Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Mughal, Farooq, and Aneesa Zafar. "Experiential Learning from a Constructivist Perspective: Reconceptualizing the Kolbian Cycle." International Journal of Learning & Development 1, no. 2 (2011): 27-37. de Freitas, Sara, and Jill Jameson. The E-Learning Reader . London and New York: Continuum Books, 2012. Polanyi, Michael. The Tacit Dimension . New York: Anchor Day Books, 1966. Nonaka, Ikujirō, and Hirotaka Takeuchi. The Knowledge Creating Company: How Japanese Companies Create the Dynamics of Innovation. New York, NY: Oxford University Press, 1995. Cooker, Ian A., Alexander Scott, Kasia Sliwinska, Novia Wong, Soham V. Shah, Jihun Liu, and David Schuster. Towards Robust Models of Cyber Situation Awareness In Advances in Intelligent Systems and Computing. Vol. 782. Cham: Springer, 2018. Taitto, Petteri, Julia Nevmerzhiskaya, and Csaba Virag. "Using Holistic Approach to Developing Cybersecurity Simulation Environments." eLearning & Software for Education 4 (2018): 77-84. Helliar, Christine, Alasdair Lonie, David Power, and Donald Sinclair. Attitudes of UK Managers to Risk and Uncertainty. Edinburgh: The Institute of Chartered Accountants of Scotland, 2001. Leonard, Barbara, and Jerry Biberman. "Utilizing Multi‐dimensionality in the Workplace: A Meta‐study." Managerial Finance 33, no. 12 (2007): 935-946. George, Claude S.. The History of Management Thought. Englewood Cliffs, NJ: Prentice-Hall, Inc. , 1972. Kara, Nuri, and Nese Sevim. "Adaptive Learning Systems: Beyond Teaching Machines." Contemporary Educational Technology 4, no. 2 (2013): 108-120. van Merrienboer, Jeroen J. G., and Paul Kirschner. Ten Steps to Complex Learning: A Systematic Approach to Four-Component Instructional Design. Third ed. New York: Routledge, 2018. Stevens-Adams, Susan, Armida Carbajal, Austin Silva, Kevin Nauer, Benjamin Anderson, Theodore Reed, and Chris Forsythe. "Enhanced Training for Cyber Situational Awareness." In Foundations of Augmented Cognition, Lecture Notes in Computer Science, 90-99. Vol. 8027. Berlin, Heidelberg: Springer, 2013. Leikas, Jaana, and Pertti Saariluoma. "‘Worth’ and Mental Contents in Designing for Ageing Citizens’ Form of Life." Gerontechnology 7, no. 3 (2008): 305-318. Saariluoma, Pertti, Antero Karvonen, Mikael Wahlstrom, Kai Happonen, Ronny Puustinen, and Tuomo Kujala. Challenge of Tacit Knowledge in Acquiring Information in Cognitive Mimetics In 2nd International Conference on Intelligent Human Systems Integration (IHSI 2019): Integrating People and Intelligent Systems. San Diego, California, USA, 2019. Li, Meng, and Fei Gao. "Why Nonaka Highlights Tacit Knowledge: A Critical Review." Journal of Knowledge Management 7, no. 4 (2003): 6-14. Leonard, Barbara. Multidimensional Decision Making In Ebook. Bradford: Emerald Publishing, 2007. Hemamali, Tennakoon. A Comprehensive Methodology for Profiling Cyber-criminals. Asia Pacific Institute of Information Technology, 2012. Brown, Cameron S. D.. "Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice." International Journal of Cyber Criminology 9, no. 1 (2015): 55-119. Nykodym, Nick, Robert Taylor, and Julia Vilela. "Criminal Profiling and Insider Cyber Crime." Digital Investigation 2, no. 4 (2005): 261-267. Profiles of Cyber-Criminals and Cyber-Attackers In project funded by the European Commission, Seventh Framework Programme. University of Cagliari, 2015. Nurse, Jason R. C., Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, and Monica Whitty. Understanding Insider Threat: A Framework for Characterising Attacks In 2014 IEEE Security and Privacy Workshops. San Jose, CA, USA, 2014. Wori, Okechukwu. "Computer Crimes: Factors of Cybercriminal Activities." International Journal of Advanced Computer Science and Information Technology 3, no. 1 (2014): 51-67. Rogers, Marcus K.. "A Two-dimensional Circumplex Approach to the Development of a Hacker Taxonomy." Digital Investigation 3, no. 2 (2006): 97-102. Georgiev, Venelin. The Human Factor in Cybersecurity. Sofia: Avangard, 2018. Hobbes, Thomas. Leviathan. Cambridge; New York: Cambridge University Press, 1996. Pages« първа ‹ предишна … 382 383 384 385 386 387 388 389 390 … следваща › последна »