CINXE.COM
Information Security Research Papers - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Information Security Research Papers - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "by_tag", 'action': "show_one", 'controller_action': 'by_tag#show_one', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="VLbyy0zutZa6zRR/nav7DYKVUkvSleFzTNsVGdlTtSbfU0WvZJZkDb4LAB8LBZk2ThxMYE1WIW3DMQw8WL9Plg==" /> <link href="/Documents/in/Information_Security?after=50%2C39645342" rel="next" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="description" content="View Information Security Research Papers on Academia.edu for free." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'by_tag'; var $action_name = "show_one"; var $rails_env = 'production'; var $app_rev = '49879c2402910372f4abc62630a427bbe033d190'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15275,"monthly_visitors":"113 million","monthly_visitor_count":113468711,"monthly_visitor_count_in_millions":113,"user_count":277146548,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1732405362000); window.Aedu.timeDifference = new Date().getTime() - 1732405362000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-296162c7af6fd81dcdd76f1a94f1fad04fb5f647401337d136fe8b68742170b1.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-8d53a22151f33ab413d88fa1c02f979c3f8706d470fc1bced09852c72a9f3454.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-f8fe82512740391f81c9e8cc48220144024b425b359b08194e316f4de070b9e8.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://www.academia.edu/Documents/in/Information_Security" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-by_tag a-show_one logged_out u-bgColorWhite'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-by_tag a-show_one logged_out u-bgColorWhite'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav no-sm no-md"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <div class="DesignSystem" style="margin-top:-40px"><div class="PageHeader"><div class="container"><div class="row"><style type="text/css">.sor-abstract { display: -webkit-box; overflow: hidden; text-overflow: ellipsis; -webkit-line-clamp: 3; -webkit-box-orient: vertical; }</style><div class="col-xs-12 clearfix"><div class="u-floatLeft"><h1 class="PageHeader-title u-m0x u-fs30">Information Security</h1><div class="u-tcGrayDark">307,622 Followers</div><div class="u-tcGrayDark u-mt2x">Recent papers in <b>Information Security</b></div></div></div></div></div></div><div class="TabbedNavigation"><div class="container"><div class="row"><div class="col-xs-12 clearfix"><ul class="nav u-m0x u-p0x list-inline u-displayFlex"><li class="active"><a href="https://www.academia.edu/Documents/in/Information_Security">Top Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Information_Security/MostCited">Most Cited Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Information_Security/MostDownloaded">Most Downloaded Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Information_Security/MostRecent">Newest Papers</a></li><li><a class="" href="https://www.academia.edu/People/Information_Security">People</a></li></ul></div><style type="text/css">ul.nav{flex-direction:row}@media(max-width: 567px){ul.nav{flex-direction:column}.TabbedNavigation li{max-width:100%}.TabbedNavigation li.active{background-color:var(--background-grey, #dddde2)}.TabbedNavigation li.active:before,.TabbedNavigation li.active:after{display:none}}</style></div></div></div><div class="container"><div class="row"><div class="col-xs-12"><div class="u-displayFlex"><div class="u-flexGrow1"><div class="works"><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_5662148" data-work_id="5662148" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/5662148/Implementation_of_Role_Based_Delegation_Model_Flat_Roles_RBDM0">Implementation of Role-Based Delegation Model/Flat Roles (RBDM0</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In the information security arena, one of the most interesting and promising techniques proposed is Role -Based Access Control (RBAC). In the last few years, much work has been done in the definition and implementation of RBAC. However,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_5662148" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In the information security arena, one of the most interesting and promising techniques proposed is Role -Based Access Control (RBAC). In the last few years, much work has been done in the definition and implementation of RBAC. However, so far the concept of delegation in RBAC has not been studied. The basic idea behind delegation is that some active entity i n a system delegates authority to another active entity in order to carry out some functions on behalf of the former. User delegation in RBAC is the ability of one user (called the delegating user) who is a member of the delegated role to authorize another user (called the delegate user) to become a member of the delegated role. This paper extends a series of simple but practically useful models for delegation, described in the literature by Barka and Sandhu (3), and starts the development of a scheme of prototype implementation in order to validate these models. More specifically, this paper reviews the most recent Role-Based Access Control (RBAC) Implementations, analyzes the implementation techniques used in other forms of delegations (other than the human-to-human delegation), and designes and develops prototype implementations of user-to-user role delegation based on the Role-Based Delegation Models, in flat roles (RBDM0), and in hierarchical roles (RBDM1).</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/5662148" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="8155450" href="https://zayed.academia.edu/KadhimHayawi">Kadhim Hayawi</a><script data-card-contents-for-user="8155450" type="text/json">{"id":8155450,"first_name":"Kadhim","last_name":"Hayawi","domain_name":"zayed","page_name":"KadhimHayawi","display_name":"Kadhim Hayawi","profile_url":"https://zayed.academia.edu/KadhimHayawi?f_ri=1283","photo":"https://0.academia-photos.com/8155450/113931564/103206256/s65_kadhim.hayawi.jpeg"}</script></span></span></li><li class="js-paper-rank-work_5662148 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="5662148"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 5662148, container: ".js-paper-rank-work_5662148", }); });</script></li><li class="js-percentile-work_5662148 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 5662148; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_5662148"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_5662148 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="5662148"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 5662148; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=5662148]").text(description); $(".js-view-count-work_5662148").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_5662148").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="5662148"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7798" href="https://www.academia.edu/Documents/in/Access_Control">Access Control</a>, <script data-card-contents-for-ri="7798" type="text/json">{"id":7798,"name":"Access Control","url":"https://www.academia.edu/Documents/in/Access_Control?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="413487" href="https://www.academia.edu/Documents/in/Design_and_Development">Design and Development</a>, <script data-card-contents-for-ri="413487" type="text/json">{"id":413487,"name":"Design and Development","url":"https://www.academia.edu/Documents/in/Design_and_Development?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="986414" href="https://www.academia.edu/Documents/in/Role_Based_Access_Control">Role Based Access Control</a><script data-card-contents-for-ri="986414" type="text/json">{"id":986414,"name":"Role Based Access Control","url":"https://www.academia.edu/Documents/in/Role_Based_Access_Control?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=5662148]'), work: {"id":5662148,"title":"Implementation of Role-Based Delegation Model/Flat Roles (RBDM0","created_at":"2014-01-09T15:19:24.502-08:00","url":"https://www.academia.edu/5662148/Implementation_of_Role_Based_Delegation_Model_Flat_Roles_RBDM0?f_ri=1283","dom_id":"work_5662148","summary":"In the information security arena, one of the most interesting and promising techniques proposed is Role -Based Access Control (RBAC). In the last few years, much work has been done in the definition and implementation of RBAC. However, so far the concept of delegation in RBAC has not been studied. The basic idea behind delegation is that some active entity i n a system delegates authority to another active entity in order to carry out some functions on behalf of the former. User delegation in RBAC is the ability of one user (called the delegating user) who is a member of the delegated role to authorize another user (called the delegate user) to become a member of the delegated role. This paper extends a series of simple but practically useful models for delegation, described in the literature by Barka and Sandhu (3), and starts the development of a scheme of prototype implementation in order to validate these models. More specifically, this paper reviews the most recent Role-Based Access Control (RBAC) Implementations, analyzes the implementation techniques used in other forms of delegations (other than the human-to-human delegation), and designes and develops prototype implementations of user-to-user role delegation based on the Role-Based Delegation Models, in flat roles (RBDM0), and in hierarchical roles (RBDM1).","downloadable_attachments":[],"ordered_authors":[{"id":8155450,"first_name":"Kadhim","last_name":"Hayawi","domain_name":"zayed","page_name":"KadhimHayawi","display_name":"Kadhim Hayawi","profile_url":"https://zayed.academia.edu/KadhimHayawi?f_ri=1283","photo":"https://0.academia-photos.com/8155450/113931564/103206256/s65_kadhim.hayawi.jpeg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":7798,"name":"Access Control","url":"https://www.academia.edu/Documents/in/Access_Control?f_ri=1283","nofollow":false},{"id":413487,"name":"Design and Development","url":"https://www.academia.edu/Documents/in/Design_and_Development?f_ri=1283","nofollow":false},{"id":986414,"name":"Role Based Access Control","url":"https://www.academia.edu/Documents/in/Role_Based_Access_Control?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34417529" data-work_id="34417529" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34417529/EL_CONCEPTO_DE_ENEMIGO_EN_EL_JUICIO_A_BRADLEY_MANNING_POR_LAS_FUGAS_A_WIKILEAKS">EL CONCEPTO DE ENEMIGO EN EL JUICIO A BRADLEY MANNING POR LAS “FUGAS” A WIKILEAKS</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Mucho se ha discutido en medios de comunicación, debates académicos y grupos activistas sobre la extravagancia de la tipificación de los delitos atribuidos a Chelsea Manning. Por ejemplo, por el hecho de que resultó convicto de... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34417529" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Mucho se ha discutido en medios de comunicación, debates académicos y grupos activistas sobre la extravagancia de la tipificación de los delitos atribuidos a Chelsea Manning. Por ejemplo, por el hecho de que resultó convicto de “espionaje”, aunque sobreseído de un<br />cargo de “ayudar al enemigo” (es decir, una variante del delito de “traición”). Uno podría preguntarse “¿cuál enemigo?”, “¿cómo ayudó al enemigo exactamente?”, “¿a favor de quién espió, si no estaba al servicio de ningún país o empresa extranjeros y solo liberó cierta<br />información para que todo el mundo la supiese por igual?”, “¿por qué se castiga así a alguien que solo fue una fuente periodística que aportó datos de claro interés público, es decir, un “whistleblower”?”, “¿puede un soldado de un país cometer el delito de espionaje sin incurrir al mismo tiempo en el de traición? Para contribuir a echar luz sobre estas aparentes paradojas, en este trabajo se analiza la construcción del concepto de “enemigo” en la ley de Inteligencia de los Estados Unidos, en su código de justicia militar y en la acusación, la defensa y otros involucrados en el juicio a Manning. Complementariamente, también se examina el concepto<br />de “espía”.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34417529" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e433af0e0577d14fe219f64e7df20ff3" rel="nofollow" data-download="{"attachment_id":54296360,"asset_id":34417529,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54296360/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="6861770" href="https://uba.academia.edu/LSiri">Laura Siri</a><script data-card-contents-for-user="6861770" type="text/json">{"id":6861770,"first_name":"Laura","last_name":"Siri","domain_name":"uba","page_name":"LSiri","display_name":"Laura Siri","profile_url":"https://uba.academia.edu/LSiri?f_ri=1283","photo":"https://0.academia-photos.com/6861770/156920058/146553726/s65_laura.siri.jpg"}</script></span></span></li><li class="js-paper-rank-work_34417529 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34417529"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34417529, container: ".js-paper-rank-work_34417529", }); });</script></li><li class="js-percentile-work_34417529 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34417529; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34417529"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34417529 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34417529"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34417529; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34417529]").text(description); $(".js-view-count-work_34417529").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34417529").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34417529"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="67267" href="https://www.academia.edu/Documents/in/Wikileaks">Wikileaks</a>, <script data-card-contents-for-ri="67267" type="text/json">{"id":67267,"name":"Wikileaks","url":"https://www.academia.edu/Documents/in/Wikileaks?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="112987" href="https://www.academia.edu/Documents/in/Espionage">Espionage</a>, <script data-card-contents-for-ri="112987" type="text/json">{"id":112987,"name":"Espionage","url":"https://www.academia.edu/Documents/in/Espionage?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="313387" href="https://www.academia.edu/Documents/in/Enemy">Enemy</a><script data-card-contents-for-ri="313387" type="text/json">{"id":313387,"name":"Enemy","url":"https://www.academia.edu/Documents/in/Enemy?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34417529]'), work: {"id":34417529,"title":"EL CONCEPTO DE ENEMIGO EN EL JUICIO A BRADLEY MANNING POR LAS “FUGAS” A WIKILEAKS","created_at":"2017-08-30T20:26:29.381-07:00","url":"https://www.academia.edu/34417529/EL_CONCEPTO_DE_ENEMIGO_EN_EL_JUICIO_A_BRADLEY_MANNING_POR_LAS_FUGAS_A_WIKILEAKS?f_ri=1283","dom_id":"work_34417529","summary":"Mucho se ha discutido en medios de comunicación, debates académicos y grupos activistas sobre la extravagancia de la tipificación de los delitos atribuidos a Chelsea Manning. Por ejemplo, por el hecho de que resultó convicto de “espionaje”, aunque sobreseído de un\ncargo de “ayudar al enemigo” (es decir, una variante del delito de “traición”). Uno podría preguntarse “¿cuál enemigo?”, “¿cómo ayudó al enemigo exactamente?”, “¿a favor de quién espió, si no estaba al servicio de ningún país o empresa extranjeros y solo liberó cierta\ninformación para que todo el mundo la supiese por igual?”, “¿por qué se castiga así a alguien que solo fue una fuente periodística que aportó datos de claro interés público, es decir, un “whistleblower”?”, “¿puede un soldado de un país cometer el delito de espionaje sin incurrir al mismo tiempo en el de traición? Para contribuir a echar luz sobre estas aparentes paradojas, en este trabajo se analiza la construcción del concepto de “enemigo” en la ley de Inteligencia de los Estados Unidos, en su código de justicia militar y en la acusación, la defensa y otros involucrados en el juicio a Manning. Complementariamente, también se examina el concepto\nde “espía”.","downloadable_attachments":[{"id":54296360,"asset_id":34417529,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":6861770,"first_name":"Laura","last_name":"Siri","domain_name":"uba","page_name":"LSiri","display_name":"Laura Siri","profile_url":"https://uba.academia.edu/LSiri?f_ri=1283","photo":"https://0.academia-photos.com/6861770/156920058/146553726/s65_laura.siri.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":67267,"name":"Wikileaks","url":"https://www.academia.edu/Documents/in/Wikileaks?f_ri=1283","nofollow":false},{"id":112987,"name":"Espionage","url":"https://www.academia.edu/Documents/in/Espionage?f_ri=1283","nofollow":false},{"id":313387,"name":"Enemy","url":"https://www.academia.edu/Documents/in/Enemy?f_ri=1283","nofollow":false},{"id":1278520,"name":"Chelsea Manning","url":"https://www.academia.edu/Documents/in/Chelsea_Manning?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_58269697" data-work_id="58269697" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/58269697/Healthcare_information_exchange_using_blockchain_technology">Healthcare information exchange using blockchain technology</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_58269697" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this conventional cloud-based data sharing environment has data security and privacy issues. This paper proposes a distributed solution based on blockchain technology for trusted Health Information Exchange (HIE). In addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations. Medical data is very sensitive, in both social as well as legal aspects, so permissioned block-chain such as Hyperledger Fabric is used to retain the necessary privacy required in the proposed system. As, this is highly permissioned network where the owner of the network i.e. patient holds all the access rights, so in case of emergency ...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/58269697" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6dc2a4a0f234fa5b47b62ea6eabb3840" rel="nofollow" data-download="{"attachment_id":72764012,"asset_id":58269697,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/72764012/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="118340601" href="https://independent.academia.edu/TusharChechare">Tushar Chechare</a><script data-card-contents-for-user="118340601" type="text/json">{"id":118340601,"first_name":"Tushar","last_name":"Chechare","domain_name":"independent","page_name":"TusharChechare","display_name":"Tushar Chechare","profile_url":"https://independent.academia.edu/TusharChechare?f_ri=1283","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_58269697 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="58269697"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 58269697, container: ".js-paper-rank-work_58269697", }); });</script></li><li class="js-percentile-work_58269697 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 58269697; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_58269697"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_58269697 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="58269697"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 58269697; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=58269697]").text(description); $(".js-view-count-work_58269697").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_58269697").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="58269697"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="586" href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a>, <script data-card-contents-for-ri="586" type="text/json">{"id":586,"name":"Health Sciences","url":"https://www.academia.edu/Documents/in/Health_Sciences?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=58269697]'), work: {"id":58269697,"title":"Healthcare information exchange using blockchain technology","created_at":"2021-10-15T21:01:37.832-07:00","url":"https://www.academia.edu/58269697/Healthcare_information_exchange_using_blockchain_technology?f_ri=1283","dom_id":"work_58269697","summary":"Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this conventional cloud-based data sharing environment has data security and privacy issues. This paper proposes a distributed solution based on blockchain technology for trusted Health Information Exchange (HIE). In addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations. Medical data is very sensitive, in both social as well as legal aspects, so permissioned block-chain such as Hyperledger Fabric is used to retain the necessary privacy required in the proposed system. As, this is highly permissioned network where the owner of the network i.e. patient holds all the access rights, so in case of emergency ...","downloadable_attachments":[{"id":72764012,"asset_id":58269697,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":118340601,"first_name":"Tushar","last_name":"Chechare","domain_name":"independent","page_name":"TusharChechare","display_name":"Tushar Chechare","profile_url":"https://independent.academia.edu/TusharChechare?f_ri=1283","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false},{"id":586,"name":"Health Sciences","url":"https://www.academia.edu/Documents/in/Health_Sciences?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine?f_ri=1283"},{"id":1450126,"name":"Blockchains","url":"https://www.academia.edu/Documents/in/Blockchains?f_ri=1283"},{"id":3725546,"name":"Electronic healthcare records (EHR)","url":"https://www.academia.edu/Documents/in/Electronic_healthcare_records_EHR_?f_ri=1283"},{"id":3725547,"name":"Health information exchange (HIE)","url":"https://www.academia.edu/Documents/in/Health_information_exchange_HIE_?f_ri=1283"},{"id":3725548,"name":"Hyperledgerfabric ","url":"https://www.academia.edu/Documents/in/Hyperledgerfabric?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_5774108" data-work_id="5774108" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/5774108/Keeping_Up_with_the_Clouds_Revealing_the_Discrepancy_between_the_Realities_of_Cloud_Technology_and_European_Data_Protection_Law">Keeping Up with the Clouds - Revealing the Discrepancy between the Realities of Cloud Technology and European Data Protection Law </a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/5774108" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3e99892991759e2e0136477c57caf16a" rel="nofollow" data-download="{"attachment_id":32797356,"asset_id":5774108,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/32797356/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3779472" href="https://ucc-ie.academia.edu/EmeraldLeeuw">Emerald de Leeuw</a><script data-card-contents-for-user="3779472" type="text/json">{"id":3779472,"first_name":"Emerald","last_name":"de Leeuw","domain_name":"ucc-ie","page_name":"EmeraldLeeuw","display_name":"Emerald de Leeuw","profile_url":"https://ucc-ie.academia.edu/EmeraldLeeuw?f_ri=1283","photo":"https://0.academia-photos.com/3779472/1370243/17393513/s65_emerald.de_leeuw.jpg"}</script></span></span></li><li class="js-paper-rank-work_5774108 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="5774108"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 5774108, container: ".js-paper-rank-work_5774108", }); });</script></li><li class="js-percentile-work_5774108 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 5774108; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_5774108"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_5774108 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="5774108"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 5774108; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=5774108]").text(description); $(".js-view-count-work_5774108").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_5774108").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="5774108"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1306" href="https://www.academia.edu/Documents/in/European_Law">European Law</a>, <script data-card-contents-for-ri="1306" type="text/json">{"id":1306,"name":"European Law","url":"https://www.academia.edu/Documents/in/European_Law?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2783" href="https://www.academia.edu/Documents/in/Privacy">Privacy</a>, <script data-card-contents-for-ri="2783" type="text/json">{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="23506" href="https://www.academia.edu/Documents/in/Information_Security_and_Privacy">Information Security and Privacy</a><script data-card-contents-for-ri="23506" type="text/json">{"id":23506,"name":"Information Security and Privacy","url":"https://www.academia.edu/Documents/in/Information_Security_and_Privacy?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=5774108]'), work: {"id":5774108,"title":"Keeping Up with the Clouds - Revealing the Discrepancy between the Realities of Cloud Technology and European Data Protection Law ","created_at":"2014-01-19T19:45:18.727-08:00","url":"https://www.academia.edu/5774108/Keeping_Up_with_the_Clouds_Revealing_the_Discrepancy_between_the_Realities_of_Cloud_Technology_and_European_Data_Protection_Law?f_ri=1283","dom_id":"work_5774108","summary":null,"downloadable_attachments":[{"id":32797356,"asset_id":5774108,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3779472,"first_name":"Emerald","last_name":"de Leeuw","domain_name":"ucc-ie","page_name":"EmeraldLeeuw","display_name":"Emerald de Leeuw","profile_url":"https://ucc-ie.academia.edu/EmeraldLeeuw?f_ri=1283","photo":"https://0.academia-photos.com/3779472/1370243/17393513/s65_emerald.de_leeuw.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1306,"name":"European Law","url":"https://www.academia.edu/Documents/in/European_Law?f_ri=1283","nofollow":false},{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=1283","nofollow":false},{"id":23506,"name":"Information Security and Privacy","url":"https://www.academia.edu/Documents/in/Information_Security_and_Privacy?f_ri=1283","nofollow":false},{"id":26860,"name":"Cloud Computing","url":"https://www.academia.edu/Documents/in/Cloud_Computing?f_ri=1283"},{"id":92007,"name":"Privacy and data protection","url":"https://www.academia.edu/Documents/in/Privacy_and_data_protection?f_ri=1283"},{"id":101534,"name":"Mobile Cloud Computing","url":"https://www.academia.edu/Documents/in/Mobile_Cloud_Computing?f_ri=1283"},{"id":181551,"name":"Cloud Computing Security","url":"https://www.academia.edu/Documents/in/Cloud_Computing_Security-1?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_22924331" data-work_id="22924331" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/22924331/Doctoral_Dissertation_Normative_Decision_Making_in_Dynamic_Environments_An_Assessment_of_Automated_Decision_Support_for_Time_Sensitive_Decision_Processes">Doctoral Dissertation, Normative Decision Making in Dynamic Environments: An Assessment of Automated Decision Support for Time-Sensitive Decision Processes</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Decision-making is a cognitive process stemming from the analysis of available courses of action related to a given problem. Rationally, potential courses of action are derived from deliberate analysis of available data related to a... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_22924331" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Decision-making is a cognitive process stemming from the analysis of available courses of action related to a given problem. Rationally, potential courses of action are derived from deliberate analysis of available data related to a problem and its potential outcomes. Decisions are generally characterized as normative, descriptive or naturalistic. Normative decisions are based on evidence, logic and analysis; descriptive decisions are based on intuition and experience. Naturalistic decisions are formed as a hybrid of normative and descriptive processes.<br /><br />For decision-makers the revolution in information technology and the amount and scope of the data they provide has become overwhelming, leading to cognitive overload, confusion and an inability to function effectively. Decision Support Systems (DSS) facilitate data analysis and selection of a viable course of action rapidly and effectively. However, like the human decision- makers they serve, DSS capabilities may also suffer from cognitive overload, inaccuracy, and complexity, especially in time-sensitive environments.<br /><br />This study explores DSS employment for time-sensitive decision processes using Digitally Aided Close Air Support (DACAS) as a model. The study explores decision theory, models, DSS development and time-sensitive environments. Using DACAS as a model the paper reveals the obstacles and opportunities associated with the employment of DSS for time- sensitive processes. Finally, the study makes recommendations for improved employment of DSS in time-sensitive environments.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/22924331" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="345474141c8dd49b96420e9740c0d7ca" rel="nofollow" data-download="{"attachment_id":43457675,"asset_id":22924331,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/43457675/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5195834" href="https://ism-paris.academia.edu/jmahaffey">john mahaffey</a><script data-card-contents-for-user="5195834" type="text/json">{"id":5195834,"first_name":"john","last_name":"mahaffey","domain_name":"ism-paris","page_name":"jmahaffey","display_name":"john mahaffey","profile_url":"https://ism-paris.academia.edu/jmahaffey?f_ri=1283","photo":"https://0.academia-photos.com/5195834/6581431/38172114/s65_john.mahaffey.jpg"}</script></span></span></li><li class="js-paper-rank-work_22924331 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="22924331"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 22924331, container: ".js-paper-rank-work_22924331", }); });</script></li><li class="js-percentile-work_22924331 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 22924331; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_22924331"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_22924331 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="22924331"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 22924331; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=22924331]").text(description); $(".js-view-count-work_22924331").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_22924331").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="22924331"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">30</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="38" href="https://www.academia.edu/Documents/in/Management">Management</a>, <script data-card-contents-for-ri="38" type="text/json">{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="459" href="https://www.academia.edu/Documents/in/Information_Science">Information Science</a>, <script data-card-contents-for-ri="459" type="text/json">{"id":459,"name":"Information Science","url":"https://www.academia.edu/Documents/in/Information_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="491" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a><script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=22924331]'), work: {"id":22924331,"title":"Doctoral Dissertation, Normative Decision Making in Dynamic Environments: An Assessment of Automated Decision Support for Time-Sensitive Decision Processes","created_at":"2016-03-07T05:01:17.662-08:00","url":"https://www.academia.edu/22924331/Doctoral_Dissertation_Normative_Decision_Making_in_Dynamic_Environments_An_Assessment_of_Automated_Decision_Support_for_Time_Sensitive_Decision_Processes?f_ri=1283","dom_id":"work_22924331","summary":"Decision-making is a cognitive process stemming from the analysis of available courses of action related to a given problem. Rationally, potential courses of action are derived from deliberate analysis of available data related to a problem and its potential outcomes. Decisions are generally characterized as normative, descriptive or naturalistic. Normative decisions are based on evidence, logic and analysis; descriptive decisions are based on intuition and experience. Naturalistic decisions are formed as a hybrid of normative and descriptive processes.\n\nFor decision-makers the revolution in information technology and the amount and scope of the data they provide has become overwhelming, leading to cognitive overload, confusion and an inability to function effectively. Decision Support Systems (DSS) facilitate data analysis and selection of a viable course of action rapidly and effectively. However, like the human decision- makers they serve, DSS capabilities may also suffer from cognitive overload, inaccuracy, and complexity, especially in time-sensitive environments.\n\nThis study explores DSS employment for time-sensitive decision processes using Digitally Aided Close Air Support (DACAS) as a model. The study explores decision theory, models, DSS development and time-sensitive environments. Using DACAS as a model the paper reveals the obstacles and opportunities associated with the employment of DSS for time- sensitive processes. Finally, the study makes recommendations for improved employment of DSS in time-sensitive environments.","downloadable_attachments":[{"id":43457675,"asset_id":22924331,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5195834,"first_name":"john","last_name":"mahaffey","domain_name":"ism-paris","page_name":"jmahaffey","display_name":"john mahaffey","profile_url":"https://ism-paris.academia.edu/jmahaffey?f_ri=1283","photo":"https://0.academia-photos.com/5195834/6581431/38172114/s65_john.mahaffey.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false},{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management?f_ri=1283","nofollow":false},{"id":459,"name":"Information Science","url":"https://www.academia.edu/Documents/in/Information_Science?f_ri=1283","nofollow":false},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283","nofollow":false},{"id":492,"name":"Management Information Systems","url":"https://www.academia.edu/Documents/in/Management_Information_Systems?f_ri=1283"},{"id":607,"name":"Emergency Medicine","url":"https://www.academia.edu/Documents/in/Emergency_Medicine?f_ri=1283"},{"id":1241,"name":"Knowledge Management","url":"https://www.academia.edu/Documents/in/Knowledge_Management?f_ri=1283"},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283"},{"id":1453,"name":"Information Management","url":"https://www.academia.edu/Documents/in/Information_Management?f_ri=1283"},{"id":1661,"name":"Fire and Emergency Services","url":"https://www.academia.edu/Documents/in/Fire_and_Emergency_Services?f_ri=1283"},{"id":1681,"name":"Decision Making","url":"https://www.academia.edu/Documents/in/Decision_Making?f_ri=1283"},{"id":2488,"name":"Decision Making Analysis and Modeling","url":"https://www.academia.edu/Documents/in/Decision_Making_Analysis_and_Modeling?f_ri=1283"},{"id":2537,"name":"Heuristics","url":"https://www.academia.edu/Documents/in/Heuristics?f_ri=1283"},{"id":2784,"name":"Judgment and decision making","url":"https://www.academia.edu/Documents/in/Judgment_and_decision_making?f_ri=1283"},{"id":4275,"name":"Decision Sciences","url":"https://www.academia.edu/Documents/in/Decision_Sciences?f_ri=1283"},{"id":4699,"name":"Naturalistic Decision Making","url":"https://www.academia.edu/Documents/in/Naturalistic_Decision_Making?f_ri=1283"},{"id":8210,"name":"Behavioral Decision Making","url":"https://www.academia.edu/Documents/in/Behavioral_Decision_Making?f_ri=1283"},{"id":10075,"name":"Decision Support Systems","url":"https://www.academia.edu/Documents/in/Decision_Support_Systems?f_ri=1283"},{"id":16097,"name":"Decision Making Under Uncertainty","url":"https://www.academia.edu/Documents/in/Decision_Making_Under_Uncertainty?f_ri=1283"},{"id":19211,"name":"Multi Criteria Decision Making","url":"https://www.academia.edu/Documents/in/Multi_Criteria_Decision_Making?f_ri=1283"},{"id":19566,"name":"Emergency Management","url":"https://www.academia.edu/Documents/in/Emergency_Management?f_ri=1283"},{"id":25660,"name":"Decision Theory","url":"https://www.academia.edu/Documents/in/Decision_Theory?f_ri=1283"},{"id":27183,"name":"Decision-Making","url":"https://www.academia.edu/Documents/in/Decision-Making?f_ri=1283"},{"id":45874,"name":"Decision support system","url":"https://www.academia.edu/Documents/in/Decision_support_system?f_ri=1283"},{"id":55155,"name":"Emergency Medical Services","url":"https://www.academia.edu/Documents/in/Emergency_Medical_Services?f_ri=1283"},{"id":111100,"name":"Command and Control","url":"https://www.academia.edu/Documents/in/Command_and_Control?f_ri=1283"},{"id":126300,"name":"Big Data","url":"https://www.academia.edu/Documents/in/Big_Data?f_ri=1283"},{"id":289278,"name":"Big Data Analytics","url":"https://www.academia.edu/Documents/in/Big_Data_Analytics?f_ri=1283"},{"id":413148,"name":"Big Data / Analytics / Data Mining","url":"https://www.academia.edu/Documents/in/Big_Data_Analytics_Data_Mining?f_ri=1283"},{"id":651785,"name":"Decision Science","url":"https://www.academia.edu/Documents/in/Decision_Science?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25107861" data-work_id="25107861" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25107861/Ensuring_Interoperability_Among_Heterogeneous_Devices_through_IoT_Middleware">Ensuring Interoperability Among Heterogeneous Devices through IoT Middleware</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Internet of Things provides truly ubiquitous and smart environment. The multilayer distributed architecture with a variety of different components together with end devices, applications and the association with its framework poses... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_25107861" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Internet of Things provides truly ubiquitous and smart environment. The multilayer distributed architecture with a variety of different components together with end devices, applications and the association with its framework poses challenge. Internet of Things middleware actions as a joining link between the heterogeneous areas that communicate across heterogeneous edges. In this work, we study the interoperability issue between heterogeneous devices. We presented guidelines to handle the interoperability issue in Internet of Things. Furthermore, we have proposed architectural framework for Home Area Network.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25107861" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="61b7cc7b396b6960de3c6815bae54809" rel="nofollow" data-download="{"attachment_id":45426933,"asset_id":25107861,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/45426933/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2328357" href="https://independent.academia.edu/JournalofComputerScienceIJCSIS">Journal of Computer Science IJCSIS</a><script data-card-contents-for-user="2328357" type="text/json">{"id":2328357,"first_name":"Journal of Computer Science","last_name":"IJCSIS","domain_name":"independent","page_name":"JournalofComputerScienceIJCSIS","display_name":"Journal of Computer Science IJCSIS","profile_url":"https://independent.academia.edu/JournalofComputerScienceIJCSIS?f_ri=1283","photo":"https://0.academia-photos.com/2328357/8085511/9052483/s65_journal_of_computer_science.ijcsis.jpg"}</script></span></span></li><li class="js-paper-rank-work_25107861 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25107861"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25107861, container: ".js-paper-rank-work_25107861", }); });</script></li><li class="js-percentile-work_25107861 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25107861; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25107861"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25107861 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25107861"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25107861; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25107861]").text(description); $(".js-view-count-work_25107861").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25107861").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25107861"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="491" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a><script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25107861]'), work: {"id":25107861,"title":"Ensuring Interoperability Among Heterogeneous Devices through IoT Middleware","created_at":"2016-05-07T06:46:07.189-07:00","url":"https://www.academia.edu/25107861/Ensuring_Interoperability_Among_Heterogeneous_Devices_through_IoT_Middleware?f_ri=1283","dom_id":"work_25107861","summary":"Internet of Things provides truly ubiquitous and smart environment. The multilayer distributed architecture with a variety of different components together with end devices, applications and the association with its framework poses challenge. Internet of Things middleware actions as a joining link between the heterogeneous areas that communicate across heterogeneous edges. In this work, we study the interoperability issue between heterogeneous devices. We presented guidelines to handle the interoperability issue in Internet of Things. Furthermore, we have proposed architectural framework for Home Area Network.","downloadable_attachments":[{"id":45426933,"asset_id":25107861,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2328357,"first_name":"Journal of Computer Science","last_name":"IJCSIS","domain_name":"independent","page_name":"JournalofComputerScienceIJCSIS","display_name":"Journal of Computer Science IJCSIS","profile_url":"https://independent.academia.edu/JournalofComputerScienceIJCSIS?f_ri=1283","photo":"https://0.academia-photos.com/2328357/8085511/9052483/s65_journal_of_computer_science.ijcsis.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=1283"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283"},{"id":52295,"name":"Interoperability","url":"https://www.academia.edu/Documents/in/Interoperability?f_ri=1283"},{"id":247799,"name":"Internet of Things (IoT)","url":"https://www.academia.edu/Documents/in/Internet_of_Things_IoT_?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_26611381 coauthored" data-work_id="26611381" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/26611381/Toward_U_S_Russia_Bilateral_Cooperation_in_the_Sphere_of_Cybersecurity">Toward U.S.-Russia Bilateral Cooperation in the Sphere of Cybersecurity</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In recent years, the dynamics of international cooperation and conflict in the cyber domain have become the focus of intense interest on the part of national governments and expert communities around the world. Russia and the United... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_26611381" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In recent years, the dynamics of international cooperation and conflict in the cyber domain have become the focus of intense interest on the part of national governments and expert communities around the world. Russia and the United States have often been at odds even in defining the nature of the problem: Russia emphasizes “international information security,” whereas the United States believes that cybercrime, cyberespionage, and cyberterrorism are the main threats in this domain and so prefers the term “cybersecurity” and a focus on the protection of computer networks and resources. It is encouraging, therefore, that the two countries reached agreement in June 2013 on the need for cooperation over “threats to or in the use of ICTs [Information Communications Technologies] in the context of international security.” Subsequent events have inhibited further progress toward cooperation. <br /><br />In this working paper, we seek to outline some of the challenges as well as the opportunities for bilateral U.S.-Russia cooperation in the sphere of cybersecurity. Cybersecurity poses certain unique difficulties where cooperation is concerned. Theories of strategic conflict and security drawn from the nuclear arms race do not carry over readily into the cyber domain. Some experts, for example, question whether doctrines of deterrence and verification of compliance with agreements are applicable to the cyber domain. The problem of attributing an attack to its source is far greater. An attack can be nearly instantaneous and without warning. <br /><br />Moreover, the Russian and U.S. sides tend to approach the problem of cybersecurity from different perspectives. The Russian government generally emphasizes the principle of sovereign control over the entire information and communications domain. Russia regards cyberweapons as inherently first-strike weapons, useless if they are not used in the early stages of a conflict. The United States, in contrast, rejects “information security” as a foundational principle and champions the idea that the Internet should be “open, secure, interoperable, and reliable.” The United States distinguishes between legitimate and illegitimate operations in the cyber domain; forms it considers illegitimate include espionage by governments and corporations to obtain commercial secrets and efforts by criminal (including terrorist) organizations to damage ICT infrastructure. It accepts that governments will conduct espionage in the interest of national security as well as operations to influence public opinion in target countries, even to the point of attempting to overthrow those countries’ regimes. The United States, which favors international cooperation to prevent and defend against criminal attacks on critical ICT infrastructure and to ban commercially motivated espionage, has found common ground with Russia and other states in reaching agreements in these areas. <br /><br />Both countries recognize the potential danger posed by cyberattacks to national infrastructure, such as electric power grids, dams, water supply, sanitation, oil and gas extraction equipment, and telecommunications networks. The dangers of a large-scale and effective attack on critical infrastructure are thus extremely severe. For this reason, the cyber domain is not entirely virtual; it includes the physical and human infrastructure linked to it. <br /><br />The Russian government is also concerned about the possibility that the U.S. government could interfere with the management of the core infrastructure of the Internet, even to the point of disrupting Russia’s access to it. Although the reform of the ICANN (Internet Corporation for Assigned Names and Numbers) to take effect in mid-2016 will move ICANN’s technical functions away from the U.S. government’s stewardship and to a selfregulating, independent international body, Russia’s concerns about the governance of the Internet may not be entirely allayed. <br /><br />We believe that these characteristics of the cyber domain should be addressed both bilaterally and multilaterally. We offer six recommendations for bilateral U.S.-Russia cooperation in the sphere of cybersecurity:<br /><br />a. agreement on an explicit definition of the thresholds for attacks on critical infrastructure such that an attack would trigger a counterattack using either cyber or other types of weapons;<br />b. agreement on the types of information that would be shared in the event of a cyberattack, for example along the lines of a response to a bio-weapons attack;<br />c. prohibition of automatic retaliation in cases of cyberattacks;<br />d. prohibition of attacks on elements of another nation’s core Internet<br />infrastructure;<br />e. joint evaluation of the Internet Core Governance (UIS, IANA, DNS RZM)<br />infrastructure to assess whether stakeholders feel that their interests and contributions are being given adequate consideration following the reform of ICANN’s governance; and<br />f. broader international discussion of cybersecurity beyond the bilateral U.S.- Russia framework, for example under the auspices of the UN Group of Government Experts on Developments in the Field of Information and<br />Telecommunications in the Context of International Security (UNGGE).<br /><br />For the longer-term future, we believe a formal, binding international treaty is needed to ensure full compliance with these norms. The bilateral norms we propose can serve as a model for such a multilateral agreement.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/26611381" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="32fd25241f97364e8853aaa6813ccdd9" rel="nofollow" data-download="{"attachment_id":46897596,"asset_id":26611381,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46897596/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1335120" href="https://mgimo.academia.edu/OlegDemidov">Oleg Demidov</a><script data-card-contents-for-user="1335120" type="text/json">{"id":1335120,"first_name":"Oleg","last_name":"Demidov","domain_name":"mgimo","page_name":"OlegDemidov","display_name":"Oleg Demidov","profile_url":"https://mgimo.academia.edu/OlegDemidov?f_ri=1283","photo":"https://0.academia-photos.com/1335120/491356/11987666/s65_oleg.demidov.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-26611381">+1</span><div class="hidden js-additional-users-26611381"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://ut-ee.academia.edu/ChrisSpirito">Chris Spirito</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-26611381'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-26611381').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_26611381 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="26611381"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 26611381, container: ".js-paper-rank-work_26611381", }); });</script></li><li class="js-percentile-work_26611381 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 26611381; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_26611381"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_26611381 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="26611381"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 26611381; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=26611381]").text(description); $(".js-view-count-work_26611381").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_26611381").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="26611381"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7822" href="https://www.academia.edu/Documents/in/Internet_Governance">Internet Governance</a>, <script data-card-contents-for-ri="7822" type="text/json">{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="81556" href="https://www.academia.edu/Documents/in/Critical_infrastructure_protection">Critical infrastructure protection</a><script data-card-contents-for-ri="81556" type="text/json">{"id":81556,"name":"Critical infrastructure protection","url":"https://www.academia.edu/Documents/in/Critical_infrastructure_protection?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=26611381]'), work: {"id":26611381,"title":"Toward U.S.-Russia Bilateral Cooperation in the Sphere of Cybersecurity","created_at":"2016-06-29T15:15:29.516-07:00","url":"https://www.academia.edu/26611381/Toward_U_S_Russia_Bilateral_Cooperation_in_the_Sphere_of_Cybersecurity?f_ri=1283","dom_id":"work_26611381","summary":"In recent years, the dynamics of international cooperation and conflict in the cyber domain have become the focus of intense interest on the part of national governments and expert communities around the world. Russia and the United States have often been at odds even in defining the nature of the problem: Russia emphasizes “international information security,” whereas the United States believes that cybercrime, cyberespionage, and cyberterrorism are the main threats in this domain and so prefers the term “cybersecurity” and a focus on the protection of computer networks and resources. It is encouraging, therefore, that the two countries reached agreement in June 2013 on the need for cooperation over “threats to or in the use of ICTs [Information Communications Technologies] in the context of international security.” Subsequent events have inhibited further progress toward cooperation. \n\nIn this working paper, we seek to outline some of the challenges as well as the opportunities for bilateral U.S.-Russia cooperation in the sphere of cybersecurity. Cybersecurity poses certain unique difficulties where cooperation is concerned. Theories of strategic conflict and security drawn from the nuclear arms race do not carry over readily into the cyber domain. Some experts, for example, question whether doctrines of deterrence and verification of compliance with agreements are applicable to the cyber domain. The problem of attributing an attack to its source is far greater. An attack can be nearly instantaneous and without warning. \n\nMoreover, the Russian and U.S. sides tend to approach the problem of cybersecurity from different perspectives. The Russian government generally emphasizes the principle of sovereign control over the entire information and communications domain. Russia regards cyberweapons as inherently first-strike weapons, useless if they are not used in the early stages of a conflict. The United States, in contrast, rejects “information security” as a foundational principle and champions the idea that the Internet should be “open, secure, interoperable, and reliable.” The United States distinguishes between legitimate and illegitimate operations in the cyber domain; forms it considers illegitimate include espionage by governments and corporations to obtain commercial secrets and efforts by criminal (including terrorist) organizations to damage ICT infrastructure. It accepts that governments will conduct espionage in the interest of national security as well as operations to influence public opinion in target countries, even to the point of attempting to overthrow those countries’ regimes. The United States, which favors international cooperation to prevent and defend against criminal attacks on critical ICT infrastructure and to ban commercially motivated espionage, has found common ground with Russia and other states in reaching agreements in these areas. \n\nBoth countries recognize the potential danger posed by cyberattacks to national infrastructure, such as electric power grids, dams, water supply, sanitation, oil and gas extraction equipment, and telecommunications networks. The dangers of a large-scale and effective attack on critical infrastructure are thus extremely severe. For this reason, the cyber domain is not entirely virtual; it includes the physical and human infrastructure linked to it. \n\nThe Russian government is also concerned about the possibility that the U.S. government could interfere with the management of the core infrastructure of the Internet, even to the point of disrupting Russia’s access to it. Although the reform of the ICANN (Internet Corporation for Assigned Names and Numbers) to take effect in mid-2016 will move ICANN’s technical functions away from the U.S. government’s stewardship and to a selfregulating, independent international body, Russia’s concerns about the governance of the Internet may not be entirely allayed. \n\nWe believe that these characteristics of the cyber domain should be addressed both bilaterally and multilaterally. We offer six recommendations for bilateral U.S.-Russia cooperation in the sphere of cybersecurity:\n\na. agreement on an explicit definition of the thresholds for attacks on critical infrastructure such that an attack would trigger a counterattack using either cyber or other types of weapons;\nb. agreement on the types of information that would be shared in the event of a cyberattack, for example along the lines of a response to a bio-weapons attack;\nc. prohibition of automatic retaliation in cases of cyberattacks;\nd. prohibition of attacks on elements of another nation’s core Internet\ninfrastructure;\ne. joint evaluation of the Internet Core Governance (UIS, IANA, DNS RZM)\ninfrastructure to assess whether stakeholders feel that their interests and contributions are being given adequate consideration following the reform of ICANN’s governance; and\nf. broader international discussion of cybersecurity beyond the bilateral U.S.- Russia framework, for example under the auspices of the UN Group of Government Experts on Developments in the Field of Information and\nTelecommunications in the Context of International Security (UNGGE).\n\nFor the longer-term future, we believe a formal, binding international treaty is needed to ensure full compliance with these norms. The bilateral norms we propose can serve as a model for such a multilateral agreement. ","downloadable_attachments":[{"id":46897596,"asset_id":26611381,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1335120,"first_name":"Oleg","last_name":"Demidov","domain_name":"mgimo","page_name":"OlegDemidov","display_name":"Oleg Demidov","profile_url":"https://mgimo.academia.edu/OlegDemidov?f_ri=1283","photo":"https://0.academia-photos.com/1335120/491356/11987666/s65_oleg.demidov.jpg"},{"id":50602995,"first_name":"Chris","last_name":"Spirito","domain_name":"ut-ee","page_name":"ChrisSpirito","display_name":"Chris Spirito","profile_url":"https://ut-ee.academia.edu/ChrisSpirito?f_ri=1283","photo":"https://0.academia-photos.com/50602995/13357336/14593087/s65_chris.spirito.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=1283","nofollow":false},{"id":81556,"name":"Critical infrastructure protection","url":"https://www.academia.edu/Documents/in/Critical_infrastructure_protection?f_ri=1283","nofollow":false},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283"},{"id":262123,"name":"US-Russian relations","url":"https://www.academia.edu/Documents/in/US-Russian_relations?f_ri=1283"},{"id":413616,"name":"Bilateral Relations","url":"https://www.academia.edu/Documents/in/Bilateral_Relations?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_19633383" data-work_id="19633383" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/19633383/Software_Architecture_for_Healthcare_Information_page_82_11th_International_Conference_on_Product_Focused_Software_June_21_23_2010_Limerick_Ireland">Software Architecture for Healthcare Information (page 82), 11th International Conference on Product Focused Software, June 21-23 2010, Limerick, Ireland</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This thesis aims at developing software-intensive systems architecture for the Healthcare Industry to meet information assurance, legislative security and privacy standards by proposing an architecture and framework - “SARCHIA” using data... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_19633383" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This thesis aims at developing software-intensive systems<br />architecture for the Healthcare Industry to meet information<br />assurance, legislative security and privacy standards by proposing<br />an architecture and framework - “SARCHIA” using data mining<br />and statistical techniques. “SARCHIA” can help the software<br />industry guard against unauthorized access to Health Information.<br />SARCHIA will help companies to track compliance in the<br />healthcare industry by leveraging SARCHIA framework and<br />architecture. The framework will be evaluated through a case<br />study from the healthcare industry. SARCHIA will do the<br />auditing, impact analysis of Key Compliance Attributes (KCA) on<br />Key Quality Attributes (KQA), and will regulate financial and<br />health information, and identify related risks.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/19633383" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="326af458ef3755c32b109149639c01d6" rel="nofollow" data-download="{"attachment_id":40746301,"asset_id":19633383,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40746301/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="40091483" href="https://riphah.academia.edu/SyedaUzmaGardazi">Syeda Uzma Gardazi</a><script data-card-contents-for-user="40091483" type="text/json">{"id":40091483,"first_name":"Syeda Uzma","last_name":"Gardazi","domain_name":"riphah","page_name":"SyedaUzmaGardazi","display_name":"Syeda Uzma Gardazi","profile_url":"https://riphah.academia.edu/SyedaUzmaGardazi?f_ri=1283","photo":"https://0.academia-photos.com/40091483/10976056/62034020/s65_syeda_uzma.gardazi.jpg"}</script></span></span></li><li class="js-paper-rank-work_19633383 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="19633383"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 19633383, container: ".js-paper-rank-work_19633383", }); });</script></li><li class="js-percentile-work_19633383 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19633383; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_19633383"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_19633383 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="19633383"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19633383; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19633383]").text(description); $(".js-view-count-work_19633383").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_19633383").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="19633383"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="449" href="https://www.academia.edu/Documents/in/Software_Engineering">Software Engineering</a>, <script data-card-contents-for-ri="449" type="text/json">{"id":449,"name":"Software Engineering","url":"https://www.academia.edu/Documents/in/Software_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="8139" href="https://www.academia.edu/Documents/in/Compliance">Compliance</a>, <script data-card-contents-for-ri="8139" type="text/json">{"id":8139,"name":"Compliance","url":"https://www.academia.edu/Documents/in/Compliance?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9270" href="https://www.academia.edu/Documents/in/Software_Architecture">Software Architecture</a><script data-card-contents-for-ri="9270" type="text/json">{"id":9270,"name":"Software Architecture","url":"https://www.academia.edu/Documents/in/Software_Architecture?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=19633383]'), work: {"id":19633383,"title":"Software Architecture for Healthcare Information (page 82), 11th International Conference on Product Focused Software, June 21-23 2010, Limerick, Ireland","created_at":"2015-12-13T04:39:48.020-08:00","url":"https://www.academia.edu/19633383/Software_Architecture_for_Healthcare_Information_page_82_11th_International_Conference_on_Product_Focused_Software_June_21_23_2010_Limerick_Ireland?f_ri=1283","dom_id":"work_19633383","summary":"This thesis aims at developing software-intensive systems\narchitecture for the Healthcare Industry to meet information\nassurance, legislative security and privacy standards by proposing\nan architecture and framework - “SARCHIA” using data mining\nand statistical techniques. “SARCHIA” can help the software\nindustry guard against unauthorized access to Health Information.\nSARCHIA will help companies to track compliance in the\nhealthcare industry by leveraging SARCHIA framework and\narchitecture. The framework will be evaluated through a case\nstudy from the healthcare industry. SARCHIA will do the\nauditing, impact analysis of Key Compliance Attributes (KCA) on\nKey Quality Attributes (KQA), and will regulate financial and\nhealth information, and identify related risks.","downloadable_attachments":[{"id":40746301,"asset_id":19633383,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":40091483,"first_name":"Syeda Uzma","last_name":"Gardazi","domain_name":"riphah","page_name":"SyedaUzmaGardazi","display_name":"Syeda Uzma Gardazi","profile_url":"https://riphah.academia.edu/SyedaUzmaGardazi?f_ri=1283","photo":"https://0.academia-photos.com/40091483/10976056/62034020/s65_syeda_uzma.gardazi.jpg"}],"research_interests":[{"id":449,"name":"Software Engineering","url":"https://www.academia.edu/Documents/in/Software_Engineering?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":8139,"name":"Compliance","url":"https://www.academia.edu/Documents/in/Compliance?f_ri=1283","nofollow":false},{"id":9270,"name":"Software Architecture","url":"https://www.academia.edu/Documents/in/Software_Architecture?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_17275525" data-work_id="17275525" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/17275525/ISO_27001">ISO 27001</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/17275525" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d7a64b6c03c18e8b95be32314a7c9ca5" rel="nofollow" data-download="{"attachment_id":39411262,"asset_id":17275525,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/39411262/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="36919774" href="https://sikadu.academia.edu/jambulgemini">jambul gemini</a><script data-card-contents-for-user="36919774" type="text/json">{"id":36919774,"first_name":"jambul","last_name":"gemini","domain_name":"sikadu","page_name":"jambulgemini","display_name":"jambul gemini","profile_url":"https://sikadu.academia.edu/jambulgemini?f_ri=1283","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_17275525 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="17275525"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 17275525, container: ".js-paper-rank-work_17275525", }); });</script></li><li class="js-percentile-work_17275525 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 17275525; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_17275525"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_17275525 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="17275525"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 17275525; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=17275525]").text(description); $(".js-view-count-work_17275525").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_17275525").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="17275525"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">2</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=17275525]'), work: {"id":17275525,"title":"ISO 27001","created_at":"2015-10-25T07:41:12.692-07:00","url":"https://www.academia.edu/17275525/ISO_27001?f_ri=1283","dom_id":"work_17275525","summary":null,"downloadable_attachments":[{"id":39411262,"asset_id":17275525,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":36919774,"first_name":"jambul","last_name":"gemini","domain_name":"sikadu","page_name":"jambulgemini","display_name":"jambul gemini","profile_url":"https://sikadu.academia.edu/jambulgemini?f_ri=1283","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_13755842" data-work_id="13755842" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/13755842/Quantitative_Analysis_of_Information_Security_Risk">Quantitative Analysis of Information Security Risk</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States. This paper took into account collected business related data... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_13755842" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States. This paper took into account collected business related data from 36 industry types. Pattern recognition, bivariate linear regression analysis, and a one-sample t-test were performed to test the industry type and information security risk-level relationship of the selected business. Test results indicated that there is a significant predictive relationship between industry type and risk-level rates among United States businesses. Moreover, the one-sample t-test results indicated that United States businesses classified as a particular industry type are more likely to have a higher information security risk-level than the midpoint level of United States businesses.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/13755842" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1029ce325bcd120b43a03698d6e50f96" rel="nofollow" data-download="{"attachment_id":38121161,"asset_id":13755842,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38121161/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1540422" href="https://waldenu.academia.edu/RobertEDavis">Dr. Robert E Davis</a><script data-card-contents-for-user="1540422" type="text/json">{"id":1540422,"first_name":"Dr. Robert","last_name":"Davis","domain_name":"waldenu","page_name":"RobertEDavis","display_name":"Dr. Robert E Davis","profile_url":"https://waldenu.academia.edu/RobertEDavis?f_ri=1283","photo":"https://0.academia-photos.com/1540422/544542/12889384/s65_robert_e..davis.jpg"}</script></span></span></li><li class="js-paper-rank-work_13755842 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="13755842"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 13755842, container: ".js-paper-rank-work_13755842", }); });</script></li><li class="js-percentile-work_13755842 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 13755842; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_13755842"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_13755842 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="13755842"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 13755842; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=13755842]").text(description); $(".js-view-count-work_13755842").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_13755842").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="13755842"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="491" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3703" href="https://www.academia.edu/Documents/in/Network_Security">Network Security</a><script data-card-contents-for-ri="3703" type="text/json">{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=13755842]'), work: {"id":13755842,"title":"Quantitative Analysis of Information Security Risk","created_at":"2015-07-07T10:24:13.857-07:00","url":"https://www.academia.edu/13755842/Quantitative_Analysis_of_Information_Security_Risk?f_ri=1283","dom_id":"work_13755842","summary":"The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States. This paper took into account collected business related data from 36 industry types. Pattern recognition, bivariate linear regression analysis, and a one-sample t-test were performed to test the industry type and information security risk-level relationship of the selected business. Test results indicated that there is a significant predictive relationship between industry type and risk-level rates among United States businesses. Moreover, the one-sample t-test results indicated that United States businesses classified as a particular industry type are more likely to have a higher information security risk-level than the midpoint level of United States businesses.","downloadable_attachments":[{"id":38121161,"asset_id":13755842,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1540422,"first_name":"Dr. Robert","last_name":"Davis","domain_name":"waldenu","page_name":"RobertEDavis","display_name":"Dr. Robert E Davis","profile_url":"https://waldenu.academia.edu/RobertEDavis?f_ri=1283","photo":"https://0.academia-photos.com/1540422/544542/12889384/s65_robert_e..davis.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=1283","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=1283"},{"id":11847,"name":"Quantitative Research","url":"https://www.academia.edu/Documents/in/Quantitative_Research?f_ri=1283"},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=1283"},{"id":12620,"name":"Quantitative Methods","url":"https://www.academia.edu/Documents/in/Quantitative_Methods?f_ri=1283"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_68055896" data-work_id="68055896" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/68055896/A_Review_of_Self_healing_Concrete_Research_Development">A Review of Self-healing Concrete Research Development</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Self-healing concretes are being widely recognized as a remedial technique to improve the durability o f concrete. Although, few review papers on self-healing concret e were published, a strong review on all aspects of self-healing... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_68055896" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Self-healing concretes are being widely recognized as a remedial technique to improve the durability o f concrete. Although, few review papers on self-healing concret e were published, a strong review on all aspects of self-healing concrete cannot be found. In this paper, natural, chemical a nd biological processes of self-healing concrete te chnologies were completely reviewed. The main focus of the study is for the biological processes. The review presents a new insight into the research for the treatment of unexpected cracking o f concrete. The information presented in this paper can be considered significant for biotechnologists and bioprocess eng ineers to have comprehensive updates on the current status-quo of self- healing concrete.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/68055896" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="14317808" href="https://independent.academia.edu/RAndalib">Dr. Ramin Andalib</a><script data-card-contents-for-user="14317808" type="text/json">{"id":14317808,"first_name":"Dr. Ramin","last_name":"Andalib","domain_name":"independent","page_name":"RAndalib","display_name":"Dr. Ramin Andalib","profile_url":"https://independent.academia.edu/RAndalib?f_ri=1283","photo":"https://0.academia-photos.com/14317808/5801806/19847358/s65_ramin.andalib.jpg"}</script></span></span></li><li class="js-paper-rank-work_68055896 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="68055896"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 68055896, container: ".js-paper-rank-work_68055896", }); });</script></li><li class="js-percentile-work_68055896 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 68055896; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_68055896"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_68055896 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="68055896"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 68055896; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=68055896]").text(description); $(".js-view-count-work_68055896").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_68055896").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="68055896"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="48" href="https://www.academia.edu/Documents/in/Engineering">Engineering</a>, <script data-card-contents-for-ri="48" type="text/json">{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="73" href="https://www.academia.edu/Documents/in/Civil_Engineering">Civil Engineering</a>, <script data-card-contents-for-ri="73" type="text/json">{"id":73,"name":"Civil Engineering","url":"https://www.academia.edu/Documents/in/Civil_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3804" href="https://www.academia.edu/Documents/in/Concrete">Concrete</a><script data-card-contents-for-ri="3804" type="text/json">{"id":3804,"name":"Concrete","url":"https://www.academia.edu/Documents/in/Concrete?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=68055896]'), work: {"id":68055896,"title":"A Review of Self-healing Concrete Research Development","created_at":"2022-01-14T00:00:31.258-08:00","url":"https://www.academia.edu/68055896/A_Review_of_Self_healing_Concrete_Research_Development?f_ri=1283","dom_id":"work_68055896","summary":"Self-healing concretes are being widely recognized as a remedial technique to improve the durability o f concrete. Although, few review papers on self-healing concret e were published, a strong review on all aspects of self-healing concrete cannot be found. In this paper, natural, chemical a nd biological processes of self-healing concrete te chnologies were completely reviewed. The main focus of the study is for the biological processes. The review presents a new insight into the research for the treatment of unexpected cracking o f concrete. The information presented in this paper can be considered significant for biotechnologists and bioprocess eng ineers to have comprehensive updates on the current status-quo of self- healing concrete.","downloadable_attachments":[],"ordered_authors":[{"id":14317808,"first_name":"Dr. Ramin","last_name":"Andalib","domain_name":"independent","page_name":"RAndalib","display_name":"Dr. Ramin Andalib","profile_url":"https://independent.academia.edu/RAndalib?f_ri=1283","photo":"https://0.academia-photos.com/14317808/5801806/19847358/s65_ramin.andalib.jpg"}],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering?f_ri=1283","nofollow":false},{"id":73,"name":"Civil Engineering","url":"https://www.academia.edu/Documents/in/Civil_Engineering?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":3804,"name":"Concrete","url":"https://www.academia.edu/Documents/in/Concrete?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283"},{"id":14978,"name":"Concrete Technology","url":"https://www.academia.edu/Documents/in/Concrete_Technology?f_ri=1283"},{"id":435561,"name":"Self Healing","url":"https://www.academia.edu/Documents/in/Self_Healing?f_ri=1283"},{"id":536266,"name":"Self Healing Concrete","url":"https://www.academia.edu/Documents/in/Self_Healing_Concrete?f_ri=1283"},{"id":622078,"name":"Self Healing Materials","url":"https://www.academia.edu/Documents/in/Self_Healing_Materials?f_ri=1283"},{"id":1463689,"name":"Biological Self-healing Concrete","url":"https://www.academia.edu/Documents/in/Biological_Self-healing_Concrete?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35996988" data-work_id="35996988" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35996988/Global_Information_Assurance_Certification_Paper">Global Information Assurance Certification Paper</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35996988" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ae75a22eb094f09b4f82a44605359fed" rel="nofollow" data-download="{"attachment_id":55882877,"asset_id":35996988,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55882877/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="77183752" href="https://independent.academia.edu/karthikaV3">karthika V</a><script data-card-contents-for-user="77183752" type="text/json">{"id":77183752,"first_name":"karthika","last_name":"V","domain_name":"independent","page_name":"karthikaV3","display_name":"karthika V","profile_url":"https://independent.academia.edu/karthikaV3?f_ri=1283","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_35996988 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35996988"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35996988, container: ".js-paper-rank-work_35996988", }); });</script></li><li class="js-percentile-work_35996988 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35996988; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35996988"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35996988 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35996988"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35996988; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35996988]").text(description); $(".js-view-count-work_35996988").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35996988").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35996988"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1380" href="https://www.academia.edu/Documents/in/Computer_Engineering">Computer Engineering</a>, <script data-card-contents-for-ri="1380" type="text/json">{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4252" href="https://www.academia.edu/Documents/in/Computer_Networks">Computer Networks</a><script data-card-contents-for-ri="4252" type="text/json">{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35996988]'), work: {"id":35996988,"title":"Global Information Assurance Certification Paper","created_at":"2018-02-23T10:33:54.454-08:00","url":"https://www.academia.edu/35996988/Global_Information_Assurance_Certification_Paper?f_ri=1283","dom_id":"work_35996988","summary":null,"downloadable_attachments":[{"id":55882877,"asset_id":35996988,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":77183752,"first_name":"karthika","last_name":"V","domain_name":"independent","page_name":"karthikaV3","display_name":"karthika V","profile_url":"https://independent.academia.edu/karthikaV3?f_ri=1283","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283","nofollow":false},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_44770632" data-work_id="44770632" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/44770632/Rapport_danalyse_de_s%C3%A9curit%C3%A9_Migration_des_syst%C3%A8mes_de_gestion_de_production_usines_SCADA_PLC_vers_une_solution_Moderne_et_infonuagique">Rapport d'analyse de sécurité -Migration des systèmes de gestion de production (usines) (SCADA PLC) vers une solution Moderne et infonuagique</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">La présente analyse a pour but d'établir le niveau de risque que représente l'utilisation système de gestion de production SCADA dans l'ABC Energie Portée (scope) : La portée de cette analyse est sur le système de gestion de production... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_44770632" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">La présente analyse a pour but d'établir le niveau de risque que représente l'utilisation système de gestion de production SCADA dans l'ABC Energie Portée (scope) : La portée de cette analyse est sur le système de gestion de production (usines) (SCADA PLC) traditionnelle dans l'ABC Energie à Montréal .l'analyse se porte sur l'utilisation de (SCADA PLC), capteurs et actionneurs, RTU.PLC, protocole de communication, les serveurs de SCADA, les applications SCADA, les clients SCADA, l'accès physique aux salle de serveurs et salle de contrôle Hors portée (out of scope): La configuration de (SCADA PLC et les applications qui a une relation avec le SCADA et leur code de sources), les outils de développement tous qui es mécanique est ne font pas partie de cette analyse de risque. Classification des informations : Dans le monde industriel, les critères liés à la sûreté de fonctionnement (disponibilité et intégrité en premier lieu) sont prioritaires par rapport aux critères de confidentialité ou de traçabilité. Mais Le stockage de données Quelle que soit la nature peut être à relativiser en fonction des processus métiers concernés et des obligations règlementaires, Des clients et des fournisseurs de service ainsi que des informations financières, des plans d'acquisition, des documents légaux et médicaux et des recettes à propriété intellectuelle, les automates les le code source et les licences. La classification des informations contenues dans les médias de sauvegarde est « Confidentielle ». Niveau de Criticité du système : Critique, période d'intolérance immédiat. Sommaire Exécutif : Il est reconnu dans l'industrie qu'une grande quantité d'incidents majeurs de sécurité informatique se sont produits dans des environnements ayant moins de surveillance telle que les logiciels de gestion. L'analyse de cet exercice nous porte à croire que le niveau de risque que représentent les le système de gestion de production SCADA chez ABC Energie est considéré élevé en raison des anomalies suivantes qui ont été observées :</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/44770632" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="0b6d42323be8fdd3246128a9cae95f18" rel="nofollow" data-download="{"attachment_id":65261076,"asset_id":44770632,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/65261076/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="13250380" href="https://polymtl.academia.edu/NouadraMohamed">Nouadra Mohamed</a><script data-card-contents-for-user="13250380" type="text/json">{"id":13250380,"first_name":"Nouadra","last_name":"Mohamed","domain_name":"polymtl","page_name":"NouadraMohamed","display_name":"Nouadra Mohamed","profile_url":"https://polymtl.academia.edu/NouadraMohamed?f_ri=1283","photo":"https://0.academia-photos.com/13250380/3863764/4519923/s65_nouadra.mohamed.jpg"}</script></span></span></li><li class="js-paper-rank-work_44770632 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="44770632"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 44770632, container: ".js-paper-rank-work_44770632", }); });</script></li><li class="js-percentile-work_44770632 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44770632; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_44770632"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_44770632 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="44770632"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44770632; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44770632]").text(description); $(".js-view-count-work_44770632").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_44770632").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="44770632"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a>, <script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="91972" href="https://www.academia.edu/Documents/in/SCADA">SCADA</a>, <script data-card-contents-for-ri="91972" type="text/json">{"id":91972,"name":"SCADA","url":"https://www.academia.edu/Documents/in/SCADA?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="401111" href="https://www.academia.edu/Documents/in/Securite_informatique">Sécurité informatique</a><script data-card-contents-for-ri="401111" type="text/json">{"id":401111,"name":"Sécurité informatique","url":"https://www.academia.edu/Documents/in/Securite_informatique?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=44770632]'), work: {"id":44770632,"title":"Rapport d'analyse de sécurité -Migration des systèmes de gestion de production (usines) (SCADA PLC) vers une solution Moderne et infonuagique","created_at":"2020-12-24T18:09:34.078-08:00","url":"https://www.academia.edu/44770632/Rapport_danalyse_de_s%C3%A9curit%C3%A9_Migration_des_syst%C3%A8mes_de_gestion_de_production_usines_SCADA_PLC_vers_une_solution_Moderne_et_infonuagique?f_ri=1283","dom_id":"work_44770632","summary":"La présente analyse a pour but d'établir le niveau de risque que représente l'utilisation système de gestion de production SCADA dans l'ABC Energie Portée (scope) : La portée de cette analyse est sur le système de gestion de production (usines) (SCADA PLC) traditionnelle dans l'ABC Energie à Montréal .l'analyse se porte sur l'utilisation de (SCADA PLC), capteurs et actionneurs, RTU.PLC, protocole de communication, les serveurs de SCADA, les applications SCADA, les clients SCADA, l'accès physique aux salle de serveurs et salle de contrôle Hors portée (out of scope): La configuration de (SCADA PLC et les applications qui a une relation avec le SCADA et leur code de sources), les outils de développement tous qui es mécanique est ne font pas partie de cette analyse de risque. Classification des informations : Dans le monde industriel, les critères liés à la sûreté de fonctionnement (disponibilité et intégrité en premier lieu) sont prioritaires par rapport aux critères de confidentialité ou de traçabilité. Mais Le stockage de données Quelle que soit la nature peut être à relativiser en fonction des processus métiers concernés et des obligations règlementaires, Des clients et des fournisseurs de service ainsi que des informations financières, des plans d'acquisition, des documents légaux et médicaux et des recettes à propriété intellectuelle, les automates les le code source et les licences. La classification des informations contenues dans les médias de sauvegarde est « Confidentielle ». Niveau de Criticité du système : Critique, période d'intolérance immédiat. Sommaire Exécutif : Il est reconnu dans l'industrie qu'une grande quantité d'incidents majeurs de sécurité informatique se sont produits dans des environnements ayant moins de surveillance telle que les logiciels de gestion. L'analyse de cet exercice nous porte à croire que le niveau de risque que représentent les le système de gestion de production SCADA chez ABC Energie est considéré élevé en raison des anomalies suivantes qui ont été observées :","downloadable_attachments":[{"id":65261076,"asset_id":44770632,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":13250380,"first_name":"Nouadra","last_name":"Mohamed","domain_name":"polymtl","page_name":"NouadraMohamed","display_name":"Nouadra Mohamed","profile_url":"https://polymtl.academia.edu/NouadraMohamed?f_ri=1283","photo":"https://0.academia-photos.com/13250380/3863764/4519923/s65_nouadra.mohamed.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":91972,"name":"SCADA","url":"https://www.academia.edu/Documents/in/SCADA?f_ri=1283","nofollow":false},{"id":401111,"name":"Sécurité informatique","url":"https://www.academia.edu/Documents/in/Securite_informatique?f_ri=1283","nofollow":false},{"id":476665,"name":"Scada Security","url":"https://www.academia.edu/Documents/in/Scada_Security?f_ri=1283"},{"id":2165140,"name":"Sécurité Industrielle","url":"https://www.academia.edu/Documents/in/S%C3%A9curit%C3%A9_Industrielle?f_ri=1283"},{"id":3832035,"name":"analyse de securite","url":"https://www.academia.edu/Documents/in/analyse_de_securite?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_13719181" data-work_id="13719181" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/13719181/Cyber_Crime_in_the_Society_Problems_and_Preventions">Cyber Crime in the Society: Problems and Preventions</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/13719181" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="bb7b1801b2ba16fedef426eda89222b4" rel="nofollow" data-download="{"attachment_id":38110491,"asset_id":13719181,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38110491/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="32846560" href="https://independent.academia.edu/%D0%AE%D0%BB%D0%B8%D0%B0%D0%BD%D0%B0%D0%93%D1%80%D0%B0%D0%B4%D0%BE%D0%B2%D0%B0">Юлиана Градова</a><script data-card-contents-for-user="32846560" type="text/json">{"id":32846560,"first_name":"Юлиана","last_name":"Градова","domain_name":"independent","page_name":"ЮлианаГрадова","display_name":"Юлиана Градова","profile_url":"https://independent.academia.edu/%D0%AE%D0%BB%D0%B8%D0%B0%D0%BD%D0%B0%D0%93%D1%80%D0%B0%D0%B4%D0%BE%D0%B2%D0%B0?f_ri=1283","photo":"https://0.academia-photos.com/32846560/14552068/15421874/s65__._.jpg"}</script></span></span></li><li class="js-paper-rank-work_13719181 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="13719181"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 13719181, container: ".js-paper-rank-work_13719181", }); });</script></li><li class="js-percentile-work_13719181 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 13719181; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_13719181"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_13719181 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="13719181"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 13719181; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=13719181]").text(description); $(".js-view-count-work_13719181").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_13719181").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="13719181"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="535" href="https://www.academia.edu/Documents/in/Criminal_Law-1">Criminal Law</a>, <script data-card-contents-for-ri="535" type="text/json">{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a>, <script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="20594" href="https://www.academia.edu/Documents/in/Cyber_crime">Cyber crime</a><script data-card-contents-for-ri="20594" type="text/json">{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=13719181]'), work: {"id":13719181,"title":"Cyber Crime in the Society: Problems and Preventions","created_at":"2015-07-06T14:01:17.930-07:00","url":"https://www.academia.edu/13719181/Cyber_Crime_in_the_Society_Problems_and_Preventions?f_ri=1283","dom_id":"work_13719181","summary":null,"downloadable_attachments":[{"id":38110491,"asset_id":13719181,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":32846560,"first_name":"Юлиана","last_name":"Градова","domain_name":"independent","page_name":"ЮлианаГрадова","display_name":"Юлиана Градова","profile_url":"https://independent.academia.edu/%D0%AE%D0%BB%D0%B8%D0%B0%D0%BD%D0%B0%D0%93%D1%80%D0%B0%D0%B4%D0%BE%D0%B2%D0%B0?f_ri=1283","photo":"https://0.academia-photos.com/32846560/14552068/15421874/s65__._.jpg"}],"research_interests":[{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=1283","nofollow":false},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=1283"},{"id":49374,"name":"Hacking","url":"https://www.academia.edu/Documents/in/Hacking?f_ri=1283"},{"id":134568,"name":"Phishing","url":"https://www.academia.edu/Documents/in/Phishing?f_ri=1283"},{"id":954607,"name":"Cyber Squatting","url":"https://www.academia.edu/Documents/in/Cyber_Squatting?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_4721959" data-work_id="4721959" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/4721959/Grey_Hat_Hacking_Reconciling_Law_with_Cyber_Reality">Grey Hat Hacking: Reconciling Law with Cyber Reality</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/4721959" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="36224f8084d97c5691d722ed58eb7950" rel="nofollow" data-download="{"attachment_id":36926435,"asset_id":4721959,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36926435/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5912962" href="https://udenver.academia.edu/CassandraKirsch">Cassandra Kirsch</a><script data-card-contents-for-user="5912962" type="text/json">{"id":5912962,"first_name":"Cassandra","last_name":"Kirsch","domain_name":"udenver","page_name":"CassandraKirsch","display_name":"Cassandra Kirsch","profile_url":"https://udenver.academia.edu/CassandraKirsch?f_ri=1283","photo":"https://0.academia-photos.com/5912962/2543057/2983348/s65_cassandra.kirsch.png"}</script></span></span></li><li class="js-paper-rank-work_4721959 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="4721959"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 4721959, container: ".js-paper-rank-work_4721959", }); });</script></li><li class="js-percentile-work_4721959 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4721959; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_4721959"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_4721959 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="4721959"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4721959; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4721959]").text(description); $(".js-view-count-work_4721959").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_4721959").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="4721959"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7074" href="https://www.academia.edu/Documents/in/Internet_Law">Internet Law</a>, <script data-card-contents-for-ri="7074" type="text/json">{"id":7074,"name":"Internet Law","url":"https://www.academia.edu/Documents/in/Internet_Law?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="23506" href="https://www.academia.edu/Documents/in/Information_Security_and_Privacy">Information Security and Privacy</a>, <script data-card-contents-for-ri="23506" type="text/json">{"id":23506,"name":"Information Security and Privacy","url":"https://www.academia.edu/Documents/in/Information_Security_and_Privacy?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="27557" href="https://www.academia.edu/Documents/in/Privacy_Law_">Privacy (Law)</a><script data-card-contents-for-ri="27557" type="text/json">{"id":27557,"name":"Privacy (Law)","url":"https://www.academia.edu/Documents/in/Privacy_Law_?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=4721959]'), work: {"id":4721959,"title":"Grey Hat Hacking: Reconciling Law with Cyber Reality","created_at":"2013-10-09T01:19:24.436-07:00","url":"https://www.academia.edu/4721959/Grey_Hat_Hacking_Reconciling_Law_with_Cyber_Reality?f_ri=1283","dom_id":"work_4721959","summary":null,"downloadable_attachments":[{"id":36926435,"asset_id":4721959,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5912962,"first_name":"Cassandra","last_name":"Kirsch","domain_name":"udenver","page_name":"CassandraKirsch","display_name":"Cassandra Kirsch","profile_url":"https://udenver.academia.edu/CassandraKirsch?f_ri=1283","photo":"https://0.academia-photos.com/5912962/2543057/2983348/s65_cassandra.kirsch.png"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":7074,"name":"Internet Law","url":"https://www.academia.edu/Documents/in/Internet_Law?f_ri=1283","nofollow":false},{"id":23506,"name":"Information Security and Privacy","url":"https://www.academia.edu/Documents/in/Information_Security_and_Privacy?f_ri=1283","nofollow":false},{"id":27557,"name":"Privacy (Law)","url":"https://www.academia.edu/Documents/in/Privacy_Law_?f_ri=1283","nofollow":false},{"id":56050,"name":"Ethical Hacking","url":"https://www.academia.edu/Documents/in/Ethical_Hacking?f_ri=1283"},{"id":92007,"name":"Privacy and data protection","url":"https://www.academia.edu/Documents/in/Privacy_and_data_protection?f_ri=1283"},{"id":344244,"name":"Computer Law","url":"https://www.academia.edu/Documents/in/Computer_Law?f_ri=1283"},{"id":574265,"name":"Hacker Culture","url":"https://www.academia.edu/Documents/in/Hacker_Culture?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_6134860" data-work_id="6134860" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/6134860/The_IT_Governance_Institute">The IT Governance Institute</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/6134860" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d25ff3ddede77907f0357a8bc7693b74" rel="nofollow" data-download="{"attachment_id":33033253,"asset_id":6134860,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/33033253/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="9304457" href="https://telkomuniversity.academia.edu/MtegarPamungkas">Mtegar Pamungkas</a><script data-card-contents-for-user="9304457" type="text/json">{"id":9304457,"first_name":"Mtegar","last_name":"Pamungkas","domain_name":"telkomuniversity","page_name":"MtegarPamungkas","display_name":"Mtegar Pamungkas","profile_url":"https://telkomuniversity.academia.edu/MtegarPamungkas?f_ri=1283","photo":"https://gravatar.com/avatar/2889763ed82fc0bc7ca422ba6f2b936a?s=65"}</script></span></span></li><li class="js-paper-rank-work_6134860 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="6134860"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 6134860, container: ".js-paper-rank-work_6134860", }); });</script></li><li class="js-percentile-work_6134860 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 6134860; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_6134860"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_6134860 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="6134860"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 6134860; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=6134860]").text(description); $(".js-view-count-work_6134860").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_6134860").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="6134860"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">2</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=6134860]'), work: {"id":6134860,"title":"The IT Governance Institute","created_at":"2014-02-19T05:29:35.742-08:00","url":"https://www.academia.edu/6134860/The_IT_Governance_Institute?f_ri=1283","dom_id":"work_6134860","summary":null,"downloadable_attachments":[{"id":33033253,"asset_id":6134860,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":9304457,"first_name":"Mtegar","last_name":"Pamungkas","domain_name":"telkomuniversity","page_name":"MtegarPamungkas","display_name":"Mtegar Pamungkas","profile_url":"https://telkomuniversity.academia.edu/MtegarPamungkas?f_ri=1283","photo":"https://gravatar.com/avatar/2889763ed82fc0bc7ca422ba6f2b936a?s=65"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34520721" data-work_id="34520721" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34520721/Lead_Auditor_ISO_27001_Program">Lead Auditor ISO 27001 Program</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">ISO is one of the principal publishers of standards in the world with superior than 21000 , covering almost every industry, from technology, to foodstuff safety, to farming and healthcare.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34520721" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7603c2352aa06b25e60ae673836dad95" rel="nofollow" data-download="{"attachment_id":54385922,"asset_id":34520721,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54385922/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="68061709" href="https://independent.academia.edu/AInnovationGroup">Advance Innovation Group</a><script data-card-contents-for-user="68061709" type="text/json">{"id":68061709,"first_name":"Advance","last_name":"Innovation Group","domain_name":"independent","page_name":"AInnovationGroup","display_name":"Advance Innovation Group","profile_url":"https://independent.academia.edu/AInnovationGroup?f_ri=1283","photo":"https://0.academia-photos.com/68061709/17683597/17724810/s65_advance.innovation_group.jpg"}</script></span></span></li><li class="js-paper-rank-work_34520721 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34520721"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34520721, container: ".js-paper-rank-work_34520721", }); });</script></li><li class="js-percentile-work_34520721 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34520721; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34520721"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34520721 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34520721"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34520721; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34520721]").text(description); $(".js-view-count-work_34520721").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34520721").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34520721"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9377" href="https://www.academia.edu/Documents/in/Training">Training</a>, <script data-card-contents-for-ri="9377" type="text/json">{"id":9377,"name":"Training","url":"https://www.academia.edu/Documents/in/Training?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a>, <script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="43838" href="https://www.academia.edu/Documents/in/India">India</a><script data-card-contents-for-ri="43838" type="text/json">{"id":43838,"name":"India","url":"https://www.academia.edu/Documents/in/India?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34520721]'), work: {"id":34520721,"title":"Lead Auditor ISO 27001 Program","created_at":"2017-09-09T06:52:02.490-07:00","url":"https://www.academia.edu/34520721/Lead_Auditor_ISO_27001_Program?f_ri=1283","dom_id":"work_34520721","summary":"ISO is one of the principal publishers of standards in the world with superior than 21000 , covering almost every industry, from technology, to foodstuff safety, to farming and healthcare. ","downloadable_attachments":[{"id":54385922,"asset_id":34520721,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":68061709,"first_name":"Advance","last_name":"Innovation Group","domain_name":"independent","page_name":"AInnovationGroup","display_name":"Advance Innovation Group","profile_url":"https://independent.academia.edu/AInnovationGroup?f_ri=1283","photo":"https://0.academia-photos.com/68061709/17683597/17724810/s65_advance.innovation_group.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":9377,"name":"Training","url":"https://www.academia.edu/Documents/in/Training?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":43838,"name":"India","url":"https://www.academia.edu/Documents/in/India?f_ri=1283","nofollow":false},{"id":94916,"name":"Indology","url":"https://www.academia.edu/Documents/in/Indology?f_ri=1283"},{"id":266422,"name":"Business Consulting","url":"https://www.academia.edu/Documents/in/Business_Consulting?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_22326938" data-work_id="22326938" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/22326938/Aligning_the_information_security_policy_with_the_strategic_information_systems_plan">Aligning the information security policy with the strategic information systems plan</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/22326938" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d014ae78e4800e9bd2c98d9f771ef477" rel="nofollow" data-download="{"attachment_id":42963115,"asset_id":22326938,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/42963115/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="67796" href="https://lboro.academia.edu/NeilDoherty">Neil Doherty</a><script data-card-contents-for-user="67796" type="text/json">{"id":67796,"first_name":"Neil","last_name":"Doherty","domain_name":"lboro","page_name":"NeilDoherty","display_name":"Neil Doherty","profile_url":"https://lboro.academia.edu/NeilDoherty?f_ri=1283","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_22326938 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="22326938"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 22326938, container: ".js-paper-rank-work_22326938", }); });</script></li><li class="js-percentile-work_22326938 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 22326938; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_22326938"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_22326938 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="22326938"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 22326938; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=22326938]").text(description); $(".js-view-count-work_22326938").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_22326938").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="22326938"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1164759" href="https://www.academia.edu/Documents/in/Computers_Security">Computers Security</a>, <script data-card-contents-for-ri="1164759" type="text/json">{"id":1164759,"name":"Computers Security","url":"https://www.academia.edu/Documents/in/Computers_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2213585" href="https://www.academia.edu/Documents/in/Information_System">Information System</a><script data-card-contents-for-ri="2213585" type="text/json">{"id":2213585,"name":"Information System","url":"https://www.academia.edu/Documents/in/Information_System?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=22326938]'), work: {"id":22326938,"title":"Aligning the information security policy with the strategic information systems plan","created_at":"2016-02-23T00:07:49.103-08:00","url":"https://www.academia.edu/22326938/Aligning_the_information_security_policy_with_the_strategic_information_systems_plan?f_ri=1283","dom_id":"work_22326938","summary":null,"downloadable_attachments":[{"id":42963115,"asset_id":22326938,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":67796,"first_name":"Neil","last_name":"Doherty","domain_name":"lboro","page_name":"NeilDoherty","display_name":"Neil Doherty","profile_url":"https://lboro.academia.edu/NeilDoherty?f_ri=1283","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1164759,"name":"Computers Security","url":"https://www.academia.edu/Documents/in/Computers_Security?f_ri=1283","nofollow":false},{"id":2213585,"name":"Information System","url":"https://www.academia.edu/Documents/in/Information_System?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_26365341 coauthored" data-work_id="26365341" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/26365341/_2_2_Full_Book_Information_Security_and_Audit_">~2.2~ Full Book- "Information Security and Audit"</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This book (ISA) is for computer science,computer application, computer engineers, and others who want to be able to have good knowledge about Information Security & Auditing by learning what is going on ―under the Information Security... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_26365341" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This book (ISA) is for computer science,computer application, computer engineers, and others who want to be able to have good knowledge about Information Security & Auditing by learning what is going on ―under the Information Security Domain. Our aim is to explain the enduring concepts underlying all computer systems, and to show you the concrete ways that these ideas affect the correctness, performance, and utility of your networking concepts. This book is written from a fundamental and advance Network concept perspective. Of course, learning what a system is supposed to do provide a good first step in learning how to build one, and so this book also serves as a valuable introduction to those who go on to implement information system security. If you study and learn the concepts in this book, you will be on your way to becoming the rare ―power knowledgeable‖ who knows how things work. Our aim is to present the fundamental and advance concepts in ways that you will find useful right away. You will also be prepared to delve deeper, studying security frameworks such as COBIT, ITIL and ISO/IEC 27001.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/26365341" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4ac1d7867d32d4ce50d7a33c1e3a20a6" rel="nofollow" data-download="{"attachment_id":46671661,"asset_id":26365341,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46671661/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4599491" href="https://b-u.academia.edu/YogeshGhorpade">Dr. Yogesh M Ghorpade</a><script data-card-contents-for-user="4599491" type="text/json">{"id":4599491,"first_name":"Dr. Yogesh","last_name":"Ghorpade","domain_name":"b-u","page_name":"YogeshGhorpade","display_name":"Dr. Yogesh M Ghorpade","profile_url":"https://b-u.academia.edu/YogeshGhorpade?f_ri=1283","photo":"https://0.academia-photos.com/4599491/11084723/34752075/s65_yogesh.ghorpade.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-26365341">+1</span><div class="hidden js-additional-users-26365341"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/RajeshMore38">Rajesh More</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-26365341'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-26365341').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_26365341 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="26365341"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 26365341, container: ".js-paper-rank-work_26365341", }); });</script></li><li class="js-percentile-work_26365341 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 26365341; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_26365341"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_26365341 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="26365341"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 26365341; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=26365341]").text(description); $(".js-view-count-work_26365341").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_26365341").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="26365341"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9305" href="https://www.academia.edu/Documents/in/Auditing">Auditing</a>, <script data-card-contents-for-ri="9305" type="text/json">{"id":9305,"name":"Auditing","url":"https://www.academia.edu/Documents/in/Auditing?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1660708" href="https://www.academia.edu/Documents/in/Information_Security_Audits">Information Security Audits</a><script data-card-contents-for-ri="1660708" type="text/json">{"id":1660708,"name":"Information Security Audits","url":"https://www.academia.edu/Documents/in/Information_Security_Audits?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=26365341]'), work: {"id":26365341,"title":"~2.2~ Full Book- \"Information Security and Audit\"","created_at":"2016-06-21T04:38:03.823-07:00","url":"https://www.academia.edu/26365341/_2_2_Full_Book_Information_Security_and_Audit_?f_ri=1283","dom_id":"work_26365341","summary":"This book (ISA) is for computer science,computer application, computer engineers, and others who want to be able to have good knowledge about Information Security \u0026 Auditing by learning what is going on ―under the Information Security Domain. Our aim is to explain the enduring concepts underlying all computer systems, and to show you the concrete ways that these ideas affect the correctness, performance, and utility of your networking concepts. This book is written from a fundamental and advance Network concept perspective. Of course, learning what a system is supposed to do provide a good first step in learning how to build one, and so this book also serves as a valuable introduction to those who go on to implement information system security. If you study and learn the concepts in this book, you will be on your way to becoming the rare ―power knowledgeable‖ who knows how things work. Our aim is to present the fundamental and advance concepts in ways that you will find useful right away. You will also be prepared to delve deeper, studying security frameworks such as COBIT, ITIL and ISO/IEC 27001.","downloadable_attachments":[{"id":46671661,"asset_id":26365341,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":4599491,"first_name":"Dr. Yogesh","last_name":"Ghorpade","domain_name":"b-u","page_name":"YogeshGhorpade","display_name":"Dr. Yogesh M Ghorpade","profile_url":"https://b-u.academia.edu/YogeshGhorpade?f_ri=1283","photo":"https://0.academia-photos.com/4599491/11084723/34752075/s65_yogesh.ghorpade.jpg"},{"id":313190211,"first_name":"Rajesh","last_name":"More","domain_name":"independent","page_name":"RajeshMore38","display_name":"Rajesh More","profile_url":"https://independent.academia.edu/RajeshMore38?f_ri=1283","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":9305,"name":"Auditing","url":"https://www.academia.edu/Documents/in/Auditing?f_ri=1283","nofollow":false},{"id":1660708,"name":"Information Security Audits","url":"https://www.academia.edu/Documents/in/Information_Security_Audits?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_40557308" data-work_id="40557308" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/40557308/iPredator_Dark_Side_of_Cyberspace_Concept">iPredator - Dark Side of Cyberspace Concept</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">"iPredator - Dark Side of Cyberspace Concept" (Edited & Revised 2019) is the updated version to Dr. Nuccitelli's original 2010 concept. iPredator remains an online assailant concept and explores why some online users become targets.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/40557308" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b2e9d86152a2868315748e6fd9eba944" rel="nofollow" data-download="{"attachment_id":68508329,"asset_id":40557308,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/68508329/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="970893" href="https://independent.academia.edu/MichaelNuccitelliPsyD">Michael Nuccitelli, Psy.D.</a><script data-card-contents-for-user="970893" type="text/json">{"id":970893,"first_name":"Michael","last_name":"Nuccitelli, Psy.D.","domain_name":"independent","page_name":"MichaelNuccitelliPsyD","display_name":"Michael Nuccitelli, Psy.D.","profile_url":"https://independent.academia.edu/MichaelNuccitelliPsyD?f_ri=1283","photo":"https://0.academia-photos.com/970893/366884/15961793/s65_michael.nuccitelli_psy.d..png"}</script></span></span></li><li class="js-paper-rank-work_40557308 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="40557308"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 40557308, container: ".js-paper-rank-work_40557308", }); });</script></li><li class="js-percentile-work_40557308 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40557308; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_40557308"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_40557308 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="40557308"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40557308; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40557308]").text(description); $(".js-view-count-work_40557308").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_40557308").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="40557308"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">20</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="189" href="https://www.academia.edu/Documents/in/Criminology">Criminology</a>, <script data-card-contents-for-ri="189" type="text/json">{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>, <script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="539" href="https://www.academia.edu/Documents/in/Forensics">Forensics</a>, <script data-card-contents-for-ri="539" type="text/json">{"id":539,"name":"Forensics","url":"https://www.academia.edu/Documents/in/Forensics?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a><script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=40557308]'), work: {"id":40557308,"title":"iPredator - Dark Side of Cyberspace Concept","created_at":"2019-10-08T06:08:03.816-07:00","url":"https://www.academia.edu/40557308/iPredator_Dark_Side_of_Cyberspace_Concept?f_ri=1283","dom_id":"work_40557308","summary":"\"iPredator - Dark Side of Cyberspace Concept\" (Edited \u0026 Revised 2019) is the updated version to Dr. Nuccitelli's original 2010 concept. iPredator remains an online assailant concept and explores why some online users become targets. ","downloadable_attachments":[{"id":68508329,"asset_id":40557308,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":970893,"first_name":"Michael","last_name":"Nuccitelli, Psy.D.","domain_name":"independent","page_name":"MichaelNuccitelliPsyD","display_name":"Michael Nuccitelli, Psy.D.","profile_url":"https://independent.academia.edu/MichaelNuccitelliPsyD?f_ri=1283","photo":"https://0.academia-photos.com/970893/366884/15961793/s65_michael.nuccitelli_psy.d..png"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=1283","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1283","nofollow":false},{"id":539,"name":"Forensics","url":"https://www.academia.edu/Documents/in/Forensics?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1284,"name":"Computer Forensics","url":"https://www.academia.edu/Documents/in/Computer_Forensics?f_ri=1283"},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1283"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1283"},{"id":4545,"name":"Parenting","url":"https://www.academia.edu/Documents/in/Parenting?f_ri=1283"},{"id":9135,"name":"The Internet of Things","url":"https://www.academia.edu/Documents/in/The_Internet_of_Things?f_ri=1283"},{"id":11470,"name":"Cyberculture","url":"https://www.academia.edu/Documents/in/Cyberculture?f_ri=1283"},{"id":12756,"name":"Cyberbullying","url":"https://www.academia.edu/Documents/in/Cyberbullying?f_ri=1283"},{"id":16416,"name":"Internet \u0026 Society","url":"https://www.academia.edu/Documents/in/Internet_and_Society?f_ri=1283"},{"id":50160,"name":"Digital Forensics","url":"https://www.academia.edu/Documents/in/Digital_Forensics?f_ri=1283"},{"id":59533,"name":"Internet Addiction","url":"https://www.academia.edu/Documents/in/Internet_Addiction?f_ri=1283"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283"},{"id":247799,"name":"Internet of Things (IoT)","url":"https://www.academia.edu/Documents/in/Internet_of_Things_IoT_?f_ri=1283"},{"id":423158,"name":"Cyberstalking","url":"https://www.academia.edu/Documents/in/Cyberstalking?f_ri=1283"},{"id":440813,"name":"Infosec","url":"https://www.academia.edu/Documents/in/Infosec?f_ri=1283"},{"id":467668,"name":"Cyberterrorism","url":"https://www.academia.edu/Documents/in/Cyberterrorism?f_ri=1283"},{"id":966926,"name":"Ipredator","url":"https://www.academia.edu/Documents/in/Ipredator?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_41723524" data-work_id="41723524" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/41723524/Trends_in_Managing_Information_Technology_in_2020">Trends in Managing Information Technology in 2020</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT)... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_41723524" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/41723524" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="925ceb3297d0cef0d542f69bd9a0345d" rel="nofollow" data-download="{"attachment_id":61882138,"asset_id":41723524,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/61882138/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="22858478" href="https://independent.academia.edu/IjmitjournalJournal">International Journal of Managing Information Technology (IJMIT)</a><script data-card-contents-for-user="22858478" type="text/json">{"id":22858478,"first_name":"International Journal of Managing Information Technology","last_name":"(IJMIT)","domain_name":"independent","page_name":"IjmitjournalJournal","display_name":"International Journal of Managing Information Technology (IJMIT)","profile_url":"https://independent.academia.edu/IjmitjournalJournal?f_ri=1283","photo":"https://0.academia-photos.com/22858478/6206168/132122239/s65_international_journal_of_managing_information_technology._ijmit_.png"}</script></span></span></li><li class="js-paper-rank-work_41723524 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="41723524"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 41723524, container: ".js-paper-rank-work_41723524", }); });</script></li><li class="js-percentile-work_41723524 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 41723524; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_41723524"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_41723524 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="41723524"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 41723524; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=41723524]").text(description); $(".js-view-count-work_41723524").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_41723524").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="41723524"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="47" href="https://www.academia.edu/Documents/in/Finance">Finance</a>, <script data-card-contents-for-ri="47" type="text/json">{"id":47,"name":"Finance","url":"https://www.academia.edu/Documents/in/Finance?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="459" href="https://www.academia.edu/Documents/in/Information_Science">Information Science</a>, <script data-card-contents-for-ri="459" type="text/json">{"id":459,"name":"Information Science","url":"https://www.academia.edu/Documents/in/Information_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="491" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a><script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=41723524]'), work: {"id":41723524,"title":"Trends in Managing Information Technology in 2020","created_at":"2020-01-24T04:35:33.384-08:00","url":"https://www.academia.edu/41723524/Trends_in_Managing_Information_Technology_in_2020?f_ri=1283","dom_id":"work_41723524","summary":"International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas","downloadable_attachments":[{"id":61882138,"asset_id":41723524,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":22858478,"first_name":"International Journal of Managing Information Technology","last_name":"(IJMIT)","domain_name":"independent","page_name":"IjmitjournalJournal","display_name":"International Journal of Managing Information Technology (IJMIT)","profile_url":"https://independent.academia.edu/IjmitjournalJournal?f_ri=1283","photo":"https://0.academia-photos.com/22858478/6206168/132122239/s65_international_journal_of_managing_information_technology._ijmit_.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false},{"id":47,"name":"Finance","url":"https://www.academia.edu/Documents/in/Finance?f_ri=1283","nofollow":false},{"id":459,"name":"Information Science","url":"https://www.academia.edu/Documents/in/Information_Science?f_ri=1283","nofollow":false},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283","nofollow":false},{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=1283"},{"id":984,"name":"Web 2.0","url":"https://www.academia.edu/Documents/in/Web_2.0?f_ri=1283"},{"id":1210,"name":"Informatics","url":"https://www.academia.edu/Documents/in/Informatics?f_ri=1283"},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283"},{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_7277407" data-work_id="7277407" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/7277407/Physical_Security_Historical_perspectives_and_operations">Physical Security: Historical perspectives and operations</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_7277407" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers for security protection because the evolution of human beings has not changed since the beginning of time. Applicable lessons are applied to all aspects of security to include physical, technical, personnel, information and operational security. The article provides examples of the original concept of access controls, vaulted areas, chemical warfare, and the origins of physical security.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/7277407" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="85cc477e679f581dfc671fc597c8bd33" rel="nofollow" data-download="{"attachment_id":33887710,"asset_id":7277407,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/33887710/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2813554" href="https://csus.academia.edu/DrCraigJohnson">Dr. Craig T . Johnson</a><script data-card-contents-for-user="2813554" type="text/json">{"id":2813554,"first_name":"Dr. Craig","last_name":"Johnson","domain_name":"csus","page_name":"DrCraigJohnson","display_name":"Dr. Craig T . Johnson","profile_url":"https://csus.academia.edu/DrCraigJohnson?f_ri=1283","photo":"https://0.academia-photos.com/2813554/918236/1150182/s65_dr._craig_t..johnson.jpg"}</script></span></span></li><li class="js-paper-rank-work_7277407 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="7277407"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 7277407, container: ".js-paper-rank-work_7277407", }); });</script></li><li class="js-percentile-work_7277407 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7277407; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_7277407"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_7277407 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="7277407"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7277407; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7277407]").text(description); $(".js-view-count-work_7277407").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_7277407").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="7277407"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">22</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="491" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4370" href="https://www.academia.edu/Documents/in/Security">Security</a>, <script data-card-contents-for-ri="4370" type="text/json">{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5282" href="https://www.academia.edu/Documents/in/Design_Research">Design Research</a><script data-card-contents-for-ri="5282" type="text/json">{"id":5282,"name":"Design Research","url":"https://www.academia.edu/Documents/in/Design_Research?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=7277407]'), work: {"id":7277407,"title":"Physical Security: Historical perspectives and operations","created_at":"2014-06-06T09:54:53.811-07:00","url":"https://www.academia.edu/7277407/Physical_Security_Historical_perspectives_and_operations?f_ri=1283","dom_id":"work_7277407","summary":"This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers for security protection because the evolution of human beings has not changed since the beginning of time. Applicable lessons are applied to all aspects of security to include physical, technical, personnel, information and operational security. The article provides examples of the original concept of access controls, vaulted areas, chemical warfare, and the origins of physical security. ","downloadable_attachments":[{"id":33887710,"asset_id":7277407,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2813554,"first_name":"Dr. Craig","last_name":"Johnson","domain_name":"csus","page_name":"DrCraigJohnson","display_name":"Dr. Craig T . Johnson","profile_url":"https://csus.academia.edu/DrCraigJohnson?f_ri=1283","photo":"https://0.academia-photos.com/2813554/918236/1150182/s65_dr._craig_t..johnson.jpg"}],"research_interests":[{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=1283","nofollow":false},{"id":5282,"name":"Design Research","url":"https://www.academia.edu/Documents/in/Design_Research?f_ri=1283","nofollow":false},{"id":5380,"name":"Homeland Security","url":"https://www.academia.edu/Documents/in/Homeland_Security?f_ri=1283"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=1283"},{"id":10678,"name":"Human Security","url":"https://www.academia.edu/Documents/in/Human_Security?f_ri=1283"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283"},{"id":21939,"name":"Environmental Security","url":"https://www.academia.edu/Documents/in/Environmental_Security?f_ri=1283"},{"id":38360,"name":"Food Security","url":"https://www.academia.edu/Documents/in/Food_Security?f_ri=1283"},{"id":44778,"name":"Common Security and Defense Policy","url":"https://www.academia.edu/Documents/in/Common_Security_and_Defense_Policy?f_ri=1283"},{"id":57256,"name":"Common Security and Defence Policy","url":"https://www.academia.edu/Documents/in/Common_Security_and_Defence_Policy?f_ri=1283"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=1283"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283"},{"id":127895,"name":"Non-Traditional Security","url":"https://www.academia.edu/Documents/in/Non-Traditional_Security?f_ri=1283"},{"id":188414,"name":"Information Security Management","url":"https://www.academia.edu/Documents/in/Information_Security_Management?f_ri=1283"},{"id":214586,"name":"Physical security","url":"https://www.academia.edu/Documents/in/Physical_security?f_ri=1283"},{"id":215782,"name":"Security and Defence Studies","url":"https://www.academia.edu/Documents/in/Security_and_Defence_Studies?f_ri=1283"},{"id":221987,"name":"Physical layer security","url":"https://www.academia.edu/Documents/in/Physical_layer_security?f_ri=1283"},{"id":556750,"name":"Physical security, risk management, security management","url":"https://www.academia.edu/Documents/in/Physical_security_risk_management_security_management?f_ri=1283"},{"id":876053,"name":"Physical Security Systems","url":"https://www.academia.edu/Documents/in/Physical_Security_Systems?f_ri=1283"},{"id":913309,"name":"Physical Security Technology","url":"https://www.academia.edu/Documents/in/Physical_Security_Technology?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_45153967" data-work_id="45153967" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/45153967/Information_Management_Concepts_of_Information_Governance_Importance_of_Information_Security_with_critical_reflection_of_Proctor_and_Gambles_senior_leadership_in_relation_to_IG_and_IS_strategies">Information Management - Concepts of Information Governance, Importance of Information Security with critical reflection of Proctor and Gamble's senior leadership in relation to IG and IS strategies</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This paper explores the information governance and information security frameworks used in conjunction with a review of the Proctor and Gamble case study about their adoption of information governance and its successful impact on culture... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_45153967" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This paper explores the information governance and information security frameworks used in conjunction with a review of the Proctor and Gamble case study about their adoption of information governance and its successful impact on culture and strategy that demonstrates organic growth. Taking the findings from this and used as a comparison, this paper further explores the conditions at AYS Clinical and how its failure to establish an information security and governance policy has led to challenges in cultural and organisational behaviour where important risks were not identified and eventually became serious issues where the company is now dealing with threats in data breach and whistleblowing. It can clearly be seen that the issues arose from blind spots throughout the company because of its failure to manage the knowledge and wisdom derived from the information collected in addition to not investing a robust IT infrastructure. This further strengthens the case for adopting information governance and information security programs in conjunction with an organisation structure that is aligned with the business strategy and ready for optimisation.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/45153967" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="91947d52bdad5540205768208d5dbea0" rel="nofollow" data-download="{"attachment_id":65729812,"asset_id":45153967,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/65729812/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="181194155" href="https://cumbria.academia.edu/RKalia">Renee Kalia</a><script data-card-contents-for-user="181194155" type="text/json">{"id":181194155,"first_name":"Renee","last_name":"Kalia","domain_name":"cumbria","page_name":"RKalia","display_name":"Renee Kalia","profile_url":"https://cumbria.academia.edu/RKalia?f_ri=1283","photo":"https://0.academia-photos.com/181194155/50352551/38373437/s65_renee.kalia.jpeg"}</script></span></span></li><li class="js-paper-rank-work_45153967 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="45153967"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 45153967, container: ".js-paper-rank-work_45153967", }); });</script></li><li class="js-percentile-work_45153967 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 45153967; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_45153967"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_45153967 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="45153967"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 45153967; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=45153967]").text(description); $(".js-view-count-work_45153967").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_45153967").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="45153967"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1453" href="https://www.academia.edu/Documents/in/Information_Management">Information Management</a>, <script data-card-contents-for-ri="1453" type="text/json">{"id":1453,"name":"Information Management","url":"https://www.academia.edu/Documents/in/Information_Management?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="640766" href="https://www.academia.edu/Documents/in/Information_governance">Information governance</a><script data-card-contents-for-ri="640766" type="text/json">{"id":640766,"name":"Information governance","url":"https://www.academia.edu/Documents/in/Information_governance?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=45153967]'), work: {"id":45153967,"title":"Information Management - Concepts of Information Governance, Importance of Information Security with critical reflection of Proctor and Gamble's senior leadership in relation to IG and IS strategies","created_at":"2021-02-19T07:21:22.652-08:00","url":"https://www.academia.edu/45153967/Information_Management_Concepts_of_Information_Governance_Importance_of_Information_Security_with_critical_reflection_of_Proctor_and_Gambles_senior_leadership_in_relation_to_IG_and_IS_strategies?f_ri=1283","dom_id":"work_45153967","summary":"This paper explores the information governance and information security frameworks used in conjunction with a review of the Proctor and Gamble case study about their adoption of information governance and its successful impact on culture and strategy that demonstrates organic growth. Taking the findings from this and used as a comparison, this paper further explores the conditions at AYS Clinical and how its failure to establish an information security and governance policy has led to challenges in cultural and organisational behaviour where important risks were not identified and eventually became serious issues where the company is now dealing with threats in data breach and whistleblowing. It can clearly be seen that the issues arose from blind spots throughout the company because of its failure to manage the knowledge and wisdom derived from the information collected in addition to not investing a robust IT infrastructure. This further strengthens the case for adopting information governance and information security programs in conjunction with an organisation structure that is aligned with the business strategy and ready for optimisation. ","downloadable_attachments":[{"id":65729812,"asset_id":45153967,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":181194155,"first_name":"Renee","last_name":"Kalia","domain_name":"cumbria","page_name":"RKalia","display_name":"Renee Kalia","profile_url":"https://cumbria.academia.edu/RKalia?f_ri=1283","photo":"https://0.academia-photos.com/181194155/50352551/38373437/s65_renee.kalia.jpeg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1453,"name":"Information Management","url":"https://www.academia.edu/Documents/in/Information_Management?f_ri=1283","nofollow":false},{"id":640766,"name":"Information governance","url":"https://www.academia.edu/Documents/in/Information_governance?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_39255106" data-work_id="39255106" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/39255106/Cybersecurity_and_artificial_intelligence">Cybersecurity and artificial intelligence</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The increasing threats of increasingly complex and frequent attacks make awkward a strong defensive position. Recent serious data breaches, such as those of the US Government Human Resources (OPM) department, have made headlines and the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_39255106" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The increasing threats of increasingly complex and frequent attacks make awkward a strong defensive position. Recent serious data breaches, such as those of the US Government Human Resources (OPM) department, have made headlines and the demand for better security has increased. As a result, today's decision makers demand better protection.<br />In the face of new daily cyber threats, IT experts fear violations and the destruction or manipulation of data. This leads to significantly increased expenditure. According to Gartner's research, the data security market will exceed $ 1, 000, 000, 000.00 by 2019.<br /><br />In this environment, a new technology based on artificial intelligence and machine training emerges that is redefining device protection - and thus, security. <br /><br />With the use of predictive and predictive techniques to detect attacks before they are executed and outside the system architecture, artificial intelligence is much more than just a technical innovation, it is a paradigm shift of philosophy and understanding.<br /><br />Artificial Intelligence (AI) as a subfield of computer science performs cognitive skills such as learning, planning, or problem-solving in computer systems.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/39255106" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="52f2905895922c5a131bc9bb57faedad" rel="nofollow" data-download="{"attachment_id":59387851,"asset_id":39255106,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/59387851/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="13276633" href="https://ual-pt.academia.edu/ArturVictoria">Artur Victoria</a><script data-card-contents-for-user="13276633" type="text/json">{"id":13276633,"first_name":"Artur","last_name":"Victoria","domain_name":"ual-pt","page_name":"ArturVictoria","display_name":"Artur Victoria","profile_url":"https://ual-pt.academia.edu/ArturVictoria?f_ri=1283","photo":"https://0.academia-photos.com/13276633/6698221/31872235/s65_artur.victoria.jpg"}</script></span></span></li><li class="js-paper-rank-work_39255106 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="39255106"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 39255106, container: ".js-paper-rank-work_39255106", }); });</script></li><li class="js-percentile-work_39255106 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 39255106; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_39255106"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_39255106 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="39255106"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 39255106; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=39255106]").text(description); $(".js-view-count-work_39255106").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_39255106").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="39255106"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="465" href="https://www.academia.edu/Documents/in/Artificial_Intelligence">Artificial Intelligence</a>, <script data-card-contents-for-ri="465" type="text/json">{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2511" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a>, <script data-card-contents-for-ri="2511" type="text/json">{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=39255106]'), work: {"id":39255106,"title":"Cybersecurity and artificial intelligence","created_at":"2019-05-25T01:20:10.110-07:00","url":"https://www.academia.edu/39255106/Cybersecurity_and_artificial_intelligence?f_ri=1283","dom_id":"work_39255106","summary":"The increasing threats of increasingly complex and frequent attacks make awkward a strong defensive position. Recent serious data breaches, such as those of the US Government Human Resources (OPM) department, have made headlines and the demand for better security has increased. As a result, today's decision makers demand better protection.\nIn the face of new daily cyber threats, IT experts fear violations and the destruction or manipulation of data. This leads to significantly increased expenditure. According to Gartner's research, the data security market will exceed $ 1, 000, 000, 000.00 by 2019.\n\nIn this environment, a new technology based on artificial intelligence and machine training emerges that is redefining device protection - and thus, security. \n\nWith the use of predictive and predictive techniques to detect attacks before they are executed and outside the system architecture, artificial intelligence is much more than just a technical innovation, it is a paradigm shift of philosophy and understanding.\n\nArtificial Intelligence (AI) as a subfield of computer science performs cognitive skills such as learning, planning, or problem-solving in computer systems.\n","downloadable_attachments":[{"id":59387851,"asset_id":39255106,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":13276633,"first_name":"Artur","last_name":"Victoria","domain_name":"ual-pt","page_name":"ArturVictoria","display_name":"Artur Victoria","profile_url":"https://ual-pt.academia.edu/ArturVictoria?f_ri=1283","photo":"https://0.academia-photos.com/13276633/6698221/31872235/s65_artur.victoria.jpg"}],"research_interests":[{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1283","nofollow":false},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36675498" data-work_id="36675498" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36675498/Full_file_at_https_testbanku_eu_Solution_Manual_for_A_Friendly_Introduction_to_Analysis_2nd_Edition_by_Kosmala">Full file at https://testbanku.eu/Solution-Manual-for-A-Friendly-Introduction-to-Analysis-2nd-Edition-by-Kosmala</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Full file at <a href="https://testbanku" rel="nofollow">https://testbanku</a>. Full file at <a href="https://testbanku.eu/" rel="nofollow">https://testbanku.eu/</a></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36675498" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="2675931b879be89a290ac1b0bd3f9ff6" rel="nofollow" data-download="{"attachment_id":56612304,"asset_id":36675498,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56612304/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="81929514" href="https://independent.academia.edu/YUM76NF0K8P8">YUM76N F0K8P8</a><script data-card-contents-for-user="81929514" type="text/json">{"id":81929514,"first_name":"YUM76N","last_name":"F0K8P8","domain_name":"independent","page_name":"YUM76NF0K8P8","display_name":"YUM76N F0K8P8","profile_url":"https://independent.academia.edu/YUM76NF0K8P8?f_ri=1283","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_36675498 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36675498"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36675498, container: ".js-paper-rank-work_36675498", }); });</script></li><li class="js-percentile-work_36675498 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36675498; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36675498"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36675498 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36675498"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36675498; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36675498]").text(description); $(".js-view-count-work_36675498").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36675498").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36675498"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">15</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="73" href="https://www.academia.edu/Documents/in/Civil_Engineering">Civil Engineering</a>, <script data-card-contents-for-ri="73" type="text/json">{"id":73,"name":"Civil Engineering","url":"https://www.academia.edu/Documents/in/Civil_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="449" href="https://www.academia.edu/Documents/in/Software_Engineering">Software Engineering</a>, <script data-card-contents-for-ri="449" type="text/json">{"id":449,"name":"Software Engineering","url":"https://www.academia.edu/Documents/in/Software_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="586" href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a>, <script data-card-contents-for-ri="586" type="text/json">{"id":586,"name":"Health Sciences","url":"https://www.academia.edu/Documents/in/Health_Sciences?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="802" href="https://www.academia.edu/Documents/in/Political_Economy">Political Economy</a><script data-card-contents-for-ri="802" type="text/json">{"id":802,"name":"Political Economy","url":"https://www.academia.edu/Documents/in/Political_Economy?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36675498]'), work: {"id":36675498,"title":"Full file at https://testbanku.eu/Solution-Manual-for-A-Friendly-Introduction-to-Analysis-2nd-Edition-by-Kosmala","created_at":"2018-05-20T13:00:34.155-07:00","url":"https://www.academia.edu/36675498/Full_file_at_https_testbanku_eu_Solution_Manual_for_A_Friendly_Introduction_to_Analysis_2nd_Edition_by_Kosmala?f_ri=1283","dom_id":"work_36675498","summary":"Full file at https://testbanku. Full file at https://testbanku.eu/","downloadable_attachments":[{"id":56612304,"asset_id":36675498,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":81929514,"first_name":"YUM76N","last_name":"F0K8P8","domain_name":"independent","page_name":"YUM76NF0K8P8","display_name":"YUM76N F0K8P8","profile_url":"https://independent.academia.edu/YUM76NF0K8P8?f_ri=1283","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":73,"name":"Civil Engineering","url":"https://www.academia.edu/Documents/in/Civil_Engineering?f_ri=1283","nofollow":false},{"id":449,"name":"Software Engineering","url":"https://www.academia.edu/Documents/in/Software_Engineering?f_ri=1283","nofollow":false},{"id":586,"name":"Health Sciences","url":"https://www.academia.edu/Documents/in/Health_Sciences?f_ri=1283","nofollow":false},{"id":802,"name":"Political Economy","url":"https://www.academia.edu/Documents/in/Political_Economy?f_ri=1283","nofollow":false},{"id":1000,"name":"Instructional Design","url":"https://www.academia.edu/Documents/in/Instructional_Design?f_ri=1283"},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283"},{"id":1736,"name":"Science Education","url":"https://www.academia.edu/Documents/in/Science_Education?f_ri=1283"},{"id":2513,"name":"Molecular Biology","url":"https://www.academia.edu/Documents/in/Molecular_Biology?f_ri=1283"},{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=1283"},{"id":3268,"name":"Computational Linguistics","url":"https://www.academia.edu/Documents/in/Computational_Linguistics?f_ri=1283"},{"id":3956,"name":"Hospitality Management","url":"https://www.academia.edu/Documents/in/Hospitality_Management?f_ri=1283"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283"},{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine?f_ri=1283"},{"id":91380,"name":"Hotel Management","url":"https://www.academia.edu/Documents/in/Hotel_Management?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_4746607" data-work_id="4746607" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/4746607/Cyber_Security_in_India_The_National_Critical_Information_Infrastructure_Protection_Centre_NCIIPC_Roadmap">Cyber Security in India The National Critical Information Infrastructure Protection Centre (NCIIPC)- Roadmap</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/4746607" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3bb17b56faed66ff88b757a1da61df43" rel="nofollow" data-download="{"attachment_id":32060106,"asset_id":4746607,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/32060106/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3494551" href="https://iitd.academia.edu/MukteshChander">Muktesh Chander</a><script data-card-contents-for-user="3494551" type="text/json">{"id":3494551,"first_name":"Muktesh","last_name":"Chander","domain_name":"iitd","page_name":"MukteshChander","display_name":"Muktesh Chander","profile_url":"https://iitd.academia.edu/MukteshChander?f_ri=1283","photo":"https://0.academia-photos.com/3494551/1191272/8106219/s65_muktesh.chander.jpg"}</script></span></span></li><li class="js-paper-rank-work_4746607 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="4746607"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 4746607, container: ".js-paper-rank-work_4746607", }); });</script></li><li class="js-percentile-work_4746607 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4746607; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_4746607"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_4746607 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="4746607"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4746607; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4746607]").text(description); $(".js-view-count-work_4746607").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_4746607").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="4746607"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">11</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1439" href="https://www.academia.edu/Documents/in/Globalization">Globalization</a>, <script data-card-contents-for-ri="1439" type="text/json">{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="11336" href="https://www.academia.edu/Documents/in/Cyber_Terrorism">Cyber Terrorism</a>, <script data-card-contents-for-ri="11336" type="text/json">{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="11337" href="https://www.academia.edu/Documents/in/Cyber_Warfare">Cyber Warfare</a><script data-card-contents-for-ri="11337" type="text/json">{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=4746607]'), work: {"id":4746607,"title":"Cyber Security in India The National Critical Information Infrastructure Protection Centre (NCIIPC)- Roadmap","created_at":"2013-10-11T03:03:39.028-07:00","url":"https://www.academia.edu/4746607/Cyber_Security_in_India_The_National_Critical_Information_Infrastructure_Protection_Centre_NCIIPC_Roadmap?f_ri=1283","dom_id":"work_4746607","summary":null,"downloadable_attachments":[{"id":32060106,"asset_id":4746607,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3494551,"first_name":"Muktesh","last_name":"Chander","domain_name":"iitd","page_name":"MukteshChander","display_name":"Muktesh Chander","profile_url":"https://iitd.academia.edu/MukteshChander?f_ri=1283","photo":"https://0.academia-photos.com/3494551/1191272/8106219/s65_muktesh.chander.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=1283","nofollow":false},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=1283","nofollow":false},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=1283","nofollow":false},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=1283"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283"},{"id":265411,"name":"Information Technology and Security","url":"https://www.academia.edu/Documents/in/Information_Technology_and_Security?f_ri=1283"},{"id":1222788,"name":"Research in Technology","url":"https://www.academia.edu/Documents/in/Research_in_Technology?f_ri=1283"},{"id":1222789,"name":"Technology and it's Advancements","url":"https://www.academia.edu/Documents/in/Technology_and_its_Advancements?f_ri=1283"},{"id":1222790,"name":"Cyber Crime and Technological Advancements","url":"https://www.academia.edu/Documents/in/Cyber_Crime_and_Technological_Advancements?f_ri=1283"},{"id":1222791,"name":"Improvements to Globalization with IT Security and Reformation","url":"https://www.academia.edu/Documents/in/Improvements_to_Globalization_with_IT_Security_and_Reformation?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36593934" data-work_id="36593934" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36593934/Assessing_Security_and_Performances_of_Consensus_algorithms_for_Permissioned_Blockchains">Assessing Security and Performances of Consensus algorithms for Permissioned Blockchains</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Blockchain is a novel technology that is rising a lot of interest in the industrial and re- search sectors because its properties of decentralisation, immutability and data integrity. Initially, the underlying consensus mechanism has been... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36593934" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Blockchain is a novel technology that is rising a lot of interest in the industrial and re- search sectors because its properties of decentralisation, immutability and data integrity. Initially, the underlying consensus mechanism has been designed for permissionless block- chain on trustless network model through the proof-of-work, i.e. a mathematical challenge which requires high computational power. This solution suffers of poor performances, hence alternative consensus algorithms as the proof-of-stake have been proposed.<br />Conversely, for permissioned blockchain, where participants are known and authenti- cated, variants of distributed consensus algorithms have been employed. However, most of them comes out without formal expression of security analysis and trust assumptions because the absence of an established knowledge. Therefore the lack of adequate analysis on these algorithms hinders any cautious evaluation of their effectiveness in a real-world setting where systems are deployed over trustless networks, i.e. Internet.<br />In this thesis we analyse security and performances of permissioned blockchain. Thus we design a general model for such a scenario in a way to propose a general benchmark for the experimental evaluations. This work brings two main contributions.<br />The first contribution concern the analysis of Proof-of-Authority, a Byzantine Fault- Tolerant consensus protocol. We compare two of the main algorithms, named Aura and Clique, with respect the well-established Practical Byzantine Fault-Tolerant, in terms of se- curity and performances. We refer the CAP theorem for the consistency, availability and partition tolerance guarantees and we describe a possible attack scenario in which one of the algorithms loses consistency. The analysis advocates that Proof-of-Authority for permissioned blockchains deployed over WANs experimenting Byzantine nodes, do not provide adequate consistency guarantees for scenarios where data integrity is essential. We claim that actually the Practical Byzantine Fault-Tolerant can fit better for permis- sioned blockchain, despite a limited loss in terms of performance.<br />The second contribution is the realisation of a benchmark for practical evaluations. We design a general model for permissioned blockchain under which benchmarking perfor- mances and security guarantees. However, because no experiment can verify all the pos- sible security issues permitted by the model, we prototype an adversarial model which simulate three attacks, feasible for a blockchain system. We then integrate this attacker model in a real blockchain client to evaluate the resiliency of the system and how much the attacks impact performances and security guarantees.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36593934" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="45c7670f63e09739cd9be82ce6cbdff7" rel="nofollow" data-download="{"attachment_id":56521828,"asset_id":36593934,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56521828/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="50965877" href="https://soton.academia.edu/StefanoDeAngelis">Stefano De Angelis</a><script data-card-contents-for-user="50965877" type="text/json">{"id":50965877,"first_name":"Stefano","last_name":"De Angelis","domain_name":"soton","page_name":"StefanoDeAngelis","display_name":"Stefano De Angelis","profile_url":"https://soton.academia.edu/StefanoDeAngelis?f_ri=1283","photo":"https://0.academia-photos.com/50965877/13495815/19559610/s65_stefano.de_angelis.jpg"}</script></span></span></li><li class="js-paper-rank-work_36593934 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36593934"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36593934, container: ".js-paper-rank-work_36593934", }); });</script></li><li class="js-percentile-work_36593934 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36593934; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36593934"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36593934 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36593934"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36593934; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36593934]").text(description); $(".js-view-count-work_36593934").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36593934").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36593934"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="440" href="https://www.academia.edu/Documents/in/Distributed_Computing">Distributed Computing</a>, <script data-card-contents-for-ri="440" type="text/json">{"id":440,"name":"Distributed Computing","url":"https://www.academia.edu/Documents/in/Distributed_Computing?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1340863" href="https://www.academia.edu/Documents/in/CAP_Theorem">CAP Theorem</a>, <script data-card-contents-for-ri="1340863" type="text/json">{"id":1340863,"name":"CAP Theorem","url":"https://www.academia.edu/Documents/in/CAP_Theorem?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1450126" href="https://www.academia.edu/Documents/in/Blockchains">Blockchains</a><script data-card-contents-for-ri="1450126" type="text/json">{"id":1450126,"name":"Blockchains","url":"https://www.academia.edu/Documents/in/Blockchains?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36593934]'), work: {"id":36593934,"title":"Assessing Security and Performances of Consensus algorithms for Permissioned Blockchains","created_at":"2018-05-09T03:17:35.626-07:00","url":"https://www.academia.edu/36593934/Assessing_Security_and_Performances_of_Consensus_algorithms_for_Permissioned_Blockchains?f_ri=1283","dom_id":"work_36593934","summary":"Blockchain is a novel technology that is rising a lot of interest in the industrial and re- search sectors because its properties of decentralisation, immutability and data integrity. Initially, the underlying consensus mechanism has been designed for permissionless block- chain on trustless network model through the proof-of-work, i.e. a mathematical challenge which requires high computational power. This solution suffers of poor performances, hence alternative consensus algorithms as the proof-of-stake have been proposed.\nConversely, for permissioned blockchain, where participants are known and authenti- cated, variants of distributed consensus algorithms have been employed. However, most of them comes out without formal expression of security analysis and trust assumptions because the absence of an established knowledge. Therefore the lack of adequate analysis on these algorithms hinders any cautious evaluation of their effectiveness in a real-world setting where systems are deployed over trustless networks, i.e. Internet.\nIn this thesis we analyse security and performances of permissioned blockchain. Thus we design a general model for such a scenario in a way to propose a general benchmark for the experimental evaluations. This work brings two main contributions.\nThe first contribution concern the analysis of Proof-of-Authority, a Byzantine Fault- Tolerant consensus protocol. We compare two of the main algorithms, named Aura and Clique, with respect the well-established Practical Byzantine Fault-Tolerant, in terms of se- curity and performances. We refer the CAP theorem for the consistency, availability and partition tolerance guarantees and we describe a possible attack scenario in which one of the algorithms loses consistency. The analysis advocates that Proof-of-Authority for permissioned blockchains deployed over WANs experimenting Byzantine nodes, do not provide adequate consistency guarantees for scenarios where data integrity is essential. We claim that actually the Practical Byzantine Fault-Tolerant can fit better for permis- sioned blockchain, despite a limited loss in terms of performance.\nThe second contribution is the realisation of a benchmark for practical evaluations. We design a general model for permissioned blockchain under which benchmarking perfor- mances and security guarantees. However, because no experiment can verify all the pos- sible security issues permitted by the model, we prototype an adversarial model which simulate three attacks, feasible for a blockchain system. We then integrate this attacker model in a real blockchain client to evaluate the resiliency of the system and how much the attacks impact performances and security guarantees.","downloadable_attachments":[{"id":56521828,"asset_id":36593934,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":50965877,"first_name":"Stefano","last_name":"De Angelis","domain_name":"soton","page_name":"StefanoDeAngelis","display_name":"Stefano De Angelis","profile_url":"https://soton.academia.edu/StefanoDeAngelis?f_ri=1283","photo":"https://0.academia-photos.com/50965877/13495815/19559610/s65_stefano.de_angelis.jpg"}],"research_interests":[{"id":440,"name":"Distributed Computing","url":"https://www.academia.edu/Documents/in/Distributed_Computing?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1340863,"name":"CAP Theorem","url":"https://www.academia.edu/Documents/in/CAP_Theorem?f_ri=1283","nofollow":false},{"id":1450126,"name":"Blockchains","url":"https://www.academia.edu/Documents/in/Blockchains?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36684617" data-work_id="36684617" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36684617/Solution_Manual_for_Unit_Operations_of_Chemical_Engineering_7th_Edition_by_Mc_Cabe">Solution Manual for Unit Operations of Chemical Engineering 7th Edition by Mc Cabe</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Solution Manual for Unit Operations of Chemical Engineering 7th Edition by Mc Cabe. Full file at <a href="https://testbanku.eu/" rel="nofollow">https://testbanku.eu/</a></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36684617" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="dc4a7fb748e159675dd5161ed76d3598" rel="nofollow" data-download="{"attachment_id":56622110,"asset_id":36684617,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56622110/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="81974910" href="https://independent.academia.edu/0GJTBYRA3NI8">0GJTBY RA3NI8</a><script data-card-contents-for-user="81974910" type="text/json">{"id":81974910,"first_name":"0GJTBY","last_name":"RA3NI8","domain_name":"independent","page_name":"0GJTBYRA3NI8","display_name":"0GJTBY RA3NI8","profile_url":"https://independent.academia.edu/0GJTBYRA3NI8?f_ri=1283","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_36684617 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36684617"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36684617, container: ".js-paper-rank-work_36684617", }); });</script></li><li class="js-percentile-work_36684617 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36684617; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36684617"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36684617 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36684617"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36684617; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36684617]").text(description); $(".js-view-count-work_36684617").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36684617").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36684617"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3392" href="https://www.academia.edu/Documents/in/Critical_Pedagogy">Critical Pedagogy</a>, <script data-card-contents-for-ri="3392" type="text/json">{"id":3392,"name":"Critical Pedagogy","url":"https://www.academia.edu/Documents/in/Critical_Pedagogy?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36684617]'), work: {"id":36684617,"title":"Solution Manual for Unit Operations of Chemical Engineering 7th Edition by Mc Cabe","created_at":"2018-05-21T15:35:26.286-07:00","url":"https://www.academia.edu/36684617/Solution_Manual_for_Unit_Operations_of_Chemical_Engineering_7th_Edition_by_Mc_Cabe?f_ri=1283","dom_id":"work_36684617","summary":"Solution Manual for Unit Operations of Chemical Engineering 7th Edition by Mc Cabe. Full file at https://testbanku.eu/","downloadable_attachments":[{"id":56622110,"asset_id":36684617,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":81974910,"first_name":"0GJTBY","last_name":"RA3NI8","domain_name":"independent","page_name":"0GJTBYRA3NI8","display_name":"0GJTBY RA3NI8","profile_url":"https://independent.academia.edu/0GJTBYRA3NI8?f_ri=1283","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":3392,"name":"Critical Pedagogy","url":"https://www.academia.edu/Documents/in/Critical_Pedagogy?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_42605635" data-work_id="42605635" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/42605635/Hybrid_nature_of_modern_threats_for_cybersecurity_and_information_security">Hybrid nature of modern threats for cybersecurity and information security</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The paper deals with phenomena arising from radical disruptions in numerous spheres of human activity that challenge the conventional understanding of security. Authors endeavour to contribute to understanding of these changes and the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_42605635" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The paper deals with phenomena arising from radical disruptions in numerous spheres of human activity that challenge the conventional understanding of security. Authors endeavour to contribute to understanding of these changes and the emerging paradigm. The notions of cyber security, information security in relation to the cyber-physical systems security, and information security in broader sense which describes safeguarding the information flows to cyberspace and media were considered. Authors explore modern manifestations of these threats, and then dive into the hybrid nature of the threats to cyber-and information security, describing cyber threats and cyber attacks as merged with existing 'conventional' techniques. The examination of hybrids threats-the cyber leverages to diplomacy, the practice of cyber retaliation, cyber sabotage and espionage, cyber weapons and the cyber arms race-was given.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/42605635" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="721b9b7e75e35220ce0844b1daa89580" rel="nofollow" data-download="{"attachment_id":62809238,"asset_id":42605635,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/62809238/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="28124614" href="https://pontsbschool.academia.edu/Tsaruk">Oleksandr Tsaruk</a><script data-card-contents-for-user="28124614" type="text/json">{"id":28124614,"first_name":"Oleksandr","last_name":"Tsaruk","domain_name":"pontsbschool","page_name":"Tsaruk","display_name":"Oleksandr Tsaruk","profile_url":"https://pontsbschool.academia.edu/Tsaruk?f_ri=1283","photo":"https://0.academia-photos.com/28124614/10585090/29261901/s65_oleksandr.tsaruk.jpg"}</script></span></span></li><li class="js-paper-rank-work_42605635 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="42605635"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 42605635, container: ".js-paper-rank-work_42605635", }); });</script></li><li class="js-percentile-work_42605635 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 42605635; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_42605635"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_42605635 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="42605635"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 42605635; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=42605635]").text(description); $(".js-view-count-work_42605635").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_42605635").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="42605635"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="18573" href="https://www.academia.edu/Documents/in/Categorization">Categorization</a>, <script data-card-contents-for-ri="18573" type="text/json">{"id":18573,"name":"Categorization","url":"https://www.academia.edu/Documents/in/Categorization?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>, <script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="397947" href="https://www.academia.edu/Documents/in/Threats">Threats</a><script data-card-contents-for-ri="397947" type="text/json">{"id":397947,"name":"Threats","url":"https://www.academia.edu/Documents/in/Threats?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=42605635]'), work: {"id":42605635,"title":"Hybrid nature of modern threats for cybersecurity and information security","created_at":"2020-04-03T13:24:39.036-07:00","url":"https://www.academia.edu/42605635/Hybrid_nature_of_modern_threats_for_cybersecurity_and_information_security?f_ri=1283","dom_id":"work_42605635","summary":"The paper deals with phenomena arising from radical disruptions in numerous spheres of human activity that challenge the conventional understanding of security. Authors endeavour to contribute to understanding of these changes and the emerging paradigm. The notions of cyber security, information security in relation to the cyber-physical systems security, and information security in broader sense which describes safeguarding the information flows to cyberspace and media were considered. Authors explore modern manifestations of these threats, and then dive into the hybrid nature of the threats to cyber-and information security, describing cyber threats and cyber attacks as merged with existing 'conventional' techniques. The examination of hybrids threats-the cyber leverages to diplomacy, the practice of cyber retaliation, cyber sabotage and espionage, cyber weapons and the cyber arms race-was given.","downloadable_attachments":[{"id":62809238,"asset_id":42605635,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":28124614,"first_name":"Oleksandr","last_name":"Tsaruk","domain_name":"pontsbschool","page_name":"Tsaruk","display_name":"Oleksandr Tsaruk","profile_url":"https://pontsbschool.academia.edu/Tsaruk?f_ri=1283","photo":"https://0.academia-photos.com/28124614/10585090/29261901/s65_oleksandr.tsaruk.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":18573,"name":"Categorization","url":"https://www.academia.edu/Documents/in/Categorization?f_ri=1283","nofollow":false},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283","nofollow":false},{"id":397947,"name":"Threats","url":"https://www.academia.edu/Documents/in/Threats?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36621985" data-work_id="36621985" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36621985/Cyber_Deterrence_A_Comprehensive_Approach">Cyber Deterrence: A Comprehensive Approach?</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Despite a growing amount of scholarly and policy attention to cyber threats, little progress seems to have been made in building effective deterrence against them. State and non-state actors continue to act with an unacceptable level of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36621985" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Despite a growing amount of scholarly and policy attention to cyber threats, little progress seems to have been made in building effective deterrence against them. State and non-state actors continue to act with an unacceptable level of impunity in using the internet for malicious purposes. This paper by Dr Joe Burton, Visiting Researcher at NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) and Senior Lecturer, New Zealand Institute for Security and Crime Science, University of Waikato, addresses these issues by posing two related questions: given the diversity of actors, threats and motivations involved, is deterrence against cyber-attacks possible? And if it is, how can effective cyber deterrence be built and sustained? These questions are important to both academic and policy debates. If progress is not made on deterring malicious activity online, the costs and consequences of cyber-attacks will continue to grow and continue to cause instability within the international system. The academic debate on cyber deterrence also appears to be unresolved, with some analysts advocating the view that the deterrence concept should be stretched, some that it should be ditched altogether, and others that cyber deterrence should be a limited approach applicable only to state actors and high-level strategic threats. <br /> <br />The overarching argument of this paper is that cyber deterrence is possible if the concept is conceived more broadly. To enhance cyber security, cyber deterrence should be a comprehensive strategy that considers the full spectrum of cyber threats and moves beyond narrow conceptions of national and military security. This is not an argument that a blanket approach to cyber deterrence should be applied to all cyber security threats across all sectors, or that military-strategic cyber deterrence is redundant. Instead, deterring diverse cyber threats requires that deterrence be tailored and customised to different actors across the societal, state and international spectrum. Traditional conceptions of deterrence may still have utility in deterring high-level strategic threats (and are arguably already doing so) but will likely not have an impact in an increasingly diverse and complex cyber security landscape</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36621985" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b3a585425056c4be8f32c74d0acfb7bd" rel="nofollow" data-download="{"attachment_id":56552885,"asset_id":36621985,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56552885/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="34147367" href="https://waikato.academia.edu/JoeBurton">joe burton</a><script data-card-contents-for-user="34147367" type="text/json">{"id":34147367,"first_name":"joe","last_name":"burton","domain_name":"waikato","page_name":"JoeBurton","display_name":"joe burton","profile_url":"https://waikato.academia.edu/JoeBurton?f_ri=1283","photo":"https://0.academia-photos.com/34147367/10019089/11175176/s65_joe.burton.jpg"}</script></span></span></li><li class="js-paper-rank-work_36621985 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36621985"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36621985, container: ".js-paper-rank-work_36621985", }); });</script></li><li class="js-percentile-work_36621985 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36621985; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36621985"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36621985 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36621985"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36621985; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36621985]").text(description); $(".js-view-count-work_36621985").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36621985").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36621985"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">2</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36621985]'), work: {"id":36621985,"title":"Cyber Deterrence: A Comprehensive Approach?","created_at":"2018-05-13T04:35:42.230-07:00","url":"https://www.academia.edu/36621985/Cyber_Deterrence_A_Comprehensive_Approach?f_ri=1283","dom_id":"work_36621985","summary":"Despite a growing amount of scholarly and policy attention to cyber threats, little progress seems to have been made in building effective deterrence against them. State and non-state actors continue to act with an unacceptable level of impunity in using the internet for malicious purposes. This paper by Dr Joe Burton, Visiting Researcher at NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) and Senior Lecturer, New Zealand Institute for Security and Crime Science, University of Waikato, addresses these issues by posing two related questions: given the diversity of actors, threats and motivations involved, is deterrence against cyber-attacks possible? And if it is, how can effective cyber deterrence be built and sustained? These questions are important to both academic and policy debates. If progress is not made on deterring malicious activity online, the costs and consequences of cyber-attacks will continue to grow and continue to cause instability within the international system. The academic debate on cyber deterrence also appears to be unresolved, with some analysts advocating the view that the deterrence concept should be stretched, some that it should be ditched altogether, and others that cyber deterrence should be a limited approach applicable only to state actors and high-level strategic threats. \r\n\r\nThe overarching argument of this paper is that cyber deterrence is possible if the concept is conceived more broadly. To enhance cyber security, cyber deterrence should be a comprehensive strategy that considers the full spectrum of cyber threats and moves beyond narrow conceptions of national and military security. This is not an argument that a blanket approach to cyber deterrence should be applied to all cyber security threats across all sectors, or that military-strategic cyber deterrence is redundant. Instead, deterring diverse cyber threats requires that deterrence be tailored and customised to different actors across the societal, state and international spectrum. Traditional conceptions of deterrence may still have utility in deterring high-level strategic threats (and are arguably already doing so) but will likely not have an impact in an increasingly diverse and complex cyber security landscape","downloadable_attachments":[{"id":56552885,"asset_id":36621985,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":34147367,"first_name":"joe","last_name":"burton","domain_name":"waikato","page_name":"JoeBurton","display_name":"joe burton","profile_url":"https://waikato.academia.edu/JoeBurton?f_ri=1283","photo":"https://0.academia-photos.com/34147367/10019089/11175176/s65_joe.burton.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_10847483" data-work_id="10847483" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/10847483/Cloud_Computing_and_Security">Cloud Computing and Security</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/10847483" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ce7f4bf79c7e915e40f0b0cbccc646a4" rel="nofollow" data-download="{"attachment_id":36659840,"asset_id":10847483,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36659840/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="26356512" href="https://upt-pt.academia.edu/AbilioCardoso">Abilio Cardoso</a><script data-card-contents-for-user="26356512" type="text/json">{"id":26356512,"first_name":"Abilio","last_name":"Cardoso","domain_name":"upt-pt","page_name":"AbilioCardoso","display_name":"Abilio Cardoso","profile_url":"https://upt-pt.academia.edu/AbilioCardoso?f_ri=1283","photo":"https://0.academia-photos.com/26356512/7293892/8205463/s65_abilio.cardoso.jpg_oh_2f3203f6db08782efe5ccbdaa8268e5b_oe_555248e0___gda___1434866571_4280ecc84cf7e7a25ee1e8b7efed745a"}</script></span></span></li><li class="js-paper-rank-work_10847483 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="10847483"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 10847483, container: ".js-paper-rank-work_10847483", }); });</script></li><li class="js-percentile-work_10847483 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 10847483; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_10847483"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_10847483 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="10847483"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 10847483; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=10847483]").text(description); $(".js-view-count-work_10847483").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_10847483").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="10847483"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1380" href="https://www.academia.edu/Documents/in/Computer_Engineering">Computer Engineering</a>, <script data-card-contents-for-ri="1380" type="text/json">{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=10847483]'), work: {"id":10847483,"title":"Cloud Computing and Security","created_at":"2015-02-16T12:52:19.816-08:00","url":"https://www.academia.edu/10847483/Cloud_Computing_and_Security?f_ri=1283","dom_id":"work_10847483","summary":null,"downloadable_attachments":[{"id":36659840,"asset_id":10847483,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":26356512,"first_name":"Abilio","last_name":"Cardoso","domain_name":"upt-pt","page_name":"AbilioCardoso","display_name":"Abilio Cardoso","profile_url":"https://upt-pt.academia.edu/AbilioCardoso?f_ri=1283","photo":"https://0.academia-photos.com/26356512/7293892/8205463/s65_abilio.cardoso.jpg_oh_2f3203f6db08782efe5ccbdaa8268e5b_oe_555248e0___gda___1434866571_4280ecc84cf7e7a25ee1e8b7efed745a"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_70997413" data-work_id="70997413" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/70997413/Design_Pattern_Classifiers_under_Attack_for_Security_Evaluation_using_Multimodal_System">Design Pattern Classifiers under Attack for Security Evaluation using Multimodal System</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/70997413" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1eeb76663282566c91ccd55d11b380c5" rel="nofollow" data-download="{"attachment_id":80519722,"asset_id":70997413,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/80519722/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="61295717" href="https://independent.academia.edu/RNavalkar">Rupali Navalkar</a><script data-card-contents-for-user="61295717" type="text/json">{"id":61295717,"first_name":"Rupali","last_name":"Navalkar","domain_name":"independent","page_name":"RNavalkar","display_name":"Rupali Navalkar","profile_url":"https://independent.academia.edu/RNavalkar?f_ri=1283","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_70997413 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="70997413"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 70997413, container: ".js-paper-rank-work_70997413", }); });</script></li><li class="js-percentile-work_70997413 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 70997413; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_70997413"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_70997413 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="70997413"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 70997413; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=70997413]").text(description); $(".js-view-count-work_70997413").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_70997413").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="70997413"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1380" href="https://www.academia.edu/Documents/in/Computer_Engineering">Computer Engineering</a>, <script data-card-contents-for-ri="1380" type="text/json">{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=70997413]'), work: {"id":70997413,"title":"Design Pattern Classifiers under Attack for Security Evaluation using Multimodal System","created_at":"2022-02-09T02:53:15.901-08:00","url":"https://www.academia.edu/70997413/Design_Pattern_Classifiers_under_Attack_for_Security_Evaluation_using_Multimodal_System?f_ri=1283","dom_id":"work_70997413","summary":null,"downloadable_attachments":[{"id":80519722,"asset_id":70997413,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":61295717,"first_name":"Rupali","last_name":"Navalkar","domain_name":"independent","page_name":"RNavalkar","display_name":"Rupali Navalkar","profile_url":"https://independent.academia.edu/RNavalkar?f_ri=1283","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":30664,"name":"Pattern Recognition and Classification","url":"https://www.academia.edu/Documents/in/Pattern_Recognition_and_Classification?f_ri=1283"},{"id":201108,"name":"Spam Detection","url":"https://www.academia.edu/Documents/in/Spam_Detection?f_ri=1283"},{"id":221389,"name":"Pattern Classification","url":"https://www.academia.edu/Documents/in/Pattern_Classification?f_ri=1283"},{"id":1750721,"name":"Security Evaluation","url":"https://www.academia.edu/Documents/in/Security_Evaluation?f_ri=1283"},{"id":2477265,"name":"Spoofing Attack Detection And Localization In Wireless Networks","url":"https://www.academia.edu/Documents/in/Spoofing_Attack_Detection_And_Localization_In_Wireless_Networks?f_ri=1283"},{"id":2757701,"name":"Adversarial application","url":"https://www.academia.edu/Documents/in/Adversarial_application?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_70757717" data-work_id="70757717" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/70757717/Transforming_Information_Systems_and_Computer_Science_Education_with_Virtualization">Transforming Information Systems and Computer Science Education with Virtualization</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Open source software (OSS) in academia can have multiple types of implementations and positive returns. This paper explores the use of OSS as a method to teach entrepreneurship concepts and practices to Science, Technology, Engineering,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_70757717" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Open source software (OSS) in academia can have multiple types of implementations and positive returns. This paper explores the use of OSS as a method to teach entrepreneurship concepts and practices to Science, Technology, Engineering, and Mathematics (STEM) majors. OSS allows for individuals to contribute and provide support services for applications. This will allow students to gain expertise in low level design, software project management, and software consulting services in order to successfully deploy their own spin off company. Covered in this submission will be examples of how the Linux software project development groups, mobile application development, video game design, and support services can be used in the classroom. These examples will serve as the base for any additions or changes in curriculum development, and design to aid institutions in deploying innovative programs in technology entrepreneurship to STEM students.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/70757717" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="82613518" href="https://iit.academia.edu/MauriceDawson">Maurice Dawson</a><script data-card-contents-for-user="82613518" type="text/json">{"id":82613518,"first_name":"Maurice","last_name":"Dawson","domain_name":"iit","page_name":"MauriceDawson","display_name":"Maurice Dawson","profile_url":"https://iit.academia.edu/MauriceDawson?f_ri=1283","photo":"https://gravatar.com/avatar/a6dd47fc155390a925162801ad79dd11?s=65"}</script></span></span></li><li class="js-paper-rank-work_70757717 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="70757717"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 70757717, container: ".js-paper-rank-work_70757717", }); });</script></li><li class="js-percentile-work_70757717 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 70757717; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_70757717"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_70757717 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="70757717"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 70757717; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=70757717]").text(description); $(".js-view-count-work_70757717").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_70757717").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="70757717"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">20</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="48" href="https://www.academia.edu/Documents/in/Engineering">Engineering</a>, <script data-card-contents-for-ri="48" type="text/json">{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="49" href="https://www.academia.edu/Documents/in/Electrical_Engineering">Electrical Engineering</a>, <script data-card-contents-for-ri="49" type="text/json">{"id":49,"name":"Electrical Engineering","url":"https://www.academia.edu/Documents/in/Electrical_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="300" href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a><script data-card-contents-for-ri="300" type="text/json">{"id":300,"name":"Mathematics","url":"https://www.academia.edu/Documents/in/Mathematics?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=70757717]'), work: {"id":70757717,"title":"Transforming Information Systems and Computer Science Education with Virtualization","created_at":"2022-02-06T15:17:32.933-08:00","url":"https://www.academia.edu/70757717/Transforming_Information_Systems_and_Computer_Science_Education_with_Virtualization?f_ri=1283","dom_id":"work_70757717","summary":"Open source software (OSS) in academia can have multiple types of implementations and positive returns. This paper explores the use of OSS as a method to teach entrepreneurship concepts and practices to Science, Technology, Engineering, and Mathematics (STEM) majors. OSS allows for individuals to contribute and provide support services for applications. This will allow students to gain expertise in low level design, software project management, and software consulting services in order to successfully deploy their own spin off company. Covered in this submission will be examples of how the Linux software project development groups, mobile application development, video game design, and support services can be used in the classroom. These examples will serve as the base for any additions or changes in curriculum development, and design to aid institutions in deploying innovative programs in technology entrepreneurship to STEM students.","downloadable_attachments":[],"ordered_authors":[{"id":82613518,"first_name":"Maurice","last_name":"Dawson","domain_name":"iit","page_name":"MauriceDawson","display_name":"Maurice Dawson","profile_url":"https://iit.academia.edu/MauriceDawson?f_ri=1283","photo":"https://gravatar.com/avatar/a6dd47fc155390a925162801ad79dd11?s=65"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false},{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering?f_ri=1283","nofollow":false},{"id":49,"name":"Electrical Engineering","url":"https://www.academia.edu/Documents/in/Electrical_Engineering?f_ri=1283","nofollow":false},{"id":300,"name":"Mathematics","url":"https://www.academia.edu/Documents/in/Mathematics?f_ri=1283","nofollow":false},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283"},{"id":459,"name":"Information Science","url":"https://www.academia.edu/Documents/in/Information_Science?f_ri=1283"},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=1283"},{"id":492,"name":"Management Information Systems","url":"https://www.academia.edu/Documents/in/Management_Information_Systems?f_ri=1283"},{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=1283"},{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=1283"},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283"},{"id":2731,"name":"Mathematics Education","url":"https://www.academia.edu/Documents/in/Mathematics_Education?f_ri=1283"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=1283"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=1283"},{"id":8136,"name":"Linux","url":"https://www.academia.edu/Documents/in/Linux?f_ri=1283"},{"id":24538,"name":"Computing","url":"https://www.academia.edu/Documents/in/Computing?f_ri=1283"},{"id":190001,"name":"Agile software development","url":"https://www.academia.edu/Documents/in/Agile_software_development?f_ri=1283"},{"id":653546,"name":"Hypervisor","url":"https://www.academia.edu/Documents/in/Hypervisor?f_ri=1283"},{"id":1161688,"name":"Hypervisors","url":"https://www.academia.edu/Documents/in/Hypervisors?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35965511" data-work_id="35965511" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35965511/Analyzing_User_Behavior_Using_Keystroke_Dynamics">Analyzing User Behavior Using Keystroke Dynamics</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><a href="https://www.irjet.net/archives/V5/i1/IRJET-V5I1138.pdf" rel="nofollow">https://www.irjet.net/archives/V5/i1/IRJET-V5I1138.pdf</a></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35965511" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fb82613f880bf8225a54e601f75dc989" rel="nofollow" data-download="{"attachment_id":55848537,"asset_id":35965511,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55848537/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="31493941" href="https://irjet.academia.edu/IRJET">IRJET Journal</a><script data-card-contents-for-user="31493941" type="text/json">{"id":31493941,"first_name":"IRJET","last_name":"Journal","domain_name":"irjet","page_name":"IRJET","display_name":"IRJET Journal","profile_url":"https://irjet.academia.edu/IRJET?f_ri=1283","photo":"https://0.academia-photos.com/31493941/9304077/11813823/s65_irjet.journal.jpg"}</script></span></span></li><li class="js-paper-rank-work_35965511 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35965511"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35965511, container: ".js-paper-rank-work_35965511", }); });</script></li><li class="js-percentile-work_35965511 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35965511; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35965511"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35965511 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35965511"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35965511; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35965511]").text(description); $(".js-view-count-work_35965511").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35965511").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35965511"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35965511]'), work: {"id":35965511,"title":"Analyzing User Behavior Using Keystroke Dynamics","created_at":"2018-02-19T22:53:06.531-08:00","url":"https://www.academia.edu/35965511/Analyzing_User_Behavior_Using_Keystroke_Dynamics?f_ri=1283","dom_id":"work_35965511","summary":"https://www.irjet.net/archives/V5/i1/IRJET-V5I1138.pdf","downloadable_attachments":[{"id":55848537,"asset_id":35965511,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":31493941,"first_name":"IRJET","last_name":"Journal","domain_name":"irjet","page_name":"IRJET","display_name":"IRJET Journal","profile_url":"https://irjet.academia.edu/IRJET?f_ri=1283","photo":"https://0.academia-photos.com/31493941/9304077/11813823/s65_irjet.journal.jpg"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35794183" data-work_id="35794183" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35794183/Developing_Tool_Support_for_IT_Development_for_Increased_Information_Security">Developing Tool Support for IT Development for Increased Information Security</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Research in the broader IT context highlights that there are two main sources for vulnerabilities in IT systems. Firstly, there are technical flaws and architectural vulnerabilities that open back-doors into otherwise safe systems.... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35794183" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Research in the broader IT context highlights that there are two main sources for vulnerabilities in IT systems. Firstly, there are technical flaws and architectural vulnerabilities that open back-doors into otherwise safe systems. Secondly, users can also use an IT system in a way that open that system for security issues, despite being technically sound otherwise. Responding to a discussion of this second source of system vulnerabilities, this project will explore how tool support for systems development engineers can be improved to allow for the development of safer systems.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35794183" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b437d878f35f655d8807beaefcd65ccb" rel="nofollow" data-download="{"attachment_id":55670653,"asset_id":35794183,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55670653/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="75629795" href="https://independent.academia.edu/AlexanderFerrier">Alexander Ferrier</a><script data-card-contents-for-user="75629795" type="text/json">{"id":75629795,"first_name":"Alexander","last_name":"Ferrier","domain_name":"independent","page_name":"AlexanderFerrier","display_name":"Alexander Ferrier","profile_url":"https://independent.academia.edu/AlexanderFerrier?f_ri=1283","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_35794183 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35794183"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35794183, container: ".js-paper-rank-work_35794183", }); });</script></li><li class="js-percentile-work_35794183 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35794183; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35794183"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35794183 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35794183"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35794183; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35794183]").text(description); $(".js-view-count-work_35794183").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35794183").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35794183"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="988" href="https://www.academia.edu/Documents/in/Design">Design</a>, <script data-card-contents-for-ri="988" type="text/json">{"id":988,"name":"Design","url":"https://www.academia.edu/Documents/in/Design?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1449" href="https://www.academia.edu/Documents/in/Requirements_Engineering">Requirements Engineering</a>, <script data-card-contents-for-ri="1449" type="text/json">{"id":1449,"name":"Requirements Engineering","url":"https://www.academia.edu/Documents/in/Requirements_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35794183]'), work: {"id":35794183,"title":"Developing Tool Support for IT Development for Increased Information Security","created_at":"2018-01-30T03:57:16.341-08:00","url":"https://www.academia.edu/35794183/Developing_Tool_Support_for_IT_Development_for_Increased_Information_Security?f_ri=1283","dom_id":"work_35794183","summary":"Research in the broader IT context highlights that there are two main sources for vulnerabilities in IT systems. Firstly, there are technical flaws and architectural vulnerabilities that open back-doors into otherwise safe systems. Secondly, users can also use an IT system in a way that open that system for security issues, despite being technically sound otherwise. Responding to a discussion of this second source of system vulnerabilities, this project will explore how tool support for systems development engineers can be improved to allow for the development of safer systems.","downloadable_attachments":[{"id":55670653,"asset_id":35794183,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":75629795,"first_name":"Alexander","last_name":"Ferrier","domain_name":"independent","page_name":"AlexanderFerrier","display_name":"Alexander Ferrier","profile_url":"https://independent.academia.edu/AlexanderFerrier?f_ri=1283","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":988,"name":"Design","url":"https://www.academia.edu/Documents/in/Design?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1449,"name":"Requirements Engineering","url":"https://www.academia.edu/Documents/in/Requirements_Engineering?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":371884,"name":"Softwre Engineering","url":"https://www.academia.edu/Documents/in/Softwre_Engineering?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35606300" data-work_id="35606300" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35606300/Review_on_Secure_Sharing_and_Self_Destructing_Data_on_Cloud_Computing">Review on Secure Sharing and Self Destructing Data on Cloud Computing</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">With the quick advancement of flexible cloud administrations, it turns out to be progressively helpless to utilize cloud administrations to share information in a companion hover in the distributed computing condition. Since it is not... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35606300" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">With the quick advancement of flexible cloud administrations, it turns out to be progressively helpless to utilize cloud administrations to share information in a companion hover in the distributed computing condition. Since it is not practical to actualize full lifecycle protection security, get to control turns into a testing errand, particularly when we share delicate information on cloud servers. Keeping in mind the end goal to handle this issue, we propose a key-approach trait based encryption with time-indicated characteristics (KP-TSABE), a novel secure information self-destructing plan in distributed computing. In the KP-TSABE plot, each figure content is marked with a period interim while private key is related with a period moment. The delicate information will be safely self-destructed after a client indicated termination time. Far reaching correlations of the security properties demonstrate that the KP-TSABE conspire proposed by us fulfills the security prerequisites and is better than other existing plans.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35606300" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="335b9aa53b5bd7381daec50c252cd86e" rel="nofollow" data-download="{"attachment_id":55473881,"asset_id":35606300,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55473881/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="15227164" href="https://independent.academia.edu/IJSTE">IJSTE - International Journal of Science Technology and Engineering</a><script data-card-contents-for-user="15227164" type="text/json">{"id":15227164,"first_name":"IJSTE","last_name":"International Journal of Science Technology and Engineering","domain_name":"independent","page_name":"IJSTE","display_name":"IJSTE - International Journal of Science Technology and Engineering","profile_url":"https://independent.academia.edu/IJSTE?f_ri=1283","photo":"https://0.academia-photos.com/15227164/4107605/4789636/s65_ijste.journal.png"}</script></span></span></li><li class="js-paper-rank-work_35606300 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35606300"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35606300, container: ".js-paper-rank-work_35606300", }); });</script></li><li class="js-percentile-work_35606300 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35606300; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35606300"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35606300 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35606300"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35606300; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35606300]").text(description); $(".js-view-count-work_35606300").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35606300").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35606300"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1380" href="https://www.academia.edu/Documents/in/Computer_Engineering">Computer Engineering</a>, <script data-card-contents-for-ri="1380" type="text/json">{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35606300]'), work: {"id":35606300,"title":"Review on Secure Sharing and Self Destructing Data on Cloud Computing","created_at":"2018-01-07T23:22:40.799-08:00","url":"https://www.academia.edu/35606300/Review_on_Secure_Sharing_and_Self_Destructing_Data_on_Cloud_Computing?f_ri=1283","dom_id":"work_35606300","summary":"With the quick advancement of flexible cloud administrations, it turns out to be progressively helpless to utilize cloud administrations to share information in a companion hover in the distributed computing condition. Since it is not practical to actualize full lifecycle protection security, get to control turns into a testing errand, particularly when we share delicate information on cloud servers. Keeping in mind the end goal to handle this issue, we propose a key-approach trait based encryption with time-indicated characteristics (KP-TSABE), a novel secure information self-destructing plan in distributed computing. In the KP-TSABE plot, each figure content is marked with a period interim while private key is related with a period moment. The delicate information will be safely self-destructed after a client indicated termination time. Far reaching correlations of the security properties demonstrate that the KP-TSABE conspire proposed by us fulfills the security prerequisites and is better than other existing plans.","downloadable_attachments":[{"id":55473881,"asset_id":35606300,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":15227164,"first_name":"IJSTE","last_name":"International Journal of Science Technology and Engineering","domain_name":"independent","page_name":"IJSTE","display_name":"IJSTE - International Journal of Science Technology and Engineering","profile_url":"https://independent.academia.edu/IJSTE?f_ri=1283","photo":"https://0.academia-photos.com/15227164/4107605/4789636/s65_ijste.journal.png"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":26860,"name":"Cloud Computing","url":"https://www.academia.edu/Documents/in/Cloud_Computing?f_ri=1283"},{"id":1150259,"name":"Sensitive Data","url":"https://www.academia.edu/Documents/in/Sensitive_Data?f_ri=1283"},{"id":1379848,"name":"Privacy Preserving","url":"https://www.academia.edu/Documents/in/Privacy_Preserving?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34423829" data-work_id="34423829" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34423829/Data_Storage_enhancement_in_NFC_Chip_Using_URL">Data Storage enhancement in NFC Chip Using URL</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><a href="https://www.irjet.net/archives/V3/i9/IRJET-V3I927.pdf" rel="nofollow">https://www.irjet.net/archives/V3/i9/IRJET-V3I927.pdf</a></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34423829" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="06347c6cc7d2385722869e4fcf3a0363" rel="nofollow" data-download="{"attachment_id":54300891,"asset_id":34423829,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54300891/download_file?st=MTczMjQwNTM2MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="31493941" href="https://irjet.academia.edu/IRJET">IRJET Journal</a><script data-card-contents-for-user="31493941" type="text/json">{"id":31493941,"first_name":"IRJET","last_name":"Journal","domain_name":"irjet","page_name":"IRJET","display_name":"IRJET Journal","profile_url":"https://irjet.academia.edu/IRJET?f_ri=1283","photo":"https://0.academia-photos.com/31493941/9304077/11813823/s65_irjet.journal.jpg"}</script></span></span></li><li class="js-paper-rank-work_34423829 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34423829"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34423829, container: ".js-paper-rank-work_34423829", }); });</script></li><li class="js-percentile-work_34423829 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34423829; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34423829"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34423829 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34423829"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34423829; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34423829]").text(description); $(".js-view-count-work_34423829").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34423829").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34423829"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2345" href="https://www.academia.edu/Documents/in/Wireless_Communications">Wireless Communications</a>, <script data-card-contents-for-ri="2345" type="text/json">{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34423829]'), work: {"id":34423829,"title":"Data Storage enhancement in NFC Chip Using URL","created_at":"2017-08-31T04:23:00.325-07:00","url":"https://www.academia.edu/34423829/Data_Storage_enhancement_in_NFC_Chip_Using_URL?f_ri=1283","dom_id":"work_34423829","summary":"https://www.irjet.net/archives/V3/i9/IRJET-V3I927.pdf","downloadable_attachments":[{"id":54300891,"asset_id":34423829,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":31493941,"first_name":"IRJET","last_name":"Journal","domain_name":"irjet","page_name":"IRJET","display_name":"IRJET Journal","profile_url":"https://irjet.academia.edu/IRJET?f_ri=1283","photo":"https://0.academia-photos.com/31493941/9304077/11813823/s65_irjet.journal.jpg"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_28521030" data-work_id="28521030" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/28521030/Detection_of_Various_Attacks_Using_Zero_Knowledge_Protocol_in_Wireless_Security">Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/28521030" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="bf042e6acba901d81e38777dc27ce210" rel="nofollow" data-download="{"attachment_id":48873586,"asset_id":28521030,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/48873586/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3387364" href="https://ijceronline.academia.edu/IJCEROnline">Independent IJCEROnline</a><script data-card-contents-for-user="3387364" type="text/json">{"id":3387364,"first_name":"Independent","last_name":"IJCEROnline","domain_name":"ijceronline","page_name":"IJCEROnline","display_name":"Independent IJCEROnline","profile_url":"https://ijceronline.academia.edu/IJCEROnline?f_ri=1283","photo":"https://0.academia-photos.com/3387364/2593067/3011994/s65_ijceronline.ijceronline.png"}</script></span></span></li><li class="js-paper-rank-work_28521030 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="28521030"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 28521030, container: ".js-paper-rank-work_28521030", }); });</script></li><li class="js-percentile-work_28521030 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 28521030; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_28521030"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_28521030 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="28521030"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 28521030; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=28521030]").text(description); $(".js-view-count-work_28521030").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_28521030").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="28521030"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a>, <script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="16542" href="https://www.academia.edu/Documents/in/Cryptography">Cryptography</a><script data-card-contents-for-ri="16542" type="text/json">{"id":16542,"name":"Cryptography","url":"https://www.academia.edu/Documents/in/Cryptography?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=28521030]'), work: {"id":28521030,"title":"Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security","created_at":"2016-09-15T23:08:10.778-07:00","url":"https://www.academia.edu/28521030/Detection_of_Various_Attacks_Using_Zero_Knowledge_Protocol_in_Wireless_Security?f_ri=1283","dom_id":"work_28521030","summary":null,"downloadable_attachments":[{"id":48873586,"asset_id":28521030,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3387364,"first_name":"Independent","last_name":"IJCEROnline","domain_name":"ijceronline","page_name":"IJCEROnline","display_name":"Independent IJCEROnline","profile_url":"https://ijceronline.academia.edu/IJCEROnline?f_ri=1283","photo":"https://0.academia-photos.com/3387364/2593067/3011994/s65_ijceronline.ijceronline.png"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":16542,"name":"Cryptography","url":"https://www.academia.edu/Documents/in/Cryptography?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_26671326" data-work_id="26671326" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/26671326/Authentication_in_Online_Banking_Systems_through_Quantum_Cryptography">Authentication in Online Banking Systems through Quantum Cryptography</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_26671326" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated researchers to introduce a new structure. Online banking is the newest delivery channel for retail banking services. Online banking facilitated by various Electronic Commerce technologies, has helped commercial banks to stay competitive through productivity gains, transaction cost reduction and customer service improvement. Security for online banking has changed considerably during the relatively short period that online banking has been in use. In particular, authentication in the early implementations was, and sometimes still is, vulnerable to various attacks such as phishing. It is known that the quantum cryptography protocols are able to detect immediately any attempt to attack the key exchange and the authentication process. This paper presents an introduction of online banking and quantum cryptography. In this paper we are proposing a model for authentication in online banking system with quantum cryptography.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/26671326" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a9c7e776801d40e89485673bd063caec" rel="nofollow" data-download="{"attachment_id":46952493,"asset_id":26671326,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46952493/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="50665228" href="https://modyuniversity.academia.edu/ASharma">Anand Sharma</a><script data-card-contents-for-user="50665228" type="text/json">{"id":50665228,"first_name":"Anand","last_name":"Sharma","domain_name":"modyuniversity","page_name":"ASharma","display_name":"Anand Sharma","profile_url":"https://modyuniversity.academia.edu/ASharma?f_ri=1283","photo":"https://0.academia-photos.com/50665228/16409982/21590385/s65_anand.sharma.jpg"}</script></span></span></li><li class="js-paper-rank-work_26671326 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="26671326"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 26671326, container: ".js-paper-rank-work_26671326", }); });</script></li><li class="js-percentile-work_26671326 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 26671326; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_26671326"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_26671326 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="26671326"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 26671326; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=26671326]").text(description); $(".js-view-count-work_26671326").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_26671326").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="26671326"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4370" href="https://www.academia.edu/Documents/in/Security">Security</a>, <script data-card-contents-for-ri="4370" type="text/json">{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=26671326]'), work: {"id":26671326,"title":"Authentication in Online Banking Systems through Quantum Cryptography","created_at":"2016-07-02T03:46:48.481-07:00","url":"https://www.academia.edu/26671326/Authentication_in_Online_Banking_Systems_through_Quantum_Cryptography?f_ri=1283","dom_id":"work_26671326","summary":"The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated researchers to introduce a new structure. Online banking is the newest delivery channel for retail banking services. Online banking facilitated by various Electronic Commerce technologies, has helped commercial banks to stay competitive through productivity gains, transaction cost reduction and customer service improvement. Security for online banking has changed considerably during the relatively short period that online banking has been in use. In particular, authentication in the early implementations was, and sometimes still is, vulnerable to various attacks such as phishing. It is known that the quantum cryptography protocols are able to detect immediately any attempt to attack the key exchange and the authentication process. This paper presents an introduction of online banking and quantum cryptography. In this paper we are proposing a model for authentication in online banking system with quantum cryptography.","downloadable_attachments":[{"id":46952493,"asset_id":26671326,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":50665228,"first_name":"Anand","last_name":"Sharma","domain_name":"modyuniversity","page_name":"ASharma","display_name":"Anand Sharma","profile_url":"https://modyuniversity.academia.edu/ASharma?f_ri=1283","photo":"https://0.academia-photos.com/50665228/16409982/21590385/s65_anand.sharma.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":16542,"name":"Cryptography","url":"https://www.academia.edu/Documents/in/Cryptography?f_ri=1283"},{"id":33361,"name":"Authentication","url":"https://www.academia.edu/Documents/in/Authentication?f_ri=1283"},{"id":1007026,"name":"QKD","url":"https://www.academia.edu/Documents/in/QKD?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8777056" data-work_id="8777056" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8777056/QUICK_INSTALLATION_GUIDE_Wireless_G_Broadband_Router_with_SpeedBooster_Model_WRT54GS_Package_Contents">QUICK INSTALLATION GUIDE Wireless-G Broadband Router with SpeedBooster Model: WRT54GS Package Contents</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8777056" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="900774a051cc1b876bbf3252ff0b5e6a" rel="nofollow" data-download="{"attachment_id":35128645,"asset_id":8777056,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35128645/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="18915935" href="https://ucv-ro.academia.edu/AVFSPAM">AVF SPAM</a><script data-card-contents-for-user="18915935" type="text/json">{"id":18915935,"first_name":"AVF","last_name":"SPAM","domain_name":"ucv-ro","page_name":"AVFSPAM","display_name":"AVF SPAM","profile_url":"https://ucv-ro.academia.edu/AVFSPAM?f_ri=1283","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_8777056 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8777056"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8777056, container: ".js-paper-rank-work_8777056", }); });</script></li><li class="js-percentile-work_8777056 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8777056; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8777056"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8777056 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8777056"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8777056; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8777056]").text(description); $(".js-view-count-work_8777056").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8777056").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8777056"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1380" href="https://www.academia.edu/Documents/in/Computer_Engineering">Computer Engineering</a>, <script data-card-contents-for-ri="1380" type="text/json">{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2345" href="https://www.academia.edu/Documents/in/Wireless_Communications">Wireless Communications</a><script data-card-contents-for-ri="2345" type="text/json">{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8777056]'), work: {"id":8777056,"title":"QUICK INSTALLATION GUIDE Wireless-G Broadband Router with SpeedBooster Model: WRT54GS Package Contents","created_at":"2014-10-14T11:04:15.752-07:00","url":"https://www.academia.edu/8777056/QUICK_INSTALLATION_GUIDE_Wireless_G_Broadband_Router_with_SpeedBooster_Model_WRT54GS_Package_Contents?f_ri=1283","dom_id":"work_8777056","summary":null,"downloadable_attachments":[{"id":35128645,"asset_id":8777056,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":18915935,"first_name":"AVF","last_name":"SPAM","domain_name":"ucv-ro","page_name":"AVFSPAM","display_name":"AVF SPAM","profile_url":"https://ucv-ro.academia.edu/AVFSPAM?f_ri=1283","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1283","nofollow":false},{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=1283","nofollow":false},{"id":2513,"name":"Molecular Biology","url":"https://www.academia.edu/Documents/in/Molecular_Biology?f_ri=1283"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=1283"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_5378533" data-work_id="5378533" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/5378533/Beale_remedies_1">Beale remedies 1</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/5378533" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d8b1887b6796afbf4e90c9d33b4699c3" rel="nofollow" data-download="{"attachment_id":32522482,"asset_id":5378533,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/32522482/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="7488864" href="https://ttu-ee.academia.edu/KhawajaWaqar">Khawaja Waqar</a><script data-card-contents-for-user="7488864" type="text/json">{"id":7488864,"first_name":"Khawaja","last_name":"Waqar","domain_name":"ttu-ee","page_name":"KhawajaWaqar","display_name":"Khawaja Waqar","profile_url":"https://ttu-ee.academia.edu/KhawajaWaqar?f_ri=1283","photo":"https://0.academia-photos.com/7488864/2729082/3178762/s65_khawaja.waqar.jpg"}</script></span></span></li><li class="js-paper-rank-work_5378533 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="5378533"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 5378533, container: ".js-paper-rank-work_5378533", }); });</script></li><li class="js-percentile-work_5378533 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 5378533; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_5378533"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_5378533 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="5378533"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 5378533; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=5378533]").text(description); $(".js-view-count-work_5378533").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_5378533").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="5378533"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="41" href="https://www.academia.edu/Documents/in/Real_Estate">Real Estate</a>, <script data-card-contents-for-ri="41" type="text/json">{"id":41,"name":"Real Estate","url":"https://www.academia.edu/Documents/in/Real_Estate?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="534" href="https://www.academia.edu/Documents/in/Law">Law</a>, <script data-card-contents-for-ri="534" type="text/json">{"id":534,"name":"Law","url":"https://www.academia.edu/Documents/in/Law?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="977" href="https://www.academia.edu/Documents/in/Development_Studies">Development Studies</a>, <script data-card-contents-for-ri="977" type="text/json">{"id":977,"name":"Development Studies","url":"https://www.academia.edu/Documents/in/Development_Studies?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a><script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=5378533]'), work: {"id":5378533,"title":"Beale remedies 1","created_at":"2013-12-10T07:43:40.855-08:00","url":"https://www.academia.edu/5378533/Beale_remedies_1?f_ri=1283","dom_id":"work_5378533","summary":null,"downloadable_attachments":[{"id":32522482,"asset_id":5378533,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":7488864,"first_name":"Khawaja","last_name":"Waqar","domain_name":"ttu-ee","page_name":"KhawajaWaqar","display_name":"Khawaja Waqar","profile_url":"https://ttu-ee.academia.edu/KhawajaWaqar?f_ri=1283","photo":"https://0.academia-photos.com/7488864/2729082/3178762/s65_khawaja.waqar.jpg"}],"research_interests":[{"id":41,"name":"Real Estate","url":"https://www.academia.edu/Documents/in/Real_Estate?f_ri=1283","nofollow":false},{"id":534,"name":"Law","url":"https://www.academia.edu/Documents/in/Law?f_ri=1283","nofollow":false},{"id":977,"name":"Development Studies","url":"https://www.academia.edu/Documents/in/Development_Studies?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":6603,"name":"Property","url":"https://www.academia.edu/Documents/in/Property?f_ri=1283"},{"id":7453,"name":"Rural Development","url":"https://www.academia.edu/Documents/in/Rural_Development?f_ri=1283"},{"id":7725,"name":"Urban Studies","url":"https://www.academia.edu/Documents/in/Urban_Studies?f_ri=1283"},{"id":9521,"name":"Housing","url":"https://www.academia.edu/Documents/in/Housing?f_ri=1283"},{"id":9846,"name":"Ecology","url":"https://www.academia.edu/Documents/in/Ecology?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_556973" data-work_id="556973" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/556973/Ethnicity_and_Violence_The_Case_of_Radical_Basque_Nationalism_2008_">Ethnicity and Violence: The Case of Radical Basque Nationalism (2008)</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/556973" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f5b03bf91a58d496ea46910680520444" rel="nofollow" data-download="{"attachment_id":34885241,"asset_id":556973,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/34885241/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="38801" href="https://st-andrews.academia.edu/DiegoMuro">Diego Muro</a><script data-card-contents-for-user="38801" type="text/json">{"id":38801,"first_name":"Diego","last_name":"Muro","domain_name":"st-andrews","page_name":"DiegoMuro","display_name":"Diego Muro","profile_url":"https://st-andrews.academia.edu/DiegoMuro?f_ri=1283","photo":"https://0.academia-photos.com/38801/354173/42575195/s65_diego.muro.png"}</script></span></span></li><li class="js-paper-rank-work_556973 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="556973"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 556973, container: ".js-paper-rank-work_556973", }); });</script></li><li class="js-percentile-work_556973 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 556973; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_556973"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_556973 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="556973"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 556973; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=556973]").text(description); $(".js-view-count-work_556973").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_556973").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="556973"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">20</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="201" href="https://www.academia.edu/Documents/in/Political_Sociology">Political Sociology</a>, <script data-card-contents-for-ri="201" type="text/json">{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1198" href="https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies">Peace and Conflict Studies</a>, <script data-card-contents-for-ri="1198" type="text/json">{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1237" href="https://www.academia.edu/Documents/in/Social_Sciences">Social Sciences</a>, <script data-card-contents-for-ri="1237" type="text/json">{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a><script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=556973]'), work: {"id":556973,"title":"Ethnicity and Violence: The Case of Radical Basque Nationalism (2008)","created_at":"2011-05-01T04:07:58.090-07:00","url":"https://www.academia.edu/556973/Ethnicity_and_Violence_The_Case_of_Radical_Basque_Nationalism_2008_?f_ri=1283","dom_id":"work_556973","summary":null,"downloadable_attachments":[{"id":34885241,"asset_id":556973,"asset_type":"Work","always_allow_download":false},{"id":42482590,"asset_id":556973,"asset_type":"Work","always_allow_download":false},{"id":34885240,"asset_id":556973,"asset_type":"Work","always_allow_download":false},{"id":34885236,"asset_id":556973,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":38801,"first_name":"Diego","last_name":"Muro","domain_name":"st-andrews","page_name":"DiegoMuro","display_name":"Diego Muro","profile_url":"https://st-andrews.academia.edu/DiegoMuro?f_ri=1283","photo":"https://0.academia-photos.com/38801/354173/42575195/s65_diego.muro.png"}],"research_interests":[{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=1283","nofollow":false},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=1283","nofollow":false},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1283"},{"id":1715,"name":"Basque Studies","url":"https://www.academia.edu/Documents/in/Basque_Studies?f_ri=1283"},{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1283"},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=1283"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1283"},{"id":5272,"name":"Identity (Culture)","url":"https://www.academia.edu/Documents/in/Identity_Culture_?f_ri=1283"},{"id":5453,"name":"Race and Ethnicity","url":"https://www.academia.edu/Documents/in/Race_and_Ethnicity?f_ri=1283"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1283"},{"id":5878,"name":"Nationalism","url":"https://www.academia.edu/Documents/in/Nationalism?f_ri=1283"},{"id":10422,"name":"National Identity","url":"https://www.academia.edu/Documents/in/National_Identity?f_ri=1283"},{"id":11358,"name":"Secession","url":"https://www.academia.edu/Documents/in/Secession?f_ri=1283"},{"id":16211,"name":"Ethnic Conflict","url":"https://www.academia.edu/Documents/in/Ethnic_Conflict?f_ri=1283"},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1283"},{"id":40516,"name":"Spain","url":"https://www.academia.edu/Documents/in/Spain?f_ri=1283"},{"id":118223,"name":"Centre-Periphery Relations","url":"https://www.academia.edu/Documents/in/Centre-Periphery_Relations?f_ri=1283"},{"id":364561,"name":"Separatism","url":"https://www.academia.edu/Documents/in/Separatism?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_69082920" data-work_id="69082920" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/69082920/Deception_on_the_Network_Thinking_Differently_About_Covert_Channels">Deception on the Network: Thinking Differently About Covert Channels</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/69082920" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4087166c2b62e4192173ec8f1353446c" rel="nofollow" data-download="{"attachment_id":79317193,"asset_id":69082920,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/79317193/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="8289142" href="https://fu-berlin.academia.edu/MaartenVanHorenbeeck">Maarten Van Horenbeeck</a><script data-card-contents-for-user="8289142" type="text/json">{"id":8289142,"first_name":"Maarten","last_name":"Van Horenbeeck","domain_name":"fu-berlin","page_name":"MaartenVanHorenbeeck","display_name":"Maarten Van Horenbeeck","profile_url":"https://fu-berlin.academia.edu/MaartenVanHorenbeeck?f_ri=1283","photo":"https://0.academia-photos.com/8289142/2832033/20127660/s65_maarten.van_horenbeeck.jpg"}</script></span></span></li><li class="js-paper-rank-work_69082920 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="69082920"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 69082920, container: ".js-paper-rank-work_69082920", }); });</script></li><li class="js-percentile-work_69082920 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 69082920; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_69082920"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_69082920 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="69082920"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 69082920; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=69082920]").text(description); $(".js-view-count-work_69082920").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_69082920").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="69082920"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">11</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="12061" href="https://www.academia.edu/Documents/in/Risk_Management">Risk Management</a>, <script data-card-contents-for-ri="12061" type="text/json">{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13498" href="https://www.academia.edu/Documents/in/Covert_Channels">Covert Channels</a>, <script data-card-contents-for-ri="13498" type="text/json">{"id":13498,"name":"Covert Channels","url":"https://www.academia.edu/Documents/in/Covert_Channels?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="20149" href="https://www.academia.edu/Documents/in/Information_Assurance">Information Assurance</a><script data-card-contents-for-ri="20149" type="text/json">{"id":20149,"name":"Information Assurance","url":"https://www.academia.edu/Documents/in/Information_Assurance?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=69082920]'), work: {"id":69082920,"title":"Deception on the Network: Thinking Differently About Covert Channels","created_at":"2022-01-21T20:37:24.895-08:00","url":"https://www.academia.edu/69082920/Deception_on_the_Network_Thinking_Differently_About_Covert_Channels?f_ri=1283","dom_id":"work_69082920","summary":null,"downloadable_attachments":[{"id":79317193,"asset_id":69082920,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":8289142,"first_name":"Maarten","last_name":"Van Horenbeeck","domain_name":"fu-berlin","page_name":"MaartenVanHorenbeeck","display_name":"Maarten Van Horenbeeck","profile_url":"https://fu-berlin.academia.edu/MaartenVanHorenbeeck?f_ri=1283","photo":"https://0.academia-photos.com/8289142/2832033/20127660/s65_maarten.van_horenbeeck.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=1283","nofollow":false},{"id":13498,"name":"Covert Channels","url":"https://www.academia.edu/Documents/in/Covert_Channels?f_ri=1283","nofollow":false},{"id":20149,"name":"Information Assurance","url":"https://www.academia.edu/Documents/in/Information_Assurance?f_ri=1283","nofollow":false},{"id":23506,"name":"Information Security and Privacy","url":"https://www.academia.edu/Documents/in/Information_Security_and_Privacy?f_ri=1283"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management?f_ri=1283"},{"id":50711,"name":"Risk Analysis","url":"https://www.academia.edu/Documents/in/Risk_Analysis?f_ri=1283"},{"id":52859,"name":"Deception","url":"https://www.academia.edu/Documents/in/Deception?f_ri=1283"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283"},{"id":392552,"name":"Threat Modelling","url":"https://www.academia.edu/Documents/in/Threat_Modelling?f_ri=1283"},{"id":1653873,"name":"Covert Channel","url":"https://www.academia.edu/Documents/in/Covert_Channel?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_78829553" data-work_id="78829553" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/78829553/THE_EFFECTS_OF_WEAK_AUTHENTICATION_TOWARDS_DATA_PRIVACY_IN_NOSQL_DATABASES">THE EFFECTS OF WEAK AUTHENTICATION TOWARDS DATA PRIVACY IN NOSQL DATABASES</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">NoSQL databases have become more popular and preferable in modern data architecture. It has become a powerful way to store data in a specialized format that yields fast performance for a large amount of data. NoSQL databases are designed... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_78829553" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">NoSQL databases have become more popular and preferable in modern data architecture. It has become a powerful way to store data in a specialized format that yields fast performance for a large amount of data. NoSQL databases are designed for modern web-scale databases. Although, nowadays, it is used to handle big data and many real-time web applications. They can handle enormous amount of unstructured data and structured data. As a result, developers will be able to be more nimble. NoSQL database developers, for example, may deploy code updates more quickly than relational database developers. However, security remains a very difficult issue even with NoSQL databases, as the security concerns inherent in previous databases have not been resolved in NoSQL. The most common example is that their password storage mechanism is weak, meaning it can be decrypted easily. This means that NoSQL databases have weaknesses and one of them is authentication weakness. This paper evaluates how strong the authentication aspect towards different kinds of attacks on a NoSQL database.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/78829553" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4e8f152e2fc7128456ca73c5025fdb56" rel="nofollow" data-download="{"attachment_id":85735192,"asset_id":78829553,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/85735192/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="6514308" href="https://sgu-id.academia.edu/JamesPurnama">James Purnama</a><script data-card-contents-for-user="6514308" type="text/json">{"id":6514308,"first_name":"James","last_name":"Purnama","domain_name":"sgu-id","page_name":"JamesPurnama","display_name":"James Purnama","profile_url":"https://sgu-id.academia.edu/JamesPurnama?f_ri=1283","photo":"https://0.academia-photos.com/6514308/55950793/44140820/s65_james.purnama.jpeg"}</script></span></span></li><li class="js-paper-rank-work_78829553 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="78829553"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 78829553, container: ".js-paper-rank-work_78829553", }); });</script></li><li class="js-percentile-work_78829553 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78829553; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_78829553"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_78829553 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="78829553"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78829553; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78829553]").text(description); $(".js-view-count-work_78829553").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_78829553").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="78829553"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2482" href="https://www.academia.edu/Documents/in/Database_Systems">Database Systems</a>, <script data-card-contents-for-ri="2482" type="text/json">{"id":2482,"name":"Database Systems","url":"https://www.academia.edu/Documents/in/Database_Systems?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4252" href="https://www.academia.edu/Documents/in/Computer_Networks">Computer Networks</a><script data-card-contents-for-ri="4252" type="text/json">{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=78829553]'), work: {"id":78829553,"title":"THE EFFECTS OF WEAK AUTHENTICATION TOWARDS DATA PRIVACY IN NOSQL DATABASES","created_at":"2022-05-09T02:04:30.782-07:00","url":"https://www.academia.edu/78829553/THE_EFFECTS_OF_WEAK_AUTHENTICATION_TOWARDS_DATA_PRIVACY_IN_NOSQL_DATABASES?f_ri=1283","dom_id":"work_78829553","summary":"NoSQL databases have become more popular and preferable in modern data architecture. It has become a powerful way to store data in a specialized format that yields fast performance for a large amount of data. NoSQL databases are designed for modern web-scale databases. Although, nowadays, it is used to handle big data and many real-time web applications. They can handle enormous amount of unstructured data and structured data. As a result, developers will be able to be more nimble. NoSQL database developers, for example, may deploy code updates more quickly than relational database developers. However, security remains a very difficult issue even with NoSQL databases, as the security concerns inherent in previous databases have not been resolved in NoSQL. The most common example is that their password storage mechanism is weak, meaning it can be decrypted easily. This means that NoSQL databases have weaknesses and one of them is authentication weakness. This paper evaluates how strong the authentication aspect towards different kinds of attacks on a NoSQL database.","downloadable_attachments":[{"id":85735192,"asset_id":78829553,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":6514308,"first_name":"James","last_name":"Purnama","domain_name":"sgu-id","page_name":"JamesPurnama","display_name":"James Purnama","profile_url":"https://sgu-id.academia.edu/JamesPurnama?f_ri=1283","photo":"https://0.academia-photos.com/6514308/55950793/44140820/s65_james.purnama.jpeg"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":2482,"name":"Database Systems","url":"https://www.academia.edu/Documents/in/Database_Systems?f_ri=1283","nofollow":false},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283"},{"id":27360,"name":"Databases","url":"https://www.academia.edu/Documents/in/Databases?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_77518511" data-work_id="77518511" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/77518511/Study_on_Theoretical_Aspects_of_Virtual_Data_Integration_and_its_Applications">Study on Theoretical Aspects of Virtual Data Integration and its Applications</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Data integration is the technique of merging data residing at different sources at different locations, and providing users with an integrated, reconciled view of these data. Such unified view is called global or mediated schema. It... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_77518511" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Data integration is the technique of merging data residing at different sources at different locations, and providing users with an integrated, reconciled view of these data. Such unified view is called global or mediated schema. It represents the intentional level of the integrated and reconciled data. In the data integration system, our area of interest in this paper is characterized by an architecture based on a global schema and a set of sources or source schemas. The objective of this paper is to provide a study on the theoretical aspects of data integration systems and to present a comprehensive review of the applications of data integration in various fields including biomedicine, environment, and social networks. It also discusses a privacy framework for protecting user’s privacy with privacy views and privacy policies.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/77518511" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="922ca457060cd2254ded612014017d4b" rel="nofollow" data-download="{"attachment_id":84831066,"asset_id":77518511,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/84831066/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="59260523" href="https://independent.academia.edu/NashreenNesa">Nashreen Nesa</a><script data-card-contents-for-user="59260523" type="text/json">{"id":59260523,"first_name":"Nashreen","last_name":"Nesa","domain_name":"independent","page_name":"NashreenNesa","display_name":"Nashreen Nesa","profile_url":"https://independent.academia.edu/NashreenNesa?f_ri=1283","photo":"https://0.academia-photos.com/59260523/18889418/18843952/s65_nashreen.nesa.jpg"}</script></span></span></li><li class="js-paper-rank-work_77518511 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="77518511"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 77518511, container: ".js-paper-rank-work_77518511", }); });</script></li><li class="js-percentile-work_77518511 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 77518511; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_77518511"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_77518511 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="77518511"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 77518511; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=77518511]").text(description); $(".js-view-count-work_77518511").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_77518511").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="77518511"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a>, <script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="17679" href="https://www.academia.edu/Documents/in/Online_social_networks">Online social networks</a>, <script data-card-contents-for-ri="17679" type="text/json">{"id":17679,"name":"Online social networks","url":"https://www.academia.edu/Documents/in/Online_social_networks?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="48769" href="https://www.academia.edu/Documents/in/Data_Integration">Data Integration</a><script data-card-contents-for-ri="48769" type="text/json">{"id":48769,"name":"Data Integration","url":"https://www.academia.edu/Documents/in/Data_Integration?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=77518511]'), work: {"id":77518511,"title":"Study on Theoretical Aspects of Virtual Data Integration and its Applications","created_at":"2022-04-24T23:00:35.540-07:00","url":"https://www.academia.edu/77518511/Study_on_Theoretical_Aspects_of_Virtual_Data_Integration_and_its_Applications?f_ri=1283","dom_id":"work_77518511","summary":"Data integration is the technique of merging data residing at different sources at different locations, and providing users with an integrated, reconciled view of these data. Such unified view is called global or mediated schema. It represents the intentional level of the integrated and reconciled data. In the data integration system, our area of interest in this paper is characterized by an architecture based on a global schema and a set of sources or source schemas. The objective of this paper is to provide a study on the theoretical aspects of data integration systems and to present a comprehensive review of the applications of data integration in various fields including biomedicine, environment, and social networks. It also discusses a privacy framework for protecting user’s privacy with privacy views and privacy policies.","downloadable_attachments":[{"id":84831066,"asset_id":77518511,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":59260523,"first_name":"Nashreen","last_name":"Nesa","domain_name":"independent","page_name":"NashreenNesa","display_name":"Nashreen Nesa","profile_url":"https://independent.academia.edu/NashreenNesa?f_ri=1283","photo":"https://0.academia-photos.com/59260523/18889418/18843952/s65_nashreen.nesa.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":17679,"name":"Online social networks","url":"https://www.academia.edu/Documents/in/Online_social_networks?f_ri=1283","nofollow":false},{"id":48769,"name":"Data Integration","url":"https://www.academia.edu/Documents/in/Data_Integration?f_ri=1283","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_77443581" data-work_id="77443581" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/77443581/Strategic_planning_for_computer_science_security_of_networks_and_systems_in_SMEs">Strategic planning for computer science security of networks and systems in SMEs</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/77443581" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="05403bbbce77b291ba6892b40392a811" rel="nofollow" data-download="{"attachment_id":84807666,"asset_id":77443581,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/84807666/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="6363640" href="https://itmmerida.academia.edu/JuanCarlosOlivaresRojas">Juan Carlos Olivares Rojas</a><script data-card-contents-for-user="6363640" type="text/json">{"id":6363640,"first_name":"Juan Carlos","last_name":"Olivares Rojas","domain_name":"itmmerida","page_name":"JuanCarlosOlivaresRojas","display_name":"Juan Carlos Olivares Rojas","profile_url":"https://itmmerida.academia.edu/JuanCarlosOlivaresRojas?f_ri=1283","photo":"https://0.academia-photos.com/6363640/3150767/34221186/s65_juan_carlos.olivares_rojas.jpg"}</script></span></span></li><li class="js-paper-rank-work_77443581 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="77443581"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 77443581, container: ".js-paper-rank-work_77443581", }); });</script></li><li class="js-percentile-work_77443581 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 77443581; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_77443581"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_77443581 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="77443581"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 77443581; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=77443581]").text(description); $(".js-view-count-work_77443581").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_77443581").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="77443581"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="26" href="https://www.academia.edu/Documents/in/Business">Business</a>, <script data-card-contents-for-ri="26" type="text/json">{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3703" href="https://www.academia.edu/Documents/in/Network_Security">Network Security</a><script data-card-contents-for-ri="3703" type="text/json">{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=77443581]'), work: {"id":77443581,"title":"Strategic planning for computer science security of networks and systems in SMEs","created_at":"2022-04-24T04:55:18.144-07:00","url":"https://www.academia.edu/77443581/Strategic_planning_for_computer_science_security_of_networks_and_systems_in_SMEs?f_ri=1283","dom_id":"work_77443581","summary":null,"downloadable_attachments":[{"id":84807666,"asset_id":77443581,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":6363640,"first_name":"Juan Carlos","last_name":"Olivares Rojas","domain_name":"itmmerida","page_name":"JuanCarlosOlivaresRojas","display_name":"Juan Carlos Olivares Rojas","profile_url":"https://itmmerida.academia.edu/JuanCarlosOlivaresRojas?f_ri=1283","photo":"https://0.academia-photos.com/6363640/3150767/34221186/s65_juan_carlos.olivares_rojas.jpg"}],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business?f_ri=1283","nofollow":false},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=1283","nofollow":false},{"id":7739,"name":"Strategic Planning","url":"https://www.academia.edu/Documents/in/Strategic_Planning?f_ri=1283"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283"},{"id":49185,"name":"Technological change","url":"https://www.academia.edu/Documents/in/Technological_change?f_ri=1283"},{"id":1975886,"name":"Data Stream","url":"https://www.academia.edu/Documents/in/Data_Stream?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_74059801" data-work_id="74059801" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/74059801/Securing_Cloud_Computing_Through_IT_Governance">Securing Cloud Computing Through IT Governance</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/74059801" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4b1ea0d38654ff91a95a8f0c804566d3" rel="nofollow" data-download="{"attachment_id":82348852,"asset_id":74059801,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/82348852/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="12096659" href="https://independent.academia.edu/shawon91">Shawon Rahman</a><script data-card-contents-for-user="12096659" type="text/json">{"id":12096659,"first_name":"Shawon","last_name":"Rahman","domain_name":"independent","page_name":"shawon91","display_name":"Shawon Rahman","profile_url":"https://independent.academia.edu/shawon91?f_ri=1283","photo":"https://0.academia-photos.com/12096659/3471834/17889392/s65_shawon.rahman.jpg"}</script></span></span></li><li class="js-paper-rank-work_74059801 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="74059801"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 74059801, container: ".js-paper-rank-work_74059801", }); });</script></li><li class="js-percentile-work_74059801 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 74059801; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_74059801"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_74059801 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="74059801"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 74059801; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=74059801]").text(description); $(".js-view-count-work_74059801").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_74059801").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="74059801"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">19</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="8096" href="https://www.academia.edu/Documents/in/Information_Security_Auditing">Information Security Auditing</a>, <script data-card-contents-for-ri="8096" type="text/json">{"id":8096,"name":"Information Security Auditing","url":"https://www.academia.edu/Documents/in/Information_Security_Auditing?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="23506" href="https://www.academia.edu/Documents/in/Information_Security_and_Privacy">Information Security and Privacy</a>, <script data-card-contents-for-ri="23506" type="text/json">{"id":23506,"name":"Information Security and Privacy","url":"https://www.academia.edu/Documents/in/Information_Security_and_Privacy?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="26860" href="https://www.academia.edu/Documents/in/Cloud_Computing">Cloud Computing</a><script data-card-contents-for-ri="26860" type="text/json">{"id":26860,"name":"Cloud Computing","url":"https://www.academia.edu/Documents/in/Cloud_Computing?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=74059801]'), work: {"id":74059801,"title":"Securing Cloud Computing Through IT Governance","created_at":"2022-03-19T03:14:22.904-07:00","url":"https://www.academia.edu/74059801/Securing_Cloud_Computing_Through_IT_Governance?f_ri=1283","dom_id":"work_74059801","summary":null,"downloadable_attachments":[{"id":82348852,"asset_id":74059801,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":12096659,"first_name":"Shawon","last_name":"Rahman","domain_name":"independent","page_name":"shawon91","display_name":"Shawon Rahman","profile_url":"https://independent.academia.edu/shawon91?f_ri=1283","photo":"https://0.academia-photos.com/12096659/3471834/17889392/s65_shawon.rahman.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":8096,"name":"Information Security Auditing","url":"https://www.academia.edu/Documents/in/Information_Security_Auditing?f_ri=1283","nofollow":false},{"id":23506,"name":"Information Security and Privacy","url":"https://www.academia.edu/Documents/in/Information_Security_and_Privacy?f_ri=1283","nofollow":false},{"id":26860,"name":"Cloud Computing","url":"https://www.academia.edu/Documents/in/Cloud_Computing?f_ri=1283","nofollow":false},{"id":45500,"name":"Information System Security","url":"https://www.academia.edu/Documents/in/Information_System_Security?f_ri=1283"},{"id":61968,"name":"IT Governance","url":"https://www.academia.edu/Documents/in/IT_Governance?f_ri=1283"},{"id":69856,"name":"Social Science Research Network","url":"https://www.academia.edu/Documents/in/Social_Science_Research_Network?f_ri=1283"},{"id":101534,"name":"Mobile Cloud Computing","url":"https://www.academia.edu/Documents/in/Mobile_Cloud_Computing?f_ri=1283"},{"id":181551,"name":"Cloud Computing Security","url":"https://www.academia.edu/Documents/in/Cloud_Computing_Security-1?f_ri=1283"},{"id":188414,"name":"Information Security Management","url":"https://www.academia.edu/Documents/in/Information_Security_Management?f_ri=1283"},{"id":227505,"name":"Origin of Cloud Computing","url":"https://www.academia.edu/Documents/in/Origin_of_Cloud_Computing?f_ri=1283"},{"id":231134,"name":"Security in Cloud Computing","url":"https://www.academia.edu/Documents/in/Security_in_Cloud_Computing?f_ri=1283"},{"id":265411,"name":"Information Technology and Security","url":"https://www.academia.edu/Documents/in/Information_Technology_and_Security?f_ri=1283"},{"id":457037,"name":"Ethical Hacking and Information Security","url":"https://www.academia.edu/Documents/in/Ethical_Hacking_and_Information_Security?f_ri=1283"},{"id":517949,"name":"Computer Networks and Information Security","url":"https://www.academia.edu/Documents/in/Computer_Networks_and_Information_Security?f_ri=1283"},{"id":600499,"name":"Computer Network and Cloud Computing","url":"https://www.academia.edu/Documents/in/Computer_Network_and_Cloud_Computing?f_ri=1283"},{"id":824049,"name":"Web Mining and Cloud Computing","url":"https://www.academia.edu/Documents/in/Web_Mining_and_Cloud_Computing?f_ri=1283"},{"id":853685,"name":"Cloud Computing and Virtualization","url":"https://www.academia.edu/Documents/in/Cloud_Computing_and_Virtualization?f_ri=1283"},{"id":1750142,"name":"Business IT alignment","url":"https://www.academia.edu/Documents/in/Business_IT_alignment-1?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43785413" data-work_id="43785413" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43785413/A_novel_automatic_voice_recognition_system_based_on_text_independent_in_a_noisy_environment">A novel automatic voice recognition system based on text-independent in a noisy environment</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Automatic voice recognition system aims to limit fraudulent access to sensitive areas as labs. Our primary objective of this paper is to increase the accuracy of the voice recognition in noisy environment of the Microsoft Research (MSR)... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43785413" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Automatic voice recognition system aims to limit fraudulent access to sensitive areas as labs. Our primary objective of this paper is to increase the accuracy of the voice recognition in noisy environment of the Microsoft Research (MSR) identity toolbox. The proposed system enabled the user to speak into the microphone then it will match unknown voice with other human voices existing in the database using a statistical model, in order to grant or deny access to the system. The voice recognition was done in two steps: training and testing. During the training a Universal Background Model as well as a Gaussian Mixtures Model: GMM-UBM models are calculated based on different sentences pronounced by the human voice (s) used to record the training data. Then the testing of voice signal in noisy environment calculated the Log-Likelihood Ratio of the GMM-UBM models in order to classify user's voice. However, before testing noise and de-noise methods were applied, we investigated different MFCC features of the voice to determine the best feature possible as well as noise filter algorithm that subsequently improved the performance of the automatic voice recognition system. Keywords: Automatic voice recognition (AVR) Gaussian mixture model (GMM) Mel frequency cepstral confections (MFCC's) Microsoft research (MSR) identity toolbox Universal background model (UBM)</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43785413" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="9842b5ffc02a41cf01f798fa3477e1e9" rel="nofollow" data-download="{"attachment_id":64100624,"asset_id":43785413,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/64100624/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="163474776" href="https://independent.academia.edu/JournalIJECE">International Journal of Electrical and Computer Engineering (IJECE)</a><script data-card-contents-for-user="163474776" type="text/json">{"id":163474776,"first_name":"International Journal of Electrical and Computer Engineering","last_name":"(IJECE)","domain_name":"independent","page_name":"JournalIJECE","display_name":"International Journal of Electrical and Computer Engineering (IJECE)","profile_url":"https://independent.academia.edu/JournalIJECE?f_ri=1283","photo":"https://0.academia-photos.com/163474776/123357473/112705609/s65_international_journal_of_electrical_and_computer_engineering._ijece_.jpg"}</script></span></span></li><li class="js-paper-rank-work_43785413 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43785413"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43785413, container: ".js-paper-rank-work_43785413", }); });</script></li><li class="js-percentile-work_43785413 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43785413; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43785413"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43785413 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43785413"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43785413; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43785413]").text(description); $(".js-view-count-work_43785413").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43785413").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43785413"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">12</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="465" href="https://www.academia.edu/Documents/in/Artificial_Intelligence">Artificial Intelligence</a>, <script data-card-contents-for-ri="465" type="text/json">{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1185" href="https://www.academia.edu/Documents/in/Image_Processing">Image Processing</a>, <script data-card-contents-for-ri="1185" type="text/json">{"id":1185,"name":"Image Processing","url":"https://www.academia.edu/Documents/in/Image_Processing?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a><script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43785413]'), work: {"id":43785413,"title":"A novel automatic voice recognition system based on text-independent in a noisy environment","created_at":"2020-08-04T23:42:44.866-07:00","url":"https://www.academia.edu/43785413/A_novel_automatic_voice_recognition_system_based_on_text_independent_in_a_noisy_environment?f_ri=1283","dom_id":"work_43785413","summary":"Automatic voice recognition system aims to limit fraudulent access to sensitive areas as labs. Our primary objective of this paper is to increase the accuracy of the voice recognition in noisy environment of the Microsoft Research (MSR) identity toolbox. The proposed system enabled the user to speak into the microphone then it will match unknown voice with other human voices existing in the database using a statistical model, in order to grant or deny access to the system. The voice recognition was done in two steps: training and testing. During the training a Universal Background Model as well as a Gaussian Mixtures Model: GMM-UBM models are calculated based on different sentences pronounced by the human voice (s) used to record the training data. Then the testing of voice signal in noisy environment calculated the Log-Likelihood Ratio of the GMM-UBM models in order to classify user's voice. However, before testing noise and de-noise methods were applied, we investigated different MFCC features of the voice to determine the best feature possible as well as noise filter algorithm that subsequently improved the performance of the automatic voice recognition system. Keywords: Automatic voice recognition (AVR) Gaussian mixture model (GMM) Mel frequency cepstral confections (MFCC's) Microsoft research (MSR) identity toolbox Universal background model (UBM)","downloadable_attachments":[{"id":64100624,"asset_id":43785413,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":163474776,"first_name":"International Journal of Electrical and Computer Engineering","last_name":"(IJECE)","domain_name":"independent","page_name":"JournalIJECE","display_name":"International Journal of Electrical and Computer Engineering (IJECE)","profile_url":"https://independent.academia.edu/JournalIJECE?f_ri=1283","photo":"https://0.academia-photos.com/163474776/123357473/112705609/s65_international_journal_of_electrical_and_computer_engineering._ijece_.jpg"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=1283","nofollow":false},{"id":1185,"name":"Image Processing","url":"https://www.academia.edu/Documents/in/Image_Processing?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=1283"},{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=1283"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283"},{"id":327120,"name":"Gaussian Mixture Model","url":"https://www.academia.edu/Documents/in/Gaussian_Mixture_Model?f_ri=1283"},{"id":377724,"name":"Gaussian mixture Models","url":"https://www.academia.edu/Documents/in/Gaussian_mixture_Models?f_ri=1283"},{"id":3719353,"name":"Universal Background Model","url":"https://www.academia.edu/Documents/in/Universal_Background_Model?f_ri=1283"},{"id":3731169,"name":"Automatic voice recognition ","url":"https://www.academia.edu/Documents/in/Automatic_voice_recognition?f_ri=1283"},{"id":3731170,"name":"Microsoft research (MSR) identity toolbox","url":"https://www.academia.edu/Documents/in/Microsoft_research_MSR_identity_toolbox?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_39645342" data-work_id="39645342" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/39645342/Bili%C5%9Fim_Sistemleri_G%C3%BCvenli%C4%9Fine_Giri%C5%9F">Bilişim Sistemleri Güvenliğine Giriş</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Bu yazımı üniversitede aldığım ders notlarımdan oluşturdum. Bilişim Sistemleri Güvenliğine girişi ve yaklaşımları kapsamaktadır.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/39645342" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="954372161452c7eab7d8e12bb81f2c9e" rel="nofollow" data-download="{"attachment_id":59809513,"asset_id":39645342,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/59809513/download_file?st=MTczMjQwNTM2Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="56394815" href="https://ekonomka.academia.edu/AtaErdemir">Ata Erdemir</a><script data-card-contents-for-user="56394815" type="text/json">{"id":56394815,"first_name":"Ata","last_name":"Erdemir","domain_name":"ekonomka","page_name":"AtaErdemir","display_name":"Ata Erdemir","profile_url":"https://ekonomka.academia.edu/AtaErdemir?f_ri=1283","photo":"https://0.academia-photos.com/56394815/14835362/154215920/s65_ata.erdemir.png"}</script></span></span></li><li class="js-paper-rank-work_39645342 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="39645342"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 39645342, container: ".js-paper-rank-work_39645342", }); });</script></li><li class="js-percentile-work_39645342 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 39645342; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_39645342"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_39645342 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="39645342"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 39645342; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=39645342]").text(description); $(".js-view-count-work_39645342").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_39645342").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="39645342"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=39645342]'), work: {"id":39645342,"title":"Bilişim Sistemleri Güvenliğine Giriş","created_at":"2019-06-20T10:14:23.016-07:00","url":"https://www.academia.edu/39645342/Bili%C5%9Fim_Sistemleri_G%C3%BCvenli%C4%9Fine_Giri%C5%9F?f_ri=1283","dom_id":"work_39645342","summary":"Bu yazımı üniversitede aldığım ders notlarımdan oluşturdum. Bilişim Sistemleri Güvenliğine girişi ve yaklaşımları kapsamaktadır.","downloadable_attachments":[{"id":59809513,"asset_id":39645342,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":56394815,"first_name":"Ata","last_name":"Erdemir","domain_name":"ekonomka","page_name":"AtaErdemir","display_name":"Ata Erdemir","profile_url":"https://ekonomka.academia.edu/AtaErdemir?f_ri=1283","photo":"https://0.academia-photos.com/56394815/14835362/154215920/s65_ata.erdemir.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1283","nofollow":false},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1283","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1283","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=1283","nofollow":false},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1283"}]}, }) } })();</script></ul></li></ul></div></div></div><div class="u-taCenter Pagination"><ul class="pagination"><li class="next_page"><a href="/Documents/in/Information_Security?after=50%2C39645342" rel="next">Next</a></li><li class="last next"><a href="/Documents/in/Information_Security?page=last">Last »</a></li></ul></div></div><div class="hidden-xs hidden-sm"><div class="u-pl6x"><div style="width: 300px;"><div class="panel panel-flat u-mt7x"><div class="panel-heading u-p5x"><div class="u-tcGrayDark u-taCenter u-fw700 u-textUppercase">Related Topics</div></div><ul class="list-group"><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cryptography">Cryptography</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="16542">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="16542">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="13923">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="13923">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Network_Security">Network Security</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="3703">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="3703">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Privacy">Privacy</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="2783">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="2783">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="422">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="422">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Applied_Cryptography">Applied Cryptography</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="7795">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="7795">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="115676">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="115676">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Information_Security_and_Privacy">Information Security and Privacy</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="23506">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="23506">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Security_in_wireless_ad_hoc_mesh_sensor_networks">Security in wireless ad hoc, mesh, sensor networks</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="1019269">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="1019269">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Wireless_security">Wireless security</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="11043">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="11043">Following</a></div></li></ul></div></div></div></div></div></div><script>// MIT License // Copyright © 2011 Sebastian Tschan, https://blueimp.net // Permission is hereby granted, free of charge, to any person obtaining a copy of // this software and associated documentation files (the "Software"), to deal in // the Software without restriction, including without limitation the rights to // use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of // the Software, and to permit persons to whom the Software is furnished to do so, // subject to the following conditions: // The above copyright notice and this permission notice shall be included in all // copies or substantial portions of the Software. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS // FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR // COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER // IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN // CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. !function(n){"use strict";function d(n,t){var r=(65535&n)+(65535&t);return(n>>16)+(t>>16)+(r>>16)<<16|65535&r}function f(n,t,r,e,o,u){return d((c=d(d(t,n),d(e,u)))<<(f=o)|c>>>32-f,r);var c,f}function l(n,t,r,e,o,u,c){return f(t&r|~t&e,n,t,o,u,c)}function v(n,t,r,e,o,u,c){return f(t&e|r&~e,n,t,o,u,c)}function g(n,t,r,e,o,u,c){return f(t^r^e,n,t,o,u,c)}function m(n,t,r,e,o,u,c){return f(r^(t|~e),n,t,o,u,c)}function i(n,t){var r,e,o,u;n[t>>5]|=128<<t%32,n[14+(t+64>>>9<<4)]=t;for(var c=1732584193,f=-271733879,i=-1732584194,a=271733878,h=0;h<n.length;h+=16)c=l(r=c,e=f,o=i,u=a,n[h],7,-680876936),a=l(a,c,f,i,n[h+1],12,-389564586),i=l(i,a,c,f,n[h+2],17,606105819),f=l(f,i,a,c,n[h+3],22,-1044525330),c=l(c,f,i,a,n[h+4],7,-176418897),a=l(a,c,f,i,n[h+5],12,1200080426),i=l(i,a,c,f,n[h+6],17,-1473231341),f=l(f,i,a,c,n[h+7],22,-45705983),c=l(c,f,i,a,n[h+8],7,1770035416),a=l(a,c,f,i,n[h+9],12,-1958414417),i=l(i,a,c,f,n[h+10],17,-42063),f=l(f,i,a,c,n[h+11],22,-1990404162),c=l(c,f,i,a,n[h+12],7,1804603682),a=l(a,c,f,i,n[h+13],12,-40341101),i=l(i,a,c,f,n[h+14],17,-1502002290),c=v(c,f=l(f,i,a,c,n[h+15],22,1236535329),i,a,n[h+1],5,-165796510),a=v(a,c,f,i,n[h+6],9,-1069501632),i=v(i,a,c,f,n[h+11],14,643717713),f=v(f,i,a,c,n[h],20,-373897302),c=v(c,f,i,a,n[h+5],5,-701558691),a=v(a,c,f,i,n[h+10],9,38016083),i=v(i,a,c,f,n[h+15],14,-660478335),f=v(f,i,a,c,n[h+4],20,-405537848),c=v(c,f,i,a,n[h+9],5,568446438),a=v(a,c,f,i,n[h+14],9,-1019803690),i=v(i,a,c,f,n[h+3],14,-187363961),f=v(f,i,a,c,n[h+8],20,1163531501),c=v(c,f,i,a,n[h+13],5,-1444681467),a=v(a,c,f,i,n[h+2],9,-51403784),i=v(i,a,c,f,n[h+7],14,1735328473),c=g(c,f=v(f,i,a,c,n[h+12],20,-1926607734),i,a,n[h+5],4,-378558),a=g(a,c,f,i,n[h+8],11,-2022574463),i=g(i,a,c,f,n[h+11],16,1839030562),f=g(f,i,a,c,n[h+14],23,-35309556),c=g(c,f,i,a,n[h+1],4,-1530992060),a=g(a,c,f,i,n[h+4],11,1272893353),i=g(i,a,c,f,n[h+7],16,-155497632),f=g(f,i,a,c,n[h+10],23,-1094730640),c=g(c,f,i,a,n[h+13],4,681279174),a=g(a,c,f,i,n[h],11,-358537222),i=g(i,a,c,f,n[h+3],16,-722521979),f=g(f,i,a,c,n[h+6],23,76029189),c=g(c,f,i,a,n[h+9],4,-640364487),a=g(a,c,f,i,n[h+12],11,-421815835),i=g(i,a,c,f,n[h+15],16,530742520),c=m(c,f=g(f,i,a,c,n[h+2],23,-995338651),i,a,n[h],6,-198630844),a=m(a,c,f,i,n[h+7],10,1126891415),i=m(i,a,c,f,n[h+14],15,-1416354905),f=m(f,i,a,c,n[h+5],21,-57434055),c=m(c,f,i,a,n[h+12],6,1700485571),a=m(a,c,f,i,n[h+3],10,-1894986606),i=m(i,a,c,f,n[h+10],15,-1051523),f=m(f,i,a,c,n[h+1],21,-2054922799),c=m(c,f,i,a,n[h+8],6,1873313359),a=m(a,c,f,i,n[h+15],10,-30611744),i=m(i,a,c,f,n[h+6],15,-1560198380),f=m(f,i,a,c,n[h+13],21,1309151649),c=m(c,f,i,a,n[h+4],6,-145523070),a=m(a,c,f,i,n[h+11],10,-1120210379),i=m(i,a,c,f,n[h+2],15,718787259),f=m(f,i,a,c,n[h+9],21,-343485551),c=d(c,r),f=d(f,e),i=d(i,o),a=d(a,u);return[c,f,i,a]}function a(n){for(var t="",r=32*n.length,e=0;e<r;e+=8)t+=String.fromCharCode(n[e>>5]>>>e%32&255);return t}function h(n){var t=[];for(t[(n.length>>2)-1]=void 0,e=0;e<t.length;e+=1)t[e]=0;for(var r=8*n.length,e=0;e<r;e+=8)t[e>>5]|=(255&n.charCodeAt(e/8))<<e%32;return t}function e(n){for(var t,r="0123456789abcdef",e="",o=0;o<n.length;o+=1)t=n.charCodeAt(o),e+=r.charAt(t>>>4&15)+r.charAt(15&t);return e}function r(n){return unescape(encodeURIComponent(n))}function o(n){return a(i(h(t=r(n)),8*t.length));var t}function u(n,t){return function(n,t){var r,e,o=h(n),u=[],c=[];for(u[15]=c[15]=void 0,16<o.length&&(o=i(o,8*n.length)),r=0;r<16;r+=1)u[r]=909522486^o[r],c[r]=1549556828^o[r];return e=i(u.concat(h(t)),512+8*t.length),a(i(c.concat(e),640))}(r(n),r(t))}function t(n,t,r){return t?r?u(t,n):e(u(t,n)):r?o(n):e(o(n))}"function"==typeof define&&define.amd?define(function(){return t}):"object"==typeof module&&module.exports?module.exports=t:n.md5=t}(this);</script><script>window.AbTest = (function() { return { 'ab_test': (uniqueId, test_name, buckets) => { let override = new URLSearchParams(window.location.search).get(`ab_test[${test_name}]`); if ( override ) { return override; } const bucketNames = buckets.map((bucket) => { return typeof bucket === 'string' ? bucket : Object.keys(bucket)[0]; }); const weights = buckets.map((bucket) => { return typeof bucket === 'string' ? 1 : Object.values(bucket)[0]; }); const total = weights.reduce((sum, weight) => sum + weight); const hash = md5(`${uniqueId}${test_name}`); const hashNum = parseInt(hash.slice(-12), 16); let bucketPoint = total * (hashNum % 100000) / 100000; const bucket = bucketNames.find((_, i) => { if (weights[i] > bucketPoint) { return true; } bucketPoint -= weights[i]; return false; }); return bucket; } }; })();</script><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-landing_url="https://www.academia.edu/Documents/in/Information_Security" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><script>function onGoogleOneTapEvent(event) { var momentType = event.getMomentType(); var momentReason = null; if (event.isNotDisplayed()) { momentReason = event.getNotDisplayedReason(); } else if (event.isSkippedMoment()) { momentReason = event.getSkippedReason(); } else if (event.isDismissedMoment()) { momentReason = event.getDismissedReason(); } Aedu.arbitraryEvents.write('GoogleOneTapEvent', { moment_type: momentType, moment_reason: momentReason, }); }</script><script>(function() { var auvid = unescape( document.cookie .split(/; ?/) .find((s) => s.startsWith('auvid')) .substring(6)); var bucket = AbTest.ab_test(auvid, 'lo_ri_one_tap_google_sign_on', ['control', 'one_tap_google_sign_on']); if (bucket === 'control') return; var oneTapTag = document.createElement('script') oneTapTag.async = true oneTapTag.defer = true oneTapTag.src = 'https://accounts.google.com/gsi/client' document.body.appendChild(oneTapTag) })();</script></div></div></div> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "5d9bbafc2dfa5c490c8380d4f54e8cfdb757a81602f90693274a1ff1aedf147a", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="Az8mYQXQl32rxMwkqCKWgUd6Kc7a+Q55HJQx4TUwhWuI2pEFLahG5q8C2EQ+jPS6i/M35UU6zmeTfijEtNx/2w==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/Documents/in/Information_Security" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="U7/O+KMuzECmjILC/WnMKQJ83a07w9+J3Yz4Yok/Wk7YWnmci1Yd26JKlqJrx64SzvXDhqQAH5dSZuFHCNOg/g==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>