Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Edwards, Kari
.
"
The Interplay of Affect and Cognition in Attitude Formation and Change
."
Journal of Personality and Social Psychology
59, no. 2 (1990): 202-216.
Kruglanski, Arie
, and
Wolfgang Stroebe
.
"
The Influence of Beliefs and Goals on Attitudes: Issues of Structure, Function, and Dynamics
." In
The Handbook of Attitudes
, 323-368. Mahwah: Lawrence Erlbaum Associates, 2005.
Rahim, Noor Hayani Abd
,
Suraya Hamid
,
Laiha Mat Kiah
,
Shahaboddin Shamshirband
, and
Steven Furnell
.
"
A Systematic Review of Approaches to Assessing Cybersecurity Awareness
."
Kybernetes
44, no. 4 (2015): 606-22.
Crites, Stephen
,
Leandre Fabrigar
, and
Richard Petty
.
"
Measuring the Affective and Cognitive Properties of Attitudes: Conceptual and Methodological Issues
."
Personality and Social Psychology Bulletin
20, no. 6 (2007): 619-634.
Peters, Ellen
, and
Paul Slovic
.
"
Affective asynchrony and the measurement of the affective attitude component
."
Cognition and Emotion
21, no. 2 (2007): 300-329.
Shropshire, Jordan
,
Merrill Warkentin
, and
Shwadhin Sharma
.
"
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
."
Computers and Security
49 (2015): 177-191.
de Goede, Susanne van ’t H.
,
Rick van der Kleij
,
Steve van de Weijer
, and
Rutger Leukfeldt
.
Hoe veilig gedragen wij ons online?
., 2019.
Fishbein, Martin
, and
Icek Ajzen
.
Predicting and Changing Behavior: The Reasoned Action Approach
. New York: Psychology Press, 2010.
Ajzen, Icek
,
Cornelia Czasch
, and
Michael Flood
.
"
From Intentions to Behavior: Implementation Intention, Commitment, and Conscientiousness
."
Journal of Applied Social Psychology
39, no. 6 (2009): 1356-7.
Fishbein, Martin
, and
Icek Ajzen
.
Belief, Attitude, Intention, and Behaviour: An introduction to theory and research
. MA: Addison-Wesley, 1975.
Gerber, Nina
,
Paul Gerber
, and
Melanie Volkamer
.
"
Explaining the Privacy Paradox: A Systematic Review of Literature Investigating Privacy Attitude and Behavior
."
Computers and Security
77 (2018).
NEN-EN-ISO/IEC 27002: Information technology - Security techniques – Code of practice for information security controls
., 2017.
Parsons, Kathryn
,
Agata McCormac
,
Malcolm Pattinson
,
Marcus Butavicius
, and
Cate Jerram
.
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations
In
Proceedings of theEuropean Information Security Multi-Conference (EISMC 2013)
., 2013.
Sue, Valerie
, and
Lois Ritter
.
Conducting Online Surveys
. Thousand Oaks, CA: Sage Publications, 2012.
Dwyer, Evelyn
.
Attitude Scale Construction: A Review of the literature
. ERIC Institute of Education Sciences, 1993.
Mayer, Peter
,
Alexandra Kun
, and
Melanie Volkamer
.
Reliable Behavioural Factors in the Information Security Context
In
ACM International Conference Proceeding Series
. Vol. Part F1305., 2017.
Lohrmann, Dan
.
"
Cyber Range: Who, What, When, Where, How and Why?
"
Government Technology Magazine
31, no. 2 (2018): 529-551.
Mirkovic, Jelena
,
Terry V. Benzel
,
Ted Faber
,
Robert Braden
,
John Wroclawski
, and
Stephen Schwab
.
The DETER Project
In
The DETER Project," in IEEE International Conference on Technologies for Homeland Security (HST ’10)
., 2010.
Ferguson, Bernard
,
Anne Tall
, and
Denise Olsen
.
National cyber range overview
In
IEEE Military Communications Conference, Baltimore, MD, USA,
., 2010.
The Michigan Cyber Range
. MCR, 2020.
Lee, Rossey
.
"
SimSpace Cyber Range
." In
Panel: Cyber Experimentation of the Future (CEF): Catalyzing a New Generation of Experimental Cybersecurity Research
. Boston, United States, 2015.
Weiss, Richard
,
Franklyn Turbak
,
Jens Mache
, and
Michael Locasto
.
"
Cybersecurity Education and Assessment in EDURange
."
IEEE Security & Privacy
15, no. 3 (2017): 90-95.
Estonian Ministry of Defence
.
Estonian Defence Force’s Cyber Range
., 2014.
Prior, Tim
, and
Florian Roth
.
CSS Study: Learning from Disaster Events and Exercises in Civil protection Organizations
In
Risk and Resilience Reports
. Zurich: Center for Security Studies, 2016.
Hoffman, Lance
,
Timothy Rosenberg
,
Ronald Dodge
, and
Daniel Ragsdale
.
"
Exploring a national cybersecurity exercise for universities
."
IEEE Security and privacy
3, no. 5 (2005): 27-33.
Pages
« първа
‹ предишна
…
438
439
440
441
442
443
444
445
446
…
следваща ›
последна »
498037 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance