Prof HA Kruger. Last updated: 19 January Publications and Technical reports
|
|
- Esther Singleton
- 6 years ago
- Views:
Transcription
1 Prof HA Kruger Last updated: 19 January 2009 Publications and Technical reports 1) Kruger, H.A. & Coetsee, L.D A model to optimize internal audit service quality, South African Journal of Economic and Management Sciences, Volume 20, Summer p ) Kruger, H.A. & Coetsee, L.D Identifying priority and quality criteria for effective internal audits, South African Journal of Economic and Management Sciences, Volume 21, Autumn p ) Kruger, H.A., Steyn, P.J. & Kearney, W.D Determinants of internal audit efficiency, South African Journal of Business Management, 33(3), September p ) Goede, R. & Kruger, H.A Evaluating information security awareness A comparison of different research paradigms, In Proceedings of the International Science and Technology Conference. ISBN Vaal University of Technology. 1-2 December ) Hattingh, J.M., Kruger, H.A. & Du Plessis, P.M Linear model selection towards a framework using a mixed integer linear programming approach, The South African Statistical Journal, 39, September p ) Kruger, H.A. & Kearney, W.D Measuring information security awareness: A West Africa gold mining environment case study, In Proceedings of the Information Security South Africa (ISSA) Conference. ISBN: X. Johannesburg. 29 June 1 July ) Kearney, W.D. & Kruger, H.A The development and application of a model to measure information security awareness, In Proceedings of the CACS2005 Oceania Conference. ISBN: Perth, Western Australia October ) Drevin, L., Kruger, H.A. & Steyn, T Value-focused assessment of ICT security awareness in an academic environment, In: IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments, eds. Fischer-Hubner, S., Ranneberg, K., Yngstrom, L., Lindskog, S. ISBN:10: X. Boston: Springer, p ) Kruger, H.A. & Hattingh, J.M A combined AHP-GP model to allocate internal auditing time to projects. ORION, 22(1), June p ) Kruger, H.A. & Kearney, W. D A prototype for assessing information security awareness. Computers and Security, 25(4), June p ) Kruger, H.A., Drevin, L & Steyn, T A framework for evaluating ICT security awareness, In Proceedings of the Information Security South Africa (ISSA) Conference. ISBN: Johannesburg. 5-7 July ) Drevin, L., Kruger, H.A. & Steyn, T Value-focused assessment of ICT security awareness in an academic environment. Computers and Security, 26(1), February p ) Steyn, T., Kruger, H.A. & Drevin, L Identity theft empirical evidence from a phishing exercise, In: New approaches for security, privacy and trust in complex environments. Proceedings of the IFIP TC nd International Information Security Conference (SEC 2007), eds. Venter, H., Eloff, M., 1
2 Labuschagne, L., Eloff, J., Von Solms, R. ISBN:13: New York: Springer, p ) Kruger, H.A., Drevin, L. & Steyn, T security awareness A practical assessment of employee behaviour, In: IFIP International Federation for Information Processing, Volume 237, Fifth world conference on Information Security Education, eds. Futcher, L., Dodge, R. ISBN:13: Boston: Springer, p ) Kruger, H.A., Steyn, T., Drevin, L. & Medlin, B.D Password Management: Empirical results from a RSA and USA study. In Innovative Minds, Proceedings of the Information Security for South Africa (ISSA 2008) Conference, Johannesburg, 7-9 July. ISBN ) Kruger, H.A., Steyn, T., Drevin, L. & Medlin, B.D How secure are passwords that will be used by future health care workers? In Redefining an agenda for Information Security, Proceedings of the 7th Annual Security Conference, Las Vegas, USA, June 2-3. Ed. G. Dhillon. Information Institute Publishing, Washington DC, USA. ISBN: ) Kruger, H.A. & Kearney, W.D Consensus ranking an ICT security awareness case study. Computers and Security, 27(7-8), December p Technical reports 18) Hattingh, J.M. & Kruger, H.A Robust linear models by discarding data and regressors simultaneously, Research Report No FABWI-N-RKW: ) Kruger, H.A., Steyn, P.J. & Kearney, W Determinants of internal audit efficiency, Research Report No FABWI-N-RKW: ) Goede, R. & Kruger, H.A Evaluating information security awareness A comparison of different research paradigms, Research Report No FABWI-N- RKW: ) Kruger, H.A. & Hattingh, J.M A combined AHP-GP model to allocate internal auditing time to projects. Research Report No FABWI-N-RKW: ) Hattingh, J.M., Kruger, H.A. & Du Plessis, P.M Linear model selection towards a framework using a mixed integer linear programming approach. Research Report No FABWI-N-RKW: ) Bell, A., Hattingh, J.M. & Kruger, H.A n Produkprysbepalingsmodel met behulp van doelwitprogrammering. Research Report No FABWI-N-RKW: ) Kruger, H.A. & Kearney, W.D Measuring information security awareness in an international mining environment, Research Report No FABWI-N- RKW: ) Kruger, H.A. & Kearney, W.D Measuring information security awareness: A West Africa gold mining environment case study, Research Report No FABWI-N-RKW: ) Kruger, H.A., Drevin, L. & Steyn, T A framework for evaluating ICT security awareness. Research Report No FABWI-N-RKW: ) Drevin, L., Kruger, H.A. & Steyn, T Value-focused assessment of ICT security awareness in an academic environment. Research Report No FABWI-N- RKW:
3 28) Kruger, H.A. & Kearney, W.D Consensus Ranking An ICT security awareness case study, Research Report No FABWI-N-RKW: ) Steyn, T., Kruger, H.A. & Drevin, L Identity theft empirical evidence from a phishing exercise. Research Report No FABWI-N-RKW: ) Kruger, H.A., Drevin, L. & Steyn, T security awareness a practical assessment of employee behaviour. Research Report No FABWI-N- RKW: ) Kruger, H.A., Drevin, L. & Steyn, T Password management assessment. Technical Report. North-West University, South Africa, FABWI-N-RKW: ) Kruger H.A., Steyn, T., Drevin L. & Medlin, B.D Aspects of Secure Password Selection. Technical Report. North-West University, South Africa, FABWI-N-RKW: ) Kruger H.A., Steyn, T., Drevin L. & Medlin, B.D Password management: A comparative study. Technical Report. North-West University, South Africa, FABWI-N-RKW: Conferences 1) Kruger, H.A The 8 th national conference for Masters and PhD students in Computer Science, Bepaling van n effektiewe bronverdelingstrategie gebaseer op risiko by verskillende rekenaarstelsels, UNISA, Pretoria, South Africa June ) Kruger, H.A. & Hattingh, J.M SAICSIT97, The 1997 National Research and Development Conference, A risk model to allocate resources to different computerized systems, Vanderbijlpark, South Africa November ) Hattingh, J.M. & Kruger, H.A Department of Informatics Robust Linear Models. Colloquium, University of Rostock, Germany. October ) Hattingh, J.M. & Kruger, H.A The sixteenth triennial conference of the International Federation of Operational Research Societies (IFORS2002), Robust linear models by discarding data and regressors simultaneously, Edinburgh, UK July ) Hattingh, J.M. & Kruger, H.A Eleventh International Colloquium on Numerical Analysis and Computer Science Applications, Linear Response Surface Analysis and Robust Linear Models, Plovdiv, Bulgaria, August ) Kruger, P.H. & Kruger, H.A rd Annual Conference of the Operations Research Society of South Africa. Construction of a chess opening repertoire using expert system technology, ABSA Conference Centre in Montana Park, Pretoria (Gauteng) September ) Kruger, H.A. & Hattingh, J.M th European Conference on Operational Research: OR and the Management of Electronic Services. A risk-based integrated framework for allocating internal auditing time to projects using AHP and Goal Programming, Rhodes, Greece. 4-7 July ) Du Plessis, P.M., Hattingh, J.M. & Kruger, H.A th Annual Conference of the Operations Research Society of South Africa. Aspects of model selection and data discarding for linear regression, Stellenbosch Graduate School of Business, Bellville (Western Cape). 5-8 September ) Kruger, H.A., Goede, R. & Kearney, W.D Simposium: Eenheid vir Bedryfswiskunde en Informatika Subprogram: Grondslae en etiek, Research Methodology in Information Systems: Evaluating information security awareness 3
4 comparison of different research paradigms, North West University, Potchefstroom, South Africa. 17 September ) Goede, R. & Kruger, H.A International Science and Technology Conference, Evaluating information security awareness A comparison of different research paradigms, Vaal University of Technology, Vanderbijlpark, South Africa. 1-2 December ) Kruger, H.A. & Kearney, W.D Information Security South Africa (ISSA) Conference, Measuring information security awareness: A West Africa gold mining environment case study, Johannesburg. 29 June 1 July ) Du Plessis, P.M., Hattingh, J.M. & Kruger, H.A The seventeenth triennial conference of the International Federation of Operational Research Societies (IFORS2005), A mathematical programming approach to simultaneously discard data points, select regressors and made transformation decisions in regression modelling,hawaii, USA July ) Du Plessis, P.M., Hattingh, J.M. & Kruger, H.A th SAIIE and 35 th ORSSA annual conference. A mathematical programming approach to simultaneously discard data points, select regressors and made transformation decisions in regression modelling, Emerald Casino Resort, Vanderbijlpark August ) Kearney, W.D. & Kruger, H.A CACS2005 Oceania Conference. The development and application of a model to measure information security awareness. Burswood Convention Centre, Perth, Western Australia October ) Drevin, L., Kruger, H.A. Steyn, T st IFIP International Information Security Conference. Security and Privacy in dynamic environments. WG 11.1/11.8 Security Culture Workshop. Value-focused assessment of ICT security awareness in an academic environment. Karlstad, Sweden May ) Kruger, H.A., Drevin, L & Steyn, T Information Security South Africa (ISSA) Conference, A framework for evaluating ICT security awareness. Johannesburg. 5-7 July ) Tsogang, M P., Hattingh, J.M., Kruger, H.A th Annual conference of the Operations Research Society of SA. A goal programming model to determine prices. Pietermaritzburg. 4-6 September ) Steyn, T., Kruger, H.A. & Drevin, L nd IFIP International Information Security Conference. New approaches for security, privacy and trust in complex environments. Identity theft empirical evidence from a phishing exercise. Sandton, Johannesburg, South Africa May ) Kruger, H.A., Drevin, L. & Steyn, T WISE5, Fifth World Conference on Information Security Education. TC11, WG security awareness A practical assessment of employee behaviour. United States Military Academy, West Point, New York, USA June ) Tsogang, M.P., Kruger, H.A. & Hattingh, J.M nd European Conference on Operational Research. Price determination based on goal programming principles, Prague, Czech Republic July ) Smith, E.H., Kruger, H.A. & Goede, R th Annual conference of the Operations Research Society of SA. An analytical framework for monitoring and optimizing bank branch network efficiency using data mining techniques. Cape Town September
5 22) Kruger, H.A., Steyn, T., Drevin, L. & Medlin, B.D The 7 th Annual Security Conference, How secure is passwords that will be used by future health care workers? Las Vegas, Nevada, USA. 2-3 June ) Kruger, H.A., Steyn, T., Drevin, L & Medlin, B.D Information Security South Africa (ISSA) Conference, Password management: Empirical results from a RSA and USA study. Johannesburg, South Africa. 7-9 July ) Du Plessis, P.M., Hattingh, J.M. & Kruger, H.A The 18th triennial conference of the International Federation of Operational Research Societies (IFORS2008), Robust linear models: A comparison between a MILP and LMS approach, Sandton, South Africa July ) Hattingh, J.M., Kruger, H.A. & Van der Westhuizen, M.M The 18th triennial conference of the International Federation of Operational Research Societies (IFORS2008), Robust non-linear regression models with minimal assumptions, Sandton, South Africa July
EA in South African. EAPC San Diego 4 February Paul van der Merwe
EA in South African Universities EAPC San Diego 4 February 2009 Paul van der Merwe South Africa 2 3 University of Pretoria Established in 1908 In 2008, student numbers totalled 57 409 In 1996, the University
More informationTowards a more secure Cyber Space for South Africa
22 October 2013 Towards a more secure Cyber Space for South Africa Prof Basie Von Solms Director : Centre for Cyber Security University of Johannesburg basievs@uj.ac.za International comments African comments
More informationHEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT
HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 7-8 November 2013 Agenda to improve health information infrastructure» In 2010, health ministers called for improvement
More informationDukpa Kim FIELDS OF INTEREST. Econometrics, Time Series Econometrics ACADEMIC POSITIONS
Dukpa Kim Contact Information Department of Economics Phone: 82-2-3290-5131 Korea University Fax: 82-2-3290-2661 145 Anam-ro, Seongbuk-gu Email: dukpakim@korea.ac.kr Seoul, 02841 Korea FIELDS OF INTEREST
More informationMONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY SUNDAY
2018 January 01 02 03 04 05 06 07 Public Holiday 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Supplementary exam: Basic s, Grooming 27 28 29 30 31 01 02 03 04 05 06 Notes: 2018 February 29
More informationTshwane University Of Technology Check Application Status
Check Application Status Free PDF ebook Download: Check Application Status Download or Read Online ebook tshwane university of technology check application status in PDF Format From The Best User Guide
More informationUsing Phishing for User Security Awareness
Using Phishing for User Email Security Awareness Ronald C. Dodge and Aaron J. Ferguson Department of Electrical Engineering and Computer Science United States Military Academy, West Point, NY, USA {ronald.dodge,
More informationService withdrawal: Selected IBM ServicePac offerings
Announcement ZS09-0086, dated April 21, 2009 Service withdrawal: Selected IBM offerings Table of contents 1 Overview 9 Announcement countries 8 Withdrawal date Overview Effective April 21, 2009, IBM will
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationINFORMATION SECURITY MANAGEMENT & SMALL SYSTEMS SECURITY
INFORMATION SECURITY MANAGEMENT & SMALL SYSTEMS SECURITY IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World
More informationProgrammes and Activities of the. International Cooperation and Assistance. (ICA) Division
Programmes and Activities of the International Cooperation & Assistance (ICA) Division Presentation for Permanent Representatives to the based in Brussels 5 November 2015 Mark Albon Director, Division
More information, ISO/IEC. ORCID ORCID ISO/IEC
.,. «ИФИ» 115409,, К, 31, e-mail: NGMiloslavskaya@mephi.ru, ORCID 0000-0002-1231-1805 e-mail: AITolstoj@mephi.ru, ORCID 0000-0001-9265-1510 DOI: http://dx.doi.org/10.26583/bit.2017.4.01. ( ) ( ) ( ).,
More informationShort courses presented by the NWU Programme in Forensic Accountancy
Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information
More informationMAGNO QUEIROZ Curriculum Vitae
MAGNO QUEIROZ Curriculum Vitae Office Management Information Systems Jon M. Huntsman School of Business Utah State University 3515 Old Main Hill Logan, UT 84322-3515 Location: Eccles Business Building
More informationHow to Become a CMA (Certified Management Accountant) May 10, 2017
How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements
More informationCurriculum Vitae Dr Kennedy Njenga
Curriculum Vitae Dr Kennedy Njenga Mobile: +27 735826851 KEY SKILLS AREAS Administration Teaching and Learning Industry and Technical Experience Research and Publications ADMINISTRATION (May 2008 to Present)
More informationRESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS
RESUME WEI LI Graduate School of Computer and Information Sciences Nova Southeastern University 3301 College Avenue, Fort Lauderdale-Davie, FL 33314 Office: (954) 262-2068 Fax: (954) 262-3915 Email: lwei@nova.edu
More informationNuts and Bolts of the Career and Professional Education Act (CAPE)
Learning Today, Earning Tomorrow Nuts and Bolts of the Career and Professional Education Act (CAPE) Tara Goodman Tara McLarnon Division of Career and Adult Education Florida Department of Education 1 The
More informationPhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt.
AMAL MOH D BARAKAT AL-DWEIK HEBRON, WEST BANK, PALESTINE +970-2-2235142. EMAIL: AMAL@PPU.EDU Education PhD. of Information Networks (2004-2009). Cairo University. Faculty of Computers and Information.
More informationTowards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula Lynn Futcher and Johan Van Niekerk Nelson Mandela Metropolitan University, Port Elizabeth, South
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016
European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public
More informationCertifying the Computer Security Professional Using the Project Management Institute's PMP Model
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model Kara L. Nance and Brian Hay ASSERT Center, University of Alaska Fairbanks 210 Chapman, Fairbanks, AK 99708
More informationCIMA Certificate BA Interactive Timetable
CIMA Certificate BA Interactive Timetable 2018 Nottingham & Leicester Version 3.2 Information last updated 09/03/18 Please note: Information and dates in this timetable are subject to change. Introduction
More informationIB Event Calendar Please check regularly for updates Last Update: April 30, 2013
IB Event Calendar 2012-2013 Please check regularly for updates Last Update: April 30, 2013 April 2013 24: (Sophomores): Required orientation meeting for all sophomores entering into IB their junior year.
More informationCurriculum Vitae Tim Ophelders last updated: September 12, 2018
Curriculum Vitae Tim Ophelders last updated: September 12, 2018 Personal Information Name Citizenship T. A. E. (Tim) Ophelders Dutch Work Address Email Department of Computational Mathematics, Science
More informationHLG Briefly. HLG was established on March 6, 2015 during the 46 th Session of the UN Statistical Commission
HLG Briefly Activity of the High-Level Group for Partnership, Coordination and Capacity Building for Statistics for Agenda 030 on Sustainable Development (HLG) HLG was established on March 6, 015 during
More informationCollaborative Security Management Services for Port Information Systems
Collaborative Security Management Services for Port Information Systems Theodoros Ntouskas, Dimitris Gritzalis Theodoros Ntouskas, Dimitris Gritzalis December 2015 Collaborative Security Management Services
More informationThe Canadian Experience
ICT4D Bridging the Digital Divide: The Canadian Experience Global Forum Malmö, Sweden Nov. 4, 2004 Len St-Aubin Minister Counsellor, Canadian Embassy Berlin International Trade Canada len.staubin@international.gc.ca
More informationQuaestiones lnformaticae
Quaestiones lnformaticae An offlclal publication of the Computer Society of and of the n Institute of Computer Scientists 'n Amptellke tydskrif van die Rekenaarverenlging van Suld-Afrika en van die Suld-Afrikaanse
More informationOverview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET
Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET 1 st National Meeting on Improving Education and Training For Chinese Nuclear Power Industry Personnel
More informationExecutive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017
Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017 Petr Jirásek et al Praha 2017 Executive Summary Substantial growth in the use of information technologies
More informationRemote Virtual Information Assurance Network
Remote Virtual Information Assurance Network Ronald C Dodge JR', Corey Bertram^, Daniel Ragsdale^ 1,3 Department of Electrical Engineerig and Computer Science, United States Military Academy, West Point,
More informationPAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016
Past Presentations PAST PRESENTATIONS 2016 Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Current Healthcare Information Security Trends and Challenges,
More informationIntervate announces launch plans for Smart Citizen
MEDIA INFORMATION Johannesburg, South Africa, 1 November, 2016 Intervate announces launch plans for Smart Citizen Intervate s Citizen Reporting Framework re-positioned as a Smart Citizen Intervate to go
More informationPrint and Online Editorial Calendar
January 2014 Ad close: 12/2/13 Materials due: 12/5/13 Campus Security & Life Safety Mobile Apps Security Locks, Doors, and Hardware ID Cards Municipal Security Video Surveillance Locks FETC, Jan. 28-31,
More informationDEVELOPING Vision Zero STRATEGY AND 7 GOLDEN RULES TOWARDS A SUSTAINABLE OSH CULTURE OF PREVENTION FOR THAI SMEs.
AND 7 GOLDEN RULES TOWARDS A SUSTAINABLE OSH CULTURE OF PREVENTION FOR THAI SMEs. Dr. Chaiyuth Chavalitnitikul, Honorary President, and Assoc. Prof. Dr. Chalermchai Chaikitiporn, President, SHAWPAT. SHAWPAT
More informationRESOLUTIONS Review and Status of Implementation
RESOLUTIONS 2017 Review and Status of Implementation 1 MATSAPHA RESOLUTIONS SATA 2018 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written
More informationStavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987
413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education
More informationA Bibliography of Publications of Jingling Xue
A Bibliography of Publications of Jingling Xue Jingling Xue Department of Mathematics, Statistics and Computing Science Armidale, NSW 2351 Australia Tel: +61 67 73 3149 FAX: +61 67 73 3312 E-mail: xue@neumann.une.edu.au
More informationSelect Committee on Communications & Public Enterprises. Cost to Communicate. 28 March 2018
Select Committee on Communications & Public Enterprises Cost to Communicate 28 March 208 Outline. MTN Who we are 2. MTN s response to reduce the cost to communicate 3. Corporate Social Investment 4. Conclusion
More informationThe United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017
The United Republic of Tanzania Domestication of Sustainable Development Goals Progress Report March, 2017 Prepared by the National Bureau of Statistics Table of Contents 1. Background... 1 2. Progress
More informationSurvey of research data management practices at the University of Pretoria, South Africa: October 2009 March 2010
Survey of research data management practices at the University of Pretoria, South Africa: October 2009 March 2010 Undertaken by the Department of Library Services in order to improve research practices
More informationMaster of Business Administration Program and Master of Sciences Program in Strategic Information Technology Management (International Program)
Naresuan University 263 Master of Business Administration Program and Master of Sciences Program in Strategic Management (International Program) Research Focus Strategic Management Knowledge Management
More informationFAMIS 2014 Reporting Industry Certifications 6/16/2014
Purposes for Reporting Industry Certifications Reporting Industry Certifications Tara Goodman Sean Friend Division of Career and Adult Education CAPE Act Florida Education Finance Program (FEFP) School
More informationReport from UN-GGIM: Europe A year in review
Report from UN-GGIM: Europe A year in review Carol Agius UN-GGIM: Europe Joint UN-GGIM: Europe ESS meeting on the Integration of Statistical and Geospatial Information March 2017 The aim of UN-GGIM: Europe
More informationComputer Grade 5. Unit: 1, 2 & 3 Total Periods 38 Lab 10 Months: April and May
Computer Grade 5 1 st Term Unit: 1, 2 & 3 Total Periods 38 Lab 10 Months: April and May Summer Vacation: June, July and August 1 st & 2 nd week Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 First term (April) Week
More informationInternational Journal of Software and Web Sciences (IJSWS)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
More informationSurvey of Research Data Management Practices at the University of Pretoria
Survey of Research Data Management Practices at the University of Pretoria Undertaken by the Department of Library Services in order to improve research practices at the University Unisa Library Open Access
More informationThe 2018 (14th) International Conference on Data Science (ICDATA)
CALL FOR PAPERS LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS, POSTERS Paper Submission Deadline: May 20, 2018 The 2018 (14th) International Conference on Data Science (ICDATA) (former International
More informationResume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram
Resume Name: Designation: Qualifications: Subjects taught: Research specialization: Dr. M.Seshashayee Assistant Professor MCA, M.Tech, Ph.D. Programming In Java, Internet programming, Software Engineering,
More informationCOCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY
COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY Name: Department: Contact Details: Address for communication Email Phone Intercom Academic Background Qualifications: Qualifying Post Graduate Degree: Ph. D
More informationA Knowledge Framework for Information Security Modeling
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2006 A Knowledge Framework for Information Security Modeling Shuangyan
More informationWorkshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security
1. SIGMM Workshop on Social Media SIGMM Workshop on Social Media is a workshop in conjunction with ACM Multimedia 2009. With the growing of user-centric multimedia applications in the recent years, this
More informationFACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008
FACTS AND OPPORTUNITIES IN BRAZIL Gartner IT Security Summit Washington DC, June 2008 OUR OBJECTIVE TODAY Raise your awareness that there are several Brazilian IT Services and Solutions Providers that
More informationEUREKA European Network in international R&D Cooperation
DLR-PT.de Chart 1 > EUREKA Andrea Hesse 2nd June 2016 EUREKA European Network in international R&D Cooperation DLR-PT - National EUREKA Bureau Andrea Hesse TRAINING DLR-PT.de Chart 2 > EUREKA Andrea Hesse
More informationCURRICULUM VITAE. June, 2013
CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il
More informationReport of the Working Group on mhealth Assessment Guidelines February 2016 March 2017
Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 1 1 INTRODUCTION 3 2 SUMMARY OF THE PROCESS 3 2.1 WORKING GROUP ACTIVITIES 3 2.2 STAKEHOLDER CONSULTATIONS 5 3 STAKEHOLDERS'
More informationFACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University
FACULTY PROFILE Name Designation Email ID : A.K.Kavitha : Assistant Professor : kavitha.ece@srit.org Area of Specialization : Wireless Communication Total Experience : Academic : 7 Years and 3 Industry
More informationABSTRACT KEYWORDS CONTENT
ABSTRACT The present doctoral thesis contributes to extending the current knowledge in the field of product modularization, based on a study of sustainable business in the context of globalization risks.
More informationBidders Pack. Townhouse on Online Auction
Bidders Pack Townhouse on Online Auction Client Instruction 17 Wilgen Street Potchefstroom Open: 26 February @ 08:00 Close: 08 March from 11:00 Public Online Auction Enquiries: Rudi Herbst 082 695 6658
More informationMining and The Standards World
GMSG and AMTC Santiago Forum 2015 Building Towards the Future of Mining November 3, 2015 Mining and The Standards World The International Standards Organization ISO A Global System + 600 organisations
More informationProgramme Specification. MSc Telecommunications Engineering 2016/17
School of Engineering and the Built Environment Glasgow Caledonian University Programme Specification MSc Telecommunications Engineering 2016/17 1 Programme Specification Pro-forma 1. GENERAL INFORMATION
More informationGlobal cybersecurity and international standards
World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level
More informationITU Centre of the Czech Technical University in Prague
CZECH TECHNICAL UNIVERSITY IN PRAGUE FACULTY OF ELECTRICAL ENGINEERING DEPT. OF TELECOMMUNICATION ENGINEERING ITU Centre of Excellence @ the Czech Technical University in Prague Jaroslav Burcik Czech Technical
More informationThe ISSA your partner in excellence in social security administration
Promoting excellence The ISSA your partner in excellence administration 33rd ASSA Board Meeting and Conference 21-23 September 2016 Manila, Philippines www.issa.int Why excellence? public expects it the
More informationCoursework Completion
Half Term 1 5 th September 12 th September 19 th September 26 th September 3 rd October 10 th October 17 th October Coursework Completion This first half term will be dedicated to ensuring that all students
More informationIATF Stakeholder Conference
IATF Stakeholder Conference 13 September 2017 Oberursel, Germany Rüdiger Funke (BMW Group) Number of certified sites against ISO/TS 16949 (and IATF 16949) 70,000 60,000 50,000 40,000 30,000 30,156 50,071
More informationA Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( )
A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing (1970 1997) Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233
More informationEnhancing Cooperative Energy Security. NATO Energy Security Centre of Excellence
Enhancing Cooperative Energy Security NATO Energy Security Centre of Excellence NATO Hub on Energy Security Expertise The NATO Energy Security Centre of Excellence is an international hub on energy security
More informationJ I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213
J I N G H A I R A O Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 Office: +1 412 268 1357 Fax: +1 412 268 7287 Mobile: +1 412
More informationReport from the Ad Hoc Committee for Task Force Maximization and Knowledge Sharing
Report from the Ad Hoc Committee for Task Force Maximization and Knowledge Sharing Presented by: Sallie Greenberg CSLF Technical Group Meeting Melbourne, Australia - 17 October 2018 2017 PIRT Abu Dhabi
More informationThe Future of PCI: Securing payments in a changing world
The Future of PCI: Securing payments in a changing world Lauren Holloway 2014 Nature of the Threat About the Council PCI DSS Updates Staying Secure How You Can Participate In Closing Agenda Nature of the
More informationN a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p
N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p South Africa-VINNOVA Workshop Date: 22 October 2015 N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p The ICT R&D and
More informationITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania
Cybersecurity @ ITU The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania Rosheen Awotar-Mauree Programme Officer, ITU Office for Europe 2 International Telecommunication Union
More informationObjectives and Agenda
Objectives and Agenda Capacity Development Workshop and Expert Group Meeting On Mainstreaming Sustainable Development into National Development Strategies Workshop Objectives The overall goal of the workshop
More informationGlobal trends in Management, IT and Governance in an e-world
Global trends in Management, IT and Governance in an e-world An International Conference co-hosted by the Open University of Mauritius (OU), Mauritius and the College of Law and Management Studies at the
More informationOctopus Programme From April 2011
Octopus Programme 2010 1994-2011 From April 2011 From Europol Working Group on Harmonisation of Cyber Crime Training Investigations To European Cybercrime Training & Education Group ECTEG 2 ECTEG Established
More informationCourse Structure A : General Education Course B : Major Course C : Free Elective Course
Bachelor of Science Program in Computer Technology ---------------------------------------------- General Information Degree Designation : Bachelor of Science Program in Computer Technology Total Credits
More informationB.2 Measures of Central Tendency and Dispersion
Appendix B. Measures of Central Tendency and Dispersion B B. Measures of Central Tendency and Dispersion What you should learn Find and interpret the mean, median, and mode of a set of data. Determine
More informationDesigning with Patterns: Possibilities and Pitfalls
Designing with Patterns: Possibilities and Pitfalls Janet Wesson & Lester Cowley University of Port Elizabeth, PO Box 1600, Port Elizabeth, South Africa csajlw@upe.ac.za, csanlc@upe.ac.za Abstract: It
More informationCURRICULUM VITAE: DI MARTIN BERNAUER. DI Martin Bernauer. Chemnitz University of Technology Faculty of Mathematics D Chemnitz Germany
CURRICULUM CURRICULUM VITAE: DI MARTIN BERNAUER Chemnitz, March 15, 2010 DI Martin Bernauer Chemnitz University of Technology Faculty of Mathematics D-09107 Chemnitz Germany +49-371-531-37497 martin.bernauer@mathematik.tu-chemnitz.de
More informationAGILE BUSINESS MEDIA, LLC 500 E. Washington St. Established 2002 North Attleboro, MA Issues Per Year: 12 (412)
Please review your report carefully. If corrections are needed, please fax us the pages requiring correction. Otherwise, sign and return to your Verified Account Coordinator by fax or email. Fax to: 415-461-6007
More informationARRA State & Local Energy Assurance Planning & Implementation
State Energy Policy and Technology Outlook Conference February 2, 2010, Washington, DC ARRA State & Local Energy Assurance Planning & Implementation Alice Lippert Senior Technical Advisor Office of Electricity
More informationList of Southasiadisasters.net (Issue No. 1 to 128, May 2005 to March 2015)
List of Southasiadisasters.net (Issue No. 1 to 128, May 2005 to March 2015) Issue No. Headline of Issues Month of Published 01 Why southasiadisasters.net? May 26, 2005 02 Rethinking Water Risks: Lessons
More informationMAHATMA GANDHI INSTITUTE OF TECHNOLOGY Gandipet, Hyderabad FACULTY PROFILE 1. JNTUH REGISTRATION ID:
MAHATMA GANDHI INSTITUTE OF TECHNOLOGY Gandipet, Hyderabad 500 075 FACULTY PROFILE 1. JNTUH REGISTRATION ID: 60150405-003701 2. DATE OF BIRTH: 10-01-1982 3. DESIGNATION: Asst.Professor 4. YEARS OF EXPERIENCE:
More informationAmr Mausad Sauber. : - Assistant Professor of Computer Science, Math Department, Faculty of Science, Menoufiya University since
Amr Mausad Sauber Material Status : Married Birth Date : 14/7/1982 Address : Menoufya, Berket el Sabaa, Mahkama Square Phone : 0113499800-01017557990 Email : AmrMausad@computalityit.com Web Site : www.computalityit.com
More informationSANReN Current and Future Developments
SANReN Current and Future Developments 28 March 2013 Presented by: Leon Staphorst Inputs from: Colin Wright, Christiaan Kuun Overview 1. Introduction 2. Current Status 3. SANReN National Backbone 4. Metro
More informationEVALUATION OF SEARCHER PERFORMANCE IN DIGITAL LIBRARIES
DEFINING SEARCH SUCCESS: EVALUATION OF SEARCHER PERFORMANCE IN DIGITAL LIBRARIES by Barbara M. Wildemuth Associate Professor, School of Information and Library Science University of North Carolina at Chapel
More informationDr. Imran Khan University of Nebraska-Lincoln Marketing (402)
Dr. Imran Khan University of Nebraska-Lincoln Marketing (402) 472-4536 Email: ikhan3@unl.edu Education DBA, Kennesaw State University, 2014. Major: Marketing Dissertation Title: Vendor Firm Characteristics
More informationThe Global Context of Sustainable Development Data
The Global Context of Sustainable Development Data Linda Hooper, UN Statistics Division UNDA10 - Workshop for ESCWA Sound Institutional, environment, cooperation, dialogue and partnerships for the production
More informationIntervate takes home double honours at Microsoft Partner Network Awards 2015
MEDIA INFORMATION Johannesburg, South Africa, November 04, 2015 Intervate takes home double honours at Microsoft Partner Network Awards 2015 Intervate wins two awards at prestigious local partner awards.
More informationExperience of the Tunisian Participation to the EU s Horizon 2020 Framework Programme as an Associated Country
Prof. Olfa ZERIBI-BEN SLIMANE DG & National NCP Coordinator Experience of the Tunisian Participation to the EU s Horizon 2020 Framework Programme as an Associated Country Dr. Yosr Z. HAFFANI Management
More informationTrustworthy ICT. FP7-ICT Objective 1.5 WP 2013
Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing
More informationCommon Criteria for IT Security Evaluation - Update report
Common Criteria for IT Security Evaluation - Update report 4 Developments in harmonisation of evaluation criteria Author. Dr. Ir. Paul L. Overbeek TNO Physics and Electronics Laboratory - p/a P.0.-Box
More informationCOMMON ISSUES AFFECTING SECURITY USABILITY
Evaluating the usability impacts of security interface adjustments in Word 2007 M. Helala 1, S.M.Furnell 1,2 and M.Papadaki 1 1 Centre for Information Security & Network Research, University of Plymouth,
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationThis document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.
December 2010 CDFM OVERVIEW The American Society of Military Comptrollers offers the Certified Defense Financial Manager (CDFM) program to those persons desiring to demonstrate proficiency in the core
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]
United Nations General Assembly Distr.: General 9 February 2010 Sixty-fourth session Agenda item 50 Resolution adopted by the General Assembly [on the report of the Second Committee (A/64/417)] 64/187.
More informationViews on the Framework for Improving Critical Infrastructure Cybersecurity
This document is scheduled to be published in the Federal Register on 12/11/2015 and available online at http://federalregister.gov/a/2015-31217, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE
More informationExample. Section: PS 709 Examples of Calculations of Reduced Hours of Work Last Revised: February 2017 Last Reviewed: February 2017 Next Review:
Following are three examples of calculations for MCP employees (undefined hours of work) and three examples for MCP office employees. Examples use the data from the table below. For your calculations use
More information