Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications EuroControl. ATM Cybersecurity Maturity Model., 2017. Scottish Local Government. Digital Telecare Security Assessment Scheme., 2021. Santos, Daniel dos, Stanislav Dashevskyi, Jos Wetzels, and Amine Amri. Amnesia:33 How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices. Forescout Research Labs, 2021. Simpson, Stacy. Software Integrity Controls. An Assurance-based Approach to Minimizing Risks in the Software Supply Chain. SAFECode, 2010. Walton, Robert. What’s in Your Software? Federal Initiative Targets Frequently Overlooked Electric Utility Vulnerabilities. Utility Dive, 2021. NCSC. Supply Chain Security Guidance., 2018. ENISA. Public Private Partnerships (PPP) – Cooperative Models., 2017. Commission, European. Shaping Europe’s Digital Future: Public Private Partnerships., 2018. Hollywood, John S., and Zev Winkelman. Improving Information Sharing Across Law Enforcement: Why Can’t We Know? In Research Report. Santa Monica, CA: RAND, 2015. Gainer, Terrance W.. Partnerships between Public Law Enforcement and Private Security Should Become the Norm. Securitas Security Services USA, Inc., , 2014. Giauque, David. "Les difficultés de gestion des partenariats public-privé en Europe." Revue Française d’administration Publique 130, no. 2 (2009): 383-94, quote on p. 385. Abrahamson, Douglas Edward, and Jane Goodman-Delahunty. "Impediments to Information and Knowledge Sharing Within Policing." SAGE Open 4, no. 1 (2014). Bruggeman, Willy, Marleen Easton, and Philippe De Baets. "It’s the Economy’ of Hoe Financiële Imperatieven Het Politie – En Veiligheidsbeleid Meer Dan Ooit Bepalen." Orde van de Dag: Criminaliteit En Samenleving 71 (2015): 15-18. Fatemi, Mahboubeh, and Mohammad Reza Behmanesh. "New Public Management Approach and Accountability." International Journal of Management, Economics and Social Sciences 1, no. 2 (2012): 42-49. Choo, Chun Wei. The Knowing Organization: How Organizations Use Information to Construct Meaning, Create Knowledge, and Make Decisions. 2nd ed. New York: Oxford University Press, 2006. Klima, Noël, and Philippe De Baets. "Inleiding. Kosten van Veiligheid – Beperkingen, Risico’s En Kansen Door Innovatie." Orde van de Dag: Criminaliteit En Samenleving 71 (2015): 2-4. Terpstra, Jan, Bas Van Stokkom, and Ruben Spreeuwers. Toezichthouders En Handhavers in de (Semi)Publieke Ruimte-Een Internationale Vergelijking . Nijmegen, The Netherlands: Criminologisch Instituut, Radboud Universiteit Nijmegen, 2013. Devroe, Elke, and Philine Terwel. "De Politiefunctie Geprivatiseerd? Private Beveiliging in België En Nederland." Cahier Politiestudies 3, no. 36 (2015): 11-31. Easton, Marleen, Arne Dormaels, and Evelien De Pauw. Innovatie, Veiligheid En Technologie: Partnerschap Als Katalysator?. Mechelen: Kluwer, 2016. Easton, Marleen. "La Triple Hélice en tant qu’outil de gestion de l’innovation au sein d’une police publique en réseau." In Organiser, Innover, Agir: Réformer et Adapter Les Polices En Belgique (18e-21e Siècles), 131-46. Louvain: Presses Universitaires de Louvain, 2017. Easton, Marleen. "Reflections on the Triple-Helix as a Vehicle to Stimulate Innovation in Technology and Security: A Belgian Case Study." In Innovations in Law Enforcement: Implications for Practice, Education and Civil Society, 35-45. Budapest, Hungary: European Union Agency for Law Enforcement Training, CEPOL, 2019. Braun, Virginia, and Victoria Clarke. "Using Thematic Analysis in Psychology." Qualitative Research in Psychology 3, no. 2 (2006): 77-101. Bryson, John M., Barbara C. Crosby, and Laura Bloomberg. "Public Value Governance: Moving Beyond Traditional Public Administration and the New Public Management." Public Administration Review 74, no. 4 74, no. 4 (2014): 445-56. Richter, Heiko, and Peter R. Slowinski. "The Data Sharing Economy: On the Emergence of New Intermediaries." International Review of Intellectual Property and Competition Law 50 (2019): 4-29. Ghose, Anindya, and Esther Gal-Or. "The Economic Consequences for Sharing Security Information." Information Systems Research 16, no. 2 (2005): 186208. Pages« първа ‹ предишна … 488 489 490 491 492 493 494 495 496 … следваща › последна »