Employing comprehensive intelligence
Sebastiaan Rietjens; Erik de Waard; Paul C. Fenema
Factoren van interesse in hosted services
Ernst ten Haaf (Begeleider); Remco van Rhijn (Student)
Promote end-users compliance to the Information Security Policy
Bas van Gils (Begeleider); Peter Straver (Student)
Understanding organizational vulnerability in military taskforces
Eric-Hans Kramer; Matthijs Moorkamp
Organizing for insecurity and chaos
Frans Osinga
Improving the Management Control Mix for Safety and Security
Jacqueline Heeren-Bogers; Joseph Soeters
Lessons Learned from NATO’s Cyber Defence exercise Locked Shields 2015
F.G.J. Absil; A.D. Dijk; J.M.G. Meulendijks
A study of preventing email (spear) phishing by enabling human intelligence
N. Stembert (Onderzoeker); A. Padmos (Onderzoeker); M.S. Bargh (Lector); R. Choenni (Lector); F. Jansen
The big picture
Kiewiet, Bert; Vos, Maurice; Moll, Henri C.; Benders, René M.J.; Laugs, Gideon A.H.; Miedema, Jan Hessels; Manickam, Anu (International Business); ter Veer, Bart; Matthee, Hein