Author of the publication

Overview of Enterprise Information Needs in Information Security Risk Assessment.

, , , , and . EDOC, page 42-51. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements engineering: The quest for the dependent variable., , and . RE, page 16-25. IEEE Computer Society, (2015)Designing & evaluating a cognitive prosthetic for people with mild dementia., , , , , , , , and . ECCE, page 11-18. Mediamatica, Delft University of Technology, The Netherlands / ACM, (2010)Home Based Assistive Technologies for People with Mild Dementia., , , , , , , , , and 2 other author(s). ICOST, volume 4541 of Lecture Notes in Computer Science, page 63-69. Springer, (2007)Building digital life stories for memory support., , , , and . IJCIH, 1 (2): 161-176 (2010)Assessing Information Security Risks using Pairwise Weighting., , and . ICISSP, page 318-324. SciTePress, (2017)Evaluation of Mobile and Home Based Cognitive Prosthetics., , , , , , , , , and 1 other author(s). ICOST, volume 5120 of Lecture Notes in Computer Science, page 18-25. Springer, (2008)Towards sustainable business models from healthcare technology research., , , , , , , , , and 4 other author(s). Int. J. Comput. Heal., 1 (1): 20-34 (2010)Evaluation of Field Trial 1, and . (2007)CogKnow Article.Dissemination Master Plan, , , , , , , , and . (2007)CogKnow Article.Using Agents for Long-Term Digital Reservation the PROTAGE Project., , , , and . DCAI, volume 50 of Advances in Soft Computing, page 118-122. Springer, (2008)