CINXE.COM

Search results for: dark side of information security

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: dark side of information security</title> <meta name="description" content="Search results for: dark side of information security"> <meta name="keywords" content="dark side of information security"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="dark side of information security" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="dark side of information security"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 15020</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: dark side of information security</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15020</span> Exploring the Dark Side of IT Security: Delphi Study on Business’ Influencing Factors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tizian%20Matschak">Tizian Matschak</a>, <a href="https://publications.waset.org/abstracts/search?q=Ilja%20Nastjuk"> Ilja Nastjuk</a>, <a href="https://publications.waset.org/abstracts/search?q=Stephan%20K%C3%BChnel"> Stephan Kühnel</a>, <a href="https://publications.waset.org/abstracts/search?q=Simon%20Trang"> Simon Trang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We argue that besides well-known primary effects of information security controls (ISCs), namely confidentiality, integrity, and availability, ISCs can also have secondary effects. For example, while IT can add business value through impacts on business processes, ISCs can be a barrier and distort the relationship between IT and organizational value through the impact on business processes. By applying the Delphi method with 28 experts, we derived 27 business process influence dimensions of ISCs. Defining and understanding these mechanisms can change the common understanding of the cost-benefit valuation of IT security investments and support managers' effective and efficient decision-making. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business%20process%20dimensions" title="business process dimensions">business process dimensions</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security" title=" dark side of information security"> dark side of information security</a>, <a href="https://publications.waset.org/abstracts/search?q=Delphi%20study" title=" Delphi study"> Delphi study</a>, <a href="https://publications.waset.org/abstracts/search?q=IT%20security%20controls" title=" IT security controls"> IT security controls</a> </p> <a href="https://publications.waset.org/abstracts/163415/exploring-the-dark-side-of-it-security-delphi-study-on-business-influencing-factors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163415.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">112</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15019</span> Using Machine Learning Techniques to Extract Useful Information from Dark Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nigar%20Hussain">Nigar Hussain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is a subset of big data. Dark data means those data in which we fail to use for future decisions. There are many issues in existing work, but some need powerful tools for utilizing dark data. It needs sufficient techniques to deal with dark data. That enables users to exploit their excellence, adaptability, speed, less time utilization, execution, and accessibility. Another issue is the way to utilize dark data to extract helpful information to settle on better choices. In this paper, we proposed upgrade strategies to remove the dark side from dark data. Using a supervised model and machine learning techniques, we utilized dark data and achieved an F1 score of 89.48%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data" title="big data">big data</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20data" title=" dark data"> dark data</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=heatmap" title=" heatmap"> heatmap</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forest" title=" random forest"> random forest</a> </p> <a href="https://publications.waset.org/abstracts/191942/using-machine-learning-techniques-to-extract-useful-information-from-dark-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191942.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">28</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15018</span> Dark Gravity Confronted with Supernovae, Baryonic Oscillations and Cosmic Microwave Background Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Frederic%20Henry-Couannier">Frederic Henry-Couannier</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Dark Gravity is a natural extension of general relativity in presence of a flat non dynamical background. Matter and radiation fields from its dark sector, as soon as their gravity dominates over our side fields gravity, produce a constant acceleration law of the scale factor. After a brief reminder of the Dark Gravity theory foundations, the confrontation with the main cosmological probes is carried out. We show that, amazingly, the sudden transition between the usual matter dominated decelerated expansion law a(t) ∝ t²/³ and this accelerated expansion law a(t) ∝ t² predicted by the theory should be able to fit the main cosmological probes (SN, BAO, CMB and age of the oldest stars data) but also direct H₀ measurements with two free parameters only: H₀ and the transition redshift. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-gravity" title="anti-gravity">anti-gravity</a>, <a href="https://publications.waset.org/abstracts/search?q=negative%20energies" title=" negative energies"> negative energies</a>, <a href="https://publications.waset.org/abstracts/search?q=time%20reversal" title=" time reversal"> time reversal</a>, <a href="https://publications.waset.org/abstracts/search?q=field%20discontinuities" title=" field discontinuities"> field discontinuities</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20energy%20theory" title=" dark energy theory"> dark energy theory</a> </p> <a href="https://publications.waset.org/abstracts/185998/dark-gravity-confronted-with-supernovae-baryonic-oscillations-and-cosmic-microwave-background-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185998.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">56</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15017</span> A Survey on Countermeasures of Cache-Timing Attack on AES Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Settana%20M.%20Abdulh">Settana M. Abdulh</a>, <a href="https://publications.waset.org/abstracts/search?q=Naila%20A.%20Sadalla"> Naila A. Sadalla</a>, <a href="https://publications.waset.org/abstracts/search?q=Yaseen%20H.%20Taha"> Yaseen H. Taha</a>, <a href="https://publications.waset.org/abstracts/search?q=Howaida%20Elshoush"> Howaida Elshoush</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AES%20algorithm" title="AES algorithm">AES algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack" title=" side channel attack"> side channel attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cache%20timing%20attack" title=" cache timing attack"> cache timing attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cache%20timing%20countermeasure" title=" cache timing countermeasure"> cache timing countermeasure</a> </p> <a href="https://publications.waset.org/abstracts/17652/a-survey-on-countermeasures-of-cache-timing-attack-on-aes-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15016</span> Dark Tourism and Local Development. Creating a Dark Urban Route</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Christos%20N.%20Tsironis">Christos N. Tsironis</a>, <a href="https://publications.waset.org/abstracts/search?q=Loanna%20Mitaftsi"> Loanna Mitaftsi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Currently, the various forms of tours and touristic visits to destinations associated with the “dark” facets of the past constitute one of the most dynamic fields of touristic initiatives and economic development. This analysis focuses on the potential development of urban dark routes. It aims a) to shed light to touristic, social, and ethical considerations and to describe some of the trends and links combining heritage and dark tourism in post-pandemic societies and b) to explore the possibilities of developing a new and polymorphic form of dark tourism in Thessaloniki, Greece, a distinctive heritage destination. The analysis concludes with a detailed dark route designed to serve a new, polymorphic and sustainable touristic product that describes a dark past with places, sights, and monuments and narrates stories and events stigmatized by death, disaster, and violence throughout the city’s history. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dark%20tourism" title="dark tourism">dark tourism</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20urban%20route" title=" dark urban route"> dark urban route</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20development" title=" local development"> local development</a>, <a href="https://publications.waset.org/abstracts/search?q=polymorphic%20tourism" title=" polymorphic tourism"> polymorphic tourism</a> </p> <a href="https://publications.waset.org/abstracts/139755/dark-tourism-and-local-development-creating-a-dark-urban-route" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139755.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">213</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15015</span> The Dark Side of Tourism&#039;s Implications: A Structural Equation Modeling Study of the 2016 Earthquake in Central Italy </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=B.%20Kulaga">B. Kulaga</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Cinti"> A. Cinti</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20J.%20Mazzocchini"> F. J. Mazzocchini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Despite the fact that growing academic attention on dark tourism is a fairly recent phenomenon, among the various reasons for travelling death-related ones, are very ancient. Furthermore, the darker side of human nature has always been fascinated and curious regarding death, or at least, man has always tried to learn lessons from death. This study proposes to describe the phenomenon of dark tourism related to the 2016 earthquake in Central Italy, deadly for 302 people and highly destructive for the rural areas of Lazio, Marche, and Umbria Regions. The primary objective is to examine the motivation-experience relationship in a dark tourism site, using the structural equation model, applied for the first time to a dark tourism research in 2016, in a study conducted after the Beichuan earthquake. The findings of the current study are derived from the calculations conducted on primary data compiled from 350 tourists in the areas mostly affected by the 2016 earthquake, including the town of Amatrice, near the epicenter, Castelluccio, Norcia, Ussita and Visso, through conducting a Likert scale survey. Furthermore, we use the structural equation model to examine the motivation behind dark travel and how this experience can influence the motivation and emotional reaction of tourists. Expected findings are in line with the previous study mentioned above, indicating that: not all tourists visit the thanatourism sites for dark tourism purpose, tourists’ emotional reactions influence more heavily the emotional tourist experience than cognitive experiences do, and curious visitors are likely to engage cognitively by learning about the incident or related issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dark%20tourism" title="dark tourism">dark tourism</a>, <a href="https://publications.waset.org/abstracts/search?q=emotional%20reaction" title=" emotional reaction"> emotional reaction</a>, <a href="https://publications.waset.org/abstracts/search?q=experience" title=" experience"> experience</a>, <a href="https://publications.waset.org/abstracts/search?q=motivation" title=" motivation"> motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20equation%20model" title=" structural equation model"> structural equation model</a> </p> <a href="https://publications.waset.org/abstracts/110726/the-dark-side-of-tourisms-implications-a-structural-equation-modeling-study-of-the-2016-earthquake-in-central-italy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110726.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">144</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15014</span> Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nahid%20Tavakoli">Nahid Tavakoli</a>, <a href="https://publications.waset.org/abstracts/search?q=Asghar%20Ehteshami"> Asghar Ehteshami</a>, <a href="https://publications.waset.org/abstracts/search?q=Akbar%20Hassanzadeh"> Akbar Hassanzadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatemeh%20Amini"> Fatemeh Amini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-value<o/oo1). Conclusions: According to ISO/IEC 27002 standards, none of the hospitals were completely complained with to present the best possible Information Security Incident Management. One of the most important aspects to consider when developing the information security incident management policy is to define the roles and responsibilities of the information security incident response team. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security%20incident%20management" title="information security incident management">information security incident management</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20management" title=" information security management"> information security management</a>, <a href="https://publications.waset.org/abstracts/search?q=standards" title=" standards"> standards</a>, <a href="https://publications.waset.org/abstracts/search?q=hospitals" title=" hospitals "> hospitals </a> </p> <a href="https://publications.waset.org/abstracts/38364/investigation-of-information-security-incident-management-based-on-international-standard-isoiec-27002-in-educational-hospitals-in-2014" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38364.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">575</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15013</span> Calculating All Dark Energy and Dark Matter Effects Through Dynamic Gravity Theory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sean%20Kinney">Sean Kinney</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In 1666, Newton created the Law of Universal Gravitation. And in 1915, Einstein improved it to incorporate factors such as time dilation and gravitational lensing. But currently, there is a problem with this “universal” law. The math doesn’t work outside the confines of our solar system. And something is missing; any evidence of what gravity actually is and how it manifest. This paper explores the notion that gravity must obey the law of conservation of energy as all other forces in this universe have been shown to do. Explaining exactly what gravity is and how it manifests itself. And looking at many different implications that would be created are explained. And finally, using the math of Dynamic Gravity to calculate Dark Energy and Dark Matter effects to explain all observations without the need of exotic measures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gravity" title="gravity">gravity</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20gravity" title=" dynamic gravity"> dynamic gravity</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20matter" title=" dark matter"> dark matter</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20energy" title=" dark energy"> dark energy</a> </p> <a href="https://publications.waset.org/abstracts/162095/calculating-all-dark-energy-and-dark-matter-effects-through-dynamic-gravity-theory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162095.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">105</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15012</span> Calculating All Dark Energy and Dark Matter Effects through Dynamic Gravity Theory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sean%20Michael%20Kinney">Sean Michael Kinney</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In 1666, Newton created the Law of Universal Gravitation. And in 1915, Einstein improved it to incorporate factors such as time dilation and gravitational lensing. But currently, there is a problem with this “universal” law. The math doesn’t work outside the confines of our solar system. And something is missing; any evidence of what gravity actually is and how it manifests. This paper explores the notion that gravity must obey the law of conservation of energy as all other forces in this universe have been shown to do. Explaining exactly what gravity is and how it manifests itself. And looking at many different implications that would be created are explained. And finally, use the math of Dynamic gravity to calculate Dark Energy and Dark Matter effects to explain all observations without the need for exotic measures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dynamic%20gravity" title="dynamic gravity">dynamic gravity</a>, <a href="https://publications.waset.org/abstracts/search?q=gravity" title=" gravity"> gravity</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20matter" title=" dark matter"> dark matter</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20energy" title=" dark energy"> dark energy</a> </p> <a href="https://publications.waset.org/abstracts/162838/calculating-all-dark-energy-and-dark-matter-effects-through-dynamic-gravity-theory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162838.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15011</span> Enterprise Security Architecture: Approaches and a Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Mohtarami">Amir Mohtarami</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadi%20Kandjani"> Hadi Kandjani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=enterprise%20architecture" title="enterprise architecture">enterprise architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture%20framework" title=" architecture framework"> architecture framework</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20architecture" title=" security architecture"> security architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20systems" title=" information systems"> information systems</a> </p> <a href="https://publications.waset.org/abstracts/26788/enterprise-security-architecture-approaches-and-a-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26788.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">704</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15010</span> Developing a Systems Dynamics Model for Security Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kuan-Chou%20Chen">Kuan-Chou Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=system%20thinking" title="system thinking">system thinking</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20systems" title=" information security systems"> information security systems</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20management" title=" security management"> security management</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a> </p> <a href="https://publications.waset.org/abstracts/40859/developing-a-systems-dynamics-model-for-security-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40859.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">430</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15009</span> The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nur%20Imroatun%20Sholihat">Nur Imroatun Sholihat</a>, <a href="https://publications.waset.org/abstracts/search?q=Gresika%20Bunga%20Sylvana"> Gresika Bunga Sylvana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security%20audit" title="information security audit">information security audit</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=Ministry%20of%20Finance%20of%20Indonesia" title=" Ministry of Finance of Indonesia"> Ministry of Finance of Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20sector%20organization" title=" public sector organization"> public sector organization</a> </p> <a href="https://publications.waset.org/abstracts/87165/the-implementation-of-information-security-audits-in-public-sector-perspective-from-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87165.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15008</span> Numerical Study of Blackness Factor Effect on Dark Solitons</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khelil%20Khadidja">Khelil Khadidja</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, blackness of dark solitons is considered. The exact combination between nonlinearity and dispersion is responsible of solitons stability. Dark solitons get born when dispersion is abnormal and balanced by nonlinearity, at the opposite of brillant solitons which is born by normal dispersion and nonlinearity together. Thanks to their stability, dark solitons are suitable for transmission by optical fibers. Dark solitons which are a solution of Nonlinear Schrodinger equation are simulated with Matlab to discuss the influence of coefficient of blackness. Results show that there is a direct proportion between the coefficient of blackness and the intensity of dark soliton. Those gray solitons are stable and convenient for transmission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=abnormal%20dispersion" title="abnormal dispersion">abnormal dispersion</a>, <a href="https://publications.waset.org/abstracts/search?q=nonlinearity" title=" nonlinearity"> nonlinearity</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20fiber" title=" optical fiber"> optical fiber</a>, <a href="https://publications.waset.org/abstracts/search?q=soliton" title=" soliton"> soliton</a> </p> <a href="https://publications.waset.org/abstracts/80445/numerical-study-of-blackness-factor-effect-on-dark-solitons" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80445.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">198</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15007</span> Developing a Viral Artifact to Improve Employees’ Security Behavior</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stefan%20Bauer">Stefan Bauer</a>, <a href="https://publications.waset.org/abstracts/search?q=Josef%20Frysak"> Josef Frysak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security%20awareness" title="information security awareness">information security awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=delivery%20methods" title=" delivery methods"> delivery methods</a>, <a href="https://publications.waset.org/abstracts/search?q=viral%20videos" title=" viral videos"> viral videos</a>, <a href="https://publications.waset.org/abstracts/search?q=employee%20security%20behavior" title=" employee security behavior"> employee security behavior</a> </p> <a href="https://publications.waset.org/abstracts/12535/developing-a-viral-artifact-to-improve-employees-security-behavior" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12535.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">542</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15006</span> Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mark%20Davey">Mark Davey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=embedded%20systems" title="embedded systems">embedded systems</a>, <a href="https://publications.waset.org/abstracts/search?q=multiprocessor" title=" multiprocessor"> multiprocessor</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20on%20chip" title=" network on chip"> network on chip</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel" title=" side channel"> side channel</a> </p> <a href="https://publications.waset.org/abstracts/171019/investigating-message-timing-side-channel-attacks-on-networks-on-chip-with-ring-topology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171019.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">71</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15005</span> Design a Network for Implementation a Hospital Information System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdulqader%20Rasool%20Feqi%20Mohammed">Abdulqader Rasool Feqi Mohammed</a>, <a href="https://publications.waset.org/abstracts/search?q=Ergun%20Er%C3%A7elebi%CC%87"> Ergun Erçelebi̇</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hospital%20information%20system" title="hospital information system">hospital information system</a>, <a href="https://publications.waset.org/abstracts/search?q=HIS" title=" HIS"> HIS</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security%20techniques" title=" network security techniques"> network security techniques</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20protocol" title=" internet protocol"> internet protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=IP" title=" IP"> IP</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a> </p> <a href="https://publications.waset.org/abstracts/44356/design-a-network-for-implementation-a-hospital-information-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44356.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15004</span> Bright–Dark Pulses in Nonlinear Polarisation Rotation Based Erbium-Doped Fiber Laser</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Z.%20R.%20R.%20Rosdin">R. Z. R. R. Rosdin</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20M.%20Ali"> N. M. Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20W.%20Harun"> S. W. Harun</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Arof"> H. Arof</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We have experimentally demonstrated bright-dark pulses in a nonlinear polarization rotation (NPR) based mode-locked Erbium-doped fiber laser (EDFL) with a long cavity configuration. Bright–dark pulses could be achieved when the laser works in the passively mode-locking regime and the net group velocity dispersion is quite anomalous. The EDFL starts to generate a bright pulse train with degenerated dark pulse at the mode-locking threshold pump power of 35.09 mW by manipulating the polarization states of the laser oscillation modes using a polarization controller (PC). A split bright–dark pulse is generated when further increasing the pump power up to 37.95 mW. Stable bright pulses with no obvious evidence of a dark pulse can also be generated when further adjusting PC and increasing the pump power up to 52.19 mW. At higher pump power of 54.96 mW, a new form of bright-dark pulse emission was successfully identified with the repetition rate of 29 kHz. The bright and dark pulses have a duration of 795.5 ns and 640 ns, respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erbium-doped%20fiber%20laser" title="Erbium-doped fiber laser">Erbium-doped fiber laser</a>, <a href="https://publications.waset.org/abstracts/search?q=nonlinear%20polarization%20rotation" title=" nonlinear polarization rotation"> nonlinear polarization rotation</a>, <a href="https://publications.waset.org/abstracts/search?q=bright-dark%20pulse" title=" bright-dark pulse"> bright-dark pulse</a>, <a href="https://publications.waset.org/abstracts/search?q=photonic" title=" photonic"> photonic</a> </p> <a href="https://publications.waset.org/abstracts/19127/bright-dark-pulses-in-nonlinear-polarisation-rotation-based-erbium-doped-fiber-laser" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19127.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">524</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15003</span> Secure Mobile E-Business Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hala%20A.%20Alrumaih">Hala A. Alrumaih</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-business" title="e-business">e-business</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title=" mobile applications"> mobile applications</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20mitigations" title=" risk mitigations"> risk mitigations</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20assurance" title=" security assurance"> security assurance</a> </p> <a href="https://publications.waset.org/abstracts/16632/secure-mobile-e-business-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16632.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15002</span> Policy Compliance in Information Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Manjula">R. Manjula</a>, <a href="https://publications.waset.org/abstracts/search?q=Kaustav%20Bagchi"> Kaustav Bagchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Sushant%20Ramesh"> Sushant Ramesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Anush%20Baskaran"> Anush Baskaran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title="information technology">information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=involvement%20theory" title=" involvement theory"> involvement theory</a>, <a href="https://publications.waset.org/abstracts/search?q=policies" title=" policies"> policies</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20bond%20theory" title=" social bond theory"> social bond theory</a> </p> <a href="https://publications.waset.org/abstracts/59601/policy-compliance-in-information-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59601.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">371</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15001</span> Between Dark and Light: The Construction and the Exclusion of Memory of Prison Heritage in Post-Soviet Period</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Guo%20Cyuan%20Deng">Guo Cyuan Deng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study represents how the Soviet-occupied dark memory in Baltic countries were interpreted and represented by examining the way of management of prison heritage. Based on the formulation of a dark-tourism spectrum which Philip Stone proposed, the Patarei prison in Estonia and the Karosta prison in Latvia are compared, and it is thought that both prisons, which had experienced similar colonial history, face different tourism operation in the present. The former is being run by NGO and remain the situation of “empty" by art intervening. However, the Estonia government attempt to get the operation of museum and transform it to anti-Soviet museum in order show national identity. By contrast, the latter is being managed by private company, whom transformed the prison to "dark fun factories" by entertainment activities in order to private capital accumulation. Moreover, it is not only indicated that both prisons exclude the minority's memory, but also the flaws of dark-tourism spectrum which divide the dark and light are discussed. Finally, given the nature and function of dark heritage, the concept "le métro" is used to supplement Stone's spectrum. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dark%20tourism" title="dark tourism">dark tourism</a>, <a href="https://publications.waset.org/abstracts/search?q=prison%20heritage" title=" prison heritage"> prison heritage</a>, <a href="https://publications.waset.org/abstracts/search?q=Post-Soviet" title=" Post-Soviet"> Post-Soviet</a>, <a href="https://publications.waset.org/abstracts/search?q=Baltic%20countries" title=" Baltic countries"> Baltic countries</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20identities" title=" national identities"> national identities</a> </p> <a href="https://publications.waset.org/abstracts/59381/between-dark-and-light-the-construction-and-the-exclusion-of-memory-of-prison-heritage-in-post-soviet-period" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59381.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">306</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15000</span> A Pattern Practise for Awareness Educations on Information Security: Information Security Project</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fati%CC%87h%20Apaydin">Fati̇h Apaydin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer" title="computer">computer</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a> </p> <a href="https://publications.waset.org/abstracts/35678/a-pattern-practise-for-awareness-educations-on-information-security-information-security-project" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35678.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">594</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14999</span> A Holistic Approach to Institutional Cyber Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Kargaci">Mehmet Kargaci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20defence" title="cyber defence">cyber defence</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/26126/a-holistic-approach-to-institutional-cyber-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26126.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14998</span> The Effect of Dark energy on Amplitude of Gravitational Waves</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jafar%20Khodagholizadeh">Jafar Khodagholizadeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this talk, we study the tensor mode equation of perturbation in the presence of nonzero $-\Lambda$ as dark energy, whose dynamic nature depends on the Hubble parameter $ H$ and/or its time derivative. Dark energy, according to the total vacuum contribution, has little effect during the radiation-dominated era, but it reduces the squared amplitude of gravitational waves (GWs) up to $60\%$ for the wavelengths that enter the horizon during the matter-dominated era. Moreover, the observations bound on dark energy models, such as running vacuum model (RVM), generalized running vacuum model (GRVM), and generalized running vacuum subcase (GRVS), are effective in reducing the GWs’ amplitude. Although this effect is less for the wavelengths that enter the horizon at later times, this reduction is stable and permanent. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gravitational%20waves" title="gravitational waves">gravitational waves</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20energy" title=" dark energy"> dark energy</a>, <a href="https://publications.waset.org/abstracts/search?q=GW%27s%20amplitude" title=" GW&#039;s amplitude"> GW&#039;s amplitude</a>, <a href="https://publications.waset.org/abstracts/search?q=all%20stage%20universe" title=" all stage universe"> all stage universe</a> </p> <a href="https://publications.waset.org/abstracts/144763/the-effect-of-dark-energy-on-amplitude-of-gravitational-waves" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144763.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14997</span> Isolation Preserving Medical Conclusion Hold Structure via C5 Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Swati%20Kishor%20Zode">Swati Kishor Zode</a>, <a href="https://publications.waset.org/abstracts/search?q=Rahul%20Ambekar"> Rahul Ambekar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data mining is the extraction of fascinating examples on the other hand information from enormous measure of information and choice is made as indicated by the applicable information extracted. As of late, with the dangerous advancement in internet, stockpiling of information and handling procedures, privacy preservation has been one of the major (higher) concerns in data mining. Various techniques and methods have been produced for protection saving data mining. In the situation of Clinical Decision Support System, the choice is to be made on the premise of the data separated from the remote servers by means of Internet to diagnose the patient. In this paper, the fundamental thought is to build the precision of Decision Support System for multiple diseases for different maladies and in addition protect persistent information while correspondence between Clinician side (Client side) also, the Server side. A privacy preserving protocol for clinical decision support network is proposed so that patients information dependably stay scrambled amid diagnose prepare by looking after the accuracy. To enhance the precision of Decision Support System for various malady C5.0 classifiers and to save security, a Homomorphism encryption algorithm Paillier cryptosystem is being utilized. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=classification" title="classification">classification</a>, <a href="https://publications.waset.org/abstracts/search?q=homomorphic%20encryption" title=" homomorphic encryption"> homomorphic encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=clinical%20decision%20support" title=" clinical decision support"> clinical decision support</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy "> privacy </a> </p> <a href="https://publications.waset.org/abstracts/32625/isolation-preserving-medical-conclusion-hold-structure-via-c5-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32625.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">330</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14996</span> Tamper Resistance Evaluation Tests with Noise Resources</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Masaya%20Yoshikawa">Masaya Yoshikawa</a>, <a href="https://publications.waset.org/abstracts/search?q=Toshiya%20Asai"> Toshiya Asai</a>, <a href="https://publications.waset.org/abstracts/search?q=Ryoma%20Matsuhisa"> Ryoma Matsuhisa</a>, <a href="https://publications.waset.org/abstracts/search?q=Yusuke%20Nozaki"> Yusuke Nozaki</a>, <a href="https://publications.waset.org/abstracts/search?q=Kensaku%20Asahi"> Kensaku Asahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tamper%20resistance" title="tamper resistance">tamper resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptographic%20circuit" title=" cryptographic circuit"> cryptographic circuit</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware%20security%20evaluation" title=" hardware security evaluation"> hardware security evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=noise%20resources" title=" noise resources "> noise resources </a> </p> <a href="https://publications.waset.org/abstracts/25852/tamper-resistance-evaluation-tests-with-noise-resources" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25852.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">504</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14995</span> Information Security Dilemma: Employees&#039; Behaviour on Three-Dimensions to Failure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dyana%20Zainudin">Dyana Zainudin</a>, <a href="https://publications.waset.org/abstracts/search?q=Atta%20Ur-Rahman"> Atta Ur-Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Thaier%20Hamed"> Thaier Hamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security%20management%20system" title="information security management system">information security management system</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20behaviour" title=" information security behaviour"> information security behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20governance" title=" information security governance"> information security governance</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20culture" title=" information security culture"> information security culture</a> </p> <a href="https://publications.waset.org/abstracts/73708/information-security-dilemma-employees-behaviour-on-three-dimensions-to-failure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73708.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">208</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14994</span> Natural Disaster Tourism as a Type of Dark Tourism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dorota%20Ruci%C5%84ska">Dorota Rucińska</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This theoretical paper combines the academic discourse regarding a specific part of dark tourism. Based on the literature analysis, distinction of natural disasters in thanatourism was investigated, which is connected with dynamic geographical conditions. Natural disasters used to play an important role in social life by their appearance in myths and religions. Nowadays, tourists pursuing natural hazards can be divided into three groups: Those interested in natural hazards themselves; those interested in landscape deformation and experiencing emotions shortly after extreme events - natural disasters - occur; and finally those interested in historic places log after an extreme event takes place. An important element of the natural disaster tourism is quick access to information on the location of a disaster and the destination of a potential excursion. Natural disaster tourism suits alternative tourism, yet it is opposed culture tourism, and sustainable tourism. The paper compares types and groups of tourists. It also considers the contradictions that describe dualism, which exists in dark tourism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dark%20tourism" title="dark tourism">dark tourism</a>, <a href="https://publications.waset.org/abstracts/search?q=dualism" title=" dualism"> dualism</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20disasters" title=" natural disasters"> natural disasters</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20hazards" title=" natural hazards"> natural hazards</a>, <a href="https://publications.waset.org/abstracts/search?q=thanatoursim" title=" thanatoursim"> thanatoursim</a> </p> <a href="https://publications.waset.org/abstracts/41651/natural-disaster-tourism-as-a-type-of-dark-tourism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41651.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">384</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14993</span> Security of Internet of Things: Challenges, Requirements and Future Directions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjad%20F.%20Alharbi">Amjad F. Alharbi</a>, <a href="https://publications.waset.org/abstracts/search?q=Bashayer%20A.%20Alotaibi"> Bashayer A. Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fahd%20S.%20Alotaibi"> Fahd S. Alotaibi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things%20%28IoT%29" title="Internet of Things (IoT)">Internet of Things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20challenges" title=" IoT security challenges"> IoT security challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20requirements" title=" IoT security requirements"> IoT security requirements</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20architecture" title=" IoT security architecture"> IoT security architecture</a> </p> <a href="https://publications.waset.org/abstracts/71488/security-of-internet-of-things-challenges-requirements-and-future-directions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">375</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14992</span> Challenges of Implementing Zero Trust Security Based on NIST SP 800-207</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mazhar%20Hamayun">Mazhar Hamayun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ZTNA" title="ZTNA">ZTNA</a>, <a href="https://publications.waset.org/abstracts/search?q=zerotrust%20architecture" title=" zerotrust architecture"> zerotrust architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=microsegmentation" title=" microsegmentation"> microsegmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=NIST%20SP%20800-207" title=" NIST SP 800-207"> NIST SP 800-207</a> </p> <a href="https://publications.waset.org/abstracts/163771/challenges-of-implementing-zero-trust-security-based-on-nist-sp-800-207" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163771.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14991</span> Prediction of the Dark Matter Distribution and Fraction in Individual Galaxies Based Solely on Their Rotation Curves</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ramzi%20Suleiman">Ramzi Suleiman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recently, the author proposed an observationally-based relativity theory termed information relativity theory (IRT). The theory is simple and is based only on basic principles, with no prior axioms and no free parameters. For the case of a body of mass in uniform rectilinear motion relative to an observer, the theory transformations uncovered a matter-dark matter duality, which prescribes that the sum of the densities of the body's baryonic matter and dark matter, as measured by the observer, is equal to the body's matter density at rest. It was shown that the theory transformations were successful in predicting several important phenomena in small particle physics, quantum physics, and cosmology. This paper extends the theory transformations to the cases of rotating disks and spheres. The resulting transformations for a rotating disk are utilized to derive predictions of the radial distributions of matter and dark matter densities in rotationally supported galaxies based solely on their observed rotation curves. It is also shown that for galaxies with flattening curves, good approximations of the radial distributions of matter and dark matter and of the dark matter fraction could be obtained from one measurable scale radius. Test of the model on five galaxies, chosen randomly from the SPARC database, yielded impressive predictions. The rotation curves of all the investigated galaxies emerged as accurate traces of the predicted radial density distributions of their dark matter. This striking result raises an intriguing physical explanation of gravity in galaxies, according to which it is the proximal drag of the stars and gas in the galaxy by its rotating dark matter web. We conclude by alluding briefly to the application of the proposed model to stellar systems and black holes. This study also hints at the potential of the discovered matter-dark matter duality in fixing the standard model of elementary particles in a natural manner without the need for hypothesizing about supersymmetric particles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dark%20matter" title="dark matter">dark matter</a>, <a href="https://publications.waset.org/abstracts/search?q=galaxies%20rotation%20curves" title=" galaxies rotation curves"> galaxies rotation curves</a>, <a href="https://publications.waset.org/abstracts/search?q=SPARC" title=" SPARC"> SPARC</a>, <a href="https://publications.waset.org/abstracts/search?q=rotating%20disk" title=" rotating disk"> rotating disk</a> </p> <a href="https://publications.waset.org/abstracts/171407/prediction-of-the-dark-matter-distribution-and-fraction-in-individual-galaxies-based-solely-on-their-rotation-curves" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171407.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=500">500</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=501">501</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=dark%20side%20of%20information%20security&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10