Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparison between Business Process Management and Information Security Management., and . FedCSIS, volume 2 of Annals of Computer Science and Information Systems, page 901-910. (2014)Design and Performance Aspects of Information Security Prediction Markets for Risk Management., and . SECRYPT, page 273-284. SciTePress, (2015)Unobtrusive Psychological Profiling for Risk Analysis., and . ICETE (2), page 376-386. SciTePress, (2018)Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review., , , , and . IntelliSys (1), volume 1250 of Advances in Intelligent Systems and Computing, page 1-18. Springer, (2020)Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation., , and . ICEIS (2), page 377-389. SciTePress, (2019)Secure Benchmarking using Electronic Voting., and . ICETE (2), page 191-206. SciTePress, (2018)Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey., , and . pHealth, volume 261 of Studies in Health Technology and Informatics, page 239-245. IOS Press, (2019)Factors Affecting the Willingness to Share Knowledge in the Communities of Practice., and . CRIWG, volume 10391 of Lecture Notes in Computer Science, page 32-39. Springer, (2017)Using Prediction Markets to Hedge Information Security Risks., and . STM, volume 8743 of Lecture Notes in Computer Science, page 129-145. Springer, (2014)Framework for Healthcare Security Practice Analysis, Modeling and Incentivization., , and . IEEE BigData, page 3242-3251. IEEE, (2019)