Author of the publication

Developing metrics to assess the effectiveness of cybersecurity awareness program.

, , and . J. Cybersecur., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Usability, security and trust in password managers: A quest for user-centric properties and features., , , and . Comput. Sci. Rev., (2019)Developing metrics to assess the effectiveness of cybersecurity awareness program., , and . J. Cybersecur., (2022)Time Up for Phishing with Effective Anti-Phishing Research Strategies., , , and . Int. J. Hum. Cap. Inf. Technol. Prof., 6 (2): 49-64 (2015)Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution., , , , , and . FMICS, volume 9128 of Lecture Notes in Computer Science, page 128-145. Springer, (2015)Towards a conceptual framework for privacy protection in the use of interactive 360° video surveillance., , , , , and . VSMM, page 1-10. IEEE, (2016)A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises., , and . Comput. Sci. Rev., (November 2023)Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness Resources., , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 97-115. Springer, (2022)Building a Cybersecurity Awareness Program: Present and Prospective Aspects., and . CyberSec4Europe, volume 1807 of Communications in Computer and Information Science, page 149-160. Springer, (2022)Properties for Cybersecurity Awareness Posters' Design and Quality Assessment., , , and . ARES, page 79:1-79:8. ACM, (2022)