Author of the publication

The impact of GDPR infringement fines on the market value of firms.

, , , and . Inf. Comput. Secur., 31 (1): 51-64 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cybercrime Victimisations/Criminalisation and Punishment., , and . ICGS3, volume 92 of Communications in Computer and Information Science, page 55-62. Springer, (2010)Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks., , , and . CSE, page 633-639. IEEE Computer Society, (2012)Introduction to Special Issue on Future of Wireless Communication and 6G Networks., , , and . Int. J. Wirel. Inf. Networks, 28 (3): 231-233 (2021)A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control., , and . IEEE Access, (2019)Foreword: Special Issue on Trends in Artificial Intelligence and Data Analytics for an Ethical and Inclusive Digitalized Society., , , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., (2021)Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography., , and . WWIC, volume 7889 of Lecture Notes in Computer Science, page 129-139. Springer, (2013)Analysis of firewall log-based detection scenarios for evidence in digital forensics., , , , and . Int. J. Electron. Secur. Digit. Forensics, 4 (4): 261-279 (2012)Fast authentication in wireless sensor networks., , , , and . Future Gener. Comput. Syst., (2016)ARP Cache Poisoning Mitigation and Forensics Investigation., , , and . TrustCom/BigDataSE/ISPA (1), page 1392-1397. IEEE, (2015)An Analysis of Honeypot Programs and the Attack Data Collected., and . ICGS3, volume 534 of Communications in Computer and Information Science, page 228-238. Springer, (2015)