Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
New Rules, Wider Reach: The Extraterritorial Scope of the GDPR
In
Slaughter and May
., 2016.
BEREC
.
Response to the ePrivacy Directive Questionnaire
., 2016.
European Data Protection Supervisor(EDPS)
.
EDPS Opinion on the Proposal for a Regulation on Privacy and Electronic Communications (ePrivacy Regulation)
., 2017.
Opinion 01/2017 on the Proposed Regulation for the ePrivacy Regulation (2002/ 58/EC), 17/EN WP 247
In
Article 29 Data Protection Working Party
. European Commission, 2017.
Itakura, Yoichiro
.
Oshu Iinkai Dokkinho Ikigai Tekiyou [The European Commission Implements the Extraterritorial Application in Competition Law]
. FACTA Online, 2015.
Ishikawa, Tomoya
.
"
Big Data Business to Kojin Jyoho Hogo [Big Data Business and Protection of Personal Data]
."
Asahi Judiciary
(2013).
Takahashi, Haruo
.
Big Data Hosei no Kokusai Hikaku [Comparison of Legal Framework of Big Data]
. KDDI Research Institute, 2013.
MIC
.
Heisei 28 Nen Jyoho Tsushin Media no Riyou Jikan to Jyoho Koudou ni Kansuru Chosa [Research for the Length of Time and Behavior to Use Communication Media]
., 2017.
MIC
.
Tsushin Riyou Dokou Chosa [Research for the Use of Telecommunication]
., 2016.
Dai 189 Kai Kokkai Kaigiroku Sangiin Naikaku Iinkai & Zaisei Kinyu Iinkai Rengou Shinsa Dai 1 Gou [The Diet Record in the 189th session of the Diet, House of Councillors, the Cabinet Office & the Financial Committee Vol.1]
. House of Councilors in the National Diet of Japan.
Kuner, Christopher
.
"
Data Protection Law and International Jurisdiction on the Internet
."
International Journal of Law and Information Technology
19, no. 3 (2010): 227, 239.
Board, European Data Prote
.
Guidelines 3/2018 on the Territorial Scope of the GDPR (Article 3) - Version for Public Consultation
. Vol. 19., 2018.
Tagawa, Yoshihiro
.
"
Internet Riyou ni okeru Tsushin no Himitsu [Secrecy of communication in the Use of the Internet]
."
Science of Information Security
5, no. 1 (2013): 33.
Georgiev, Venelin
.
Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities
In
IT4Sec Reports
., 2021.
ENISA
.
CSIRT Maturity - Self-assessment Tool
., 2021.
ENISA
.
NCSS: Practical Guide on Development and Execution
., 2021.
International Telecommunication Union(ITU)
.
The Global Cybersecurity Index
., 2018.
Institute of Internal Auditors
.
Internal audit capability model (IA-CM) for the public sector: overview and application guide
. Altamonte Springs, 2009.
National Capabilities Assessment Framework
. European Union Agency for Cybersecurity (ENISA), 2020.
White, Gregory
.
"
The Community Cyber Security Maturity Model
." In
40th Hawaii International International Conference on Systems Science (HICSS-40 2007)
. Waikoloa, Big Island, HI, USA, 2007.
Davis, Brigit L.
.
Anticipating Social Movement National Security Threats: Social Media Content’s Potential in Developing a Structured Analytical Model
. Vol. Doctorate in Strategic Security. National American University, 2021.
Zukic, Anes
.
Assessing the Role of the Military in National Cybersecurity Efforts
In
Faculty of the U.S. Army Command and General Staff College
. Vol. Master of Military art and science. Ankara, Turkey: Land Forces Military Academy, 2009.
Iqbal, Ishtiaq
,
Sonia Afroz
, and
Intisar Kabir
.
"
Plan a Condensed Risk Model using Fuzzy Logic for Natural Disaster Management
."
International Journal of Engineering Research & Technology (IJERT)
10, no. 04 (2021).
Garba, Adamu Abdullahi
,
Fathe Jeribi
,
Ibrahim Al-Shourbaji
,
Mohammed Alhameed
,
Faheem Reegu
, and
Sophia Alim
.
"
An Approach To Weigh Cybersecurity Awareness Questions In Academic Institutions Based On Principle Component Analysis: A Case Study Of Saudi Arabia
."
International Journal of Scientific & Technology Research
10, no. 04 (2021).
Доценко, C. І.
,
Є. В. Брежнєв
, and
Є. М. Будніченко
.
"
Natural intellectual systems: contradictions of methodologies of integrated and systematic approaches and ways to overcome them
."
Radioelectronic and Computer Systems
1, no. 97 (2021).
Pages
« първа
‹ предишна
…
490
491
492
493
494
495
496
497
498
…
следваща ›
последна »
344888 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all