Simulating Small-Scale Agricultural Adaptation Decisions in Response to Drought Risk: An Empirical Agent-Based Model for Semi-Arid Kenya
Wens, Marthe; Veldkamp, Ted I. (Lectoraat Water In En Om De Stad); Mwangi, Moses; Johnson, J. Michael; Lasage, Ralph; Haer, Toon; Aerts, Jeroen C. J. H.
Ons cybergedrag is veel onveiliger dan we zelf denken
Rick van der Kleij (Lid Lectoraat); Susanne van ‘t Hoff – de Goede, PhD (Lid Lectoraat); Steve van de Weijer (Onderzoeker)
Information security behaviour
Kör, Burcu (Amsib (Cedis)); Sentürk, Taner; Uzundönekoglu, Serkan; Metin, Bilgin
Games for the optimal deployment of Security Forces
Corine Maartje Laan
Gender-sensitive Violence Risk Assessment
Vivienne de Vogel (Lector); Mieke Bruggeman; Marike Lancel
Determinants of reporting cybercrime
Steve van de Weijer; E.R. (Rutger) Leukfeldt (Lector); Wim Bernasco
End-users Compliance to the Information Security Policy
Peter Straver (Onderzoeker); Pascal Ravesteijn (Lector)
Promote end-users compliance to the Information Security Policy
Peter Straver (Student); Bas van Gils (Begeleider)
Chemical weapons and international security
Hanna Lim (Student); P. (Pieter) Pijlman (Begeleider)
Factors influencing Non-Compliance behavior towards Information Security Policies
Gilbert Silvius (Lector); Taco Dols (Lid Lectoraat)