Understanding human aspects for an effective information security management implementation.
Kör, Burcu (Amsib (Cedis)); Metin, Bilgin
The role of Edge/Fog computing security in IoT and Industry 4.0 infrastructures
Mutlutürk, Meltem; Kör, Burcu (Amsib (Cedis)); Metin, Bilgin; Phiri Chigwada, Josiline; Tsvuura, Godfrey
Flight Performance Analysis of the Samad Attack Drones Operated by Houthi Armed Forces
Mark Voskuijl; Thomas Dekkers; Ralph Savelsberg
Deterrence, Resilience, and the Shooting Down of Flight MH17
Cees van Doorn; Th.B.F.M. Brinkel
Verkenning best practices cybersecurity informatiedeling
Luuk Bekkers (Lid Lectoraat); Rick van der Kleij (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lector)
Criminal persuasion techniques versus sharing personal information
Susanne van ‘t Hoff – de Goede, PhD (Lid Lectoraat)
The factors that determine the degree of women's participation in the military
Naomi Faasse (Student)
Towards applying design-thinking for designing privacy-protecting information systems
M.S. Bargh; R. Choenni
Crisiscommunicatie bij gemeenten
Vince Grandadam (Student)
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour
Lisa C. de Kok (Lid Lectoraat); Deborah Oosting (Lid Lectoraat); M.E.M. (Marcel) Spruit (Lector)