Author of the publication

Exploring the role of work identity and work locus of control in information security awareness.

, , , , and . Comput. Secur., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiobjective sparse ensemble learning by means of evolutionary algorithms., , , , , , and . Decis. Support Syst., (2018)Multiobjective Optimization of Classifiers by Means of 3-D Convex Hull Based Evolutionary Algorithm., , , , , , , and . CoRR, (2014)Published incidents and their proportions of human error., , , and . Inf. Comput. Secur., 27 (3): 343-357 (2019)Modeling and analysis of influence power for information security decisions., , and . Perform. Evaluation, (2016)Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector., , , , and . Int. J. Medical Informatics, (2019)A Portfolio Optimization Approach to Selection in Multiobjective Evolutionary Algorithms., , , and . PPSN, volume 8672 of Lecture Notes in Computer Science, page 672-681. Springer, (2014)Bridging the Cyber Security Skills Gap: Using Tabletop Exercises to Solve the CSSG Crisis., , and . JCSG, volume 12434 of Lecture Notes in Computer Science, page 117-131. Springer, (2020)Nudging for Quantitative Access Control Systems., , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 340-351. Springer, (2014)Designing Strong Privacy Metrics Suites Using Evolutionary Optimization., and . ACM Trans. Priv. Secur., 24 (2): 12:1-12:35 (2021)Improving the drug discovery process by using multiple classifier systems., , , , and . Expert Syst. Appl., (2019)