Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
George, Claude S.
.
The History of Management Thought
. Englewood Cliffs, NJ: Prentice-Hall, Inc. , 1972.
Kara, Nuri
, and
Nese Sevim
.
"
Adaptive Learning Systems: Beyond Teaching Machines
."
Contemporary Educational Technology
4, no. 2 (2013): 108-120.
van Merrienboer, Jeroen J. G.
, and
Paul Kirschner
.
Ten Steps to Complex Learning: A Systematic Approach to Four-Component Instructional Design
. Third ed. New York: Routledge, 2018.
Stevens-Adams, Susan
,
Armida Carbajal
,
Austin Silva
,
Kevin Nauer
,
Benjamin Anderson
,
Theodore Reed
, and
Chris Forsythe
.
"
Enhanced Training for Cyber Situational Awareness
." In
Foundations of Augmented Cognition, Lecture Notes in Computer Science
, 90-99. Vol. 8027. Berlin, Heidelberg: Springer, 2013.
Leikas, Jaana
, and
Pertti Saariluoma
.
"
‘Worth’ and Mental Contents in Designing for Ageing Citizens’ Form of Life
."
Gerontechnology
7, no. 3 (2008): 305-318.
Saariluoma, Pertti
,
Antero Karvonen
,
Mikael Wahlstrom
,
Kai Happonen
,
Ronny Puustinen
, and
Tuomo Kujala
.
Challenge of Tacit Knowledge in Acquiring Information in Cognitive Mimetics
In
2nd International Conference on Intelligent Human Systems Integration (IHSI 2019): Integrating People and Intelligent Systems
. San Diego, California, USA, 2019.
Li, Meng
, and
Fei Gao
.
"
Why Nonaka Highlights Tacit Knowledge: A Critical Review
."
Journal of Knowledge Management
7, no. 4 (2003): 6-14.
Leonard, Barbara
.
Multidimensional Decision Making
In
Ebook
. Bradford: Emerald Publishing, 2007.
Hemamali, Tennakoon
.
A Comprehensive Methodology for Profiling Cyber-criminals
. Asia Pacific Institute of Information Technology, 2012.
Brown, Cameron S. D.
.
"
Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice
."
International Journal of Cyber Criminology
9, no. 1 (2015): 55-119.
Nykodym, Nick
,
Robert Taylor
, and
Julia Vilela
.
"
Criminal Profiling and Insider Cyber Crime
."
Digital Investigation
2, no. 4 (2005): 261-267.
Profiles of Cyber-Criminals and Cyber-Attackers
In
project funded by the European Commission, Seventh Framework Programme
. University of Cagliari, 2015.
Nurse, Jason R. C.
,
Oliver Buckley
,
Philip A. Legg
,
Michael Goldsmith
,
Sadie Creese
,
Gordon R. T. Wright
, and
Monica Whitty
.
Understanding Insider Threat: A Framework for Characterising Attacks
In
2014 IEEE Security and Privacy Workshops
. San Jose, CA, USA, 2014.
Wori, Okechukwu
.
"
Computer Crimes: Factors of Cybercriminal Activities
."
International Journal of Advanced Computer Science and Information Technology
3, no. 1 (2014): 51-67.
Rogers, Marcus K.
.
"
A Two-dimensional Circumplex Approach to the Development of a Hacker Taxonomy
."
Digital Investigation
3, no. 2 (2006): 97-102.
Georgiev, Venelin
.
The Human Factor in Cybersecurity
. Sofia: Avangard, 2018.
Hobbes, Thomas
.
Leviathan
. Cambridge; New York: Cambridge University Press, 1996.
Chaturvedi, B.K.
.
Kautilya’s Arthashastra
. Dimond Pocket Books, 2001.
Cuny, Frederick C.
.
Use of the Military in Humanitarian Relief
. Niinsalo, Finland, 1989.
Mallick, P.K.
.
"
Role of the Armed Forces in Internal Security: Time for Review
."
CLAWS Journal
(2007): 68.
Responsibility to protect populations from genocide, war crimes, ethnic cleansing and crimes against humanity
In
2005 World Summit Outcome, UN General Assembly Resolution
., 2005.
Schnabel, Albrecht
, and
Marc Krupanski
.
Mapping Evolving Internal Roles of the Armed Forces
. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2012.
Hofmann, Charles-Antoine
, and
Laura Hudson
.
"
Military Responses to Natural Disasters: Last Resort or Inevitable Trend
."
Humanitarian Exchange Magazine
44 (2009): 29-30.
United Nations
.
Civil-Military Coordination Officer Field Handbook
. Vol. version E 1.0., 2008.
UN Office for the Coordination of Humanitarian Affairs
.
United Nations Disaster Assessment and Coordination (UNDAC Field Handbook)
. 6th ed., 2013.
Pages
« първа
‹ предишна
…
382
383
384
385
386
387
388
389
390
…
следваща ›
последна »
383732 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all