Information security education based on job profiles and the e-CF
M.E.M. (Marcel) Spruit (Lector)
Whose truth?
Peter de Werd; Frans Boersma
How to become innovative: measuring and improving innovative development
Hani Al-Ers (Lid Lectoraat); Tim Cocx (Onderzoeker); Joost Verschuuren (Student); Jonathan Lindeborg (Student); Alarico van der Ham (Student)
to be submitted An explorative study on possible determinants which explaining adherence to portal supported rehabilitation treatments. To be submitted Journal of Internet Medical Research.
Thea van der Geest; H.P. Buimer; M. Tabak; L. van Velsen
The Chief Information Security Officer (CISO) and soft skills
Richard Smit (Student); Jeroen J.M. van Yperen Hagedoorn (Student)
Het realiseren van een security information & event management- systeem voor Level Level
Wouter Honselaar (Student)
Ontwikkelen van interactieve malware voor phishing
Job Bakker (Student)
Cybercrisis bij gemeenten
S. Ebbers (Onderzoeker); J. Koch (Lid Lectoraat); Jurjen Jansen (Onderzoeker); J. (Jelle) Groenendaal (Onderzoeker); Willem Bantema (Onderzoeker); E.R. (Rutger) Leukfeldt (Lector)
Flight Performance Analysis of the Samad Attack Drones Operated by Houthi Armed Forces
Mark Voskuijl; Thomas Dekkers; Ralph Savelsberg
Deterrence, Resilience, and the Shooting Down of Flight MH17
Cees van Doorn; Th.B.F.M. Brinkel