Prof HA Kruger. Last updated: 19 January Publications and Technical reports

Size: px
Start display at page:

Download "Prof HA Kruger. Last updated: 19 January Publications and Technical reports"

Transcription

1 Prof HA Kruger Last updated: 19 January 2009 Publications and Technical reports 1) Kruger, H.A. & Coetsee, L.D A model to optimize internal audit service quality, South African Journal of Economic and Management Sciences, Volume 20, Summer p ) Kruger, H.A. & Coetsee, L.D Identifying priority and quality criteria for effective internal audits, South African Journal of Economic and Management Sciences, Volume 21, Autumn p ) Kruger, H.A., Steyn, P.J. & Kearney, W.D Determinants of internal audit efficiency, South African Journal of Business Management, 33(3), September p ) Goede, R. & Kruger, H.A Evaluating information security awareness A comparison of different research paradigms, In Proceedings of the International Science and Technology Conference. ISBN Vaal University of Technology. 1-2 December ) Hattingh, J.M., Kruger, H.A. & Du Plessis, P.M Linear model selection towards a framework using a mixed integer linear programming approach, The South African Statistical Journal, 39, September p ) Kruger, H.A. & Kearney, W.D Measuring information security awareness: A West Africa gold mining environment case study, In Proceedings of the Information Security South Africa (ISSA) Conference. ISBN: X. Johannesburg. 29 June 1 July ) Kearney, W.D. & Kruger, H.A The development and application of a model to measure information security awareness, In Proceedings of the CACS2005 Oceania Conference. ISBN: Perth, Western Australia October ) Drevin, L., Kruger, H.A. & Steyn, T Value-focused assessment of ICT security awareness in an academic environment, In: IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments, eds. Fischer-Hubner, S., Ranneberg, K., Yngstrom, L., Lindskog, S. ISBN:10: X. Boston: Springer, p ) Kruger, H.A. & Hattingh, J.M A combined AHP-GP model to allocate internal auditing time to projects. ORION, 22(1), June p ) Kruger, H.A. & Kearney, W. D A prototype for assessing information security awareness. Computers and Security, 25(4), June p ) Kruger, H.A., Drevin, L & Steyn, T A framework for evaluating ICT security awareness, In Proceedings of the Information Security South Africa (ISSA) Conference. ISBN: Johannesburg. 5-7 July ) Drevin, L., Kruger, H.A. & Steyn, T Value-focused assessment of ICT security awareness in an academic environment. Computers and Security, 26(1), February p ) Steyn, T., Kruger, H.A. & Drevin, L Identity theft empirical evidence from a phishing exercise, In: New approaches for security, privacy and trust in complex environments. Proceedings of the IFIP TC nd International Information Security Conference (SEC 2007), eds. Venter, H., Eloff, M., 1

2 Labuschagne, L., Eloff, J., Von Solms, R. ISBN:13: New York: Springer, p ) Kruger, H.A., Drevin, L. & Steyn, T security awareness A practical assessment of employee behaviour, In: IFIP International Federation for Information Processing, Volume 237, Fifth world conference on Information Security Education, eds. Futcher, L., Dodge, R. ISBN:13: Boston: Springer, p ) Kruger, H.A., Steyn, T., Drevin, L. & Medlin, B.D Password Management: Empirical results from a RSA and USA study. In Innovative Minds, Proceedings of the Information Security for South Africa (ISSA 2008) Conference, Johannesburg, 7-9 July. ISBN ) Kruger, H.A., Steyn, T., Drevin, L. & Medlin, B.D How secure are passwords that will be used by future health care workers? In Redefining an agenda for Information Security, Proceedings of the 7th Annual Security Conference, Las Vegas, USA, June 2-3. Ed. G. Dhillon. Information Institute Publishing, Washington DC, USA. ISBN: ) Kruger, H.A. & Kearney, W.D Consensus ranking an ICT security awareness case study. Computers and Security, 27(7-8), December p Technical reports 18) Hattingh, J.M. & Kruger, H.A Robust linear models by discarding data and regressors simultaneously, Research Report No FABWI-N-RKW: ) Kruger, H.A., Steyn, P.J. & Kearney, W Determinants of internal audit efficiency, Research Report No FABWI-N-RKW: ) Goede, R. & Kruger, H.A Evaluating information security awareness A comparison of different research paradigms, Research Report No FABWI-N- RKW: ) Kruger, H.A. & Hattingh, J.M A combined AHP-GP model to allocate internal auditing time to projects. Research Report No FABWI-N-RKW: ) Hattingh, J.M., Kruger, H.A. & Du Plessis, P.M Linear model selection towards a framework using a mixed integer linear programming approach. Research Report No FABWI-N-RKW: ) Bell, A., Hattingh, J.M. & Kruger, H.A n Produkprysbepalingsmodel met behulp van doelwitprogrammering. Research Report No FABWI-N-RKW: ) Kruger, H.A. & Kearney, W.D Measuring information security awareness in an international mining environment, Research Report No FABWI-N- RKW: ) Kruger, H.A. & Kearney, W.D Measuring information security awareness: A West Africa gold mining environment case study, Research Report No FABWI-N-RKW: ) Kruger, H.A., Drevin, L. & Steyn, T A framework for evaluating ICT security awareness. Research Report No FABWI-N-RKW: ) Drevin, L., Kruger, H.A. & Steyn, T Value-focused assessment of ICT security awareness in an academic environment. Research Report No FABWI-N- RKW:

3 28) Kruger, H.A. & Kearney, W.D Consensus Ranking An ICT security awareness case study, Research Report No FABWI-N-RKW: ) Steyn, T., Kruger, H.A. & Drevin, L Identity theft empirical evidence from a phishing exercise. Research Report No FABWI-N-RKW: ) Kruger, H.A., Drevin, L. & Steyn, T security awareness a practical assessment of employee behaviour. Research Report No FABWI-N- RKW: ) Kruger, H.A., Drevin, L. & Steyn, T Password management assessment. Technical Report. North-West University, South Africa, FABWI-N-RKW: ) Kruger H.A., Steyn, T., Drevin L. & Medlin, B.D Aspects of Secure Password Selection. Technical Report. North-West University, South Africa, FABWI-N-RKW: ) Kruger H.A., Steyn, T., Drevin L. & Medlin, B.D Password management: A comparative study. Technical Report. North-West University, South Africa, FABWI-N-RKW: Conferences 1) Kruger, H.A The 8 th national conference for Masters and PhD students in Computer Science, Bepaling van n effektiewe bronverdelingstrategie gebaseer op risiko by verskillende rekenaarstelsels, UNISA, Pretoria, South Africa June ) Kruger, H.A. & Hattingh, J.M SAICSIT97, The 1997 National Research and Development Conference, A risk model to allocate resources to different computerized systems, Vanderbijlpark, South Africa November ) Hattingh, J.M. & Kruger, H.A Department of Informatics Robust Linear Models. Colloquium, University of Rostock, Germany. October ) Hattingh, J.M. & Kruger, H.A The sixteenth triennial conference of the International Federation of Operational Research Societies (IFORS2002), Robust linear models by discarding data and regressors simultaneously, Edinburgh, UK July ) Hattingh, J.M. & Kruger, H.A Eleventh International Colloquium on Numerical Analysis and Computer Science Applications, Linear Response Surface Analysis and Robust Linear Models, Plovdiv, Bulgaria, August ) Kruger, P.H. & Kruger, H.A rd Annual Conference of the Operations Research Society of South Africa. Construction of a chess opening repertoire using expert system technology, ABSA Conference Centre in Montana Park, Pretoria (Gauteng) September ) Kruger, H.A. & Hattingh, J.M th European Conference on Operational Research: OR and the Management of Electronic Services. A risk-based integrated framework for allocating internal auditing time to projects using AHP and Goal Programming, Rhodes, Greece. 4-7 July ) Du Plessis, P.M., Hattingh, J.M. & Kruger, H.A th Annual Conference of the Operations Research Society of South Africa. Aspects of model selection and data discarding for linear regression, Stellenbosch Graduate School of Business, Bellville (Western Cape). 5-8 September ) Kruger, H.A., Goede, R. & Kearney, W.D Simposium: Eenheid vir Bedryfswiskunde en Informatika Subprogram: Grondslae en etiek, Research Methodology in Information Systems: Evaluating information security awareness 3

4 comparison of different research paradigms, North West University, Potchefstroom, South Africa. 17 September ) Goede, R. & Kruger, H.A International Science and Technology Conference, Evaluating information security awareness A comparison of different research paradigms, Vaal University of Technology, Vanderbijlpark, South Africa. 1-2 December ) Kruger, H.A. & Kearney, W.D Information Security South Africa (ISSA) Conference, Measuring information security awareness: A West Africa gold mining environment case study, Johannesburg. 29 June 1 July ) Du Plessis, P.M., Hattingh, J.M. & Kruger, H.A The seventeenth triennial conference of the International Federation of Operational Research Societies (IFORS2005), A mathematical programming approach to simultaneously discard data points, select regressors and made transformation decisions in regression modelling,hawaii, USA July ) Du Plessis, P.M., Hattingh, J.M. & Kruger, H.A th SAIIE and 35 th ORSSA annual conference. A mathematical programming approach to simultaneously discard data points, select regressors and made transformation decisions in regression modelling, Emerald Casino Resort, Vanderbijlpark August ) Kearney, W.D. & Kruger, H.A CACS2005 Oceania Conference. The development and application of a model to measure information security awareness. Burswood Convention Centre, Perth, Western Australia October ) Drevin, L., Kruger, H.A. Steyn, T st IFIP International Information Security Conference. Security and Privacy in dynamic environments. WG 11.1/11.8 Security Culture Workshop. Value-focused assessment of ICT security awareness in an academic environment. Karlstad, Sweden May ) Kruger, H.A., Drevin, L & Steyn, T Information Security South Africa (ISSA) Conference, A framework for evaluating ICT security awareness. Johannesburg. 5-7 July ) Tsogang, M P., Hattingh, J.M., Kruger, H.A th Annual conference of the Operations Research Society of SA. A goal programming model to determine prices. Pietermaritzburg. 4-6 September ) Steyn, T., Kruger, H.A. & Drevin, L nd IFIP International Information Security Conference. New approaches for security, privacy and trust in complex environments. Identity theft empirical evidence from a phishing exercise. Sandton, Johannesburg, South Africa May ) Kruger, H.A., Drevin, L. & Steyn, T WISE5, Fifth World Conference on Information Security Education. TC11, WG security awareness A practical assessment of employee behaviour. United States Military Academy, West Point, New York, USA June ) Tsogang, M.P., Kruger, H.A. & Hattingh, J.M nd European Conference on Operational Research. Price determination based on goal programming principles, Prague, Czech Republic July ) Smith, E.H., Kruger, H.A. & Goede, R th Annual conference of the Operations Research Society of SA. An analytical framework for monitoring and optimizing bank branch network efficiency using data mining techniques. Cape Town September

5 22) Kruger, H.A., Steyn, T., Drevin, L. & Medlin, B.D The 7 th Annual Security Conference, How secure is passwords that will be used by future health care workers? Las Vegas, Nevada, USA. 2-3 June ) Kruger, H.A., Steyn, T., Drevin, L & Medlin, B.D Information Security South Africa (ISSA) Conference, Password management: Empirical results from a RSA and USA study. Johannesburg, South Africa. 7-9 July ) Du Plessis, P.M., Hattingh, J.M. & Kruger, H.A The 18th triennial conference of the International Federation of Operational Research Societies (IFORS2008), Robust linear models: A comparison between a MILP and LMS approach, Sandton, South Africa July ) Hattingh, J.M., Kruger, H.A. & Van der Westhuizen, M.M The 18th triennial conference of the International Federation of Operational Research Societies (IFORS2008), Robust non-linear regression models with minimal assumptions, Sandton, South Africa July

EA in South African. EAPC San Diego 4 February Paul van der Merwe

EA in South African. EAPC San Diego 4 February Paul van der Merwe EA in South African Universities EAPC San Diego 4 February 2009 Paul van der Merwe South Africa 2 3 University of Pretoria Established in 1908 In 2008, student numbers totalled 57 409 In 1996, the University

More information

Towards a more secure Cyber Space for South Africa

Towards a more secure Cyber Space for South Africa 22 October 2013 Towards a more secure Cyber Space for South Africa Prof Basie Von Solms Director : Centre for Cyber Security University of Johannesburg basievs@uj.ac.za International comments African comments

More information

HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT

HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 7-8 November 2013 Agenda to improve health information infrastructure» In 2010, health ministers called for improvement

More information

Dukpa Kim FIELDS OF INTEREST. Econometrics, Time Series Econometrics ACADEMIC POSITIONS

Dukpa Kim FIELDS OF INTEREST. Econometrics, Time Series Econometrics ACADEMIC POSITIONS Dukpa Kim Contact Information Department of Economics Phone: 82-2-3290-5131 Korea University Fax: 82-2-3290-2661 145 Anam-ro, Seongbuk-gu Email: dukpakim@korea.ac.kr Seoul, 02841 Korea FIELDS OF INTEREST

More information

MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY SUNDAY

MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY SUNDAY 2018 January 01 02 03 04 05 06 07 Public Holiday 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Supplementary exam: Basic s, Grooming 27 28 29 30 31 01 02 03 04 05 06 Notes: 2018 February 29

More information

Tshwane University Of Technology Check Application Status

Tshwane University Of Technology Check Application Status Check Application Status Free PDF ebook Download: Check Application Status Download or Read Online ebook tshwane university of technology check application status in PDF Format From The Best User Guide

More information

Using Phishing for User Security Awareness

Using Phishing for User  Security Awareness Using Phishing for User Email Security Awareness Ronald C. Dodge and Aaron J. Ferguson Department of Electrical Engineering and Computer Science United States Military Academy, West Point, NY, USA {ronald.dodge,

More information

Service withdrawal: Selected IBM ServicePac offerings

Service withdrawal: Selected IBM ServicePac offerings Announcement ZS09-0086, dated April 21, 2009 Service withdrawal: Selected IBM offerings Table of contents 1 Overview 9 Announcement countries 8 Withdrawal date Overview Effective April 21, 2009, IBM will

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

INFORMATION SECURITY MANAGEMENT & SMALL SYSTEMS SECURITY

INFORMATION SECURITY MANAGEMENT & SMALL SYSTEMS SECURITY INFORMATION SECURITY MANAGEMENT & SMALL SYSTEMS SECURITY IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World

More information

Programmes and Activities of the. International Cooperation and Assistance. (ICA) Division

Programmes and Activities of the. International Cooperation and Assistance. (ICA) Division Programmes and Activities of the International Cooperation & Assistance (ICA) Division Presentation for Permanent Representatives to the based in Brussels 5 November 2015 Mark Albon Director, Division

More information

, ISO/IEC. ORCID ORCID ISO/IEC

, ISO/IEC.   ORCID ORCID ISO/IEC .,. «ИФИ» 115409,, К, 31, e-mail: NGMiloslavskaya@mephi.ru, ORCID 0000-0002-1231-1805 e-mail: AITolstoj@mephi.ru, ORCID 0000-0001-9265-1510 DOI: http://dx.doi.org/10.26583/bit.2017.4.01. ( ) ( ) ( ).,

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

MAGNO QUEIROZ Curriculum Vitae

MAGNO QUEIROZ Curriculum Vitae MAGNO QUEIROZ Curriculum Vitae Office Management Information Systems Jon M. Huntsman School of Business Utah State University 3515 Old Main Hill Logan, UT 84322-3515 Location: Eccles Business Building

More information

How to Become a CMA (Certified Management Accountant) May 10, 2017

How to Become a CMA (Certified Management Accountant) May 10, 2017 How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements

More information

Curriculum Vitae Dr Kennedy Njenga

Curriculum Vitae Dr Kennedy Njenga Curriculum Vitae Dr Kennedy Njenga Mobile: +27 735826851 KEY SKILLS AREAS Administration Teaching and Learning Industry and Technical Experience Research and Publications ADMINISTRATION (May 2008 to Present)

More information

RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS

RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS RESUME WEI LI Graduate School of Computer and Information Sciences Nova Southeastern University 3301 College Avenue, Fort Lauderdale-Davie, FL 33314 Office: (954) 262-2068 Fax: (954) 262-3915 Email: lwei@nova.edu

More information

Nuts and Bolts of the Career and Professional Education Act (CAPE)

Nuts and Bolts of the Career and Professional Education Act (CAPE) Learning Today, Earning Tomorrow Nuts and Bolts of the Career and Professional Education Act (CAPE) Tara Goodman Tara McLarnon Division of Career and Adult Education Florida Department of Education 1 The

More information

PhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt.

PhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt. AMAL MOH D BARAKAT AL-DWEIK HEBRON, WEST BANK, PALESTINE +970-2-2235142. EMAIL: AMAL@PPU.EDU Education PhD. of Information Networks (2004-2009). Cairo University. Faculty of Computers and Information.

More information

Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula

Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula Lynn Futcher and Johan Van Niekerk Nelson Mandela Metropolitan University, Port Elizabeth, South

More information

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public

More information

Certifying the Computer Security Professional Using the Project Management Institute's PMP Model

Certifying the Computer Security Professional Using the Project Management Institute's PMP Model Certifying the Computer Security Professional Using the Project Management Institute's PMP Model Kara L. Nance and Brian Hay ASSERT Center, University of Alaska Fairbanks 210 Chapman, Fairbanks, AK 99708

More information

CIMA Certificate BA Interactive Timetable

CIMA Certificate BA Interactive Timetable CIMA Certificate BA Interactive Timetable 2018 Nottingham & Leicester Version 3.2 Information last updated 09/03/18 Please note: Information and dates in this timetable are subject to change. Introduction

More information

IB Event Calendar Please check regularly for updates Last Update: April 30, 2013

IB Event Calendar Please check regularly for updates Last Update: April 30, 2013 IB Event Calendar 2012-2013 Please check regularly for updates Last Update: April 30, 2013 April 2013 24: (Sophomores): Required orientation meeting for all sophomores entering into IB their junior year.

More information

Curriculum Vitae Tim Ophelders last updated: September 12, 2018

Curriculum Vitae Tim Ophelders last updated: September 12, 2018 Curriculum Vitae Tim Ophelders last updated: September 12, 2018 Personal Information Name Citizenship T. A. E. (Tim) Ophelders Dutch Work Address Email Department of Computational Mathematics, Science

More information

HLG Briefly. HLG was established on March 6, 2015 during the 46 th Session of the UN Statistical Commission

HLG Briefly. HLG was established on March 6, 2015 during the 46 th Session of the UN Statistical Commission HLG Briefly Activity of the High-Level Group for Partnership, Coordination and Capacity Building for Statistics for Agenda 030 on Sustainable Development (HLG) HLG was established on March 6, 015 during

More information

Collaborative Security Management Services for Port Information Systems

Collaborative Security Management Services for Port Information Systems Collaborative Security Management Services for Port Information Systems Theodoros Ntouskas, Dimitris Gritzalis Theodoros Ntouskas, Dimitris Gritzalis December 2015 Collaborative Security Management Services

More information

The Canadian Experience

The Canadian Experience ICT4D Bridging the Digital Divide: The Canadian Experience Global Forum Malmö, Sweden Nov. 4, 2004 Len St-Aubin Minister Counsellor, Canadian Embassy Berlin International Trade Canada len.staubin@international.gc.ca

More information

Quaestiones lnformaticae

Quaestiones lnformaticae Quaestiones lnformaticae An offlclal publication of the Computer Society of and of the n Institute of Computer Scientists 'n Amptellke tydskrif van die Rekenaarverenlging van Suld-Afrika en van die Suld-Afrikaanse

More information

Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET

Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET 1 st National Meeting on Improving Education and Training For Chinese Nuclear Power Industry Personnel

More information

Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017

Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017 Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017 Petr Jirásek et al Praha 2017 Executive Summary Substantial growth in the use of information technologies

More information

Remote Virtual Information Assurance Network

Remote Virtual Information Assurance Network Remote Virtual Information Assurance Network Ronald C Dodge JR', Corey Bertram^, Daniel Ragsdale^ 1,3 Department of Electrical Engineerig and Computer Science, United States Military Academy, West Point,

More information

PAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016

PAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Past Presentations PAST PRESENTATIONS 2016 Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Current Healthcare Information Security Trends and Challenges,

More information

Intervate announces launch plans for Smart Citizen

Intervate announces launch plans for Smart Citizen MEDIA INFORMATION Johannesburg, South Africa, 1 November, 2016 Intervate announces launch plans for Smart Citizen Intervate s Citizen Reporting Framework re-positioned as a Smart Citizen Intervate to go

More information

Print and Online Editorial Calendar

Print and Online Editorial Calendar January 2014 Ad close: 12/2/13 Materials due: 12/5/13 Campus Security & Life Safety Mobile Apps Security Locks, Doors, and Hardware ID Cards Municipal Security Video Surveillance Locks FETC, Jan. 28-31,

More information

DEVELOPING Vision Zero STRATEGY AND 7 GOLDEN RULES TOWARDS A SUSTAINABLE OSH CULTURE OF PREVENTION FOR THAI SMEs.

DEVELOPING Vision Zero STRATEGY AND 7 GOLDEN RULES TOWARDS A SUSTAINABLE OSH CULTURE OF PREVENTION FOR THAI SMEs. AND 7 GOLDEN RULES TOWARDS A SUSTAINABLE OSH CULTURE OF PREVENTION FOR THAI SMEs. Dr. Chaiyuth Chavalitnitikul, Honorary President, and Assoc. Prof. Dr. Chalermchai Chaikitiporn, President, SHAWPAT. SHAWPAT

More information

RESOLUTIONS Review and Status of Implementation

RESOLUTIONS Review and Status of Implementation RESOLUTIONS 2017 Review and Status of Implementation 1 MATSAPHA RESOLUTIONS SATA 2018 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written

More information

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

Stavros Nikolaou. 413 Gates Hall URL:  Ithaca, NY, 14853, USA Date of Birth: December, 1987 413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education

More information

A Bibliography of Publications of Jingling Xue

A Bibliography of Publications of Jingling Xue A Bibliography of Publications of Jingling Xue Jingling Xue Department of Mathematics, Statistics and Computing Science Armidale, NSW 2351 Australia Tel: +61 67 73 3149 FAX: +61 67 73 3312 E-mail: xue@neumann.une.edu.au

More information

Select Committee on Communications & Public Enterprises. Cost to Communicate. 28 March 2018

Select Committee on Communications & Public Enterprises. Cost to Communicate. 28 March 2018 Select Committee on Communications & Public Enterprises Cost to Communicate 28 March 208 Outline. MTN Who we are 2. MTN s response to reduce the cost to communicate 3. Corporate Social Investment 4. Conclusion

More information

The United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017

The United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017 The United Republic of Tanzania Domestication of Sustainable Development Goals Progress Report March, 2017 Prepared by the National Bureau of Statistics Table of Contents 1. Background... 1 2. Progress

More information

Survey of research data management practices at the University of Pretoria, South Africa: October 2009 March 2010

Survey of research data management practices at the University of Pretoria, South Africa: October 2009 March 2010 Survey of research data management practices at the University of Pretoria, South Africa: October 2009 March 2010 Undertaken by the Department of Library Services in order to improve research practices

More information

Master of Business Administration Program and Master of Sciences Program in Strategic Information Technology Management (International Program)

Master of Business Administration Program and Master of Sciences Program in Strategic Information Technology Management (International Program) Naresuan University 263 Master of Business Administration Program and Master of Sciences Program in Strategic Management (International Program) Research Focus Strategic Management Knowledge Management

More information

FAMIS 2014 Reporting Industry Certifications 6/16/2014

FAMIS 2014 Reporting Industry Certifications 6/16/2014 Purposes for Reporting Industry Certifications Reporting Industry Certifications Tara Goodman Sean Friend Division of Career and Adult Education CAPE Act Florida Education Finance Program (FEFP) School

More information

Report from UN-GGIM: Europe A year in review

Report from UN-GGIM: Europe A year in review Report from UN-GGIM: Europe A year in review Carol Agius UN-GGIM: Europe Joint UN-GGIM: Europe ESS meeting on the Integration of Statistical and Geospatial Information March 2017 The aim of UN-GGIM: Europe

More information

Computer Grade 5. Unit: 1, 2 & 3 Total Periods 38 Lab 10 Months: April and May

Computer Grade 5. Unit: 1, 2 & 3 Total Periods 38 Lab 10 Months: April and May Computer Grade 5 1 st Term Unit: 1, 2 & 3 Total Periods 38 Lab 10 Months: April and May Summer Vacation: June, July and August 1 st & 2 nd week Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 First term (April) Week

More information

International Journal of Software and Web Sciences (IJSWS)

International Journal of Software and Web Sciences (IJSWS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Survey of Research Data Management Practices at the University of Pretoria

Survey of Research Data Management Practices at the University of Pretoria Survey of Research Data Management Practices at the University of Pretoria Undertaken by the Department of Library Services in order to improve research practices at the University Unisa Library Open Access

More information

The 2018 (14th) International Conference on Data Science (ICDATA)

The 2018 (14th) International Conference on Data Science (ICDATA) CALL FOR PAPERS LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS, POSTERS Paper Submission Deadline: May 20, 2018 The 2018 (14th) International Conference on Data Science (ICDATA) (former International

More information

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram Resume Name: Designation: Qualifications: Subjects taught: Research specialization: Dr. M.Seshashayee Assistant Professor MCA, M.Tech, Ph.D. Programming In Java, Internet programming, Software Engineering,

More information

COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY

COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY Name: Department: Contact Details: Address for communication Email Phone Intercom Academic Background Qualifications: Qualifying Post Graduate Degree: Ph. D

More information

A Knowledge Framework for Information Security Modeling

A Knowledge Framework for Information Security Modeling Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2006 A Knowledge Framework for Information Security Modeling Shuangyan

More information

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security 1. SIGMM Workshop on Social Media SIGMM Workshop on Social Media is a workshop in conjunction with ACM Multimedia 2009. With the growing of user-centric multimedia applications in the recent years, this

More information

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008 FACTS AND OPPORTUNITIES IN BRAZIL Gartner IT Security Summit Washington DC, June 2008 OUR OBJECTIVE TODAY Raise your awareness that there are several Brazilian IT Services and Solutions Providers that

More information

EUREKA European Network in international R&D Cooperation

EUREKA European Network in international R&D Cooperation DLR-PT.de Chart 1 > EUREKA Andrea Hesse 2nd June 2016 EUREKA European Network in international R&D Cooperation DLR-PT - National EUREKA Bureau Andrea Hesse TRAINING DLR-PT.de Chart 2 > EUREKA Andrea Hesse

More information

CURRICULUM VITAE. June, 2013

CURRICULUM VITAE. June, 2013 CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il

More information

Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017

Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 1 1 INTRODUCTION 3 2 SUMMARY OF THE PROCESS 3 2.1 WORKING GROUP ACTIVITIES 3 2.2 STAKEHOLDER CONSULTATIONS 5 3 STAKEHOLDERS'

More information

FACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University

FACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University FACULTY PROFILE Name Designation Email ID : A.K.Kavitha : Assistant Professor : kavitha.ece@srit.org Area of Specialization : Wireless Communication Total Experience : Academic : 7 Years and 3 Industry

More information

ABSTRACT KEYWORDS CONTENT

ABSTRACT KEYWORDS CONTENT ABSTRACT The present doctoral thesis contributes to extending the current knowledge in the field of product modularization, based on a study of sustainable business in the context of globalization risks.

More information

Bidders Pack. Townhouse on Online Auction

Bidders Pack. Townhouse on Online Auction Bidders Pack Townhouse on Online Auction Client Instruction 17 Wilgen Street Potchefstroom Open: 26 February @ 08:00 Close: 08 March from 11:00 Public Online Auction Enquiries: Rudi Herbst 082 695 6658

More information

Mining and The Standards World

Mining and The Standards World GMSG and AMTC Santiago Forum 2015 Building Towards the Future of Mining November 3, 2015 Mining and The Standards World The International Standards Organization ISO A Global System + 600 organisations

More information

Programme Specification. MSc Telecommunications Engineering 2016/17

Programme Specification. MSc Telecommunications Engineering 2016/17 School of Engineering and the Built Environment Glasgow Caledonian University Programme Specification MSc Telecommunications Engineering 2016/17 1 Programme Specification Pro-forma 1. GENERAL INFORMATION

More information

Global cybersecurity and international standards

Global cybersecurity and international standards World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level

More information

ITU Centre of the Czech Technical University in Prague

ITU Centre of the Czech Technical University in Prague CZECH TECHNICAL UNIVERSITY IN PRAGUE FACULTY OF ELECTRICAL ENGINEERING DEPT. OF TELECOMMUNICATION ENGINEERING ITU Centre of Excellence @ the Czech Technical University in Prague Jaroslav Burcik Czech Technical

More information

The ISSA your partner in excellence in social security administration

The ISSA your partner in excellence in social security administration Promoting excellence The ISSA your partner in excellence administration 33rd ASSA Board Meeting and Conference 21-23 September 2016 Manila, Philippines www.issa.int Why excellence? public expects it the

More information

Coursework Completion

Coursework Completion Half Term 1 5 th September 12 th September 19 th September 26 th September 3 rd October 10 th October 17 th October Coursework Completion This first half term will be dedicated to ensuring that all students

More information

IATF Stakeholder Conference

IATF Stakeholder Conference IATF Stakeholder Conference 13 September 2017 Oberursel, Germany Rüdiger Funke (BMW Group) Number of certified sites against ISO/TS 16949 (and IATF 16949) 70,000 60,000 50,000 40,000 30,000 30,156 50,071

More information

A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( )

A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( ) A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing (1970 1997) Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233

More information

Enhancing Cooperative Energy Security. NATO Energy Security Centre of Excellence

Enhancing Cooperative Energy Security. NATO Energy Security Centre of Excellence Enhancing Cooperative Energy Security NATO Energy Security Centre of Excellence NATO Hub on Energy Security Expertise The NATO Energy Security Centre of Excellence is an international hub on energy security

More information

J I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213

J I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 J I N G H A I R A O Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 Office: +1 412 268 1357 Fax: +1 412 268 7287 Mobile: +1 412

More information

Report from the Ad Hoc Committee for Task Force Maximization and Knowledge Sharing

Report from the Ad Hoc Committee for Task Force Maximization and Knowledge Sharing Report from the Ad Hoc Committee for Task Force Maximization and Knowledge Sharing Presented by: Sallie Greenberg CSLF Technical Group Meeting Melbourne, Australia - 17 October 2018 2017 PIRT Abu Dhabi

More information

The Future of PCI: Securing payments in a changing world

The Future of PCI: Securing payments in a changing world The Future of PCI: Securing payments in a changing world Lauren Holloway 2014 Nature of the Threat About the Council PCI DSS Updates Staying Secure How You Can Participate In Closing Agenda Nature of the

More information

N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p

N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p South Africa-VINNOVA Workshop Date: 22 October 2015 N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p The ICT R&D and

More information

ITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania

ITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania Cybersecurity @ ITU The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania Rosheen Awotar-Mauree Programme Officer, ITU Office for Europe 2 International Telecommunication Union

More information

Objectives and Agenda

Objectives and Agenda Objectives and Agenda Capacity Development Workshop and Expert Group Meeting On Mainstreaming Sustainable Development into National Development Strategies Workshop Objectives The overall goal of the workshop

More information

Global trends in Management, IT and Governance in an e-world

Global trends in Management, IT and Governance in an e-world Global trends in Management, IT and Governance in an e-world An International Conference co-hosted by the Open University of Mauritius (OU), Mauritius and the College of Law and Management Studies at the

More information

Octopus Programme From April 2011

Octopus Programme From April 2011 Octopus Programme 2010 1994-2011 From April 2011 From Europol Working Group on Harmonisation of Cyber Crime Training Investigations To European Cybercrime Training & Education Group ECTEG 2 ECTEG Established

More information

Course Structure A : General Education Course B : Major Course C : Free Elective Course

Course Structure A : General Education Course B : Major Course C : Free Elective Course Bachelor of Science Program in Computer Technology ---------------------------------------------- General Information Degree Designation : Bachelor of Science Program in Computer Technology Total Credits

More information

B.2 Measures of Central Tendency and Dispersion

B.2 Measures of Central Tendency and Dispersion Appendix B. Measures of Central Tendency and Dispersion B B. Measures of Central Tendency and Dispersion What you should learn Find and interpret the mean, median, and mode of a set of data. Determine

More information

Designing with Patterns: Possibilities and Pitfalls

Designing with Patterns: Possibilities and Pitfalls Designing with Patterns: Possibilities and Pitfalls Janet Wesson & Lester Cowley University of Port Elizabeth, PO Box 1600, Port Elizabeth, South Africa csajlw@upe.ac.za, csanlc@upe.ac.za Abstract: It

More information

CURRICULUM VITAE: DI MARTIN BERNAUER. DI Martin Bernauer. Chemnitz University of Technology Faculty of Mathematics D Chemnitz Germany

CURRICULUM VITAE: DI MARTIN BERNAUER. DI Martin Bernauer. Chemnitz University of Technology Faculty of Mathematics D Chemnitz Germany CURRICULUM CURRICULUM VITAE: DI MARTIN BERNAUER Chemnitz, March 15, 2010 DI Martin Bernauer Chemnitz University of Technology Faculty of Mathematics D-09107 Chemnitz Germany +49-371-531-37497 martin.bernauer@mathematik.tu-chemnitz.de

More information

AGILE BUSINESS MEDIA, LLC 500 E. Washington St. Established 2002 North Attleboro, MA Issues Per Year: 12 (412)

AGILE BUSINESS MEDIA, LLC 500 E. Washington St. Established 2002 North Attleboro, MA Issues Per Year: 12 (412) Please review your report carefully. If corrections are needed, please fax us the pages requiring correction. Otherwise, sign and return to your Verified Account Coordinator by fax or email. Fax to: 415-461-6007

More information

ARRA State & Local Energy Assurance Planning & Implementation

ARRA State & Local Energy Assurance Planning & Implementation State Energy Policy and Technology Outlook Conference February 2, 2010, Washington, DC ARRA State & Local Energy Assurance Planning & Implementation Alice Lippert Senior Technical Advisor Office of Electricity

More information

List of Southasiadisasters.net (Issue No. 1 to 128, May 2005 to March 2015)

List of Southasiadisasters.net (Issue No. 1 to 128, May 2005 to March 2015) List of Southasiadisasters.net (Issue No. 1 to 128, May 2005 to March 2015) Issue No. Headline of Issues Month of Published 01 Why southasiadisasters.net? May 26, 2005 02 Rethinking Water Risks: Lessons

More information

MAHATMA GANDHI INSTITUTE OF TECHNOLOGY Gandipet, Hyderabad FACULTY PROFILE 1. JNTUH REGISTRATION ID:

MAHATMA GANDHI INSTITUTE OF TECHNOLOGY Gandipet, Hyderabad FACULTY PROFILE 1. JNTUH REGISTRATION ID: MAHATMA GANDHI INSTITUTE OF TECHNOLOGY Gandipet, Hyderabad 500 075 FACULTY PROFILE 1. JNTUH REGISTRATION ID: 60150405-003701 2. DATE OF BIRTH: 10-01-1982 3. DESIGNATION: Asst.Professor 4. YEARS OF EXPERIENCE:

More information

Amr Mausad Sauber. : - Assistant Professor of Computer Science, Math Department, Faculty of Science, Menoufiya University since

Amr Mausad Sauber. : - Assistant Professor of Computer Science, Math Department, Faculty of Science, Menoufiya University since Amr Mausad Sauber Material Status : Married Birth Date : 14/7/1982 Address : Menoufya, Berket el Sabaa, Mahkama Square Phone : 0113499800-01017557990 Email : AmrMausad@computalityit.com Web Site : www.computalityit.com

More information

SANReN Current and Future Developments

SANReN Current and Future Developments SANReN Current and Future Developments 28 March 2013 Presented by: Leon Staphorst Inputs from: Colin Wright, Christiaan Kuun Overview 1. Introduction 2. Current Status 3. SANReN National Backbone 4. Metro

More information

EVALUATION OF SEARCHER PERFORMANCE IN DIGITAL LIBRARIES

EVALUATION OF SEARCHER PERFORMANCE IN DIGITAL LIBRARIES DEFINING SEARCH SUCCESS: EVALUATION OF SEARCHER PERFORMANCE IN DIGITAL LIBRARIES by Barbara M. Wildemuth Associate Professor, School of Information and Library Science University of North Carolina at Chapel

More information

Dr. Imran Khan University of Nebraska-Lincoln Marketing (402)

Dr. Imran Khan University of Nebraska-Lincoln Marketing (402) Dr. Imran Khan University of Nebraska-Lincoln Marketing (402) 472-4536 Email: ikhan3@unl.edu Education DBA, Kennesaw State University, 2014. Major: Marketing Dissertation Title: Vendor Firm Characteristics

More information

The Global Context of Sustainable Development Data

The Global Context of Sustainable Development Data The Global Context of Sustainable Development Data Linda Hooper, UN Statistics Division UNDA10 - Workshop for ESCWA Sound Institutional, environment, cooperation, dialogue and partnerships for the production

More information

Intervate takes home double honours at Microsoft Partner Network Awards 2015

Intervate takes home double honours at Microsoft Partner Network Awards 2015 MEDIA INFORMATION Johannesburg, South Africa, November 04, 2015 Intervate takes home double honours at Microsoft Partner Network Awards 2015 Intervate wins two awards at prestigious local partner awards.

More information

Experience of the Tunisian Participation to the EU s Horizon 2020 Framework Programme as an Associated Country

Experience of the Tunisian Participation to the EU s Horizon 2020 Framework Programme as an Associated Country Prof. Olfa ZERIBI-BEN SLIMANE DG & National NCP Coordinator Experience of the Tunisian Participation to the EU s Horizon 2020 Framework Programme as an Associated Country Dr. Yosr Z. HAFFANI Management

More information

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013 Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing

More information

Common Criteria for IT Security Evaluation - Update report

Common Criteria for IT Security Evaluation - Update report Common Criteria for IT Security Evaluation - Update report 4 Developments in harmonisation of evaluation criteria Author. Dr. Ir. Paul L. Overbeek TNO Physics and Electronics Laboratory - p/a P.0.-Box

More information

COMMON ISSUES AFFECTING SECURITY USABILITY

COMMON ISSUES AFFECTING SECURITY USABILITY Evaluating the usability impacts of security interface adjustments in Word 2007 M. Helala 1, S.M.Furnell 1,2 and M.Papadaki 1 1 Centre for Information Security & Network Research, University of Plymouth,

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0 ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

This document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.

This document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information. December 2010 CDFM OVERVIEW The American Society of Military Comptrollers offers the Certified Defense Financial Manager (CDFM) program to those persons desiring to demonstrate proficiency in the core

More information

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)] United Nations General Assembly Distr.: General 9 February 2010 Sixty-fourth session Agenda item 50 Resolution adopted by the General Assembly [on the report of the Second Committee (A/64/417)] 64/187.

More information

Views on the Framework for Improving Critical Infrastructure Cybersecurity

Views on the Framework for Improving Critical Infrastructure Cybersecurity This document is scheduled to be published in the Federal Register on 12/11/2015 and available online at http://federalregister.gov/a/2015-31217, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE

More information

Example. Section: PS 709 Examples of Calculations of Reduced Hours of Work Last Revised: February 2017 Last Reviewed: February 2017 Next Review:

Example. Section: PS 709 Examples of Calculations of Reduced Hours of Work Last Revised: February 2017 Last Reviewed: February 2017 Next Review: Following are three examples of calculations for MCP employees (undefined hours of work) and three examples for MCP office employees. Examples use the data from the table below. For your calculations use

More information