Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Securing the Edge: Surveying the Vulnerabilities in the Federal Government’s Inter-net of Things In Research report. Government Business Council, Brocade Communications System, 2017. Kostaki, Irene. EU Struggles to Balance Trans-Atlantic Ties with Exposure to Huawei. Brussels: New Europe, 2019. Wheeler, Tom. Moving from ‘Secret Sauce’ to Open Standards for 5G. Brookings Global Eye, 2020. Zhao, Christina. China Building Artificial Intelligence–Powered Nuclear Submarine That Could Have 'Its Own Thoughts,' Report Says. Newsweek, 2018. Brundage, Miles, Shahar Avin, and Jack Clark. The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. Future of Humanity Institute – University of Oxford, Centre for the Study of Existential Risk, Center for a New American Security, Electronic Frontier Foundation, Open AI, 2018. New Cryptography Must Be Developed and Deployed Now. Homeland Security News Wire, 2018. Forum, World Economic. The Global Risks Report 2019., 2019. Berlin Wants First Use of EU Cyber Sanctions on Russia. EU Observer, 2020. Nakashima, Ellen. "Trump Approved Cyber-strikes Against Iranian Computer Database Used to Plan At-tacks on Oil Tankers." Washington Post (2019). Futter, Andrew. What Does Cyber Arms Control Look Like? Four Principles for Managing Cyber Risk In Policy Brief. European Leadership Network, 2020. Karev, Maksim. "Risk Management as a Part of The Security Strategic Management." Science & Technologies V, no. 7 (2015). Borissova, Daniela, Delyan Keremedchiev, and Georgi Tuparov. "Multi-Criteria Model for Questions Selection in Generating e-Education Tests Involving Gamification." TEM Journal 2 (2020): 779-785. Borissova, Daniela, Magdalena Garvanova, Zornitsa Dimitrova, Andrea Pandulis, and Ivan Garvanov. "Decision Support Framework for Composing of Different Questionnaires Based on Business Model with Optimization." In Integrated Uncertainty in Knowledge Modelling and Decision Making. Springer Nature, 2020. Borissova, Daniela, Dilian Korsemov, and Nina Keremedchieva. Generalized Approach to Support Business Group Decision-Making by Using of Different Strategies In International Conference on Computer Information Systems and Industrial Management CISIM 2020: Computer Information Systems and Industrial Management., 2020. Regulations for the Life Cycle Management of the Command, Control, Communications, Computers, and Intelligence Systems (C4I) in the Ministry of Defense and the Bulgarian Armed Forces. Sofia: Military Publishing House, 2000. Maximizing the Success of Chief Information Officers: Learning from Leading Organizations In Executive Guide. United States General Accounting Office, 2001. Lawry, Rachel, Dianne Waddell, and Mohini Singh. Roles, Responsibilities and Futures of Chief Information Officers (CIOs) in the Public Sector., 2007. Gruber, William H.. Strategic Information for Competitive Advantage., 2019. Synnott, William R., and William H. Gruber. Information Resource Management: Opportunities and Strategies for the 1980s . New York: Wiley Interscience, 1981. Peppard, Joe. "Unlocking the Performance of the Chief Information Officer (CIO)." California Management Review 52, no. 4 (2010): 5. What Exactly Does a Chief Information Officer Do? In interview with Paul Burfitt. Computer Weekly, 2005. CIO Interview: David Cooper, CTIO of Mitie. Horizon CIO Network, 2018. J. Baldwin, Norman. "Public versus private: not that different, not that consequential." Public Personnel Management 16, no. 2 (1987): 181-193. Bouma, Gary, and Rod Ling. The Research Process Fifth Edition . Oxford University Press, 2004. Boyne, George. "Public and Private Management: What’s the Difference?" Journal of Management Studies 39, no. 1 (2002): 97-122. Pages« първа ‹ предишна … 450 451 452 453 454 455 456 457 458 … следваща › последна »