Author of the publication

Techno-crime and Terror against Tomorrow's Organisations: What About Cyberpunks?

, and . IFIP Congress (2), volume A-52 of IFIP Transactions, page 563-570. North-Holland, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Teaching micro-Computer Skills to Management Students: Academic Achievement, Gender, Student Effort on Homework, and Learning Performance.. ICIS, page 6. Association for Information Systems, (1987)How Corporate Clients and Consumers Surf the Internet: A Review and Future Directions for Research., , , , and . ECIS, page 212-234. Copenhagen Business School, (1999)Techno-crime and Terror against Tomorrow's Organisations: What About Cyberpunks?, and . IFIP Congress (2), volume A-52 of IFIP Transactions, page 563-570. North-Holland, (1994)Early warning system for home users and small- and medium-sized enterprises: eight lessons learned.. Int. J. Syst. Syst. Eng., 1 (1/2): 149-170 (2008)Using the Internet for B2B activities: a review and future directions for research., , and . Internet Res., 10 (2): 126-140 (2000)Bologna process revisited: educating information security and malware experts.. J. Comput. Virol., 3 (2): 149-161 (2007)Computerization of the workplace: testing attitudinal effects with a causal model., , , and . SIGCPR, page 52-66. ACM, (1986)Morality and technology, or is it wrong to create and let loose a computer virus., and . HICSS (3), page 563-573. IEEE Computer Society, (1995)Social Media Audit - Measure for Impact.. Springer Briefs in Computer Science Springer, (2013)EICAR 2005.. IEEE Secur. Priv., 3 (4): 45-48 (2005)