Searched for: author%3A%22Pieters%2C+W.%22
(1 - 20 of 33)

Pages

Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures
Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures
Individual preferences in security risk decision making
Individual preferences in security risk decision making: an exploratory study under security professionals
Investigating the effect of security and privacy on IoT device purchase behaviour
Investigating the effect of security and privacy on IoT device purchase behaviour
Bayesian network model to distinguish between intentional attacks and accidental technical failures
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
Risk Personalization
Risk Personalization: Governing Uncertain Collective Risk Through Individual Decisions
Decision support model for effects estimation and proportionality assessment for targeting in cyber operations
Decision support model for effects estimation and proportionality assessment for targeting in cyber operations
Effectiveness fettered by bureaucracy–why surveillance technology is not evaluated
Effectiveness fettered by bureaucracy–why surveillance technology is not evaluated
Solutions for mitigating cybersecurity risks caused by legacy software in medical devices
Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review
CYBECO
CYBECO: Supporting cyber-insurance from a behavioural choice perspective
Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures
Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures
Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations
Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations
An Adversarial Risk Analysis Framework for Cybersecurity
An Adversarial Risk Analysis Framework for Cybersecurity
The hybrid victim
The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory
Developing a Cyber Operations Computational Ontology
Developing a Cyber Operations Computational Ontology
On the anatomy of social engineering attacks
On the anatomy of social engineering attacks: A literature-based dissection of successful attacks
Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment
Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment
The effectiveness of surveillance technology
The effectiveness of surveillance technology: What intelligence officials are saying
Plots, murders, and money
Plots, murders, and money: oversight bodies evaluating the effectiveness of surveillance technology
Game mechanics and technological mediation
Game mechanics and technological mediation: an ethical perspective on the effects of MMORPG’s
Beyond individual-centric privacy
Beyond individual-centric privacy: Information technology in social systems
Searched for: author%3A%22Pieters%2C+W.%22
(1 - 20 of 33)

Pages