Author of the publication

Bibliometric Mapping of Research on User Training for Secure Use of Information Systems.

, , and . J. Univers. Comput. Sci., 26 (7): 764-782 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Approach for Acquiring Training and Software Security Requirements., , and . EICC, page 12:1-12:2. ACM, (2020)Exploring the Relations Between Net Benefits of IT Projects and CIOs' Perception of Quality of Software Development Disciplines., , and . Bus. Inf. Syst. Eng., 62 (4): 347-360 (2020)Agile Effort Estimation: Comparing the Accuracy and Efficiency of Planning Poker, Bucket System, and Affinity Estimation Methods., , , and . Int. J. Softw. Eng. Knowl. Eng., 33 (11&12): 1923-1950 (November 2023)A Framework and Tool-Support for Reengineering Software Development Methods., and . Informatica, 19 (3): 321-344 (2008)Bibliometric Mapping of Research on User Training for Secure Use of Information Systems., , and . J. Univers. Comput. Sci., 26 (7): 764-782 (2020)A Comparative Evaluation of E-learning and Traditional Pedagogical Process Elements., , and . J. Educ. Technol. Soc., 16 (3): 76-87 (2013)Using a market basket analysis in tourism studies., , and . CoRR, (2021)Balancing software and training requirements for information security., , and . Comput. Secur., (November 2023)Software Process Improvement Based on the Method Engineering Principles., , , and . Situational Method Engineering, volume 244 of IFIP, page 283-297. Springer, (2007)Cybersecurity competence of older adult users of mobile devices., , , and . CoRR, (2024)