Author of the publication

Security Culture in Small and Medium-Size Enterprise.

, , , and . CENTERIS (2), volume 110 of Communications in Computer and Information Science, page 315-324. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating advantages of test driven development: a controlled experiment with professionals, , , , and . ISESE '06: Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering, page 364--371. New York, NY, USA, ACM, (2006)Homogenization of Models to Support Multi-model Processes in Improvement Environments., , , and . ICSOFT (1), page 151-156. INSTICC Press, (2009)Analysis and Design of a Recommender System with Agents., , , and . ICSOFT (2), page 175-178. INSTICC Press, (2009)Técnica de Mejora del Mantenimiento Software Basada en Valor., , and . JISBD, page 317-325. Thomson Editorial, (2007)Quality in Conceptual Modelling., and . Information and Database Quality, volume 25 of Advances in Database Systems, Springer, (2002)A Framework for Defining Simulators with Which to Train Global Software Development., , and . ICSOFT (2), page 261-264. SciTePress, (2011)Imitating the knowledge management of communities of practice., , , , and . ICINCO-ICSO, page 173-178. INSTICC Press, (2007)978-972-8865-82-5.Priorización del Valor de Artefactos Software Basada en la Frecuencia de Uso., , and . JISBD, page 183-194. (2008)VENTURE: Towards a framework for simulating GSD in educational environments., , and . RCIS, page 1-10. IEEE, (2011)Ontology-based similarity applied to business process clustering., , and . Journal of Software: Evolution and Process, 26 (12): 1128-1149 (2014)