From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach., , , и . Information, 11 (5): 261 (2020)PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange., , , , , , , , , и 8 other автор(ы). CoRR, (2023)How nostalgic feelings impact Pokémon Go players - integrating childhood brand nostalgia into the technology acceptance theory., и . Behav. Inf. Technol., 39 (12): 1276-1296 (2020)A Structured Comparison of the Corporate Information Security Maturity Level., и . SEC, том 562 из IFIP Advances in Information and Communication Technology, стр. 223-237. Springer, (2019)PERSUADED: Fighting Social Engineering Attacks with a Serious Game., , и . TrustBus, том 11033 из Lecture Notes in Computer Science, стр. 103-118. Springer, (2018)Acceptance Factors and Obstacles for Cryptocurrency Adoption., , и . EICC, стр. 26-33. ACM, (2023)Maturity level assessments of information security controls: An empirical analysis of practitioners assessment capabilities., , , и . Comput. Secur., (2021)How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies - The Case of Tor., и . HICSS, стр. 1-10. ScholarSpace, (2019)User Acceptance Criteria for Privacy Preserving Machine Learning Techniques., , и . ARES, стр. 149:1-149:8. ACM, (2023)Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust., и . AMCIS, Association for Information Systems, (2018)