Searched for: contributor:"Pieters, Wolter (mentor)"
(1 - 13 of 13)
Exploring how security and privacy affect IoT device purchase behaviour
Exploring how security and privacy affect IoT device purchase behaviour
An empirical study into how cyber security professionals deal with uncertainty in information security risk assessments
An empirical study into how cyber security professionals deal with uncertainty in information security risk assessments: Understanding perceptual aspects and judgment operations
The relation between the organizational information security climate and employees’ information security behavior
The relation between the organizational information security climate and employees’ information security behavior
User preference for authentication method
User preference for authentication method: A study on the influencing variables in a web application context
Cyberattack-Related Cascading Effects Mitigation
Cyberattack-Related Cascading Effects Mitigation: A Risk-based Approach for ICS Network Segmentation Design in Chemical Plants
Analysing the impact of cyber insurance on the cyber security ecosystem
Analysing the impact of cyber insurance on the cyber security ecosystem: Utilising agent-based modelling to explore the effects of insurance policies
Simulating ecosystem-level cybersecurity for the future generation of critical infrastructures
Simulating ecosystem-level cybersecurity for the future generation of critical infrastructures: Exploring the impact of cyber-defensive strategies on critical infrastructures through agent-based modelling
Drivers and impediments for cyber insurance adoption among Dutch SMEs
Drivers and impediments for cyber insurance adoption among Dutch SMEs
Modelling Humanitarian Interaction
Modelling Humanitarian Interaction: Exploring the factors that determine humanitarian interaction and the policies that influence them through agent-based modelling. The case of information security.
Systematically Applying Gamification to Cyber Security Awareness Trainings
Systematically Applying Gamification to Cyber Security Awareness Trainings: A framework and case study approach
Designing a cyber risk assessment tool for small to medium enterprises
Designing a cyber risk assessment tool for small to medium enterprises
What drives cybersecurity investment?
What drives cybersecurity investment?: Organizational factors and perspectives from decision-makers
Security Requirements Engineering in medical IoT: comparing literature and developers’ practices
Security Requirements Engineering in medical IoT: comparing literature and developers’ practices
Searched for: contributor:"Pieters, Wolter (mentor)"
(1 - 13 of 13)