Author of the publication

Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness.

, , , and . ISC, volume 4176 of Lecture Notes in Computer Science, page 530-545. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using GMB methodology on a large crisis model., , , , , , and . ISCRAM, ISCRAM, Seattle, USA, (2010)Modeling and Simulating Information Security Management., , , , , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 327-336. Springer, (2007)Blind information security strategy., , and . Int. J. Crit. Infrastructure Prot., 2 (3): 95-109 (2009)Learning from Your Elders: A Shortcut to Information Security Management Success., , and . SAFECOMP, volume 4680 of Lecture Notes in Computer Science, page 224-237. Springer, (2007)Semantic Image Retrieval Using Region-Based Relevance Feedback., , and . Adaptive Multimedia Retrieval, volume 4398 of Lecture Notes in Computer Science, page 192-206. Springer, (2006)Object and Event Detection Pipeline for Rink Hockey Games., , , , , , , , and . Future Internet, 16 (6): 179 (June 2024)Home Appliance Recognition Using Edge Intelligence., , , , and . WorldCIST (3), volume 1367 of Advances in Intelligent Systems and Computing, page 619-629. Springer, (2021)Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness., , , and . ISC, volume 4176 of Lecture Notes in Computer Science, page 530-545. Springer, (2006)Security Strategy Analysis for Critical Information Infrastructures., , and . CRITIS, volume 5508 of Lecture Notes in Computer Science, page 247-257. Springer, (2008)Steering Security through Measurement., , , and . TrustBus, volume 5695 of Lecture Notes in Computer Science, page 95-104. Springer, (2009)