From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enterprise Social Networks: A Successful Implementation within a Telecommunication Company., , и . AMCIS, Association for Information Systems, (2015)A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management., , , и . TrustCom/BigDataSE/ISPA (1), стр. 1073-1080. IEEE, (2015)Android Cache Taxonomy and Forensic Process., , и . TrustCom/BigDataSE/ISPA (1), стр. 1094-1101. IEEE, (2015)Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective., , , и . AMCIS, Association for Information Systems, (2015)Guest Editorial: Multimedia Social Network Security and Applications., и . Multimedia Tools Appl., 76 (3): 3163-3168 (2017)Performance of Android Forensics Data Recovery Tools., , и . CoRR, (2017)The cyber threat landscape: Challenges and future research directions. Computers & Security, 30 (8): 719 - 731 (2011)Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model., , и . AMCIS, Association for Information Systems, (2014)Using Social Media Data to Improve Situational Awareness during Emergent Events., , , и . AMCIS, Association for Information Systems, (2018)Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop.. SIGACT News, 43 (2): 38-40 (2012)