Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Graf, Sabine
,
Silvia Rita Viola
,
Tommaso Leo
, and
Kinshuk
.
"
In-Depth Analysis of the Felder-Silverman Learning Style Dimensions
."
Journal of Research on Technology in Education
40, no. 1 (2007).
Hubbard, Melissa
, and
Matthew Bailey
.
Mastering Microsoft Teams: End User Guide to Practical Usage, Collaboration, and Governance
. 1st ed. Apress, 2020.
Moore, Kevin
,
Frank Hanfland
,
Lisa Young
, and
Lance Dublin
.
Handbook of e-Learning. The eLearning Guild
. Santa Rosa, CA: The eLearning Guild, 2007.
Scriven, Michael
.
Evaluation Thesaurus
. Newbury Park, CA: Sage Publications, 1991.
Shank, Patti
, and
Amy Sitze
.
Making Sense of Online Learning: A Guide for the Beginners and the Truly Skeptical
. Pfeiffer, 2004.
Number of Internet Users Worldwide from 2005 to 2018 (in Millions)
. Statista, 2020.
Sfakianakis, Andreas
,
Christos Douligeris
, and
Louis Marinos
.
ENISA Threat Landscape Report 2018 15 Top Cyberthreats and Trends
. ENISA, 2019.
Cybersecuritymonitor 2019
. CBS, 2019.
Cybersecurity Awareness en Skills in Nederland
. TNS NIPO, 2020.
Rasmussen, Jens
.
"
Skills, Rules, and Knowledge; Signals, Signs, and Symbols, and Other Distinctions in Human Performance Models
."
Systems, Man and Cybernetics, IEEE Transactions On SMC
13, no. 2 (1983): 257-66.
Worsley, Anthony
.
"
Nutrition Knowledge and Food Consumption: Can Nutrition Knowledge Change Food Behaviour?
"
Asia Pacific Journal of Clinical Nutrition
11, no. 3 (2002).
Durojaiye, Oyewole
.
"
Knowledge, Attitude and Practice of HIV/AIDS: Behavior Change among Tertiary Education Students in Lagos, Nigeria
."
Annals of Tropical Medicine and Public Health
4, no. 1 (2011): 18-24.
Ben-Asher, Noam
, and
Cleotilde Gonzalez
.
"
Effects of Cyber Security Knowledge on Attack Detection
."
Computers in Human Behavior
48 (2015): 51-61.
Bitton, Ron
,
Kobi Boymgold
,
Rami Puzis
, and
Asaf Shabtai
.
"
Evaluating the Information Security Awareness of Smartphone Users
."
arXiv:1906.10229
(2019).
Siponen, Mikko
.
"
Five Dimensions of Information Security Awareness
."
ACM SIGCAS Computers and Society
31, no. 2 (2001): 24-29.
Ahlan, Abdul Rahman
,
Muharman Lubis
, and
Arif Ridho Lubis
.
"
Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures
."
Procedia Computer Science 72 (:
72 (2015): 361-73.
Bada, Maria
,
Angela Sasse
, and
Jason Nurse
.
Cyber Security Awareness Campaigns: Why Do They Fail to Change Behaviour?
In
the International Conference on Cyber Security for Sustainable Society
., 2017.
Caldwell, Tracey
.
"
Making Security Awareness Training Work
."
Computer Fraud and Security
6 (2016): 8-14.
Siponen, Mikko
,
Adam Mahmood
, and
Seppo Pahnila
.
"
Employees’ Adherence to Information Security Policies: An Exploratory Field Study
."
Information and Management
51, no. 2 (2014): 217-24.
Aronson, Elliot
, and
Timothy Wilson
.
Sociale Psychologie
. Amsterdam: Pearson Benelux, 2017.
Fiske, Susan
, and
Shelley Taylor
.
Social cognition: From brains to Culture
. Thousand Oaks: Sage Publications , 2013.
Schrader, P.G.
, and
Kimberley Lawless
.
"
The Knowledge, Attitudes, & Behaviors Approach How To Evaluate Performance and Learning in Complex Environments
."
Performance Improvement
43, no. 9 (2004): 8-15.
Lebek, Benedict
,
Jörg Uffen
,
Markus Neumann
,
Bernd Hohler
, and
Michael Breitner
.
"
Information Security Awareness and Behavior: A Theory-Based Literature Review
."
Management Research Review
37, no. 12 (2014).
Sommestad, Teodor
,
Jonas Hallberg
,
Kristoffer Lundholm
, and
Johan Bengtsson
.
"
Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
."
Information Management and Computer Security
22, no. 1 (2014): 42-75.
Kruger, Hennie
, and
Wayne Kearney
.
"
A Prototype for Assessing Information Security Awareness
."
Computers and Security
25, no. 4 (2006): 289-96.
Pages
« първа
‹ предишна
…
436
437
438
439
440
441
442
443
444
…
следваща ›
последна »
347945 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all