Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
(active tab)
Full profile
Publications
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
DPDP
(link is external)
., 2015.
Bezbedno na internet
(link is external)
In
Site Summary
. Sitemeter.com, 2015.
Safer Internet Day
(link is external)
., 2015.
Promotion campaign for safety of children and youth of the Internet "Surf Safe" (Macedonian)
(link is external)
. MIO, 2013.
FINKI
(link is external)
., 2015.
AEK
(link is external)
., 2015.
TACSO
., 2015.
Trope, R. L.
, and
L. L. Hantover
.
"
In the Wake of Cyber Damage: Significant Decisions in Cybersecurity 2013-2014
."
Business Lawyer
70, no. 1 (2014).
Tasevski, Predrag
.
I can hack your FB, can you catch me...
(link is external)
., 2013.
Ferraro, M. F.
.
"
"Groundbreaking" or Broken? An Analysis of SEC Cybersecurity Disclosure Guidance, Its Effectiveness, and Implications
."
Albany Law Review
77, no. 2 (2014).
Privatnost.mk
(link is external)
., 2015.
E-Society.mk
(link is external)
., 2015.
Research and analysis of responses to the questionnaire for pupils of secondary schools of the City of Skopje – Project Class for Privacy (Macedonian)
(link is external)
. Metamorphosis and DPDP, 2015.
Shackelford, S. J.
, and
A. N. Craig
.
"
Beyond the New Digital Divide: Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity
."
Stanford Journal of International Law
50, no. 1 (2014).
Ministry of Economic Affairs and Communication
.
Estonia, Cyber Security Strategy 2014-2017
., 2014.
Computer Networks and Cybersecurity
(link is external)
. New Man's Business Accelerator, 2015.
Delibert, A. C.
,
M.W. Laurent
, and
Schneider L.L.
.
"
Cybersecurity: Could Investment Company Directors be Liable for a Breach?
."
The Investment Lawyer
22, no. 2 (2015).
Faculty of Computer Networks Security
(link is external)
. Ohrid: University of Information Science & Technology “St. Paul The Apostle”, 2015.
Department of Homeland Security(DHS)
.
About the National Cybersecurity and Communications Integration Center.
(link is external)
., 2014.
GAO), United States Gov
.
Information Security Agencies Need to Improve Cyber Incident Response Practices
(link is external)
., 2014.
GAO), United States Gov
.
Cybersecurity National Strategy, Roles, and Responsibilities Need to be Better Defined and More Effectively Implemented
(link is external)
., 2013.
Minchev, Zlatogor
.
Hybrid Challenges to Cyberspace and the Role of the Human Factor
(link is external)
In
Proceedings of International Scientific Conference “South-East Europe: New Threats for the Regional Security”
. New Bulgarian University, 2015.
House, White
.
National Security Strategy. President of the United States. 2010
(link is external)
., 2010.
Georghiou, Luke
,
Jennifer Cassingena Harper
,
Michael Keenan
,
Ian Miles
, and
Rafael Popper
.
The Handbook of Technology Foresight: Concepts and Practice
. Massachusetts: Edward Elgar Publishing, 2008.
.
Data Breach Response Guide. Experian Data Breach Resolution. 2013-2014
(link is external)
., 2013.
Pages
« първа
‹ предишна
…
174
175
176
177
178
179
180
181
182
…
следваща ›
последна »
380587 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top