How to become innovative: measuring and improving innovative development
Hani Al-Ers (Lid Lectoraat); Tim Cocx (Onderzoeker); Joost Verschuuren (Student); Jonathan Lindeborg (Student); Alarico van der Ham (Student)
Information security education based on job profiles and the e-CF
M.E.M. (Marcel) Spruit (Lector)
Whose truth?
Peter de Werd; Frans Boersma
Understanding human aspects for an effective information security management implementation.
Kör, Burcu (Amsib (Cedis)); Metin, Bilgin
The role of Edge/Fog computing security in IoT and Industry 4.0 infrastructures
Mutlutürk, Meltem; Kör, Burcu (Amsib (Cedis)); Metin, Bilgin; Phiri Chigwada, Josiline; Tsvuura, Godfrey
Flight Performance Analysis of the Samad Attack Drones Operated by Houthi Armed Forces
Mark Voskuijl; Thomas Dekkers; Ralph Savelsberg
Deterrence, Resilience, and the Shooting Down of Flight MH17
Cees van Doorn; Th.B.F.M. Brinkel
Verkenning best practices cybersecurity informatiedeling
Luuk Bekkers (Lid Lectoraat); Rick van der Kleij (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lector)
Criminal persuasion techniques versus sharing personal information
Susanne van ‘t Hoff – de Goede, PhD (Lid Lectoraat)
Towards applying design-thinking for designing privacy-protecting information systems
M.S. Bargh; R. Choenni