Understanding human aspects for an effective information security management implementation.
Gepubliceerd op:
The embracement of risks
Gepubliceerd op:
Information security behaviour
Gepubliceerd op:
Social Engineering as an Approach for Probing Organizations to Improve IT Security
Gepubliceerd op:
End-users Compliance to the Information Security Policy
Gepubliceerd op:
Computer Security Incident Response Team Effectiveness: A Needs Assessment
Gepubliceerd op:
Legal management
Gepubliceerd op:
Qualification for information security professionals
Gepubliceerd op:
Factors influencing Non-Compliance behavior towards Information Security Policies
Gepubliceerd op:
De Haagse Labs: versterken van regionale netwerkvorming
Start:
Eind:
Encryption for all
Start:
Eind:
Geriatrische revalidatie op afstand: businesscase en beveiliging van informatie
Start:
Eind:
Integrated distributed SCADA security through local approximations of power flow equations
Start:
Eind:
MASCOT - MeAsuring Security in Cloud OuTsourcing
Start:
Eind:
Risicomanagement en digitale veiligheid smart cities
Start:
Eind:
SCOUT (Sensoric data Catching Of highly Useful Terabytes)
PRECISION FARMING IN DE TUINBOUWKAS
Start:
Eind:
Smart Energy Twin
Start:
Eind: