Search results for: message framing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 518

Search results for: message framing

518 Exploring Framing Effect and Repetition Effect of the Persuasive Message on Moral Decision Making in Conflict of Interests

Authors: Sae-Yeon Seong, EunSun Chung, Dongjoo Chin

Abstract:

Conflict of interest (COI) is one of the dominant circumstantial factors of moral corruption across various fields. Several management strategies have been proposed to prevent self-interested decision making in COIs. Among these strategies, message persuasion has been considered as a practical and effective approach. Framing and repetition are two of the major factors in the persuasion effect of message. Therefore, their effect on moral decision making in COI should be explored systematically. The purpose of this study was to compare the differential effects of positively framed message and negatively framed message, and secondly, to investigate how the effectiveness of persuasive message changes through repetitive exposures. A total of 63 participants were randomly assigned to one of 3 framing conditions: positive framing, negative framing, and no-message condition. Prior to the online experiment involving a consultation task, the differently framed persuasive message was presented to the participants. This process was repeated four times in a row. The results showed that participants with positive-framing message were less likely to provide self-interested consultation than participants in the no-message condition. Also, a U-shaped quadric relation between repetition and self-interest consultation was found. Implications and limitations are further discussed.

Keywords: conflicts of interest, persuasive message, framing effect, repetition effect, self-interested behavior

Procedia PDF Downloads 131
517 When Messages Cause Distraction from Advertising: An Eye-Tracking Study

Authors: Nilamadhab Mohanty

Abstract:

It is essential to use message formats that make communication understandable and correct. It is because; the information format can influence consumer decision on the purchase of a product. This study combines information from qualitative inquiry, media trend analysis, eye tracking experiment, and questionnaire data to examine the impact of specific message format and consumer perceived risk on attention to the information and risk retention. We investigated the influence of message framing (goal framing, attribute framing, and mix framing) on consumer memory, study time, and decisional uncertainty while deciding on the purchase of drugs. Furthermore, we explored the impact of consumer perceived risk (associated with the use of the drug, i.e., RISK-AB and perceived risk associated with the non-use of the drug, i.e., RISK-EB) on message format preference. The study used eye-tracking methods to understand the differences in message processing. Findings of the study suggest that the message format influences information processing, and participants' risk perception impacts message format preference. Eye tracking can be used to understand the format differences and design effective advertisements.

Keywords: message framing, consumer perceived risk, advertising, eye tracking

Procedia PDF Downloads 87
516 How Message Framing and Temporal Distance Affect Word of Mouth

Authors: Camille Lacan, Pierre Desmet

Abstract:

In the crowdfunding model, a campaign succeeds by collecting the funds required over a predefined duration. The success of a CF campaign depends both on the capacity to attract members of the online communities concerned, and on the community members’ involvement in online word-of-mouth recommendations. To maximize the campaign's success probability, project creators (i.e., an organization appealing for financial resources) send messages to contributors to ask them to issue word of mouth. Internet users relay information about projects through Word of Mouth which is defined as “a critical tool for facilitating information diffusion throughout online communities”. The effectiveness of these messages depends on the message framing and the time at which they are sent to contributors (i.e., at the start of the campaign or close to the deadline). This article addresses the following question: What are the effect of message framing and temporal distance on the willingness to share word of mouth? Drawing on Perspectives Theory and Construal Level Theory, this study examines the interplay between message framing (Gains vs. Losses) and temporal distance (message while the deadline is coming vs. far) on intention to share word of mouth. A between-subject experimental design is conducted to test the research model. Results show significant differences between a loss-framed message (lack of benefits if the campaign fails) associated with a short deadline (ending tomorrow) compared to a gain-framed message (benefits if the campaign succeeds) associated with a distant deadline (ending in three months). However, this effect is moderated by the anticipated regret of a campaign failure and the temporal orientation. These moderating effects contribute to specifying the boundary condition of the framing effect. Handling the message framing and the temporal distance are thus the key decisions to influence the willingness to share word of mouth.

Keywords: construal levels, crowdfunding, message framing, word of mouth

Procedia PDF Downloads 215
515 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 269
514 Advertising Message Strategy on Ghana’s TV

Authors: Aisha Iddrisu, Ferruh Uztuğ

Abstract:

This study is a quantitative content analysis of advertising message strategies used in Ghana’s TV commercials (2020-2021) using the modified strategy of Wang and Praet (2016) with the objective of exploring the various advertising message strategies used in Ghana’s TV advertisement, its variation according to product category including the most widely used message strategy. The findings indicate that, out of the 220 commercials used in the study, the Affective message strategy (n=122, 55%) was the dominant message strategy used in Ghana’s TV commercials. The most advertised product category in Ghana’s TV commercials (2020-2021) was the food category, and a significant relationship was observed between message strategy and product category as well as message strategy and brand type.

Keywords: advertising, message strategy, Ghana, television

Procedia PDF Downloads 143
513 Mathematical Model That Using Scrambling and Message Integrity Methods in Audio Steganography

Authors: Mohammed Salem Atoum

Abstract:

The success of audio steganography is to ensure imperceptibility of the embedded message in stego file and withstand any form of intentional or un-intentional degradation of message (robustness). Audio steganographic that utilized LSB of audio stream to embed message gain a lot of popularity over the years in meeting the perceptual transparency, robustness and capacity. This research proposes an XLSB technique in order to circumvent the weakness observed in LSB technique. Scrambling technique is introduce in two steps; partitioning the message into blocks followed by permutation each blocks in order to confuse the contents of the message. The message is embedded in the MP3 audio sample. After extracting the message, the permutation codebook is used to re-order it into its original form. Md5sum and SHA-256 are used to verify whether the message is altered or not during transmission. Experimental result shows that the XLSB performs better than LSB.

Keywords: XLSB, scrambling, audio steganography, security

Procedia PDF Downloads 333
512 Persuading ICT Consumers to Disconnect from Work: An Experimental Study on the Influence of Message Frame, Regulatory Focus, Ad Believability and Attitude toward the Ad on Message Effectiveness

Authors: Katharina Ninaus, Ralf Terlutter, Sandra Diehl

Abstract:

Information and communication technologies (ICT) have become pervasive in all areas of modern life, both in work and leisure. Technological developments and particularly the ubiquity of smartphones have made it possible for ICT consumers to be constantly connected to work, fostering an always-on mentality and increasing the pressure to be accessible at all times. However, performing work tasks outside of working hours using ICT results in a lack of mental detachment and recovery from work. It is, therefore, necessary to develop effective behavioral interventions to increase risk awareness of a constant connection to the workplace in the employed population. Drawing on regulatory focus theory, this study aims to investigate the persuasiveness of tailoring messages to individuals’ chronic regulatory focus in order to encourage ICT consumers to set boundaries by defining fixed times for professional accessibility outside of working hours in order to contribute to the well-being of ICT consumers with high ICT involvement in their work life. The experimental study examines the interaction effect between consumers’ chronic regulatory focus (i.e. promotion focus versus prevention focus) and positive or negative message framing (i.e. gain frame versus loss frame) on consumers’ intention to perform the advocated behavior. Based on the assumption that congruent messages create regulatory fit and increase message effectiveness, it is hypothesized that behavioral intention will be higher in the condition of regulatory fit compared to regulatory non-fit. It is further hypothesized that ad believability and attitude toward the ad will mediate the effect of regulatory fit on behavioral intention given that ad believability and ad attitude both determine consumer behavioral responses. Results confirm that the interaction between regulatory focus and message frame emerged as a predictor of behavioral intention such as that consumers’ intentions to set boundaries by defining fixed times for professional accessibility outside of working hours increased as congruency with their regulatory focus increased. The loss-framed ad was more effective for consumers with a predominant prevention focus, while the gain-framed ad was more effective for consumers with a predominant promotion focus. Ad believability and attitude toward the ad both emerged as predictors of behavioral intention. Mediation analysis revealed that the direct effect of the interaction between regulatory focus and message frame on behavioral intention was no longer significant when including ad believability and ad attitude as mediators in the model, indicating full mediation. However, while the indirect effect through ad believability was significant, the indirect effect through attitude toward the ad was not significant. Hence, regulatory fit increased ad believability, which then increased behavioral intention. Ad believability appears to have a superior effect indicating that behavioral intention does not depend on attitude toward the ad, but it depends on whether or not the ad is perceived as believable. The study shows that the principle of regulatory fit holds true in the context of ICT consumption and responds to calls for more research on mediators of health message framing effects.

Keywords: always-on mentality, Information and communication technologies (ICT) consumption, message framing, regulatory focus

Procedia PDF Downloads 168
511 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 244
510 The Factors Constitute the Interaction between Teachers and Students: An Empirical Study at the Notion of Framing

Authors: Tien-Hui Chiang

Abstract:

The code theory, proposed by Basil Bernstein, indicates that framing can be viewed as the core element in constituting the phenomenon of cultural reproduction because it is able to regulate the transmission of pedagogical information. Strong framing increases the social relation boundary between a teacher and pupils, which obstructs information transmission, so that in order to improve underachieving students’ academic performances, teachers need to reduce to strength of framing. Weak framing enables them to transform academic knowledge into commonsense knowledge in daily life language. This study posits that most teachers would deliver strong framing due to their belief mainly confined within the aspect of instrumental rationality that deprives their critical minds. This situation could make them view the normal distribution bell curve of students’ academic performances as a natural outcome. In order to examine the interplay between framing, instrumental rationality and pedagogical action, questionnaires were completed by over 5,000 primary school teachers in Henan province, China, who were stratified sample. The statistical results show that most teachers employed psychological concepts to measure students’ academic performances and, in turn, educational inequity was legitimatized as a natural outcome in the efficiency-led approach. Such efficiency-led minds made them perform as the agent practicing the mechanism of social control and in turn sustaining the phenomenon of cultural reproduction.

Keywords: code, cultural reproduction, framing, instrumental rationality, social relation and interaction

Procedia PDF Downloads 110
509 Use of Personal Rhythm to Authenticate Encrypted Messages

Authors: Carlos Gonzalez

Abstract:

When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).

Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption

Procedia PDF Downloads 259
508 Unsupervised Sentiment Analysis for Indonesian Political Message on Twitter

Authors: Omar Abdillah, Mirna Adriani

Abstract:

In this work, we perform new approach for analyzing public sentiment towards the presidential candidate in the 2014 Indonesian election that expressed in Twitter. In this study we propose such procedure for analyzing sentiment over Indonesian political message by understanding the behavior of Indonesian society in sending message on Twitter. We took different approach from previous works by utilizing punctuation mark and Indonesian sentiment lexicon that completed with the new procedure in determining sentiment towards the candidates. Our experiment shows the performance that yields up to 83.31% of average precision. In brief, this work makes two contributions: first, this work is the preliminary study of sentiment analysis in the domain of political message that has not been addressed yet before. Second, we propose such method to conduct sentiment analysis by creating decision making procedure in which it is in line with the characteristic of Indonesian message on Twitter.

Keywords: unsupervised sentiment analysis, political message, lexicon based, user behavior understanding

Procedia PDF Downloads 441
507 Carrier Communication through Power Lines

Authors: Pavuluri Gopikrishna, B. Neelima

Abstract:

Power line carrier communication means audio power transmission via power line and reception of the amplified audio power at the receiver as in the form of speaker output signal using power line as the channel medium. The main objective of this suggested work is to transmit our message signal after frequency modulation by the help of FM modulator IC LM565 which gives output proportional to the input voltage of the input message signal. And this audio power is received from the power line by the help of isolation circuit and demodulated from IC LM565 which uses the concept of the PLL and produces FM demodulated signal to the listener. Message signal will be transmitted over the carrier signal that will be generated from the FM modulator IC LM565. Using this message signal will not damage because of no direct contact of message signal from the power line, but noise can disturb our information.

Keywords: amplification, fm demodulator ic 565, fm modulator ic 565, phase locked loop, power isolation

Procedia PDF Downloads 508
506 The Effect of ‘Love Accounting’ on Gift Budgeting

Authors: Yanan Wang

Abstract:

It is proposed that when people give a gift they engage in 'love accounting', so that they will spend less on it if they include a written expression of love with it. This hypothesis was tested with college students (N = 308). It was found that participants who wrote a love message to accompany a Mother's Day gift budgeted less for the gift itself than control participants (Experiment 1), and this effect was replicated for a Christmas gift (Experiment 2). The amount of effort expended by the giver on preparing the love message did not account for the effect (Experiment 3). It is concluded that a gift and its accompanying love message are mentally computed as belonging to the same love account, implying that consumers’ excessive splurging on gifts might be controlled by writing a love message before gift shopping.

Keywords: expression of love, gift-giving, gift-budgeting, mental accounting

Procedia PDF Downloads 294
505 A New Method for Fault Detection

Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed

Abstract:

Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.

Keywords: Byzantine faults, distributed systems, fault detection, network protocols, node-disjoint paths

Procedia PDF Downloads 409
504 Modifying Byzantine Fault Detection Using Disjoint Paths

Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed

Abstract:

Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.

Keywords: Byzantine faults, distributed systems, fault detection, network pro- tocols, node-disjoint paths

Procedia PDF Downloads 523
503 Newspaper Framing of President Buhari’s Handling of Insecurity in Nigeria, January 2016 - December 2017

Authors: Onyekwere Okpara, Kingsley C. Izuogu

Abstract:

This paper examined newspaper framing of President Buhari's handling of insecurity in Nigeria between January 2016-December 2017. The objectives were to examine the tone and sources of news frames used in reporting President Buhari's handling of insecurity in Nigeria. This paper did a content analysis of three newspapers-Daily Sun, The Nation, and the Leadership. Using a systematic random sampling, the study sampled a total of 732 editions of the selected newspapers and found out that the newspapers used neutral tone and government frame. The study, therefore, recommended that newspapers should improve their investigative reporting efforts.

Keywords: insecurity, newspapers, framing, media

Procedia PDF Downloads 51
502 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 599
501 Thinking in a Foreign Language Overcomes the Developmental Reversal in Risky Decision-Making: The Foreign Language Effect in Risky Decision-Making

Authors: Rendong Cai, Bei Peng, Yanping Dong

Abstract:

In risk decision making, individuals are found to be susceptible to 'frames': people tend to be risk averse when the choice is described in terms of potential 'gains' (gain frame), whereas they tend to be risk seeking when the same choice is described in terms of potential 'losses' (loss frame); this effect is termed the framing effect. The framing effect has been well documented and some studies even find a developmental reversal in the framing effect: The more experience an individual has in a certain field, the easier for him to be influenced by the frame relevant to the field, resulting in greater decision inconsistency. Recent studies reported that using a foreign language can reduce the framing effect. However, it is not clear whether foreign language use can overcome the developmental reversal in the framing effect. The present study investigated three potential factors that may influence the developmental reversal in the framing effect: specialized knowledge of the participants, the language in which the problem is presented, and the types of problems. The present study examined the decision making behavior of 188 Chinese-English bilinguals who majored in Finance, with a group of 277 English majors as the control group. They were asked to solve a financial problem (experimental condition) and a life problem (control condition). Each problem was presented in one of the following four versions: native language-gain frame, foreign language-gain frame, native language-loss frame, and foreign language-loss frame. Results revealed that for the life problem, under the native condition, both groups were affected by the frame; but under the foreign condition, this framing effect disappeared for the financial majors. This confirmed that foreign language use modulates framing effects in general decision making, which served as an effective baseline. For the financial problem, under the native condition, only the financial major was observed to be influenced by the frame, which was a developmental reversal; under the foreign condition, however, this framing effect disappeared. The results provide further empirical evidence for the universal of the developmental reversal in risky decision making. More importantly, the results suggest that using a foreign language can overcome such reversal, which has implications for the reduction of decision biases in professionals. The findings also shed new light on the complex interaction between general decision-making and bilingualism.

Keywords: the foreign language effect, developmental reversals, the framing effect, bilingualism

Procedia PDF Downloads 337
500 RSU Aggregated Message Delivery for VANET

Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana

Abstract:

V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.

Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation

Procedia PDF Downloads 364
499 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 275
498 Political Behavior and Democratic Values: Framing Analysis of Political Discussion Programs in Pakistan

Authors: Umair Nadeem, Sidra Umair

Abstract:

Political behavior of voters and democratic values have been observed an emerging phenomenon in recent years in Pakistan. Privatized TV news channels are taking one sided position on the political issues, corresponding with respective political parties. Since last decade, TV News Channels have undermined this monopoly. Elections 2013 were unique in Pakistan with reference to political behavior and democratic values. Partisan narratives and counter narratives have been witnessed on different TV channels, in last few years. These mediated events seem very important to study the political behavior and democratic values as the country is approaching towards elections 2018. This endeavor is an attempt to capture the framing of the parties, issues in the partisan media culture and framing effects on political behavior of voters. Data for this research come from two data set. Content analysis of selected representative talks shows broadcast on mainstream news channels provide an assessment of the framing while quantitative survey of the discussion program’s viewers from Lahore city provide an evidence of framing effects on political behavior on voters and on democratic values. Regression results help us to argue that the highly partisan shows are strong predictors of polarized views among the audience. Study also grasp the attention of scholars towards the implications of this phenomenon.

Keywords: democratic values, partisan media, polarized views, political behavior

Procedia PDF Downloads 142
497 Impact of Negative News on Ethical Fashion: Case Study to Investigate the Effect of Fashion CSR Ad Framing on Purchase Intention

Authors: Dana Lee, Young Chan Kim

Abstract:

The purpose of this paper is to examine the relationship between the fashion corporate social responsibility (CSR) ad framing and consumer purchase behaviours with the focus on consumer’s concern and involvement towards fashion brands. A self-completion questionnaire was administered to 200 respondents. Factor analysis and other statistical analyses were applied to test hypotheses. The results suggested that the quality of the product was the most important factor when consumers purchase fashion brand products with high level of responsibility towards unethical practices but surprisingly favourability for fast fashion. Unexpectedly, it was shown that consumers took the plenty of blame, but not much responsibility on buying fast fashion evading their responsibility to CSR ad, and their purchase intentions remained unchanged. The result, on the other hand, showed that fashion CSR ads can significantly moderate individuals’ emotions even though this had no significant correlation with the purchase intentions. Despite the limited sample size and geographical region, this research has important implications for contemporary fashion brands that use ad framing to understand how consumers’ involvement and concernedness toward the CSR actions in ad, influence their favourability (purchase intention) for fashion brands.

Keywords: framing effect, CSR advertisements, consumer behaviour, purchase intention

Procedia PDF Downloads 164
496 Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population

Authors: Colette Faucher

Abstract:

In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population.

Keywords: military psychological operations, social identity, social network, emotion propagation

Procedia PDF Downloads 372
495 Prosody of Text Communication: Inducing Synchronization and Coherence in Chat Conversations

Authors: Karolina Ziembowicz, Andrzej Nowak

Abstract:

In the current study, we examined the consequences of adding prosodic cues to text communication by allowing users to observe the process of message creation while engaged in dyadic conversations. In the first condition, users interacted through a traditional chat that requires pressing ‘enter’ to make a message visible to an interlocutor. In another, text appeared on the screen simultaneously as the sender was writing it, letter after letter (Synchat condition), so that users could observe the varying rhythm of message production, precise timing of message appearance, typos and their corrections. The results show that the ability to observe the dynamics of message production had a twofold effect on the social interaction process. First, it enhanced the relational aspect of communication – interlocutors synchronized their emotional states during the interaction, their communication included more statements on relationship building, and they evaluated the Synchat medium as more personal and emotionally engaging. Second, it increased the coherence of communication, reflected in greater continuity of the topics raised in Synchat conversations. The results are discussed from the interaction design (IxD) perspective.

Keywords: chat communication, online conversation, prosody, social synchronization, interaction incoherence, relationship building

Procedia PDF Downloads 107
494 Hip and Valley Support Location in Wood Framing

Authors: P. Hajyalikhani, B. Hudson, D. Boll, L. Boren, Z. Sparks, M. Ward

Abstract:

Wood Light frame construction is one of the most common types of construction methods for residential and light commercial building in North America and parts of Europe. The typical roof framing for wood framed building is sloped and consists of several structural members such as rafters, hips, and valleys which are connected to the ridge and ceiling joists. The common slopes for roofs are 3/12, 8/12, and 12/12. Wood framed residential roof failure is most commonly caused by wind damage in such buildings. In the recent study, one of the weaknesses of wood framed roofs is long unsupported structural member lengths, such as hips and valleys. The purpose of this research is to find the critical support location for long hips and valleys with different slopes. ForteWeb software is used to find the critical location. The analysis results demonstrating the maximum unbraced hip and valley length are from 8.5 to 10.25 ft. dependent on the slope and roof type.

Keywords: wood frame, stick framing, hip, valley

Procedia PDF Downloads 78
493 Nation Branding as Reframing: From the Perspective of Translation Studies

Authors: Ye Tian

Abstract:

Soft power has replaced hard power and become one of the most attractive ways nations pursue to expand their international influence. One of the ways to improve a nation’s soft power is to commercialise the country and brand or rebrand it to the international audience, and thus attract interests or foreign investments. In this process, translation has often been regarded as merely a tool, and researches in it are either in translating literature as culture export or in how (in)accuracy of translation influences the branding campaign. This paper proposes to analyse nation branding campaign with framing theory, and thus gives an entry for translation studies to come to a central stage in today’s soft power research. To frame information or elements of a text, an event, or, as in this paper, a nation is to put them in a mental structure. This structure can be built by outsiders or by those who create the text, the event, or by citizens of the nation. To frame information like this can be regarded as a process of translation, as what translation does in its traditional meaning of ‘translating a text’ is to put a framework on the text to, deliberately or not, highlight some of the elements while hiding the others. In the discourse of nations, then, people unavoidably simplify a national image and put the nation into their imaginary framework. In this way, problems like stereotype and prejudice come into being. Meanwhile, if nations seek ways to frame or reframe themselves, they make efforts to have in control what and who they are in the eyes of international audiences, and thus make profits, economically or politically, from it. The paper takes African nations, which are usually perceived as a whole, and the United Kingdom as examples to justify passive and active framing process, and assesses both positive and negative influence framing has on nations. In conclusion, translation as framing causes problems like prejudice, and the image of a nation is not always in the hands of nation branders, but reframing the nation in a positive way has the potential to turn the tide.

Keywords: framing, nation branding, stereotype, translation

Procedia PDF Downloads 119
492 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'

Authors: Adnan M. Al Assaf

Abstract:

This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.

Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message

Procedia PDF Downloads 421
491 Secure Message Transmission Using Meaningful Shares

Authors: Ajish Sreedharan

Abstract:

Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained.

Keywords: visual cryptography, wavelet transform, meaningful shares, grey scale image

Procedia PDF Downloads 411
490 The Sustainability of Eco–City Model: Green and Energy Efficiency Technology-Related Framing and Selectivity Issues in Eco–City Projects in Stockholm

Authors: Simon Elias Bibri, Vera Minavere Bardici

Abstract:

In this article, we investigate framing, discursive and material selectivity as important issues that need to be addressed in the planning of eco–city as a model of sustainable urban form. Focusing on the Stockholm region in Sweden, we discuss issues of the contribution of eco–city model to sustainability and examine key themes associated with the construction of the discourse on eco–city projects, namely the integration of environmental, economic, and social sustainability as well as design and technology as solutions in urban projects documents pertaining specifically to Hammarby Sjöstad and Stockholm Royal Seaport. The article is divided into four sections. First, we elucidate the concept and problem of framing and discursive and material selectivity. Second, we briefly discuss the discourse of sustainability, sustainable urban forms, and eco–city, pointing out some key issues that need to be addressed in sustainable urban planning. In the third and main section of the article, we investigate plans and projects for sustainable urban development, focusing on framing and discursive and material selectivity issues in the construction of the discourse on eco–city projects in Stockholm and discussing the findings in terms of the integration of sustainability dimensions, the economic benefits of and the negative environmental effects of energy efficiency and green technology, the shaping influence of cultural frames, the links of eco–city to macro–processes of regulation, the technological orientation of eco–city projects and the associated selectivity aspects. The article concludes with a call for further research for the possibilities for a more environmentally sound and holistic approach to sustainable urban forms.

Keywords: framing, selectivity, sustainability, eco–city, sustainable urban form, design, energy efficiency, green technology, Hammarby Sjöstad, Stockholm Royal Seaport

Procedia PDF Downloads 380
489 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks

Authors: Neetesh Saxena, Narendra S. Chaudhari

Abstract:

Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.

Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS

Procedia PDF Downloads 371