Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Mair, L. P.. Clientship in East Africa In Cahiers d'études africaines., 1961. M., Robinson. "Corruption and Development: An Introduction." In Corruption and Development, 1-14. London: Frank Cass, 1998. Huntington, S.. Political Order in Changing Societies. New Haven, Conn: Yale University Press, 1968. Lui, F.T.. "An equilibrium queuing model of bribery." Journal of Political Economy 93 (1985): 760-781. Nye, J.S.. "Corruption and Political Development: A Cost–Benefit Analysis." In Political corruption: readings in comparative analysis. Holt: Rinehart and Winston, 1970. Peng, Y.. "Kinship Networks and Entrepreneurs in China’s Transitional Economy." American Journal of Sociology 109, no. 5 (2004): 1045-1074. Aldrich, H., and R. Waldinger. "Ethnicity and Entrepreneurship." Annual Review of Sociology 16 (1990): 111-135. Вебер, М.. Протестантската етика и духът на капитализма. София: Просвета, 2006. Зудин, А.Ю.. "Государство и бизнес в посткоммунистической России: цикличность и перспективы институционализации." In Социально-экономические отношениягосударство и бизнеса., 2014. Фукуяма, Фр.. "За доброто и лошото управление." Геополитика (2015). Minchev, Zlatogor. Future Threats and Challenges in Cyberspace In CSDM Views. Sofia: Centre for Security and Defence Management, 2015. Souter, David, and Monica Kerrets-Makau. Internet Governance in Kenya: An Assessment. ICT Development Associates Ltd, 2012. Demombynes, Gabriel, and Aaron Thegeya. Kenya’s Mobile Revolution and the Promise of Mobile Savings In Poverty Reduction and Economic Management Unit, Africa Region World Bank., 2012. Africa 2013, Cybercrime, Hacking and Malware. IDG Connect, 2013. Calandro, Enrico, Cristoph Stork, and Alison Gillwald. Internet Going Mobile: Internet Access and Usage in 11 African Countries In Research ICT Africa., 2012. Internet Market Analysis Study. CAK, 2007. Kenya Cybersecurity Report 2014. Rethinking cyber security “An Integrated Approach: Process, Intelligence and Monitoring“. Serianu Ltd., 2014. Kenya’s ICT Master Plan 2014-2017. ICT Authority, 2013. Von Solms, Sune, and Roussouw Von Solms. Towards Cyber Safety Education in Primary Schools in Africa. HAISA, 2014. Bresz, F.P.. "People – Often the Weakest Link in Security, but One of the Best Places to Start." Journal of Healthcare Compliance 6, no. 4 (2004): 57-60. Reid, Reyne, and Johan Van Niekerk. Towards an Education Campaign for Fostering a Societal Cyber Security Culture In Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA)., 2014. ENISA threat Landscape 2013 – Overview of Current and Emerging Cyber Threats. ENISA, 2013. Barlow, Caleb. "Highlights and Insights." In RSA 2014 Conference., 2014. The role of NIST and Technology in Mobile Security. NIST, 2014. Mobile Threat Report. F-Secure Lab, 2013. Pages« първа ‹ предишна … 108 109 110 111 112 113 114 115 116 … следваща › последна »