CINXE.COM

Search results for: digital piracy

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: digital piracy</title> <meta name="description" content="Search results for: digital piracy"> <meta name="keywords" content="digital piracy"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="digital piracy" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="digital piracy"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2815</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: digital piracy</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2815</span> The Perils of Flagging Pirates: How Gender, False Consensus and Normative Messages Influence Digital Piracy Intentions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kate%20Whitman">Kate Whitman</a>, <a href="https://publications.waset.org/abstracts/search?q=Zahra%20Murad"> Zahra Murad</a>, <a href="https://publications.waset.org/abstracts/search?q=Joe%20Cox"> Joe Cox</a>, <a href="https://publications.waset.org/abstracts/search?q=Adam%20Cox"> Adam Cox</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates the influence of normative communications on digital piracy intentions. Although descriptive norms are thought to influence behavior, the study examines the potential bias in one's own behavior, leading to false consensus—a phenomenon perpetuating undesirable activities. The research tests the presence of false consensus and the effect of correcting normative predictions on changes in piracy intentions, examining gender differences. Results from a controlled experiment (N = 684) indicate that normative communications, reflecting the "real" norm based on government data (N=5000), increase (decrease) piracy intentions among men (women) underestimating their peers' behavior. Conversely, neither men nor women overestimating their peers' piracy show any notable change in intentions. Considering men consume more illegal content than women, suggesting they pose a higher risk, the study highlights the need for cautious use of normative communications. Therefore, policymakers should minimize the visibility of piracy behavior for effective digital piracy management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20piracy" title="digital piracy">digital piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20consensus" title=" false consensus"> false consensus</a>, <a href="https://publications.waset.org/abstracts/search?q=normative%20interventions" title=" normative interventions"> normative interventions</a>, <a href="https://publications.waset.org/abstracts/search?q=persuasive%20messages" title=" persuasive messages"> persuasive messages</a> </p> <a href="https://publications.waset.org/abstracts/182037/the-perils-of-flagging-pirates-how-gender-false-consensus-and-normative-messages-influence-digital-piracy-intentions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182037.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2814</span> Psychological Reactance to Anti-Piracy Messages Explained by Gender and Attitudes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kate%20Whitman">Kate Whitman</a>, <a href="https://publications.waset.org/abstracts/search?q=Zahra%20Murad"> Zahra Murad</a>, <a href="https://publications.waset.org/abstracts/search?q=Joe%20Cox"> Joe Cox</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital piracy is costly to creative economies across the world. Anti-piracy messages can cause people to pirate more rather than less, suggesting the presence of psychological reactance. Gender differences in message reactance and the moderating impact of attitudes have not been explored. In this paper, we examine whether messages based on real-world anti-piracy campaigns cause reactance and whether this effect is explained by gender and attitudes. An experiment compares two threatening and one prosocial message against a control group, with changes in piracy intention from past behavior for digital TV/film analysed. The results suggest that the prosocial message is ineffective for both genders. However, the threatening messages have significantly opposing effects on men and women. One threatening message influences women to reduce their piracy intentions by over 50% and men to increase it by 18%. Gender effects are moderated by pre-existing attitudes, with men and women who report the most favorable attitudes towards piracy having the most polarised changes in piracy intentions. The results suggest that men and women process threatening messages differently and that the creative industries should take care when targeting their messages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=piracy" title="piracy">piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=reactance" title=" reactance"> reactance</a>, <a href="https://publications.waset.org/abstracts/search?q=persuasive-messages" title=" persuasive-messages"> persuasive-messages</a>, <a href="https://publications.waset.org/abstracts/search?q=TV%2Ffilm" title=" TV/film"> TV/film</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a> </p> <a href="https://publications.waset.org/abstracts/161473/psychological-reactance-to-anti-piracy-messages-explained-by-gender-and-attitudes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161473.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2813</span> Piracy Killed the Radio Star: A System Archetype Analysis of Digital Music Theft</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marton%20Gergely">Marton Gergely</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital experience goods, such as music and video, are readily available and easily accessible through a sundry of illegal mediums. Furthermore, the rate of music theft has been increasing at a seemingly unstoppable rate. Instead of studying the effect of copyright infringement on affected shareholders, this paper aims to examine the overall impact that digital music piracy has on society as a whole. Through a systems dynamics approach, an archetype is built to model the behavior of both legal and illegal music users. Additionally, the effects over time are considered. The conceptual model suggests that if piracy continues to grow at the current pace, industry shareholders will eventually lose the motivation to supply new music. In turn, this tragedy would affect not only the illegal players, but legal consumers as well, by means of a decrease in overall quality of life. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=music%20piracy" title="music piracy">music piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=illegal%20downloading" title=" illegal downloading"> illegal downloading</a>, <a href="https://publications.waset.org/abstracts/search?q=tragedy%20of%20the%20commons" title=" tragedy of the commons"> tragedy of the commons</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20archetypes" title=" system archetypes"> system archetypes</a> </p> <a href="https://publications.waset.org/abstracts/42258/piracy-killed-the-radio-star-a-system-archetype-analysis-of-digital-music-theft" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42258.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">357</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2812</span> Climatic Roots of Piracy in Red Sea</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nasser%20Karami">Nasser Karami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Piracy in the North West of Indian Ocean and the Red Sea has become a global crisis in recent years. Pirates of this area are often very poor people from the Horn of Africa and the western coast of the Red Sea. Climatic and geographical evidence suggests that poverty and destruction of social structures in the region have directly relation to prolonged-drought. Indeed, after the seventies (more than 40 years ago) due to the long-term drought in the region, all political, economic and social structures had declined. Spread of terrorism, violent extremism and of course piracy, are main effects of climate change and drought of this regression. It is disturbing to say the climatic documents say that because of global climate change, severe drought will continue in this region. This mean that the dangers worse than piracy threatens the future of this area. Forty-year data that has assessed in this study indicate that there is direct relationship between spread of drought and piracy in the Red Sea. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=climate" title="climate">climate</a>, <a href="https://publications.waset.org/abstracts/search?q=poverty" title=" poverty"> poverty</a>, <a href="https://publications.waset.org/abstracts/search?q=climate%20change" title=" climate change"> climate change</a>, <a href="https://publications.waset.org/abstracts/search?q=drought" title=" drought"> drought</a>, <a href="https://publications.waset.org/abstracts/search?q=piracy%20in%20red%20sea" title=" piracy in red sea"> piracy in red sea</a> </p> <a href="https://publications.waset.org/abstracts/30771/climatic-roots-of-piracy-in-red-sea" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30771.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">498</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2811</span> Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Almaududy%20Amri">Ahmad Almaududy Amri </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=piracy" title="piracy">piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=Southeast%20Asia" title=" Southeast Asia"> Southeast Asia</a>, <a href="https://publications.waset.org/abstracts/search?q=maritime%20security" title=" maritime security"> maritime security</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20frameworks" title=" legal frameworks"> legal frameworks</a> </p> <a href="https://publications.waset.org/abstracts/8418/piracy-in-southeast-asian-waters-problems-legal-measures-and-way-forward" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8418.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">503</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2810</span> Harvard Lawyers Perception of Intellectual Property and Digital Rights</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dariusz%20Jemielniak">Dariusz Jemielniak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The near future will bring significant changes to contemporary organizations and management, because of the rapidly increasing role of immaterial goods and knowledge workers. The area of copyright, IP, as well as digital (non-material) goods and media redistribution seems to be one of the major challenges for the economy and society in general, and management and organization studies in particular. The proposed paper shows the views and perceptions of fairness of digital media sharing among Harvard Law School LL.M. students, basing on 50 qualitative interviews and 100 questionnaires. The researcher took an ethnographic approach to the study and joined the 2016 Harvard LL.M. Facebook group, which allowed natural socializing and joining for in-person events and private parties more easily. After making acquaintance with many of the students, the researcher conducted a quantitative questionnaire with 100 respondents, allowing to better understand the respondents perception of fairness in digital files sharing in different contexts (depending on the price of the media, its availability, regional licensing, status of the copyright holder, etc.). Basing on the results of the questionnaire, the researcher followed up with long-term, open ended, loosely structured ethnographic interviews (50 interviews were conducted) to further deepen the understanding of the results. The major finding of the study is that Harvard lawyers, in spite of the highest possible understanding of law, as well as professional standards, generally approve of digital piracy in certain contexts. Interestingly, they are also more likely to approve of it if they work for the government rather than the private sector. The conclusions from this study allow a better understanding of how ‘fairness’ is perceived by the younger generation of law professionals, and also open grounds for a more rational licensing policing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=piracy" title="piracy">piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20sharing" title=" digital sharing"> digital sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=perception%20of%20fairness" title=" perception of fairness"> perception of fairness</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20profession" title=" legal profession"> legal profession</a> </p> <a href="https://publications.waset.org/abstracts/72702/harvard-lawyers-perception-of-intellectual-property-and-digital-rights" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72702.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">219</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2809</span> Examining the Relationship Between Traditional Property Rights and Online Intellectual Property Rights in the Digital Age</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Luljeta%20Plakolli-Kasumi">Luljeta Plakolli-Kasumi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the digital age, the relationship between traditional property rights and online intellectual property rights is becoming increasingly complex. On the one hand, the internet and advancements in technology have allowed for the widespread distribution and use of digital content, making it easier for individuals and businesses to access and share information. On the other hand, the rise of digital piracy and illegal file-sharing has led to increased concerns about the protection of intellectual property rights. This paper aims to examine the relationship between traditional property rights and online intellectual property rights in the digital age by analyzing the current legal frameworks, key challenges and controversies that arise, and potential solutions for addressing these issues. The paper will look at how traditional property rights concepts such as ownership and possession are being applied in the online context and how they intersect with new and evolving forms of intellectual property such as digital downloads, streaming services, and online content creation. It will also discuss the tension between the need for strong intellectual property protection to encourage creativity and innovation and the public interest in promoting access to information and knowledge. Ultimately, the paper will explore how the legal system can adapt to better balance the interests of property owners, creators, and users in the digital age. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property" title="intellectual property">intellectual property</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20property" title=" traditional property"> traditional property</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20age" title=" digital age"> digital age</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20content" title=" digital content"> digital content</a> </p> <a href="https://publications.waset.org/abstracts/161600/examining-the-relationship-between-traditional-property-rights-and-online-intellectual-property-rights-in-the-digital-age" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161600.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2808</span> Digital Cinema Watermarking State of Art and Comparison</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Kelkoul">H. Kelkoul</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20Zaz"> Y. Zaz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, the vigorous popularity of video processing techniques has resulted in an explosive growth of multimedia data illegal use. So, watermarking security has received much more attention. The purpose of this paper is to explore some watermarking techniques in order to observe their specificities and select the finest methods to apply in digital cinema domain against movie piracy by creating an invisible watermark that includes the date, time and the place where the hacking was done. We have studied three principal watermarking techniques in the frequency domain: Spread spectrum, Wavelet transform domain and finally the digital cinema watermarking transform domain. In this paper, a detailed technique is presented where embedding is performed using direct sequence spread spectrum technique in DWT transform domain. Experiment results shows that the algorithm provides high robustness and good imperceptibility. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20cinema" title="digital cinema">digital cinema</a>, <a href="https://publications.waset.org/abstracts/search?q=watermarking" title=" watermarking"> watermarking</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelet%20DWT" title=" wavelet DWT"> wavelet DWT</a>, <a href="https://publications.waset.org/abstracts/search?q=spread%20spectrum" title=" spread spectrum"> spread spectrum</a>, <a href="https://publications.waset.org/abstracts/search?q=JPEG2000%20MPEG4" title=" JPEG2000 MPEG4"> JPEG2000 MPEG4</a> </p> <a href="https://publications.waset.org/abstracts/61470/digital-cinema-watermarking-state-of-art-and-comparison" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61470.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2807</span> The Impact of Artificial Intelligence on Legislations and Laws</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Keroles%20Akram%20Saed%20Ghatas">Keroles Akram Saed Ghatas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The near future will bring significant changes in modern organizations and management due to the growing role of intangible assets and knowledge workers. The area of copyright, intellectual property, digital (intangible) assets and media redistribution appears to be one of the greatest challenges facing business and society in general and management sciences and organizations in particular. The proposed article examines the views and perceptions of fairness in digital media sharing among Harvard Law School's LL.M.s. Students, based on 50 qualitative interviews and 100 surveys. The researcher took an ethnographic approach to her research and entered the Harvard LL.M. in 2016. at, a Face book group that allows people to connect naturally and attend in-person and private events more easily. After listening to numerous students, the researcher conducted a quantitative survey among 100 respondents to assess respondents' perceptions of fairness in digital file sharing in various contexts (based on media price, its availability, regional licenses, copyright holder status, etc.). to understand better . .). Based on the survey results, the researcher conducted long-term, open-ended and loosely structured ethnographic interviews (50 interviews) to further deepen the understanding of the results. The most important finding of the study is that Harvard lawyers generally support digital piracy in certain contexts, despite having the best possible legal and professional knowledge. Interestingly, they are also more accepting of working for the government than the private sector. The results of this study provide a better understanding of how “fairness” is perceived by the younger generation of lawyers and pave the way for a more rational application of licensing laws. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cognitive%20impairments" title="cognitive impairments">cognitive impairments</a>, <a href="https://publications.waset.org/abstracts/search?q=communication%20disorders" title=" communication disorders"> communication disorders</a>, <a href="https://publications.waset.org/abstracts/search?q=death%20penalty" title=" death penalty"> death penalty</a>, <a href="https://publications.waset.org/abstracts/search?q=executive%20function%20communication%20disorders" title=" executive function communication disorders"> executive function communication disorders</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20disorders" title=" cognitive disorders"> cognitive disorders</a>, <a href="https://publications.waset.org/abstracts/search?q=capital%20murder" title=" capital murder"> capital murder</a>, <a href="https://publications.waset.org/abstracts/search?q=executive%20function%20death%20penalty" title=" executive function death penalty"> executive function death penalty</a>, <a href="https://publications.waset.org/abstracts/search?q=egyptian%20law%20absence" title=" egyptian law absence"> egyptian law absence</a>, <a href="https://publications.waset.org/abstracts/search?q=justice" title=" justice"> justice</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20cases%20piracy" title=" political cases piracy"> political cases piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20sharing" title=" digital sharing"> digital sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=perception%20of%20fairness" title=" perception of fairness"> perception of fairness</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20profession" title=" legal profession"> legal profession</a> </p> <a href="https://publications.waset.org/abstracts/183105/the-impact-of-artificial-intelligence-on-legislations-and-laws" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183105.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2806</span> Detecting and Disabling Digital Cameras Using D3CIP Algorithm Based on Image Processing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Vignesh">S. Vignesh</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20S.%20Rangasamy"> K. S. Rangasamy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper deals with the device capable of detecting and disabling digital cameras. The system locates the camera and then neutralizes it. Every digital camera has an image sensor known as a CCD, which is retro-reflective and sends light back directly to its original source at the same angle. The device shines infrared LED light, which is invisible to the human eye, at a distance of about 20 feet. It then collects video of these reflections with a camcorder. Then the video of the reflections is transferred to a computer connected to the device, where it is sent through image processing algorithms that pick out infrared light bouncing back. Once the camera is detected, the device would project an invisible infrared laser into the camera's lens, thereby overexposing the photo and rendering it useless. Low levels of infrared laser neutralize digital cameras but are neither a health danger to humans nor a physical damage to cameras. We also discuss the simplified design of the above device that can used in theatres to prevent piracy. The domains being covered here are optics and image processing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CCD" title="CCD">CCD</a>, <a href="https://publications.waset.org/abstracts/search?q=optics" title=" optics"> optics</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title=" image processing"> image processing</a>, <a href="https://publications.waset.org/abstracts/search?q=D3CIP" title=" D3CIP"> D3CIP</a> </p> <a href="https://publications.waset.org/abstracts/1736/detecting-and-disabling-digital-cameras-using-d3cip-algorithm-based-on-image-processing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1736.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">357</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2805</span> Music Piracy Revisited: Agent-Based Modelling and Simulation of Illegal Consumption Behavior</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=U.%20S.%20Putro">U. S. Putro</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Mayangsari"> L. Mayangsari</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Siallagan"> M. Siallagan</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20P.%20Tjahyani"> N. P. Tjahyani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> National Collective Management Institute (LKMN) in Indonesia stated that legal music products were about 77.552.008 unit while illegal music products were about 22.0688.225 unit in 1996 and this number keeps getting worse every year. Consequently, Indonesia named as one of the countries with high piracy levels in 2005. This study models people decision toward unlawful behavior, music content piracy in particular, using agent-based modeling and simulation (ABMS). The classification of actors in the model constructed in this study are legal consumer, illegal consumer, and neutral consumer. The decision toward piracy among the actors is a manifestation of the social norm which attributes are social pressure, peer pressure, social approval, and perceived prevalence of piracy. The influencing attributes fluctuate depending on the majority of surrounding behavior called social network. There are two main interventions undertaken in the model, campaign and peer influence, which leads to scenarios in the simulation: positively-framed descriptive norm message, negatively-framed descriptive norm message, positively-framed injunctive norm with benefits message, and negatively-framed injunctive norm with costs message. Using NetLogo, the model is simulated in 30 runs with 10.000 iteration for each run. The initial number of agent was set 100 proportion of 95:5 for illegal consumption. The assumption of proportion is based on the data stated that 95% sales of music industry are pirated. The finding of this study is that negatively-framed descriptive norm message has a worse reversed effect toward music piracy. The study discovers that selecting the context-based campaign is the key process to reduce the level of intention toward music piracy as unlawful behavior by increasing the compliance awareness. The context of Indonesia reveals that that majority of people has actively engaged in music piracy as unlawful behavior, so that people think that this illegal act is common behavior. Therefore, providing the information about how widespread and big this problem is could make people do the illegal consumption behavior instead. The positively-framed descriptive norm message scenario works best to reduce music piracy numbers as it focuses on supporting positive behavior and subject to the right perception on this phenomenon. Music piracy is not merely economical, but rather social phenomenon due to the underlying motivation of the actors which has shifted toward community sharing. The indication of misconception of value co-creation in the context of music piracy in Indonesia is also discussed. This study contributes theoretically that understanding how social norm configures the behavior of decision-making process is essential to breakdown the phenomenon of unlawful behavior in music industry. In practice, this study proposes that reward-based and context-based strategy is the most relevant strategy for stakeholders in music industry. Furthermore, this study provides an opportunity that findings may generalize well beyond music piracy context. As an emerging body of work that systematically constructs the backstage of law and social affect decision-making process, it is interesting to see how the model is implemented in other decision-behavior related situation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=music%20piracy" title="music piracy">music piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20norm" title=" social norm"> social norm</a>, <a href="https://publications.waset.org/abstracts/search?q=behavioral%20decision-making" title=" behavioral decision-making"> behavioral decision-making</a>, <a href="https://publications.waset.org/abstracts/search?q=agent-based%20model" title=" agent-based model"> agent-based model</a>, <a href="https://publications.waset.org/abstracts/search?q=value%20co-creation" title=" value co-creation"> value co-creation</a> </p> <a href="https://publications.waset.org/abstracts/81835/music-piracy-revisited-agent-based-modelling-and-simulation-of-illegal-consumption-behavior" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81835.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">187</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2804</span> The Effect of Maritime Security on National Development in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adegboyega%20Adedolapo%20Ola">Adegboyega Adedolapo Ola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Globally, a country’s maritime security has a significant impact on its national development because it serves as a major source of a commercial contact and food supply. However, the country has been faced with a number of problems, such as piracy, kidnapping, illegal bunkering and oil theft. As such, the study examined the contribution and the relationship between maritime security and Nigeria’s development, as well as the prospects and challenges of maritime security in Nigeria. The study utilized a questionnaire and focused group discussion/interview as instruments for data collection. The method of analysis employed in the study is descriptive. A total of Three Hundred and Ninety (390) respondents were randomly selected. The result of the study showed that maritime security contributes to national development in Nigeria by guaranteeing food security in Nigeria, creating employment opportunities as well as increasing the Gross Domestic Product (GDP) of the economy. It was also found that maritime security is yet to provide sufficient support for national development in Nigeria. It is further established that it has prospects for development through the creation of employment opportunities, increase in foreign earnings, and fostering improved living standards for citizens. The study concluded that the high level of corruption, piracy and kidnapping, lack of political will by the government and the porosity of the Nigerian borders are serious obstacles, among others. In attempting to solve the problem of piracy and kidnapping in Nigerian maritime, to contribute to National development, it is primordial to address the cancer of corruption, poverty, and youth unemployment. In view of this, the study recommends: among other things, that the maritime industry should be well secured by removing its constraints/bottlenecks so as to enhance its contributions to national development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=maritime%20security" title="maritime security">maritime security</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20development" title=" national development"> national development</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=piracy" title=" piracy"> piracy</a> </p> <a href="https://publications.waset.org/abstracts/166065/the-effect-of-maritime-security-on-national-development-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166065.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2803</span> Criminal Liability for Copyright and Related Rights Infringement: Albania Legislation Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ilda%20Mu%C3%A7mataj">Ilda Muçmataj</a>, <a href="https://publications.waset.org/abstracts/search?q=Anjeza%20Li%C3%A7enji"> Anjeza Liçenji</a>, <a href="https://publications.waset.org/abstracts/search?q=Borana%20Kalemi"> Borana Kalemi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Copyright and related rights have been pivotal in driving the economic growth of nations worldwide and fostering culture and new forms of entertainment. The introduction of the internet and technological advancement has significantly expanded the opportunities for creators and rights holders to promote their works and boost their revenues. However, this digital era has also brought about complex challenges, leading to a more extensive range of copyright infringement, primarily due to the substantial surge in piracy and counterfeiting. Despite being reported internationally, the mechanisms to tackle and the responsibility for enforcing copyright infringements often remain rooted in national jurisdictions, resulting in a gap between the scale of the problem and the efficacy of enforcement measures. Thus, it is essential to ensure adequate legal protection, a vital safeguard for authors' economic and moral interests, information security, innovative development promotion, and intellectual creativity preservation. This paper describes Albanian criminal law-based copyright enforcement legislation, focusing on doctrinal guidance and practical judicial considerations. Lastly, the paper offers recommendations for enhancing copyright protection and related rights. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=author" title="author">author</a>, <a href="https://publications.waset.org/abstracts/search?q=copyright%20infringement" title=" copyright infringement"> copyright infringement</a>, <a href="https://publications.waset.org/abstracts/search?q=copyright" title=" copyright"> copyright</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20liability" title=" criminal liability"> criminal liability</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property" title=" intellectual property"> intellectual property</a>, <a href="https://publications.waset.org/abstracts/search?q=piracy" title=" piracy"> piracy</a> </p> <a href="https://publications.waset.org/abstracts/188420/criminal-liability-for-copyright-and-related-rights-infringement-albania-legislation-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188420.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">36</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2802</span> Digital Preservation: A Need of Tomorrow</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gaurav%20Kumar">Gaurav Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital libraries have been established all over the world to create, maintain and to preserve the digital materials. This paper exhibits the importance and objectives of digital preservation. The necessities of preservation are hardware and software technology to interpret the digital documents and discuss various aspects of digital preservation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=preservation" title="preservation">preservation</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20preservation" title=" digital preservation"> digital preservation</a>, <a href="https://publications.waset.org/abstracts/search?q=conservation" title=" conservation"> conservation</a>, <a href="https://publications.waset.org/abstracts/search?q=archive" title=" archive"> archive</a>, <a href="https://publications.waset.org/abstracts/search?q=repository" title=" repository"> repository</a>, <a href="https://publications.waset.org/abstracts/search?q=document" title=" document"> document</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware" title=" hardware"> hardware</a>, <a href="https://publications.waset.org/abstracts/search?q=software" title=" software"> software</a>, <a href="https://publications.waset.org/abstracts/search?q=organization" title=" organization"> organization</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20readable%20format" title=" machine readable format"> machine readable format</a> </p> <a href="https://publications.waset.org/abstracts/23433/digital-preservation-a-need-of-tomorrow" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23433.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">588</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2801</span> Lockit: A Logic Locking Automation Software</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nemanja%20Kajtez">Nemanja Kajtez</a>, <a href="https://publications.waset.org/abstracts/search?q=Yue%20Zhan"> Yue Zhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Basel%20Halak"> Basel Halak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The significant rise in the cost of manufacturing of nanoscale integrated circuits (IC) has led the majority of IC design companies to outsource the fabrication of their products to other companies, often located in different countries. This multinational nature of the hardware supply chain has led to a host of security threats, including IP piracy, IC overproduction, and Trojan insertion. To combat that, researchers have proposed logic locking techniques to protect the intellectual properties of the design and increase the difficulty of malicious modification of its functionality. However, the adoption of logic locking approaches is rather slow due to the lack of the integration with IC production process and the lack of efficacy of existing algorithms. This work automates the logic locking process by developing software using Python that performs the locking on a gate-level netlist and can be integrated with the existing digital synthesis tools. Analysis of the latest logic locking algorithms has demonstrated that the SFLL-HD algorithm is one of the most secure and versatile in trading-off levels of protection against different types of attacks and was thus selected for implementation. The presented tool can also be expanded to incorporate the latest locking mechanisms to keep up with the fast-paced development in this field. The paper also presents a case study to demonstrate the functionality of the tool and how it could be used to explore the design space and compare different locking solutions. The source code of this tool is available freely from (https://www.researchgate.net/publication/353195333_Source_Code_for_The_Lockit_Tool). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design%20automation" title="design automation">design automation</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware%20security" title=" hardware security"> hardware security</a>, <a href="https://publications.waset.org/abstracts/search?q=IP%20piracy" title=" IP piracy"> IP piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=logic%20locking" title=" logic locking"> logic locking</a> </p> <a href="https://publications.waset.org/abstracts/143937/lockit-a-logic-locking-automation-software" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143937.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">182</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2800</span> A General Framework to Successfully Operate the Digital Transformation Process in the Post-COVID Era</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Driss%20Kettani">Driss Kettani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we shed light on “Digital Divide 2.0,” which we see as COVID-19’s Version of the Digital Divide! We believe that “Fighting” against Digital Divide 2.0 necessitates for a Country to be seriously advanced in the Global Digital Transformation that is, naturally, a complex, delicate, costly and long-term Process. We build an argument supporting our assumption and, from there, we present the foundations of a computational framework to guide and streamline Digital Transformation at all levels. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20divide%202.0" title="digital divide 2.0">digital divide 2.0</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20transformation" title=" digital transformation"> digital transformation</a>, <a href="https://publications.waset.org/abstracts/search?q=ICTs%20for%20development" title=" ICTs for development"> ICTs for development</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20outcomes%20assessment" title=" computational outcomes assessment"> computational outcomes assessment</a> </p> <a href="https://publications.waset.org/abstracts/143734/a-general-framework-to-successfully-operate-the-digital-transformation-process-in-the-post-covid-era" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143734.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">177</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2799</span> The Roles of Aesthetics and Information Quality on Intention to Continued Used of Digital Library within the Context of UTAUT2</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shahruhaida%20Adayu%20Mohd%20Paili">Shahruhaida Adayu Mohd Paili</a>, <a href="https://publications.waset.org/abstracts/search?q=Abd%20Latif%20Abdul%20Rahman"> Abd Latif Abdul Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Asmadi%20Mohammed%20Ghazali"> Asmadi Mohammed Ghazali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital library was developed by many organizations, especially universities. The digital library can be considered as a new information system. Digital library brings many benefits to the users. There are many researches that have investigated the importance of the digital library, the acceptance, and continuance use of digital library. The investigation towards the digital library is important and it is crucial to understand the reason why users accept and continued use of digital library. Users can search the information and available resources through the digital library website. It is important to know the user’s perception towards the aesthetics of the digital library. Besides that, because of digital library provided information to the users, the researcher also needed to investigate the quality of information in digital library. This study used Extending the Unified Theory of Acceptance and Use of Technology (UTAUT2) in order to know the user’s intention to continued use of digital library. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20library" title="digital library">digital library</a>, <a href="https://publications.waset.org/abstracts/search?q=aesthetics" title=" aesthetics"> aesthetics</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20quality" title=" information quality"> information quality</a>, <a href="https://publications.waset.org/abstracts/search?q=intention%20to%20continued%20use%20of%20digital%20library" title=" intention to continued use of digital library"> intention to continued use of digital library</a>, <a href="https://publications.waset.org/abstracts/search?q=UTAUT2" title=" UTAUT2"> UTAUT2</a> </p> <a href="https://publications.waset.org/abstracts/45725/the-roles-of-aesthetics-and-information-quality-on-intention-to-continued-used-of-digital-library-within-the-context-of-utaut2" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45725.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">388</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2798</span> Notice and Block?</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Althaf%20Marsoof">Althaf Marsoof</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The blocking injunction, giving rise to a ‘notice and block’ regime, has become the new approach to curtail the infringement of Intellectual Property rights on the Internet. As such, the blocking injunction is an addition to the arsenal of copyright owners, and more recently has also benefited trademark owners, in their battle against piracy and counterfeiting. Yet, the blocking injunction, notwithstanding the usefulness of its ‘notice and block’ outcome, is not without limitations. In the circumstances, it is argued that ‘notice and takedown’, the approach that has been adopted by right-holders for some years, is still an important remedy against the proliferation of online content that infringe the rights of copyright and trademark owners, which is both viable and effective. Thus, it is suggested that the battle against online piracy and counterfeiting could be won only if both the blocking injunction and the practice of ‘notice and takedown’ are utilised by right-holders as complementary and simultaneous remedies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blocking%20injunctions" title="blocking injunctions">blocking injunctions</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20intermediaries" title=" internet intermediaries"> internet intermediaries</a>, <a href="https://publications.waset.org/abstracts/search?q=notice%20and%20takedown" title=" notice and takedown"> notice and takedown</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property" title=" intellectual property"> intellectual property</a> </p> <a href="https://publications.waset.org/abstracts/23729/notice-and-block" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23729.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">416</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2797</span> A Passive Digital Video Authentication Technique Using Wavelet Based Optical Flow Variation Thresholding</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20S.%20Remya">R. S. Remya</a>, <a href="https://publications.waset.org/abstracts/search?q=U.%20S.%20Sethulekshmi"> U. S. Sethulekshmi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Detecting the authenticity of a video is an important issue in digital forensics as Video is used as a silent evidence in court such as in child pornography, movie piracy cases, insurance claims, cases involving scientific fraud, traffic monitoring etc. The biggest threat to video data is the availability of modern open video editing tools which enable easy editing of videos without leaving any trace of tampering. In this paper, we propose an efficient passive method for inter-frame video tampering detection, its type and location by estimating the optical flow of wavelet features of adjacent frames and thresholding the variation in the estimated feature. The performance of the algorithm is compared with the z-score thresholding and achieved an efficiency above 95% on all the tested databases. The proposed method works well for videos with dynamic (forensics) as well as static (surveillance) background. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discrete%20wavelet%20transform" title="discrete wavelet transform">discrete wavelet transform</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20flow" title=" optical flow"> optical flow</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20flow%20variation" title=" optical flow variation"> optical flow variation</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20tampering" title=" video tampering"> video tampering</a> </p> <a href="https://publications.waset.org/abstracts/45252/a-passive-digital-video-authentication-technique-using-wavelet-based-optical-flow-variation-thresholding" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45252.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2796</span> A Practical Approach and Implementation of Digital Library Towards Best Practice in Malaysian Academic Library</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zainab%20Ajab%20Mohideen">Zainab Ajab Mohideen</a>, <a href="https://publications.waset.org/abstracts/search?q=Kiran%20Kaur"> Kiran Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Basheer%20Ahamadhu"> A. Basheer Ahamadhu</a>, <a href="https://publications.waset.org/abstracts/search?q=Noor%20Azlinda%20Wan%20Jan"> Noor Azlinda Wan Jan</a>, <a href="https://publications.waset.org/abstracts/search?q=Sukmawati%20Muhammad"> Sukmawati Muhammad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The corpus in the digital library is to provide an overview and evidence from library automation that can be used to justify the needs of the digital library. This paper disperses the approach and implementation of the digital library as part of best practices by the Automation Division at Hamzah Sendut Library of the University Science Malaysia (USM). The implemented digital library model emphasizes on the entire library collections, technical perspective, and automation solution. This model served as a foundation for digital library services as part of information delivery in the USM digital library. The approach to digital library includes discussion on key factors, design, architecture, and pragmatic model that has been collected, captured, and identified during the implementation stages. At present, the USM digital library has achieved the status of an Institutional Repository (IR). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20digital%20library" title="academic digital library">academic digital library</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20information%20system" title=" digital information system"> digital information system</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20library%20best%20practice" title=" digital library best practice"> digital library best practice</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20library%20model" title=" digital library model"> digital library model</a> </p> <a href="https://publications.waset.org/abstracts/31709/a-practical-approach-and-implementation-of-digital-library-towards-best-practice-in-malaysian-academic-library" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31709.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">555</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2795</span> Digital Preservation: Requirement of 21st Century</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gaurav%20Kumar">Gaurav Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Shilpa"> Shilpa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital libraries have been established all over the world to create, maintain and to preserve the digital materials. This paper focuses on operational digital preservation systems specifically in educational organizations in India. It considers the broad range of digital objects including e-journals, technical reports, e-records, project documents, scientific data, etc. This paper describes the main objectives, process and technological issues involved in preservation of digital materials. Digital preservation refers to the various methods of keeping digital materials alive for the future. It includes everything from electronic publications on CD-ROM to Online database and collections of experimental data in digital format maintains the ability to display, retrieve and use digital collections in the face of rapidly changing technological and organizational infrastructures elements. This paper exhibits the importance and objectives of digital preservation. The necessities of preservation are hardware and software technology to interpret the digital documents and discuss various aspects of digital preservation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=preservation" title="preservation">preservation</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20preservation" title=" digital preservation"> digital preservation</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20dark%20age" title=" digital dark age"> digital dark age</a>, <a href="https://publications.waset.org/abstracts/search?q=conservation" title=" conservation"> conservation</a>, <a href="https://publications.waset.org/abstracts/search?q=archive" title=" archive"> archive</a>, <a href="https://publications.waset.org/abstracts/search?q=repository" title=" repository"> repository</a>, <a href="https://publications.waset.org/abstracts/search?q=document" title=" document"> document</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware" title=" hardware"> hardware</a>, <a href="https://publications.waset.org/abstracts/search?q=software" title=" software"> software</a>, <a href="https://publications.waset.org/abstracts/search?q=organization" title=" organization"> organization</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20readable%20format" title=" machine readable format"> machine readable format</a> </p> <a href="https://publications.waset.org/abstracts/31308/digital-preservation-requirement-of-21st-century" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31308.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">457</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2794</span> SHIFT: Examining Preservice Teachers’ Perceptions on Digital Citizenship Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cachanda%20K.%20Orellana">Cachanda K. Orellana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examined preservice teachers’ perceptions of their role in digital citizenship education. Data was gathered via surveys and coursework from the preservice teachers’ instructional technology course. Pre-service teachers were asked about their role in digital citizenship education during a unit on digital dilemmas. Findings suggest that teacher education programs should consider digital citizenship education as more than the acquisition of a set of skills and behaviors and prepare preservice teachers to support students’ ability to engage in ethical decision-making in digital spaces. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20citizenship" title="digital citizenship">digital citizenship</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20dilemmas" title=" digital dilemmas"> digital dilemmas</a>, <a href="https://publications.waset.org/abstracts/search?q=pre-service%20teachers" title=" pre-service teachers"> pre-service teachers</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20education" title=" teacher education"> teacher education</a> </p> <a href="https://publications.waset.org/abstracts/135188/shift-examining-preservice-teachers-perceptions-on-digital-citizenship-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135188.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2793</span> Rhetoric and Renarrative Structure of Digital Images in Trans-Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yang%20Geng">Yang Geng</a>, <a href="https://publications.waset.org/abstracts/search?q=Anqi%20Zhao"> Anqi Zhao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The misreading theory of Harold Bloom provides a new diachronic perspective as an approach to the consistency between rhetoric of digital technology, dynamic movement of digital images and uncertain meaning of text. Reinterpreting the diachroneity of 'intertextuality' in the context of misreading theory extended the range of the 'intermediality' of transmedia to the intense tension between digital images and symbolic images throughout history of images. With the analogy between six categories of revisionary ratios and six steps of digital transformation, digital rhetoric might be illustrated as a linear process reflecting dynamic, intensive relations between digital moving images and original static images. Finally, it was concluded that two-way framework of the rhetoric of transformation of digital images and reversed served as a renarrative structure to revive static images by reconnecting them with digital moving images. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=rhetoric" title="rhetoric">rhetoric</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20art" title=" digital art"> digital art</a>, <a href="https://publications.waset.org/abstracts/search?q=intermediality" title=" intermediality"> intermediality</a>, <a href="https://publications.waset.org/abstracts/search?q=misreading%20theory" title=" misreading theory"> misreading theory</a> </p> <a href="https://publications.waset.org/abstracts/100230/rhetoric-and-renarrative-structure-of-digital-images-in-trans-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100230.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">256</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2792</span> Jordan Curves in the Digital Plane with Respect to the Connectednesses given by Certain Adjacency Graphs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Josef%20Slapal">Josef Slapal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital images are approximations of real ones and, therefore, to be able to study them, we need the digital plane Z2 to be equipped with a convenient structure that behaves analogously to the Euclidean topology on the real plane. In particular, it is required that such a structure allows for a digital analogue of the Jordan curve theorem. We introduce certain adjacency graphs on the digital plane and prove digital Jordan curves for them thus showing that the graphs provide convenient structures on Z2 for the study and processing of digital images. Further convenient structures including the wellknown Khalimsky and Marcus-Wyse adjacency graphs may be obtained as quotients of the graphs introduced. Since digital Jordan curves represent borders of objects in digital images, the adjacency graphs discussed may be used as background structures on the digital plane for solving the problems of digital image processing that are closely related to borders like border detection, contour filling, pattern recognition, thinning, etc. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20plane" title="digital plane">digital plane</a>, <a href="https://publications.waset.org/abstracts/search?q=adjacency%20graph" title=" adjacency graph"> adjacency graph</a>, <a href="https://publications.waset.org/abstracts/search?q=Jordan%20curve" title=" Jordan curve"> Jordan curve</a>, <a href="https://publications.waset.org/abstracts/search?q=quotient%20adjacency" title=" quotient adjacency"> quotient adjacency</a> </p> <a href="https://publications.waset.org/abstracts/65454/jordan-curves-in-the-digital-plane-with-respect-to-the-connectednesses-given-by-certain-adjacency-graphs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65454.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">379</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2791</span> Digital Leadership and HR practices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joanna%20Konstantinou">Joanna Konstantinou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the pandemic, we have recently witnessed an explosion of HR Tech offering a variety of solutions for digital transformation, as well as a large number of HR practices implemented by professionals both in data science and occupational psychology. The aim of this study is to explore the impact of these practices and their effectiveness and to develop an understanding of digital leadership. The study will be based on semi-structured interviews using qualitative research methods and tools. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=HR%20practices" title="HR practices">HR practices</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20trasformation" title=" digital trasformation"> digital trasformation</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20leadership" title=" digital leadership"> digital leadership</a> </p> <a href="https://publications.waset.org/abstracts/142655/digital-leadership-and-hr-practices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">205</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2790</span> The Development of Digital Economy in Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Danuvasin%20Charoen">Danuvasin Charoen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates the development of the digital economy policy in Thailand. The researcher describes the importance of digital technologies for competitiveness development of the country. In addition, the researcher analyzes the components and roadmap of the digital economy policy in Thailand. Main problems and challenges of the policy were identified. The data were gathered and analyzed from secondary sources. The finding can be used to guide the implementation of the digital economy in Thailand and other developing economies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20economy" title="digital economy">digital economy</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT%20in%20developing%20countries" title=" ICT in developing countries"> ICT in developing countries</a>, <a href="https://publications.waset.org/abstracts/search?q=Thailand" title=" Thailand"> Thailand</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT%20development" title=" ICT development"> ICT development</a> </p> <a href="https://publications.waset.org/abstracts/38291/the-development-of-digital-economy-in-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38291.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">346</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2789</span> Factors Drive Consumers to Purchase Digital Music: An Empirical Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chechen%20Liao">Chechen Liao</a>, <a href="https://publications.waset.org/abstracts/search?q=Yi-Jen%20Huang"> Yi-Jen Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu-Ting%20Lu"> Yu-Ting Lu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores and complements digital aspects. In this study, we construct a research model based on the theory of reasoned action and extend it with the advantages and disadvantages of intangibility (convenience, perceived risk), some characteristics of digital products (price, variety, trialability), and factors related to entertainment (perceived playfulness) to predict what consumers really consider when they buy digital music. Eight hypotheses were tested and supported. Finally, we prove that the theory of reasoned action is still valid in the field of digital products. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20music" title="digital music">digital music</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20product" title=" digital product"> digital product</a>, <a href="https://publications.waset.org/abstracts/search?q=theory%20of%20reasoned%20action" title=" theory of reasoned action "> theory of reasoned action </a> </p> <a href="https://publications.waset.org/abstracts/29870/factors-drive-consumers-to-purchase-digital-music-an-empirical-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29870.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">441</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2788</span> Effect of Enterprise Digital Transformation on Enterprise Growth: Theoretical Logic and Chinese Experience</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bin%20Li">Bin Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the era of the digital economy, digital transformation has gradually become a strategic choice for enterprise development, but there is a relative lack of systematic research from the perspective of enterprise growth. Based on the sample of Chinese A-share listed companies from 2011 to 2021, this paper constructs A digital transformation index system and an enterprise growth composite index to empirically test the impact of enterprise digital transformation on enterprise growth and its mechanism. The results show that digital transformation can significantly promote corporate growth. The mechanism analysis finds that reducing operating costs, optimizing human capital structure, promoting R&D output and improving digital innovation capability play an important intermediary role in the process of digital transformation promoting corporate growth. At the same time, the level of external digital infrastructure and the strength of organizational resilience play a positive moderating role in the process of corporate digital transformation promoting corporate growth. In addition, while further analyzing the heterogeneity of enterprises, this paper further deepens the analysis of the driving factors and digital technology support of digital transformation, as well as the three dimensions of enterprise growth, thus deepening the research depth of enterprise digital transformation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20transformation" title="digital transformation">digital transformation</a>, <a href="https://publications.waset.org/abstracts/search?q=enterprise%20growth" title=" enterprise growth"> enterprise growth</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20technology" title=" digital technology"> digital technology</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20infrastructure" title=" digital infrastructure"> digital infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=organization%20resilience" title=" organization resilience"> organization resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20innovation" title=" digital innovation"> digital innovation</a> </p> <a href="https://publications.waset.org/abstracts/181633/effect-of-enterprise-digital-transformation-on-enterprise-growth-theoretical-logic-and-chinese-experience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/181633.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">61</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2787</span> Digital Revolution a Veritable Infrastructure for Technological Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Osakwe%20Jude%20Odiakaosa">Osakwe Jude Odiakaosa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today’s digital society is characterized by e-education or e-learning, e-commerce, and so on. All these have been propelled by digital revolution. Digital technology such as computer technology, Global Positioning System (GPS) and Geographic Information System (GIS) has been having a tremendous impact on the field of technology. This development has positively affected the scope, methods, speed of data acquisition, data management and the rate of delivery of the results (map and other map products) of data processing. This paper tries to address the impact of revolution brought by digital technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20revolution" title="digital revolution">digital revolution</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20management" title=" data management "> data management </a> </p> <a href="https://publications.waset.org/abstracts/25925/digital-revolution-a-veritable-infrastructure-for-technological-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25925.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">449</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2786</span> Digital Image Forensics: Discovering the History of Digital Images</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gurinder%20Singh">Gurinder Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Kulbir%20Singh"> Kulbir Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital multimedia contents such as image, video, and audio can be tampered easily due to the availability of powerful editing softwares. Multimedia forensics is devoted to analyze these contents by using various digital forensic techniques in order to validate their authenticity. Digital image forensics is dedicated to investigate the reliability of digital images by analyzing the integrity of data and by reconstructing the historical information of an image related to its acquisition phase. In this paper, a survey is carried out on the forgery detection by considering the most recent and promising digital image forensic techniques. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Computer%20Forensics" title="Computer Forensics">Computer Forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=Multimedia%20Forensics" title=" Multimedia Forensics"> Multimedia Forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=Image%20Ballistics" title=" Image Ballistics"> Image Ballistics</a>, <a href="https://publications.waset.org/abstracts/search?q=Camera%20Source%20Identification" title=" Camera Source Identification"> Camera Source Identification</a>, <a href="https://publications.waset.org/abstracts/search?q=Forgery%20Detection" title=" Forgery Detection"> Forgery Detection</a> </p> <a href="https://publications.waset.org/abstracts/76669/digital-image-forensics-discovering-the-history-of-digital-images" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76669.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">247</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=93">93</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=94">94</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20piracy&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10