From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An analyst's view of IS security., и . SEC, том 54 из IFIP Conference Proceedings, стр. 23-35. Chapman & Hall, (1996)Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration., и . SEC, том 214 из IFIP Conference Proceedings, стр. 347-356. Kluwer, (2002)Embedding security practices in contemporary information systems development approaches., , и . Inf. Manag. Comput. Secur., 9 (4): 183-197 (2001)Managing the introduction of information security awareness programmes in organisations., , , и . Eur. J. Inf. Syst., 24 (1): 38-58 (2015)Analyzing Information Security Awareness through Networks of Association., , , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 227-237. Springer, (2010)Redefining Information Systems Security: Viable Information Systems., , и . SEC, том 193 из IFIP Conference Proceedings, стр. 453-468. Kluwer, (2001)Using the Lens of Circuits of Power in Information Systems Security Management., , и . TrustBus, том 4657 из Lecture Notes in Computer Science, стр. 228-236. Springer, (2007)Perceptions of Security Contributing to the Implementation of Secure IS., и . SEC, том 250 из IFIP Conference Proceedings, стр. 313-324. Kluwer, (2003)Formulating information systems risk management strategies through cultural theory., , , и . Inf. Manag. Comput. Secur., 14 (3): 198-217 (2006)Achieving Interoperability in a Multiple-Security- Policies Environment., и . Comput. Secur., 19 (3): 267-281 (2000)