Author of the publication

Analysing information security in a bank using soft systems methodology.

, and . Inf. Comput. Secur., 25 (3): 240-258 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the effectiveness of ICT to support globally distributed PBL teams., and . ITiCSE, page 47-51. ACM, (2004)Social Robots in Learning Experiences of Adults with Intellectual Disability: An Exploratory Study., , , , and . INTERACT (1), volume 12932 of Lecture Notes in Computer Science, page 266-285. Springer, (2021)Strategic IT issues: the views of some major IT investors., , , and . J. Strateg. Inf. Syst., 1 (4): 183-189 (1992)Design insights into embedding virtual reality content into life skills training for people with intellectual disability., , , , , and . OZCHI, page 581-585. ACM, (2016)The Cyber Security Knowledge Exchange: Working with Employers to Produce Authentic PBL Scenarios and Enhance Employability., and . Trans. Edutainment, (2019)Analysing information security in a bank using soft systems methodology., and . Inf. Comput. Secur., 25 (3): 240-258 (2017)Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure., , and . ICITST, page 162-167. IEEE, (2013)Evaluating a Second Life Problem-Based Learning (PBL) demonstrator project: what can we learn?, , , and . Interact. Learn. Environ., 22 (1): 125-141 (2014)Virtual student teams: opportunities and challenges., , , , and . ITiCSE, page 340-341. ACM, (2005)The NASA Technical Report Server., , , , , , , , , and 1 other author(s). Internet Res., 5 (2): 25-36 (1995)