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161473.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4092</span> Maintaining User-Level Security in Short Message Service</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Arudchelvam">T. Arudchelvam</a>, <a href="https://publications.waset.org/abstracts/search?q=W.%20W.%20E.%20N.%20Fernando"> W. W. E. N. Fernando</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SMS" title="SMS">SMS</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20level%20security" title=" user level security"> user level security</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=decryption" title=" decryption"> decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=short%20message%20service" title=" short message service"> short message service</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20communication" title=" mobile communication"> mobile communication</a> </p> <a href="https://publications.waset.org/abstracts/49955/maintaining-user-level-security-in-short-message-service" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49955.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4091</span> Music Piracy Revisited: Agent-Based Modelling and Simulation of Illegal Consumption Behavior</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=U.%20S.%20Putro">U. S. Putro</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Mayangsari"> L. Mayangsari</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Siallagan"> M. Siallagan</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20P.%20Tjahyani"> N. P. Tjahyani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> National Collective Management Institute (LKMN) in Indonesia stated that legal music products were about 77.552.008 unit while illegal music products were about 22.0688.225 unit in 1996 and this number keeps getting worse every year. Consequently, Indonesia named as one of the countries with high piracy levels in 2005. This study models people decision toward unlawful behavior, music content piracy in particular, using agent-based modeling and simulation (ABMS). The classification of actors in the model constructed in this study are legal consumer, illegal consumer, and neutral consumer. The decision toward piracy among the actors is a manifestation of the social norm which attributes are social pressure, peer pressure, social approval, and perceived prevalence of piracy. The influencing attributes fluctuate depending on the majority of surrounding behavior called social network. There are two main interventions undertaken in the model, campaign and peer influence, which leads to scenarios in the simulation: positively-framed descriptive norm message, negatively-framed descriptive norm message, positively-framed injunctive norm with benefits message, and negatively-framed injunctive norm with costs message. Using NetLogo, the model is simulated in 30 runs with 10.000 iteration for each run. The initial number of agent was set 100 proportion of 95:5 for illegal consumption. The assumption of proportion is based on the data stated that 95% sales of music industry are pirated. The finding of this study is that negatively-framed descriptive norm message has a worse reversed effect toward music piracy. The study discovers that selecting the context-based campaign is the key process to reduce the level of intention toward music piracy as unlawful behavior by increasing the compliance awareness. The context of Indonesia reveals that that majority of people has actively engaged in music piracy as unlawful behavior, so that people think that this illegal act is common behavior. Therefore, providing the information about how widespread and big this problem is could make people do the illegal consumption behavior instead. The positively-framed descriptive norm message scenario works best to reduce music piracy numbers as it focuses on supporting positive behavior and subject to the right perception on this phenomenon. Music piracy is not merely economical, but rather social phenomenon due to the underlying motivation of the actors which has shifted toward community sharing. The indication of misconception of value co-creation in the context of music piracy in Indonesia is also discussed. This study contributes theoretically that understanding how social norm configures the behavior of decision-making process is essential to breakdown the phenomenon of unlawful behavior in music industry. In practice, this study proposes that reward-based and context-based strategy is the most relevant strategy for stakeholders in music industry. Furthermore, this study provides an opportunity that findings may generalize well beyond music piracy context. As an emerging body of work that systematically constructs the backstage of law and social affect decision-making process, it is interesting to see how the model is implemented in other decision-behavior related situation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=music%20piracy" title="music piracy">music piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20norm" title=" social norm"> social norm</a>, <a href="https://publications.waset.org/abstracts/search?q=behavioral%20decision-making" title=" behavioral decision-making"> behavioral decision-making</a>, <a href="https://publications.waset.org/abstracts/search?q=agent-based%20model" title=" agent-based model"> agent-based model</a>, <a href="https://publications.waset.org/abstracts/search?q=value%20co-creation" title=" value co-creation"> value co-creation</a> </p> <a href="https://publications.waset.org/abstracts/81835/music-piracy-revisited-agent-based-modelling-and-simulation-of-illegal-consumption-behavior" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81835.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">187</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=137">137</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=138">138</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20strategy&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10