Filter your results
- 18
- 2
- 17
- 2
- 1
- 20
- 5
- 2
- 1
- 2
- 3
- 1
- 2
- 1
- 1
- 2
- 1
- 4
- 20
- 5
- 1
- 1
- 1
- 1
- 1
- 4
- 4
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
What Can We Learn from the Analysis of Information Security Policies? The Case of UK’s Schools15th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2021, Virtual, United Kingdom. pp.81-90, ⟨10.1007/978-3-030-81111-2_7⟩
Conference papers
hal-04041062v1
|
||
|
Learning for Professional Competence in an IS Context7th Scandinavian Conference on Information Systems (SCIS), Aug 2016, Ljungskile, Sweden. pp.163-175, ⟨10.1007/978-3-319-43597-8_12⟩
Conference papers
hal-01771703v1
|
||
|
Artificial Intelligence Applications and InnovationsSpringer, AICT-339, 2010, IFIP Advances in Information and Communication Technology, 978-3-642-16238-1. ⟨10.1007/978-3-642-16239-8⟩
Books
hal-01550055v1
|
||
|
Another Fallen Hash-Based RFID Authentication Protocol6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.29-37, ⟨10.1007/978-3-642-30955-7_4⟩
Conference papers
hal-01534308v1
|
||
|
Towards an Heuristic Approach to Cybersecurity and Online Safety Pedagogy14th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2020, Mytilene, Lesbos, Greece. pp.58-70, ⟨10.1007/978-3-030-57404-8_5⟩
Conference papers
hal-03657732v1
|
||
|
Sustainability in IS: The Case for an Open Systems ApproachGovernance and Sustainability in Information Systems: Managing the Transfer and Diffusion of IT (Working conference), Sep 2011, Hamburg, Germany. pp.325-329, ⟨10.1007/978-3-642-24148-2_26⟩
Conference papers
hal-01571723v1
|
||
Artificial Intelligence in Theory and Practice IIISpringer, AICT-331, 2010, IFIP Advances in Information and Communication Technology, 978-3-642-15285-6
Books
hal-01557558v1
|
|||
|
The Changing Face of the History of Computing: The Role of Emulation in Protecting Our Digital HeritageArthur Tatnall. Reflections on the History of Computing : Preserving Memories and Sharing Stories, AICT-387, Springer, pp.362-384, 2012, IFIP Advances in Information and Communication Technology (SURVEY), ⟨10.1007/978-3-642-33899-1_21⟩
Book sections
hal-01526806v1
|
||
|
A Utility-Based Reputation Model for the Internet of Things31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.261-275, ⟨10.1007/978-3-319-33630-5_18⟩
Conference papers
hal-01369560v1
|
||
|
Incremental Learning for Large Scale Classification Systems14th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2018, Rhodes, Greece. pp.112-122, ⟨10.1007/978-3-319-92016-0_11⟩
Conference papers
hal-01821312v1
|
||
|
Design Challenges for Mobile and Wearable Systems to Support Learning on-the-move at Outdoor Cultural Heritage Sites17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.185-207, ⟨10.1007/978-3-030-29387-1_11⟩
Conference papers
hal-02553852v1
|
||
|
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing15th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2021, Virtual, United Kingdom. pp.148-163, ⟨10.1007/978-3-030-81111-2_13⟩
Conference papers
hal-04041081v1
|
||
|
J-PMCRI: A Methodology for Inducing Pre-Pruned Modular Classification RulesThird IFIP TC12 International Conference on Artificial Intelligence (AI) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.47-56, ⟨10.1007/978-3-642-15286-3_5⟩
Conference papers
hal-01054584v1
|
||
|
Theorising Monitoring: Algebraic Models of Web Monitoring in Organisations23th International Workshop on Algebraic Development Techniques (WADT), Sep 2016, Gregynog, United Kingdom. pp.13-35, ⟨10.1007/978-3-319-72044-9_3⟩
Conference papers
hal-01767467v1
|
||
|
Personalized Support with ‘Little’ DataTransfer and Diffusion of IT (TDIT), Jun 2014, Aalborg, Denmark. pp.355-358, ⟨10.1007/978-3-662-43459-8_24⟩
Conference papers
hal-01381206v1
|
||
|
Contested Histories: De-Mythologising the Early History of Modern British Computing.IFIP WG 9.7 International Conference on History of Computing (HC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.58-67, ⟨10.1007/978-3-642-15199-6_7⟩
Conference papers
hal-01059593v1
|
||
|
Using a Goal-Driven Approach in the Investigation of a Questioned Contract9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.153-167, ⟨10.1007/978-3-642-41148-9_11⟩
Conference papers
hal-01460603v1
|
||
|
Detecting Question Intention Using a K-Nearest Neighbor Based Approach14th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2018, Rhodes, Greece. pp.101-111, ⟨10.1007/978-3-319-92016-0_10⟩
Conference papers
hal-01821311v1
|
||
|
Reformulating Requirements Modelling for Digitalisation: A Structuration and Semiotic Informed Approach18th International Conference on Informatics and Semiotics in Organisations (ICISO), Jul 2018, Reading, United Kingdom. pp.218-227, ⟨10.1007/978-3-319-94541-5_22⟩
Conference papers
hal-01920739v1
|
||
|
Balancing Stakeholder Interests: Socio-Technical Perspectives on Smart Working PracticeInternational Working Conference on Transfer and Diffusion of IT (TDIT), Jun 2018, Portsmouth, United Kingdom. pp.261-276, ⟨10.1007/978-3-030-04315-5_18⟩
Conference papers
hal-02068931v1
|