Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing & evaluating a cognitive prosthetic for people with mild dementia., , , , , , , , and . ECCE, page 11-18. Mediamatica, Delft University of Technology, The Netherlands / ACM, (2010)Home Based Assistive Technologies for People with Mild Dementia., , , , , , , , , and 2 other author(s). ICOST, volume 4541 of Lecture Notes in Computer Science, page 63-69. Springer, (2007)Requirements engineering: The quest for the dependent variable., , and . RE, page 16-25. IEEE Computer Society, (2015)Modeling and Assessment of Systems Security., , and . MODSEC@MoDELS, volume 413 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)Overview of Enterprise Information Needs in Information Security Risk Assessment., , , , and . EDOC, page 42-51. IEEE Computer Society, (2014)A Test of Structured Threat Descriptions for Information Security Risk Assessments., , and . ICISSP, page 469-476. SciTePress, (2018)Variables influencing information security policy compliance: A systematic review of quantitative studies., , , and . Inf. Manag. Comput. Secur., 22 (1): 42-75 (2014)Evaluation of Field Trial 1, and . (2007)CogKnow Article.Dissemination Master Plan, , , , , , , , and . (2007)CogKnow Article.Building digital life stories for memory support., , , , and . IJCIH, 1 (2): 161-176 (2010)