Author of the publication

Potential Use of the Theory of Vulnerability in Information Systems.

, , , , , and . Inf. Resour. Manag. J., 25 (2): 22-33 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Potential Use of the Theory of Vulnerability in Information Systems., , , , , and . Inf. Resour. Manag. J., 25 (2): 22-33 (2012)Simulation - Concepts and Applications., , , and . WSKS (2), volume 112 of Communications in Computer and Information Science, page 429-434. Springer, (2010)Simulation Technology for Enhanced Learning: VAT Simulator for Portuguese Accounting Students., , and . UKSim, page 355-359. IEEE Computer Society, (2011)Using Simulation for Enhanced Accounting Learning: A Case Study., , and . Int. J. Distance Educ. Technol., 10 (4): 26-43 (2012)Simulation, Games and Challenges: From Schools to Enterprises., , , and . EOMAS, volume 88 of Lecture Notes in Business Information Processing, page 63-73. Springer, (2011)Collaborative Risk Management in Software Projects., , and . QUATIC, page 157-160. IEEE Computer Society, (2012)