Understanding human aspects for an effective information security management implementation.
Published at:
Verkenning best practices cybersecurity informatiedeling
Published at:
The embracement of risks
Published at:
Information security behaviour
Published at:
Social Engineering as an Approach for Probing Organizations to Improve IT Security
Published at:
End-users Compliance to the Information Security Policy
Published at:
Legal management
Published at:
Qualification for information security professionals
Published at:
Factors influencing Non-Compliance behavior towards Information Security Policies
Published at:
De Haagse Labs: versterken van regionale netwerkvorming
Start:
End:
Encryption for all
Start:
End:
Geriatrische revalidatie op afstand: businesscase en beveiliging van informatie
Start:
End:
Integrated distributed SCADA security through local approximations of power flow equations
Start:
End:
MASCOT - MeAsuring Security in Cloud OuTsourcing
Start:
End:
Risicomanagement en digitale veiligheid smart cities
Start:
End:
SCOUT (Sensoric data Catching Of highly Useful Terabytes)
PRECISION FARMING IN DE TUINBOUWKAS
Start:
End:
Smart Energy Twin
Start:
End: