From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Remote Management of Face-to-face Written Authenticated Though Anonymous Exams., , , и . CSEDU (2), стр. 431-437. SciTePress, (2011)Dagstuhl Reports, Vol. 2, Issue 12 ISSN 2192-5283, , , , , , , , , и 1 other автор(ы). (2013)Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge., и . SN Comput. Sci., 3 (5): 346 (2022)Protecting The Vulnerable: Dimensions of Assisted Digital Access., , и . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-26 (2022)Digitalised Welfare: Systems For Both Seeing and Working With Mess., , и . WebSci (Companion), стр. 26-31. ACM, (2020)10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response., , , , и . Insider Threats: Strategies for Prevention, Mitigation, and Response, том 10341 из Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)Designing Through The Stack: The Case for a Participatory Digital Security By Design., , , и . NSPW, стр. 45-59. ACM, (2022)Walking the Line: The Everyday Security Ties that Bind., и . HCI (22), том 10292 из Lecture Notes in Computer Science, стр. 464-480. Springer, (2017)The changing shape of privacy and consent.. Inf. Secur. Tech. Rep., 14 (3): 111-112 (2009)Information security management: An entangled research challenge.. Inf. Secur. Tech. Rep., 14 (4): 181-185 (2009)