Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
UNESCO
.
Rethinking Education – Towards Common Goal?
., 2015.
Lewis, Linda H.
, and
Sarol J. Williams
.
"
Experiential Learning: Past and Present
."
New Directions for Adult and Continuing Education
62 (1994): 5-16.
Mughal, Farooq
, and
Aneesa Zafar
.
"
Experiential Learning from a Constructivist Perspective: Reconceptualizing the Kolbian Cycle
."
International Journal of Learning & Development
1, no. 2 (2011): 27-37.
de Freitas, Sara
, and
Jill Jameson
.
The E-Learning Reader
. London and New York: Continuum Books, 2012.
Polanyi, Michael
.
The Tacit Dimension
. New York: Anchor Day Books, 1966.
Nonaka, Ikujirō
, and
Hirotaka Takeuchi
.
The Knowledge Creating Company: How Japanese Companies Create the Dynamics of Innovation
. New York, NY: Oxford University Press, 1995.
Cooker, Ian A.
,
Alexander Scott
,
Kasia Sliwinska
,
Novia Wong
,
Soham V. Shah
,
Jihun Liu
, and
David Schuster
.
Towards Robust Models of Cyber Situation Awareness
In
Advances in Intelligent Systems and Computing
. Vol. 782. Cham: Springer, 2018.
Taitto, Petteri
,
Julia Nevmerzhiskaya
, and
Csaba Virag
.
"
Using Holistic Approach to Developing Cybersecurity Simulation Environments
."
eLearning & Software for Education
4 (2018): 77-84.
Helliar, Christine
,
Alasdair Lonie
,
David Power
, and
Donald Sinclair
.
Attitudes of UK Managers to Risk and Uncertainty
. Edinburgh: The Institute of Chartered Accountants of Scotland, 2001.
Leonard, Barbara
, and
Jerry Biberman
.
"
Utilizing Multi‐dimensionality in the Workplace: A Meta‐study
."
Managerial Finance
33, no. 12 (2007): 935-946.
George, Claude S.
.
The History of Management Thought
. Englewood Cliffs, NJ: Prentice-Hall, Inc. , 1972.
Kara, Nuri
, and
Nese Sevim
.
"
Adaptive Learning Systems: Beyond Teaching Machines
."
Contemporary Educational Technology
4, no. 2 (2013): 108-120.
van Merrienboer, Jeroen J. G.
, and
Paul Kirschner
.
Ten Steps to Complex Learning: A Systematic Approach to Four-Component Instructional Design
. Third ed. New York: Routledge, 2018.
Stevens-Adams, Susan
,
Armida Carbajal
,
Austin Silva
,
Kevin Nauer
,
Benjamin Anderson
,
Theodore Reed
, and
Chris Forsythe
.
"
Enhanced Training for Cyber Situational Awareness
." In
Foundations of Augmented Cognition, Lecture Notes in Computer Science
, 90-99. Vol. 8027. Berlin, Heidelberg: Springer, 2013.
Leikas, Jaana
, and
Pertti Saariluoma
.
"
‘Worth’ and Mental Contents in Designing for Ageing Citizens’ Form of Life
."
Gerontechnology
7, no. 3 (2008): 305-318.
Saariluoma, Pertti
,
Antero Karvonen
,
Mikael Wahlstrom
,
Kai Happonen
,
Ronny Puustinen
, and
Tuomo Kujala
.
Challenge of Tacit Knowledge in Acquiring Information in Cognitive Mimetics
In
2nd International Conference on Intelligent Human Systems Integration (IHSI 2019): Integrating People and Intelligent Systems
. San Diego, California, USA, 2019.
Li, Meng
, and
Fei Gao
.
"
Why Nonaka Highlights Tacit Knowledge: A Critical Review
."
Journal of Knowledge Management
7, no. 4 (2003): 6-14.
Leonard, Barbara
.
Multidimensional Decision Making
In
Ebook
. Bradford: Emerald Publishing, 2007.
Hemamali, Tennakoon
.
A Comprehensive Methodology for Profiling Cyber-criminals
. Asia Pacific Institute of Information Technology, 2012.
Brown, Cameron S. D.
.
"
Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice
."
International Journal of Cyber Criminology
9, no. 1 (2015): 55-119.
Nykodym, Nick
,
Robert Taylor
, and
Julia Vilela
.
"
Criminal Profiling and Insider Cyber Crime
."
Digital Investigation
2, no. 4 (2005): 261-267.
Profiles of Cyber-Criminals and Cyber-Attackers
In
project funded by the European Commission, Seventh Framework Programme
. University of Cagliari, 2015.
Nurse, Jason R. C.
,
Oliver Buckley
,
Philip A. Legg
,
Michael Goldsmith
,
Sadie Creese
,
Gordon R. T. Wright
, and
Monica Whitty
.
Understanding Insider Threat: A Framework for Characterising Attacks
In
2014 IEEE Security and Privacy Workshops
. San Jose, CA, USA, 2014.
Wori, Okechukwu
.
"
Computer Crimes: Factors of Cybercriminal Activities
."
International Journal of Advanced Computer Science and Information Technology
3, no. 1 (2014): 51-67.
Rogers, Marcus K.
.
"
A Two-dimensional Circumplex Approach to the Development of a Hacker Taxonomy
."
Digital Investigation
3, no. 2 (2006): 97-102.
Pages
« първа
‹ предишна
…
382
383
384
385
386
387
388
389
390
…
следваща ›
последна »
372820 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance