• No results found

Social network analysis in the context of information security risk management

N/A
N/A
Protected

Academic year: 2021

Share "Social network analysis in the context of information security risk management"

Copied!
296
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

Loading

Referenties

GERELATEERDE DOCUMENTEN

An algebra task was chosen because previous efforts to model algebra tasks in the ACT-R architecture showed activity in five different modules when solving algebra problem;

To sum up, the development of the Tocharian vowel system can be understood very well in light of the South Siberian system represented by Ket. Although theoretically this could be

• Several new mining layouts were evaluated in terms of maximum expected output levels, build-up period to optimum production and the equipment requirements

Objectives To investigate the Maslach Burnout Inven- tory—General Survey (MBI—GS) and the Utrecht Work Engagement Scale (UWES) for their ability to identify non-sicklisted

If the option foot was passed to the package, you may consider numbering authors’ names so that you can use numbered footnotes for the affiliations. \author{author one$^1$ and

The package is primarily intended for use with the aeb mobile package, for format- ting document for the smartphone, but I’ve since developed other applications of a package that

The present study demon- strated that patients with preoperative dyspeptic symptoms and patients using psychotropic medication are both at risk of persistence of the preexisting

this phase showed less mitigation strategies specific to the contracting risk, but rather was used to reduce the impact of risks stemming from the supplier selection, as