From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World., , , и . ISSA, стр. 1-11. ISSA, Pretoria, South Africa, (2006)ICT pollution and liability.. SIGCAS Comput. Soc., 41 (1): 48-53 (2011)Bridging the gap between general management and technicians - A case study on ICT security in a developing country., , , , и . Comput. Secur., 26 (1): 44-55 (2007)The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study., , , и . IICIS, том 193 из IFIP, стр. 157-173. Springer, (2004)A method for predicting the probability of business network profitability., , , , , и . Inf. Syst. E Bus. Manag., 12 (4): 567-593 (2014)Risk and Compliance Management Framework for Outsourced Global Software Development., и . ICGSE, стр. 228-233. IEEE Computer Society, (2010)BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business., и . SEC, том 214 из IFIP Conference Proceedings, стр. 335-346. Kluwer, (2002)Business Model Risk Analysis: Predicting the Probability of Business Network Profitability., , , , , и . IWEI, том 144 из Lecture Notes in Business Information Processing, стр. 118-130. Springer, (2013)Value creation and Return On Security Investments (ROSI)., , и . SEC, том 232 из IFIP, стр. 25-35. Springer, (2007)The knowledge pressure on Risk and Security managers is increasing., , и . ARES, стр. 974-979. IEEE Computer Society, (2006)