Information security education based on job profiles and the e-CF
M.E.M. (Marcel) Spruit (Lector)
Understanding human aspects for an effective information security management implementation.
Kör, Burcu (Amsib (Cedis)); Metin, Bilgin
The role of Edge/Fog computing security in IoT and Industry 4.0 infrastructures
Mutlutürk, Meltem; Kör, Burcu (Amsib (Cedis)); Metin, Bilgin; Phiri Chigwada, Josiline; Tsvuura, Godfrey
The Chief Information Security Officer (CISO) and soft skills
Richard Smit (Student); Jeroen J.M. van Yperen Hagedoorn (Student)
Whose truth?
Peter de Werd; Frans Boersma
Flight Performance Analysis of the Samad Attack Drones Operated by Houthi Armed Forces
Mark Voskuijl; Thomas Dekkers; Ralph Savelsberg
Deterrence, Resilience, and the Shooting Down of Flight MH17
Cees van Doorn; Th.B.F.M. Brinkel
Verkenning best practices cybersecurity informatiedeling
Luuk Bekkers (Lid Lectoraat); Rick van der Kleij (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lector)
Criminal persuasion techniques versus sharing personal information
Susanne van ‘t Hoff – de Goede, PhD (Lid Lectoraat)
The factors that determine the degree of women's participation in the military
Naomi Faasse (Student)