Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Crites, Stephen, Leandre Fabrigar, and Richard Petty. "Measuring the Affective and Cognitive Properties of Attitudes: Conceptual and Methodological Issues." Personality and Social Psychology Bulletin 20, no. 6 (2007): 619-634. Peters, Ellen, and Paul Slovic. "Affective asynchrony and the measurement of the affective attitude component." Cognition and Emotion 21, no. 2 (2007): 300-329. Shropshire, Jordan, Merrill Warkentin, and Shwadhin Sharma. "Personality, attitudes, and intentions: Predicting initial adoption of information security behavior." Computers and Security 49 (2015): 177-191. de Goede, Susanne van ’t H., Rick van der Kleij, Steve van de Weijer, and Rutger Leukfeldt. Hoe veilig gedragen wij ons online?., 2019. Fishbein, Martin, and Icek Ajzen. Predicting and Changing Behavior: The Reasoned Action Approach. New York: Psychology Press, 2010. Ajzen, Icek, Cornelia Czasch, and Michael Flood. "From Intentions to Behavior: Implementation Intention, Commitment, and Conscientiousness." Journal of Applied Social Psychology 39, no. 6 (2009): 1356-7. Fishbein, Martin, and Icek Ajzen. Belief, Attitude, Intention, and Behaviour: An introduction to theory and research. MA: Addison-Wesley, 1975. Gerber, Nina, Paul Gerber, and Melanie Volkamer. "Explaining the Privacy Paradox: A Systematic Review of Literature Investigating Privacy Attitude and Behavior." Computers and Security 77 (2018). NEN-EN-ISO/IEC 27002: Information technology - Security techniques – Code of practice for information security controls., 2017. Parsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations In Proceedings of theEuropean Information Security Multi-Conference (EISMC 2013)., 2013. Sue, Valerie, and Lois Ritter. Conducting Online Surveys . Thousand Oaks, CA: Sage Publications, 2012. Dwyer, Evelyn. Attitude Scale Construction: A Review of the literature. ERIC Institute of Education Sciences, 1993. Mayer, Peter, Alexandra Kun, and Melanie Volkamer. Reliable Behavioural Factors in the Information Security Context In ACM International Conference Proceeding Series. Vol. Part F1305., 2017. Lohrmann, Dan. "Cyber Range: Who, What, When, Where, How and Why?" Government Technology Magazine 31, no. 2 (2018): 529-551. Mirkovic, Jelena, Terry V. Benzel, Ted Faber, Robert Braden, John Wroclawski, and Stephen Schwab. The DETER Project In The DETER Project," in IEEE International Conference on Technologies for Homeland Security (HST ’10)., 2010. Ferguson, Bernard, Anne Tall, and Denise Olsen. National cyber range overview In IEEE Military Communications Conference, Baltimore, MD, USA,., 2010. The Michigan Cyber Range. MCR, 2020. Lee, Rossey. "SimSpace Cyber Range." In Panel: Cyber Experimentation of the Future (CEF): Catalyzing a New Generation of Experimental Cybersecurity Research. Boston, United States, 2015. Weiss, Richard, Franklyn Turbak, Jens Mache, and Michael Locasto. "Cybersecurity Education and Assessment in EDURange." IEEE Security & Privacy 15, no. 3 (2017): 90-95. Estonian Ministry of Defence. Estonian Defence Force’s Cyber Range., 2014. Prior, Tim, and Florian Roth. CSS Study: Learning from Disaster Events and Exercises in Civil protection Organizations In Risk and Resilience Reports. Zurich: Center for Security Studies, 2016. Hoffman, Lance, Timothy Rosenberg, Ronald Dodge, and Daniel Ragsdale. "Exploring a national cybersecurity exercise for universities." IEEE Security and privacy 3, no. 5 (2005): 27-33. Andreev, Evgeni, Mariya Nikolova, Veselka Radeva, and Georgi Bochev. Creating Moon Port and Spaceship Simulations in A Virtual Environment In 44th International Conference on Applications of Mathematics in Engineering and Economics AIP . Vol. 2048., 2018. Andreev, Evgeni, Veselka Radeva, and Mariya Nikolova. Innovative Biomonitoring Systems in The Aerospace Industry In CEMA’19 conference. Sofia, 2019. Clarke, Justin. SQL Injection Attacks and Defense . USA: Syngress, 2012. Pages« първа ‹ предишна … 438 439 440 441 442 443 444 445 446 … следваща › последна »