|
|
|
Joachim Bjørge Ulven and Gaute Wangen
The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive Literature Review (CLR) Mo...
ver más
|
|
|
|
|
|
|
Philip Nyblom, Gaute Wangen and Vasileios Gkioulos
Social media are getting more and more ingrained into everybody?s lives. With people?s more substantial presence on social media, threat actors exploit the platforms and the information that people share there to deploy and execute various types of attac...
ver más
|
|
|
|
|
|
|
Vasileios Gkioulos, Gaute Wangen and Sokratis K. Katsikas
Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A pletho...
ver más
|
|
|
|
|
|
|
Vasileios Gkioulos, Gaute Wangen, Sokratis K. Katsikas, George Kavallieratos and Panayiotis Kotzanikolaou
-
|
|
|
|
|
|