Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Taitto, Petteri
,
Julia Nevmerzhiskaya
, and
Csaba Virag
.
"
Using Holistic Approach to Developing Cybersecurity Simulation Environments
."
eLearning & Software for Education
4 (2018): 77-84.
Helliar, Christine
,
Alasdair Lonie
,
David Power
, and
Donald Sinclair
.
Attitudes of UK Managers to Risk and Uncertainty
. Edinburgh: The Institute of Chartered Accountants of Scotland, 2001.
Leonard, Barbara
, and
Jerry Biberman
.
"
Utilizing Multi‐dimensionality in the Workplace: A Meta‐study
."
Managerial Finance
33, no. 12 (2007): 935-946.
George, Claude S.
.
The History of Management Thought
. Englewood Cliffs, NJ: Prentice-Hall, Inc. , 1972.
Kara, Nuri
, and
Nese Sevim
.
"
Adaptive Learning Systems: Beyond Teaching Machines
."
Contemporary Educational Technology
4, no. 2 (2013): 108-120.
van Merrienboer, Jeroen J. G.
, and
Paul Kirschner
.
Ten Steps to Complex Learning: A Systematic Approach to Four-Component Instructional Design
. Third ed. New York: Routledge, 2018.
Stevens-Adams, Susan
,
Armida Carbajal
,
Austin Silva
,
Kevin Nauer
,
Benjamin Anderson
,
Theodore Reed
, and
Chris Forsythe
.
"
Enhanced Training for Cyber Situational Awareness
." In
Foundations of Augmented Cognition, Lecture Notes in Computer Science
, 90-99. Vol. 8027. Berlin, Heidelberg: Springer, 2013.
Leikas, Jaana
, and
Pertti Saariluoma
.
"
‘Worth’ and Mental Contents in Designing for Ageing Citizens’ Form of Life
."
Gerontechnology
7, no. 3 (2008): 305-318.
Saariluoma, Pertti
,
Antero Karvonen
,
Mikael Wahlstrom
,
Kai Happonen
,
Ronny Puustinen
, and
Tuomo Kujala
.
Challenge of Tacit Knowledge in Acquiring Information in Cognitive Mimetics
In
2nd International Conference on Intelligent Human Systems Integration (IHSI 2019): Integrating People and Intelligent Systems
. San Diego, California, USA, 2019.
Li, Meng
, and
Fei Gao
.
"
Why Nonaka Highlights Tacit Knowledge: A Critical Review
."
Journal of Knowledge Management
7, no. 4 (2003): 6-14.
Leonard, Barbara
.
Multidimensional Decision Making
In
Ebook
. Bradford: Emerald Publishing, 2007.
Hemamali, Tennakoon
.
A Comprehensive Methodology for Profiling Cyber-criminals
. Asia Pacific Institute of Information Technology, 2012.
Brown, Cameron S. D.
.
"
Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice
."
International Journal of Cyber Criminology
9, no. 1 (2015): 55-119.
Nykodym, Nick
,
Robert Taylor
, and
Julia Vilela
.
"
Criminal Profiling and Insider Cyber Crime
."
Digital Investigation
2, no. 4 (2005): 261-267.
Profiles of Cyber-Criminals and Cyber-Attackers
In
project funded by the European Commission, Seventh Framework Programme
. University of Cagliari, 2015.
Nurse, Jason R. C.
,
Oliver Buckley
,
Philip A. Legg
,
Michael Goldsmith
,
Sadie Creese
,
Gordon R. T. Wright
, and
Monica Whitty
.
Understanding Insider Threat: A Framework for Characterising Attacks
In
2014 IEEE Security and Privacy Workshops
. San Jose, CA, USA, 2014.
Wori, Okechukwu
.
"
Computer Crimes: Factors of Cybercriminal Activities
."
International Journal of Advanced Computer Science and Information Technology
3, no. 1 (2014): 51-67.
Rogers, Marcus K.
.
"
A Two-dimensional Circumplex Approach to the Development of a Hacker Taxonomy
."
Digital Investigation
3, no. 2 (2006): 97-102.
Georgiev, Venelin
.
The Human Factor in Cybersecurity
. Sofia: Avangard, 2018.
Hobbes, Thomas
.
Leviathan
. Cambridge; New York: Cambridge University Press, 1996.
Chaturvedi, B.K.
.
Kautilya’s Arthashastra
. Dimond Pocket Books, 2001.
Cuny, Frederick C.
.
Use of the Military in Humanitarian Relief
. Niinsalo, Finland, 1989.
Mallick, P.K.
.
"
Role of the Armed Forces in Internal Security: Time for Review
."
CLAWS Journal
(2007): 68.
Responsibility to protect populations from genocide, war crimes, ethnic cleansing and crimes against humanity
In
2005 World Summit Outcome, UN General Assembly Resolution
., 2005.
Schnabel, Albrecht
, and
Marc Krupanski
.
Mapping Evolving Internal Roles of the Armed Forces
. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2012.
Pages
« първа
‹ предишна
…
382
383
384
385
386
387
388
389
390
…
следваща ›
последна »
348032 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all