Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editors' Introduction: Managing Cybersecurity, , and . IT Professional, 9 (2): 9 (2007)Cybersecurity: Welcome to My World.. IT Prof., 9 (2): 61-64 (2007)IT Productivity = ??. IT Prof., 11 (6): 64-63 (2009)Digital Deception: Cyber Fraud and Online Misinformation., , and . IT Prof., 22 (2): 19-20 (2020)Introduction to SI., , and . IT Prof., 23 (2): 10-11 (2021)Cybersecurity or Privacy Guest editors' introduction., , , and . IT Prof., 18 (5): 16-17 (2016)Web Services - A View from the Top., , , , , , and . IEEE SCC, IEEE Computer Society, (2006)CyberSecurity Privacy Risks.. AHFE (10), volume 268 of Lecture Notes in Networks and Systems, page 191-198. Springer, (2021)Cyber Risks in Social Media.. HCI (14), volume 12194 of Lecture Notes in Computer Science, page 393-406. Springer, (2020)