Author of the publication

A brief study of information security and ethics awareness as an imperative component of management information systems.

, , and . ACM Southeast Regional Conference, page 515-516. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Malicious Payload Detection., , and . WAC, page 1-5. IEEE, (2018)HeteroGenius: An Improvised 'Intelligence' in Heterogeneous Graph Transformers., , , and . ICMLA, page 849-854. IEEE, (2022)Computer security and ethics awareness in university environments: a challenge for management of information systems., , and . ACM Southeast Regional Conference, page 434-439. ACM, (2006)A nearest neighbor approach to letter recognition., and . ACM Southeast Regional Conference, page 776-777. ACM, (2006)A New Approach for Information Processing inWireless Sensor Network., , , and . ICDE Workshops, page 34. IEEE Computer Society, (2006)Fuzzy Cluster Analysis of Spatio-Temporal Data., and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 984-991. Springer, (2003)Measuring the Influence of Mass Media on Opinion Segregation through Twitter., , and . Complex Adaptive Systems, volume 36 of Procedia Computer Science, page 152-159. Elsevier, (2014)Fuzzy decision fusion for single target classification in wireless sensor networks., , , and . FUZZ-IEEE, page 1-8. IEEE, (2010)A brief study of information security and ethics awareness as an imperative component of management information systems., , and . ACM Southeast Regional Conference, page 515-516. ACM, (2007)Network service quality rank: a network selection algorithm for heterogeneous wireless networks., and . ANCS, page 239-240. ACM, (2014)