Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Gasau, Isa Umar
.
"
SSS Displays Rocket Launchers, Grenade Bound for Plateau and Taraba
."
Daily Trust
(2011).
Resca, Paolo Spagnolett
.
"
The Duality of Information Security Management: Fighting Against Predictable and Unpredictable Threat
."
Journal of Information Systems Security
(2008).
Layton, Timothy P.
.
Information Security, Design Implementation, Measurement and Compliance
. Boca Raton, Florida: Auerbach Publications, 2007.
Soriwei, Fidelis
.
Soldiers Arrested for Aiding Boko Haram
. Punch, 2013.
Peltier, Thomas R.
.
Information Security Policies, Procedure and Standards Guidelines for Effective Information Security Management
. Bosca Raton, Florida: Auerbach publication, 2002.
Drake, Paul
, and
Steve Clark
.
A Social Perspective on Information Security: Theoretical Grounding Domain
. London: University of Luton Press, 2003.
Bandura, Albert
.
"
Perceived Self-efficacy in Cognitive Development and Functioning
."
Psychologist
28, no. 2 (1993): 117-148.
Lent, Robert W.
,
Steven D. Brown
, and
Gail Hacket
.
"
Career Development from Socio-cognitive Perspective
." In
Career Choice and Development
, 56-99. San Francisco: Jossey –Bass, 1992.
Hutchins, Edwin
.
Distribution Cognition
. San Diego: University of California Press, 2000.
Sunyaev, Ali
,
Christian Mauro
,
Florian Trammel
,
Jan Marco Leimeister
, and
Helmut Kremar
.
A Reclassification of IS Security analysis approaches
In
Proceedings of the Fifteenth Americas Conference on Information Systems
. San Francisco, California, 2009.
Dhillon, Gurpreet
.
Principles of Information Systems Security: Text and Cases
. New York: John Willey and Sons, 2007.
Grootaert, Christiaan
, and
Thierry van Bastelaer
.
Understanding and Measuring Social Capital: A Synthesis of Findings and Recommendations from the Social Capital Initiative
In
Social Capital Initiative Working Paper
., 2001.
Ukaegbu, Chikwendu
.
"
Merit, Corruption, Social capital and Development in Post 50 Nigeria
."
The Nation, September
(2011): 15.
Boko Haram’s kingpin confesses: Top Police officers helped me to escape
., 2012.
Hir, Joseph
.
Nasarawa Killings: How Police Insiders Tipped-off Cultists
. allAfrica.com, 2013.
SSS and security information breach
. Punch, 2013.
Governor Jonah David Gyang’s speech
., 2014.
Pwanagba, Agabus
.
"
Insecurity: Nigerian Army to Court Martial 17 Soldiers Who Erred in Peace Operations
."
DailyPost
(2013).
Ekpo, E.E.
.
"
Confronting the Realities of Corruption in Nigeria
." In
Corruption and Nigeria’s Underdevelopment
, 46-67. Lagos: Serenity Press, 2012.
Nigeria: Conviction of Admirals confirms Navy roles in oil theft
. IRIN News, 2005.
Shehu, B.
.
"
Immigration Officers Who Help Boko Haram
."
Vanguard
1 (2013): 8-9.
Ehimen, Okonigene Robert
, and
Adekanle Bola
.
"
Cybercrime in Nigeria
."
Business Intelligence Journal
3, no. 1 (2010).
Boubacar, Daouda Diallo
.
"
Organized Crime in Bukina Faso, Mali and Niger
." In
he Impact of Organized Crime on Governance in West Africa
, 85-99. Lagos: FES, 2013.
Rachev, Valeri
, and
Zlatogor Minchev
.
"
Methodology for Designing Defence Planning Scenarios
." In
Methodology and scenarios for defense planning
., 2007.
Rachev, Valeri
, and
Zlatogor Minchev
.
"
Context Scenarios for Defence Planning
." In
Methodology and scenarios for defense planning
. Sofia: Ministry of Defence, Directorate "Defence Policy", Military Publishing House, 2007.
Pages
« първа
‹ предишна
…
81
82
83
84
85
86
87
88
89
…
следваща ›
последна »
469509 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all