Understanding human aspects for an effective information security management implementation.
Kör, Burcu (Amsib (Cedis)); Metin, Bilgin
The role of Edge/Fog computing security in IoT and Industry 4.0 infrastructures
Mutlutürk, Meltem; Kör, Burcu (Amsib (Cedis)); Metin, Bilgin; Phiri Chigwada, Josiline; Tsvuura, Godfrey
Whose truth?
Peter de Werd; Frans Boersma
to be submitted An explorative study on possible determinants which explaining adherence to portal supported rehabilitation treatments. To be submitted Journal of Internet Medical Research.
Thea van der Geest; H.P. Buimer; M. Tabak; L. van Velsen
The Chief Information Security Officer (CISO) and soft skills
Richard Smit (Student); Jeroen J.M. van Yperen Hagedoorn (Student)
Flight Performance Analysis of the Samad Attack Drones Operated by Houthi Armed Forces
Mark Voskuijl; Thomas Dekkers; Ralph Savelsberg
Deterrence, Resilience, and the Shooting Down of Flight MH17
Cees van Doorn; Th.B.F.M. Brinkel
Verkenning best practices cybersecurity informatiedeling
Luuk Bekkers (Lid Lectoraat); Rick van der Kleij (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lector)
Criminal persuasion techniques versus sharing personal information
Susanne van ‘t Hoff – de Goede, PhD (Lid Lectoraat)
The factors that determine the degree of women's participation in the military
Naomi Faasse (Student)