Search

Your search keyword '"Pieters W"' showing total 360 results

Search Constraints

Start Over You searched for: Author "Pieters W" Remove constraint Author: "Pieters W"
360 results on '"Pieters W"'

Search Results

51. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

52. Developing a Cyber Operations Computational Ontology

53. Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment

54. Plots, murders, and money: oversight bodies evaluating the effectiveness of surveillance technology

55. The effectiveness of surveillance technology: What intelligence officials are saying

56. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

59. Bayesian Network Models in Cyber Security: A Systematic Review

60. Roflumilast in moderate-to-severe chronic obstructive pulmonary disease treated with longacting bronchodilators: two randomised clinical trials

61. The attack navigator

62. Cyber weapons: a profiling framework

63. Socio-technical security metrics

64. Bayesian Network Models in Cyber Security: A Systematic Review

65. Game mechanics and technological mediation: an ethical perspective on the effects of MMORPG’s

66. Beyond individual-centric privacy: Information technology in social systems

68. Inleiding: Kennisklimaat

69. Inzicht en toezicht

70. Gevoel voor kennis: emoties in de kennissamenleving

71. Security-by-experiment: lessons from responsible deployment in cyberspace

72. Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures

73. The attack navigator

74. The Navigation Metaphor in Security Economics

75. ENHANCING WORK ENGAGEMENT OF TEACHERS THROUGH ORGANISATIONAL COMMITMENT, ORGANISATIONAL JUSTICE AND PSYCHOLOGICAL CONDITIONS IN NAMIBIA.

76. System Abuse by Service Composition: Analysis and Prevention

77. Enoxaparin followed by once-weekly idrabiotaparinux versus enoxaparin plus warfarin for patients with acute symptomatic pulmonary embolism: a randomised, double-blind, double-dummy, non-inferiority trial

81. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

82. Socio-technical security metrics

83. Refining the ethics of computer-made decisions: A classification of moral mediation by ubiquitous machines

84. Het wakende oog

89. Ode aan Lau Mazirel

91. Gevoel voor kennis: emoties in de kennissamenleving

92. Ethics of e-voting: An essay on requirements and values in internet elections

93. La Volonté Machinale: Understanding the electronic voting controversy

94. E-voting discourses in the UK and the Netherlands

95. Vote buying revisited: implications for receipt-freeness

96. Internet voting: A conceptual challenge to democracy

97. Receipt-freeness as a special case of anonymity in epistemic logic

98. Acceptance of voting technology: Between confidence and trust

99. Ethics of e-voting: An essay on requirements and values in Internet elections

100. What proof do we prefer? Variants of verifiability in voting

Catalog

Books, media, physical & digital resources