Author of the publication

On the role of the Facilitator in information security risk assessment.

, and . J. Comput. Virol., 3 (2): 143-148 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digitalised Welfare: Systems For Both Seeing and Working With Mess., , and . WebSci (Companion), page 26-31. ACM, (2020)Dagstuhl Reports, Vol. 2, Issue 12 ISSN 2192-5283, , , , , , , , , and 1 other author(s). (2013)Remote Management of Face-to-face Written Authenticated Though Anonymous Exams., , , and . CSEDU (2), page 431-437. SciTePress, (2011)Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge., and . SN Comput. Sci., 3 (5): 346 (2022)Protecting The Vulnerable: Dimensions of Assisted Digital Access., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-26 (2022)Designing Through The Stack: The Case for a Participatory Digital Security By Design., , , and . NSPW, page 45-59. ACM, (2022)Walking the Line: The Everyday Security Ties that Bind., and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 464-480. Springer, (2017)10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response., , , , and . Insider Threats: Strategies for Prevention, Mitigation, and Response, volume 10341 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)The significance of securing as a critical component of information security: An Australian narrative., and . Comput. Secur., (2019)On the role of the Facilitator in information security risk assessment., and . J. Comput. Virol., 3 (2): 143-148 (2007)