Author of the publication

Applying Action Research in the Formulation of Information Security Policies.

, and . WorldCIST (1), volume 353 of Advances in Intelligent Systems and Computing, page 513-522. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Communication Systems: Evolution and Security., , , , , and . MICRADS, volume 152 of Smart Innovation, Systems and Technologies, page 87-94. Springer, (2019)Augmented Computing and Smart Cities Sustainability., , , , and . ICCSA (Workshops 5), volume 14108 of Lecture Notes in Computer Science, page 123-132. Springer, (2023)How 5G Will Transform Smart Cities: A Literature Review., , , and . ICCSA (Workshops 5), volume 14108 of Lecture Notes in Computer Science, page 70-81. Springer, (2023)Implementation of Information Systems Security Policies: A Survey in Small and Medium Sized Enterprises., and . WorldCIST (1), volume 353 of Advances in Intelligent Systems and Computing, page 459-468. Springer, (2015)Adoption of the Rules of the General Data Protection Regulation on the Websites of Municipalities., , and . ICCSA (Workshops 5), volume 14108 of Lecture Notes in Computer Science, page 166-176. Springer, (2023)Approach for Preventive Maintenance Planning of Machine Tools., , and . TE, volume 7 of Advances in Transdisciplinary Engineering, page 966-975. IOS Press, (2018)The Art of Phishing., , and . ICITS, volume 918 of Advances in Intelligent Systems and Computing, page 683-690. Springer, (2019)Productivity Improvement in Manufacturing Systems Through TPM, OEE and Collaboration Between Maintenance and Production: A Case Study., and . APMS (5), volume 634 of IFIP Advances in Information and Communication Technology, page 261-268. Springer, (2021)Numerical Simulation of the Biological Control of the Chestnut Gall Wasp with T. Sinensis., , , and . ICAI Workshops, volume 2486 of CEUR Workshop Proceedings, page 230-243. CEUR-WS.org, (2019)Applying Action Research in the Formulation of Information Security Policies., and . WorldCIST (1), volume 353 of Advances in Intelligent Systems and Computing, page 513-522. Springer, (2015)