Search results for: conceal
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 22

Search results for: conceal

22 The Escalation of Incivility in the Light of Social Constructions that Conceal Inequalities

Authors: J. M. B. Mendonça, M. V. S. Siqueira, A. Soares, M. A. F. Santos

Abstract:

The purpose of this article is to understand the dynamics of the increase in incivility through social relations (gender, race, class, sexual orientation, etc.), which hide inequalities in the form of treatment and opportunities within the organizational sphere. For this, we will examine works that address incivility at work, as well as studies that deviate from the mainstream, bringing more obscure organizational facets to light in connection with a critical approach to this issue. Next, some results of a bibliometric study shall be exposed, to analyze contributions connected to the theme and demonstrate gaps for future research. Then, models that facilitate reflection on the dynamics of violence shall be discussed. Finally, a broader concept of incivility in interpersonal relationships in the workplace shall be exposed considering the multiple approaches discussed.

Keywords: incivility, inequalities, organization reflections, preventing violence

Procedia PDF Downloads 290
21 Image Steganography Using Predictive Coding for Secure Transmission

Authors: Baljit Singh Khehra, Jagreeti Kaur

Abstract:

In this paper, steganographic strategy is used to hide the text file inside an image. To increase the storage limit, predictive coding is utilized to implant information. In the proposed plan, one can exchange secure information by means of predictive coding methodology. The predictive coding produces high stego-image. The pixels are utilized to insert mystery information in it. The proposed information concealing plan is powerful as contrasted with the existing methodologies. By applying this strategy, a provision helps clients to productively conceal the information. Entropy, standard deviation, mean square error and peak signal noise ratio are the parameters used to evaluate the proposed methodology. The results of proposed approach are quite promising.

Keywords: cryptography, steganography, reversible image, predictive coding

Procedia PDF Downloads 392
20 Determination of Complexity Level in Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 318
19 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 264
18 Deployment of Matrix Transpose in Digital Image Encryption

Authors: Okike Benjamin, Garba E J. D.

Abstract:

Encryption is used to conceal information from prying eyes. Presently, information and data encryption are common due to the volume of data and information in transit across the globe on daily basis. Image encryption is yet to receive the attention of the researchers as deserved. In other words, video and multimedia documents are exposed to unauthorized accessors. The authors propose image encryption using matrix transpose. An algorithm that would allow image encryption is developed. In this proposed image encryption technique, the image to be encrypted is split into parts based on the image size. Each part is encrypted separately using matrix transpose. The actual encryption is on the picture elements (pixel) that make up the image. After encrypting each part of the image, the positions of the encrypted images are swapped before transmission of the image can take place. Swapping the positions of the images is carried out to make the encrypted image more robust for any cryptanalyst to decrypt.

Keywords: image encryption, matrices, pixel, matrix transpose

Procedia PDF Downloads 387
17 The Misuse of Free Cash and Earnings Management: An Analysis of the Extent to Which Board Tenure Mitigates Earnings Management

Authors: Michael McCann

Abstract:

Managerial theories propose that, in joint stock companies, executives may be tempted to waste excess free cash on unprofitable projects to keep control of resources. In order to conceal their projects' poor performance, they may seek to engage in earnings management. On the one hand, managers may manipulate earnings upwards in order to post ‘good’ performances and safeguard their position. On the other, since managers pursuit of unrewarding investments are likely to lead to low long-term profitability, managers will use negative accruals to reduce current year’s earnings, smoothing earnings over time in order to conceal the negative effects. Agency models argue that boards of directors are delegated by shareholders to ensure that companies are governed properly. Part of that responsibility is ensuring the reliability of financial information. Analyses of the impact of board characteristics, particularly board independence on the misuse of free cash flow and earnings management finds conflicting evidence. However, existing characterizations of board independence do not account for such directors gaining firm-specific knowledge over time, influencing their monitoring ability. Further, there is little analysis of the influence of the relative experience of independent directors and executives on decisions surrounding the use of free cash. This paper contributes to this literature regarding the heterogeneous characteristics of boards by investigating the influence of independent director tenure on earnings management and the relative tenures of independent directors and Chief Executives. A balanced panel dataset comprising 51 companies across 11 annual periods from 2005 to 2015 is used for the analysis. In each annual period, firms were classified as conducting earnings management if they had discretionary accruals in the bottom quartile (downwards) and top quartile (upwards) of the distributed values for the sample. Logistical regressions were conducted to determine the marginal impact of independent board tenure and a number of control variables on the probability of conducting earnings management. The findings indicate that both absolute and relative measures of board independence and experience do not have a significant impact on the likelihood of earnings management. It is the level of free cash flow which is the major influence on the probability of earnings management. Higher free cash flow increases the probability of earnings management significantly. The research also investigates whether board monitoring of earnings management is contingent on the level of free cash flow. However, the results suggest that board monitoring is not amplified when free cash flow is higher. This suggests that the extent of earnings management in companies is determined by a range of company, industry and situation-specific factors.

Keywords: corporate governance, boards of directors, agency theory, earnings management

Procedia PDF Downloads 200
16 Britain and the EU Referendum: Arguments over East European Welfare Benefit Tourism

Authors: James Moir

Abstract:

This paper considers the political controversy in Britain, both pre- and post-EU referendum, concerning claims over welfare benefit tourism and immigration in the UK. These claims were seen to be a significant reason for the vote for Brexit despite evidence to the contrary that benefit tourism was not, and is not, implicated in the migration of East Europeans to the UK. Populist rhetoric is analysed alongside studies that contradict such views. These contentious issues are examined with respect to the agenda set by the United Kingdom Independence Party (UKIP) concerning anti-EU and anti-immigrant sentiment and the notion of cultural differences as the basis for supporting Brexit. The paper also examines the paradoxical claim that East European migrants are taking British jobs and driving down wages. Taken together, it is argued that these two kinds of claims effectively contribute to anti-immigration discourse based on the logic of economics, but also at the same time conceal more irrational fears of adapting to change through the inclusion of others. Such fears are considered as being founded upon a challenge to the stability of totems of national life and identity.

Keywords: benefits, Brexit, immigration, tourism, welfare

Procedia PDF Downloads 346
15 Secure Text Steganography for Microsoft Word Document

Authors: Khan Farhan Rafat, M. Junaid Hussain

Abstract:

Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.

Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography

Procedia PDF Downloads 215
14 Acoustic Analysis for Comparison and Identification of Normal and Disguised Speech of Individuals

Authors: Surbhi Mathur, J. M. Vyas

Abstract:

Although the rapid development of forensic speaker recognition technology has been conducted, there are still many problems to be solved. The biggest problem arises when the cases involving disguised voice samples come across for the purpose of examination and identification. Such type of voice samples of anonymous callers is frequently encountered in crimes involving kidnapping, blackmailing, hoax extortion and many more, where the speaker makes a deliberate effort to manipulate their natural voice in order to conceal their identity due to the fear of being caught. Voice disguise causes serious damage to the natural vocal parameters of the speakers and thus complicates the process of identification. The sole objective of this doctoral project is to find out the possibility of rendering definite opinions in cases involving disguised speech by experimentally determining the effects of different disguise forms on personal identification and percentage rate of speaker recognition for various voice disguise techniques such as raised pitch, lower pitch, increased nasality, covering the mouth, constricting tract, obstacle in mouth etc by analyzing and comparing the amount of phonetic and acoustic variation in of artificial (disguised) and natural sample of an individual, by auditory as well as spectrographic analysis.

Keywords: forensic, speaker recognition, voice, speech, disguise, identification

Procedia PDF Downloads 339
13 Influential Health Care System Rankings Can Conceal Maximal Inequities: A Simulation Study

Authors: Samuel Reisman

Abstract:

Background: Comparative rankings are increasingly used to evaluate health care systems. These rankings combine discrete attribute rankings into a composite overall ranking. Health care equity is a component of overall rankings, but excelling in other categories can counterbalance low inequity grades. Highly ranked inequitable health care would commend systems that disregard human rights. We simulated the ranking of a maximally inequitable health care system using a published, influential ranking methodology. Methods: We used The Commonwealth Fund’s ranking of eleven health care systems to simulate the rank of a maximally inequitable system. Eighty performance indicators were simulated, assuming maximal ineptitude in equity benchmarks. Maximal rankings in all non-equity subcategories were assumed. Subsequent stepwise simulations lowered all non-equity rank positions by one. Results: The maximally non-equitable health care system ranked first overall. Three subsequent stepwise simulations, lowering non-equity rankings by one, each resulted in an overall ranking within the top three. Discussion: Our results demonstrate that grossly inequitable health care systems can rank highly in comparative health care system rankings. These findings challenge the validity of ranking methodologies that subsume equity under broader benchmarks. We advocate limiting maximum overall rankings of health care systems to their individual equity rankings. Such limits are logical given the insignificance of health care system improvements to those lacking adequate health care.

Keywords: global health, health equity, healthcare systems, international health

Procedia PDF Downloads 369
12 Measuring Corporate Brand Loyalties in Business Markets: A Case for Caution

Authors: Niklas Bondesson

Abstract:

Purpose: This paper attempts to examine how different facets of attitudinal brand loyalty are determined by different brand image elements in business markets. Design/Methodology/Approach: Statistical analysis is employed to data from a web survey, covering 226 professional packaging buyers in eight countries. Findings: The results reveal that different brand loyalty facets have different antecedents. Affective brand loyalties (or loyalty 'feelings') are mainly driven by customer associations to service relationships, whereas customers’ loyalty intentions (to purchase and recommend a brand) are triggered by associations to the general reputation of the company. The findings also indicate that willingness to pay a price premium is a distinct form of loyalty, with unique determinants. Research implications: Theoretically, the paper suggests that corporate B2B brand loyalty needs to be conceptualised with more refinement than has been done in extant B2B branding work. Methodologically, the paper highlights that single-item approaches can be fruitful when measuring B2B brand loyalty, and that multi-item scales can conceal important nuances in terms of understanding why customers are loyal. Practical implications: The idea of a loyalty 'silver metric' is an attractive idea, but this study indicates that firms who rely too much on one single type of brand loyalty risk to miss important building blocks. Originality/Value/Contribution: The major contribution is a more multi-faceted conceptualisation, and measurement, of corporate B2B brand loyalty and its brand image determinants than extant work has provided.

Keywords: brand equity, business-to-business branding, industrial marketing, buying behaviour

Procedia PDF Downloads 386
11 Complicating Representations of Domestic Violence Perpetration through a Qualitative Content Analysis and Socio-Ecological Approach

Authors: Charlotte Lucke

Abstract:

This study contributes to the body of literature that analyzes and complicates oversimplified and sensationalized representations of trauma and violence through a close examination and complication of representations of perpetrators of domestic violence in the mass media. This study determines the ways the media frames perpetrators of domestic violence through a qualitative content analysis and socio-ecological approach to the perpetration of violence. While the qualitative analysis has not been carried out, through preliminary research, this study hypothesizes that the media represents perpetrators through tropes such as the 'predator' or 'offender,' or as a demonized 'other.' It is necessary to expose and work through such stereotypes because cultivation theory demonstrates that the mass media determines societal beliefs about and perceptions of the world. Thus, representations of domestic violence in the mass media can lead people to believe that perpetrators of violence are mere animals or criminals and overlook the trauma that many perpetrators experience. When the media represents perpetrators as pure evil, monsters, or absolute 'others,' it leaves out the complexities of what moves people to commit domestic violence. By analyzing and placing media representations of perpetrators into conversation with the socio-ecological approach to violence perpetration, this study complicates domestic violence stereotypes. The socio-ecological model allows researchers to consider the way the interplay between individuals and their families, friends, communities, and cultures can move people to act violently. Using this model, along with psychological and psychoanalytic approaches to the etiology of domestic violence, this paper argues that media stereotypes conceal the way people’s experiences of trauma, along with community and cultural norms, perpetuates the cycle of systemic trauma and violence in the home.

Keywords: domestic violence, media images, representing trauma, theorising trauma

Procedia PDF Downloads 200
10 Earnings Management and Tone Management: Evidence from the UK

Authors: Salah Kayed Kayed, Jessica Hong Yang

Abstract:

This study investigates, whether earnings management in the audited financial statements is associated with tone management in the narrative sections of the annual report in the UK. Earnings management and narrative disclosure are communication strategies used from managers to communicate with investors or other users. Because earnings management and narrative disclosure stem from managers, they can exploit this by doing manipulation in their earnings, and simultaneously disclosing qualitative text (narrative information) in their reports as a tone of words, which will affect users’ perception, and hence users will be misinformed. The association between earnings and tone management can be explained by the self-serving, through cognitive reference points, theory. The sample period lasts from 2010 to 2015, and the sample comprises all non-financial firms that consider under FTSE 350 in any year during the sample period. A list of words from previous research is used to measure the tone in the narrative sections of the annual report. Because this study focuses on the managerial strategic choice and the subjective issues that come from management, it uses the abnormal tone to capture the managerial discretion on tone, and a number of different discretionary accruals proxies to measure earnings management, where accruals management is considered as a manipulation tool from managers to change the users' perception. This research is motivated to fulfil the literature gap by examining the association between earnings and tone management. Moreover, if firms that apply earnings management use tone management to mislead investors, it is beneficial for investors, policy makers, standard setters, or other users to know whether there is an association between earnings management and tone management. Clearly, we believe that this study is fundamental in the accounting context, where it evaluates the communication strategies that are used in firms' financial reports. Consistent with prior research, it is expected that tone management is positively associated with earnings management. This means that firms that use earnings management have incentives to manipulate in their narrative disclosure through tone of words, to reflect a good perception for users, which will conceal the earnings management techniques used in their reporting.

Keywords: earnings management, FTSE 350, narrative disclosure, tone management

Procedia PDF Downloads 230
9 Different Types of Amyloidosis Revealed with Positive Cardiac Scintigraphy with Tc-99M DPD-SPECT

Authors: Ioannis Panagiotopoulos, Efstathios Kastritis, Anastasia Katinioti, Georgios Efthymiadis, Argyrios Doumas, Maria Koutelou

Abstract:

Introduction: Transthyretin amyloidosis (ATTR) is a rare but serious infiltrative disease. Myocardial scintigraphy with DPD has emerged as the most effective, non-invasive, highly sensitive, and highly specific diagnostic method for cardiac ATTR amyloidosis. However, there are cases in which additional laboratory investigations reveal AL amyloidosis or other diseases despite a positive DPD scintigraphy. We describe the experience from the Onassis Cardiac Surgery Center and the monitoring center for infiltrative myocardial diseases of the cardiology clinic at AHEPA. Materials and Methods: All patients with clinical suspicion of cardiac or extracardiac amyloidosis undergo a myocardial scintigraphy scan with Tc-99m DPD. In this way, over 500 patients have been examined. Further diagnostic approach based on clinical and imaging findings includes laboratory investigation and invasive techniques (e.g., biopsy). Results: Out of 76 patients in total with positive myocardial scintigraphy Grade 2 or 3 according to the Perugini scale, 8 were proven to suffer from AL Amyloidosis during the investigation of paraproteinemia. Among these patients, 3 showed Grade 3 uptake, while the rest were graded as Grade 2, or 2 to 3. Additionally, one patient presented diffuse and unusual radiopharmaceutical uptake in soft tissues throughout the body without cardiac involvement. These findings raised suspicions, leading to the analysis of κ and λ light chains in the serum, as well as immunostaining of proteins in the serum and urine of these specific patients. The final diagnosis was AL amyloidosis. Conclusion: The value of DPD scintigraphy in the diagnosis of cardiac amyloidosis from transthyretin is undisputed. However, positive myocardial scintigraphy with DPD should not automatically lead to the diagnosis of ATTR amyloidosis. Laboratory differentiation between ATTR and AL amyloidosis is crucial, as both prognosis and therapeutic strategy are dramatically altered. Laboratory exclusion of paraproteinemia is a necessary and essential step in the diagnostic algorithm of ATTR amyloidosis for all positive myocardial scintigraphy with diphosphonate tracers since >20% of patients with Grade 3 and 2 uptake may conceal AL amyloidosis.

Keywords: AL amyloidosis, amyloidosis, ATTR, myocardial scintigraphy, Tc-99m DPD

Procedia PDF Downloads 35
8 Al-Azhar’s Ideological Capacity to Counter Extremism

Authors: Dina Tawfic, Robert Hassan

Abstract:

The current chapter addresses Al-Azhar's strategy to counter extremism in tandem with reflecting on the ideology of the Islamic establishment itself. The topic is motivated by the fact that some of the Western governments have been relying on Al-Azhar to counter the ideology of Islamist radicalism and violent extremism, in particular during the rise of the Islamic State in Syria and Iraq (known as ISIS/ ISIL/ Daesh) in 2014/2015. In his visit to Egypt in June 2016, Brett McGurk, the then U.S. envoy for the global coalition to counter ISIS, commended Al-Azhar’s “intellectual and reforming role” in refuting the ideology of extremism. On the other hand, Egyptian liberal intellectuals, such as Farag Fouda (1945- 1992) and Nasr Hamed Abu Zeid (1943-2010), had always questioned the ideological capability of Al-Azhar to counter extremism, citing the rigidity and resistance of the Islamic establishment to carry out genuine reformation. This chapter aims to discuss the following research questions: what is the strategy of Al-Azhar to counter extremism? Does Al-Azhar have a solid strategy to combat online propaganda produced by violent extremist groups? Is it applicable to identify Al-Azhar ideological identity? and is it capable of countering extremism? To answer these questions, I conducted intensive interviews with seven senior scholars and officials at Al-Azhar and the Endowments ministry from September to December 2020. Using a qualitative approach as a backdrop, this project uses semi-structured interviews to collect data. Participants were briefed on the purpose of the study and consented to be interviewed and to record their interviews. Some of the participants chose to conceal their names. All the interviews were conducted in Arabic via Zoom. The researcher then transcribed and translated the interviews into English. A purposive sample is used to select the seven interviewees, based on their prominence and experience in the field of counter-extremism and Al-Azhar affairs. The researcher uses a snowball sample to select the sample, in which a personal contact recommends other officials within the establishment.

Keywords: Al-Azhar, Egypt, Counter-Extremism, Political Islam, Ideology

Procedia PDF Downloads 195
7 Music in Religion Culture of the Georgian Pentecostals

Authors: Nino Naneishvili

Abstract:

The study of religious minorities and their musical culture has attracted scant academic attention in Georgia. Within wider Georgian society, it would seem that the focus of discourse to date has been on the traditional orthodox religion and its musical expression, with other forms of religious expression regarded as intrinsically less valuable. The goal of this article is to study Georgia's different religious and musical picture which, this time, is presented on the example of the Pentecostals. The first signs of the Pentecostal movement originated at the end of the 19th Century in the USA, and first appeared in Georgia as early as 1914. An ethnomusicological perspective allows the use of anthropological and sociological approaches. The basic methodology is an ethnographic method. This involved attending religious services, observation, in-depth interviews and musical material analysis. This analysis, based on a combined use of various theoretical and methodological approaches, reveals that Georgian Pentecostals, apart from polyphonic singing, are characterised by “ bi-musicality.“ This phenomenon together with Georgian three part polyphony combines vocalisation within “social polyphony.“ The concept of back stage and front stage is highlighted. Chanters also try to express national identity. In some cases however it has been observed that they abandon or conceal certain musical forms of expression which are considered central to Georgian identity. The famous hymn “Thou art a Vineyard” is a case in point. The reason given for this omission within the Georgian Pentecostal church is that within Pentecostal doctrine, God alone is the object of worship. Therefore there is no veneration of Saints as representatives of the Divine. In some cases informants denied the existence of this hymn, and others explain that the meaning conveyed to the Vineyard is that of Jesus Christ and not the Virgin Mary. Others stated that they loved Virgin Mary and were therefore free to sing this song outside church circles. The results of this study illustrates that one of the religious minorities in Georgia, the Pentecostals, are characterised by a deviation in musical thinking from Homo Polyphonicus. They actively change their form of musical worship to secondary ethno hearing – bi-musicality. This outcome is determined by both new religious thinking and the process of globalization. A significant principle behind this form of worship is the use of forms during worship which are acceptable and accessible to all. This naturally leads to the development of modern forms. Obtained material does not demonstrate a connection between traditional religious music in general. Rather, it constitutes an independent domain.

Keywords: Georgia, globalization, music, pentecostal

Procedia PDF Downloads 301
6 On the Question of Ideology: Criticism of the Enlightenment Approach and Theory of Ideology as Objective Force in Gramsci and Althusser

Authors: Edoardo Schinco

Abstract:

Studying the Marxist intellectual tradition, it is possible to verify that there were numerous cases of philosophical regression, in which the important achievements of detailed studies have been replaced by naïve ideas and previous misunderstandings: one of most important example of this tendency is related to the question of ideology. According to a common Enlightenment approach, the ideology is essentially not a reality, i.e., a factor capable of having an effect on the reality itself; in other words, the ideology is a mere error without specific historical meaning, which is only due to ignorance or inability of subjects to understand the truth. From this point of view, the consequent and immediate practice against every form of ideology are the rational dialogue, the reasoning based on common sense, in order to dispel the obscurity of ignorance through the light of pure reason. The limits of this philosophical orientation are however both theoretical and practical: on the one hand, the Enlightenment criticism of ideology is not an historicistic thought, since it cannot grasp the inner connection that ties an historical context and its peculiar ideology together; moreover, on the other hand, when the Enlightenment approach fails to release people from their illusions (e.g., when the ideology persists, despite the explanation of its illusoriness), it usually becomes a racist or elitarian thought. Unlike this first conception of ideology, Gramsci attempts to recover Marx’s original thought and to valorize its dialectical methodology with respect to the reality of ideology. As Marx suggests, the ideology – in negative meaning – is surely an error, a misleading knowledge, which aims to defense the current state of things and to conceal social, political or moral contradictions; but, that is precisely why the ideological error is not casual: every ideology mediately roots in a particular material context, from which it takes its reason being. Gramsci avoids, however, any mechanistic interpretation of Marx and, for this reason; he underlines the dialectic relation that exists between material base and ideological superstructure; in this way, a specific ideology is not only a passive product of base but also an active factor that reacts on the base itself and modifies it. Therefore, there is a considerable revaluation of ideology’s role in maintenance of status quo and the consequent thematization of both ideology as objective force, active in history, and ideology as cultural hegemony of ruling class on subordinate groups. Among the Marxists, the French philosopher Louis Althusser also gives his contribution to this crucial question; as follower of Gramsci’s thought, he develops the idea of ideology as an objective force through the notions of Repressive State Apparatus (RSA) and Ideological State Apparatuses (ISA). In addition to this, his philosophy is characterized by the presence of structuralist elements, which must be studied, since they deeply change the theoretical foundation of his Marxist thought.

Keywords: Althusser, enlightenment, Gramsci, ideology

Procedia PDF Downloads 168
5 The Temporal Implications of Spatial Prospects

Authors: Zhuo Job Chen, Kevin Nute

Abstract:

The work reported examines potential linkages between spatial and temporal prospects, and more specifically, between variations in the spatial depth and foreground obstruction of window views, and observers’ sense of connection to the future. It was found that external views from indoor spaces were strongly associated with a sense of the future, that partially obstructing such a view with foreground objects significantly reduced its association with the future, and replacing it with a pictorial representation of the same scene (with no real actual depth) removed most of its temporal association. A lesser change in the spatial depth of the view, however, had no apparent effect on association with the future. While the role of spatial depth has still to be confirmed, the results suggest that spatial prospects directly affect temporal ones. The word “prospect” typifies the overlapping of the spatial and temporal in most human languages. It originated in classical times as a purely spatial term, but in the 16th century took on the additional temporal implication of an imagined view ahead, of the future. The psychological notion of prospection, then, has its distant origins in a spatial analogue. While it is not yet proven that space directly structures our processing of time at a physiological level, it is generally agreed that it commonly does so conceptually. The mental representation of possible futures has been a central part of human survival as a species (Boyer, 2008; Suddendorf & Corballis, 2007). A sense of the future seems critical not only practically, but also psychologically. It has been suggested, for example, that lack of a positive image of the future may be an important contributing cause of depression (Beck, 1974; Seligman, 2016). Most people in the developed world now spend more than 90% of their lives indoors. So any direct link between external views and temporal prospects could have important implications for both human well-being and building design. We found that the ability to see what lies in front of us spatially was strongly associated with a sense of what lies ahead temporally. Partial obstruction of a view was found to significantly reduce that sense connection to the future. Replacing a view with a flat pictorial representation of the same scene removed almost all of its connection with the future, but changing the spatial depth of a real view appeared to have no significant effect. While foreground obstructions were found to reduce subjects’ sense of connection to the future, they increased their sense of refuge and security. Consistent with Prospect and Refuge theory, an ideal environment, then, would seem to be one in which we can “see without being seen” (Lorenz, 1952), specifically one that conceals us frontally from others, without restricting our own view. It is suggested that these optimal conditions might be translated architecturally as screens, the apertures of which are large enough for a building occupant to see through unobstructed from close by, but small enough to conceal them from the view of someone looking from a distance outside.

Keywords: foreground obstructions, prospection, spatial depth, window views

Procedia PDF Downloads 96
4 Analyzing Social Media Discourses of Domestic Violence in Promoting Awareness and Support Seeking: An Exploratory Study

Authors: Sudha Subramani, Hua Wang

Abstract:

Domestic Violence (DV) against women is now recognized to be a serious and widespread problem worldwide. There is a growing concern that violence against women has a global public health impact, as well as a violation of human rights. From the existing statistical surveys, it is revealed that there exists a strong relationship between DV and health issues of women like bruising, lacerations, depression, anxiety, flashbacks, sleep disturbances, hyper-arousal, emotional distress, sexually transmitted diseases and so on. This social problem is still considered as behind the closed doors issue and stigmatized topic. Women conceal their sufferings from family and friends, as they experience a lack of trust in others, feelings of shame and embarrassment among the society. Hence, women survivors of DV experience some barriers in seeking the support of specialized services such as health care access, crisis support, and legal guidance. Fortunately, with the popularity of social media like Facebook and Twitter, people share their opinions and emotional feelings to seek the social and emotional support, for sympathetic encouragement, to show compassion and empathy among the public. Considering the DV, social media plays a predominant role in creating the awareness and promoting the support services to the public, as we live in the golden era of social media. The various professional people like the public health researchers, clinicians, psychologists, social workers, national family health organizations, lawyers, and victims or their family and friends share the unprecedentedly valuable information (personal opinions and experiences) in a single platform to improve the social welfare of the community. Though each tweet or post contains a less informational value, the consolidation of millions of messages can generate actionable knowledge and provide valuable insights about the public opinion in general. Hence, this paper reports on an exploratory analysis of the effectiveness of social media for unobtrusive assessment of attitudes and awareness towards DV. In this paper, mixed methods such as qualitative analysis and text mining approaches are used to understand the social media disclosures of DV through the lenses of opinion sharing, anonymity, and support seeking. The results of this study could be helpful to avoid the cost of wide scale surveys, while still maintaining appropriate research conditions is to leverage the abundance of data publicly available on the web. Also, this analysis with data enrichment and consolidation would be useful in assisting advocacy and national family health organizations to provide information about resources and support, raise awareness and counter common stigmatizing attitudes about DV.

Keywords: domestic violence, social media, social stigma and support, women health

Procedia PDF Downloads 261
3 Gender Differences In Pain Assessment: A Daily Activities Perspective

Authors: Hui-mei Huang, Huei-Jiun Cheng

Abstract:

Introduction Many patients are aware of the health benefits associated with an active lifestyle, but they are often hindered from engaging in physical activity due to the presence of pain. The majority of patients experience pain, which can fluctuate over time and is influenced by various factors, including gender. Gender differences in clinical pain and pain-related conditions are widely recognized. Existing literature strongly supports the notion that men and women exhibit distinct responses to pain. Previous studies conducted in Taiwan have highlighted gender differences in pain assessment, but only a limited number of studies have investigated the gender-related factors that influence pain during daily activities. The objective of this study was to examine gender differences in pain assessment among inpatients in Taiwan and investigate whether gender and surgical procedures are factors that impact the daily activities of pain. Method In this study, a prospective and structured questionnaire survey method was utilized, employing intentional sampling to gather data from inpatients admitted to a medical center in central Taiwan. The research period covered in this study is from October 1, 2019, to June 30, 2020. In this study, participants who were hospitalized within 48 hours were requested to self-assess their pain using the Numeric Rating Scale (NRS) and indicate the impact of pain on their activities. The data were analyzed to explore the potential influence of gender and surgical procedures on daily activities affected by pain. Result A total of 722 cases were included in the study, with the mean age of the subjects is 54.38 years old (SD=16.3), and the range varied from 18 to 93 years old. Among the subjects, 48.23% (n=348) were male, and 62.3% (n=450) of them had received more than 12 years of education., and 56.9% (n=411) underwent surgery. The results indicated that regardless of whether the participants underwent surgery or not, females experienced higher perceived severe pain intensity than males (t=2.248, P < .05). However, in surgical patients, there was no significant difference in gender (t=1.75, P > .05). Regarding the impact of pain on daily activities when pain intensity reached 7 , male subjects experienced a 5-point effect on their daily activities (AUC=0.84, 95% CI 0.79-0.89, P <0.01), while female subjects experienced a 7-point effect (AUC=0.88, 95% CI 0.80-0.87, P <0.01). Discussion Some studies suggest that women experience painful stimuli as more intense than men, this difference has been observed in various types of experimental pain, including mechanical and thermal stimuli. Our study reached the same conclusion, female patients exhibited greater intensity of pain. According to the research findings, The research findings highlight the significant impact of gender on individuals' response to intense pain (NRS>7) during their daily activities, with men showing a higher pain tolerance. The higher pain tolerance often observed in men may be attributed to societal conditioning, which encourages them to conceal outward expressions of pain. Further research in this area could help provide a more comprehensive understanding of the topic in Taiwan.

Keywords: pain assessment, gender, surgery, activities of daily living

Procedia PDF Downloads 39
2 Deconstructing Reintegration Services for Survivors of Human Trafficking: A Feminist Analysis of Australian and Thai Government and Non-Government Responses

Authors: Jessica J. Gillies

Abstract:

Awareness of the tragedy that is human trafficking has increased exponentially over the past two decades. The four pillars widely recognised as global solutions to the problem are prevention, prosecution, protection, and partnership between government and non-government organisations. While ‘sex-trafficking’ initially received major attention, this focus has shifted to other industries that conceal broader experiences of exploitation. However, within the regions of focus for this study, namely Australia and Thailand, trafficking for the purpose of sexual exploitation remains the commonly uncovered narrative of criminal justice investigations. In these regions anti-trafficking action is characterised by government-led prevention and prosecution efforts; whereas protection and reintegration practices have received criticism. Typically, non-government organisations straddle the critical chasm between policy and practice; therefore, they are perfectly positioned to contribute valuable experiential knowledge toward understanding how both sectors can support survivors in the post-trafficking experience. The aim of this research is to inform improved partnerships throughout government and non-government post-trafficking services by illuminating gaps in protection and reintegration initiatives. This research will explore government and non-government responses to human trafficking in Thailand and Australia, in order to understand how meaning is constructed in this context and how the construction of meaning effects survivors in the post-trafficking experience. A qualitative, three-stage methodology was adopted for this study. The initial stage of enquiry consisted of a discursive analysis, in order to deconstruct the broader discourses surrounding human trafficking. The data included empirical papers, grey literature such as publicly available government and non-government reports, and anti-trafficking policy documents. The second and third stages of enquiry will attempt to further explore the findings of the discourse analysis and will focus more specifically on protection and reintegration in Australia and Thailand. Stages two and three will incorporate process observations in government and non-government survivor support services, and semi-structured interviews with employees and volunteers within these settings. Two key findings emerged from the discursive analysis. The first exposed conflicting feminist arguments embedded throughout anti-trafficking discourse. Informed by conflicting feminist discourses on sex-work, a discursive relationship has been constructed between sex-industry policy and anti-trafficking policy. In response to this finding, data emerging from the process observations and semi-structured interviews will be interpreted using a feminist theoretical framework. The second finding progresses from the construction in the first. The discursive construction of sex-trafficking appears to have had influence over perceptions of the legitimacy of survivors, and therefore the support they receive in the post-trafficking experience. For example; women who willingly migrate for employment in the sex-industry, and on arrival are faced with exploitative conditions, are not perceived to be deserving of the same support as a woman who is not coerced, but rather physically forced, into such circumstances, yet both meet the criteria for a victim of human trafficking. The forthcoming study is intended to contribute toward building knowledge and understanding around the implications of the construction of legitimacy; and contextualise this in reference to government led protection and reintegration support services for survivors in the post-trafficking experience.

Keywords: Australia, government, human trafficking, non-government, reintegration, Thailand

Procedia PDF Downloads 86
1 Use of Artificial Intelligence and Two Object-Oriented Approaches (k-NN and SVM) for the Detection and Characterization of Wetlands in the Centre-Val de Loire Region, France

Authors: Bensaid A., Mostephaoui T., Nedjai R.

Abstract:

Nowadays, wetlands are the subject of contradictory debates opposing scientific, political and administrative meanings. Indeed, given their multiple services (drinking water, irrigation, hydrological regulation, mineral, plant and animal resources...), wetlands concentrate many socio-economic and biodiversity issues. In some regions, they can cover vast areas (>100 thousand ha) of the landscape, such as the Camargue area in the south of France, inside the Rhone delta. The high biological productivity of wetlands, the strong natural selection pressures and the diversity of aquatic environments have produced many species of plants and animals that are found nowhere else. These environments are tremendous carbon sinks and biodiversity reserves depending on their age, composition and surrounding environmental conditions, wetlands play an important role in global climate projections. Covering more than 3% of the earth's surface, wetlands have experienced since the beginning of the 1990s a tremendous revival of interest, which has resulted in the multiplication of inventories, scientific studies and management experiments. The geographical and physical characteristics of the wetlands of the central region conceal a large number of natural habitats that harbour a great biological diversity. These wetlands, one of the natural habitats, are still influenced by human activities, especially agriculture, which affects its layout and functioning. In this perspective, decision-makers need to delimit spatial objects (natural habitats) in a certain way to be able to take action. Thus, wetlands are no exception to this rule even if it seems to be a difficult exercise to delimit a type of environment as whose main characteristic is often to occupy the transition between aquatic and terrestrial environment. However, it is possible to map wetlands with databases, derived from the interpretation of photos and satellite images, such as the European database Corine Land cover, which allows quantifying and characterizing for each place the characteristic wetland types. Scientific studies have shown limitations when using high spatial resolution images (SPOT, Landsat, ASTER) for the identification and characterization of small wetlands (1 hectare). To address this limitation, it is important to note that these wetlands generally represent spatially complex features. Indeed, the use of very high spatial resolution images (>3m) is necessary to map small and large areas. However, with the recent evolution of artificial intelligence (AI) and deep learning methods for satellite image processing have shown a much better performance compared to traditional processing based only on pixel structures. Our research work is also based on spectral and textural analysis on THR images (Spot and IRC orthoimage) using two object-oriented approaches, the nearest neighbour approach (k-NN) and the Super Vector Machine approach (SVM). The k-NN approach gave good results for the delineation of wetlands (wet marshes and moors, ponds, artificial wetlands water body edges, ponds, mountain wetlands, river edges and brackish marshes) with a kappa index higher than 85%.

Keywords: land development, GIS, sand dunes, segmentation, remote sensing

Procedia PDF Downloads 25