Filter your results
- 10
- 1
- 10
- 1
- 11
- 1
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 2
- 11
- 2
- 1
- 1
- 1
- 1
- 2
- 6
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Measuring and Visualising Projects’ Collective Method Rationale9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.344-352, ⟨10.1007/978-3-319-48393-1_26⟩
Conference papers
hal-01653533v1
|
||
|
Defining Objectives for Preventing Cyberstalking31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.76-87, ⟨10.1007/978-3-319-33630-5_6⟩
Conference papers
hal-01369544v1
|
||
|
Using Actor Network Theory to Understand Information Security Management25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.43-54, ⟨10.1007/978-3-642-15257-3_5⟩
Conference papers
hal-01054504v1
|
||
|
Secure Outsourcing: An Investigation of the Fit between Clients and Providers28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.405-418, ⟨10.1007/978-3-642-39218-4_30⟩
Conference papers
hal-01463842v1
|
||
|
Towards a Roadmap for User Involvement in E-Government Service Development9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.251-262, ⟨10.1007/978-3-642-14799-9_22⟩
Conference papers
hal-01056581v1
|
||
|
Organizational Transformation and Information Security Culture: A Telecom Case Study29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.431-437, ⟨10.1007/978-3-642-55415-5_36⟩
Conference papers
hal-01370391v1
|
||
ICT Systems Security and Privacy ProtectionSpringer International Publishing, AICT-562, 2019, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-030-22312-0⟩
Books
hal-03744304v1
|
|||
|
Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.49-61, ⟨10.1007/978-3-319-33630-5_4⟩
Conference papers
hal-01369541v1
|
||
|
When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.352-363, ⟨10.1007/978-3-642-30436-1_29⟩
Conference papers
hal-01518211v1
|
||
|
Organizational Power and Information Security Rule Compliance26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.185-196, ⟨10.1007/978-3-642-21424-0_15⟩
Conference papers
hal-01567592v1
|
||
|
Practice-Based Discourse Analysis of InfoSec Policies30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.297-310, ⟨10.1007/978-3-319-18467-8_20⟩
Conference papers
hal-01345115v1
|