Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contrasting global approaches for identifying and managing cybersecurity risks in supply chains., , and . CoRR, (2022)Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks., , , , and . Comput. Secur., (2021)Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures., , , and . SOUPS @ USENIX Security Symposium, page 301-317. USENIX Association, (2020)When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?, , and . Big Data Soc., 9 (1): 205395172211083 (January 2022)Cybersecurity for Smart Farming: Socio-Cultural Context Matters., , and . IEEE Technol. Soc. Mag., 39 (4): 28-35 (2020)Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities., , , , , , , and . Proc. ACM Hum. Comput. Interact., 7 (CSCW2): 1-21 (2023)Data Ethics Club: Creating a collaborative space to discuss data ethics., , , , , , , , , and 2 other author(s). Patterns, 3 (7): 100537 (2022)