Author of the publication

Bridging the gap between general management and technicians - A case study on ICT security in a developing country.

, , , , and . Comput. Secur., 26 (1): 44-55 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Synchronizing Human Behavior, Processes and Support Systems Using a Socio-technical Approach., and . BMMDS/EMMSAD, volume 175 of Lecture Notes in Business Information Processing, page 109-123. Springer, (2014)A Framework for Evaluation of Information Systems Security., , and . ISSA, page 1-11. ISSA, Pretoria, South Africa, (2005)Simulating apprenticeship using multimedia in higher education: A case from the information systems field., , , and . Interact. Technol. Smart Educ., 12 (2): 137-154 (2015)The Impact of Business-IT Alignment on Information Security Process., , and . HCI (18), volume 8527 of Lecture Notes in Computer Science, page 25-36. Springer, (2014)ST(CS)2 - Featuring socio-technical cyber security warning systems., and . CyberSec, page 312-316. IEEE, (2012)Cybernetic analysis of national computer security.. Comput. Secur., 10 (3): 217-227 (1991)IT Security Incidents Escalation in the Swedish Financial Sector: A Maturity Model Study., , , and . HAISA, page 45-55. University of Plymouth, (2016)Cassandra's Calling Card: Socio-technical Risk Analysis and Management in Cyber Security Systems., and . STPIS@ECIS, volume 2398 of CEUR Workshop Proceedings, page 65-80. CEUR-WS.org, (2019)Summary of the Interactive Workshop Sessions at STPIS'16.. STPIS@CAiSE, volume 1854 of CEUR Workshop Proceedings, page 110-111. CEUR-WS.org, (2017)Generating features for named entity recognition by learning prototypes in semantic space: The case of de-identifying health records., , and . BIBM, page 450-457. IEEE Computer Society, (2014)