Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Delft University of Technology" +contributor:("Van Eeten, M.J.G."). Showing records 1 – 15 of 15 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Delft University of Technology

1. Bougioukos, D. A Framework of Technologies and Security Controls towards the Support of 'Bring Your Own Device Programmes' in Organizations:.

Degree: 2013, Delft University of Technology

 The diffusion of mobile devices in the market place has been tremendous in the last several years. Devices such as smartphones and tablets have become… (more)

Subjects/Keywords: Bring Your Own Device; Mobile Security; Mobile Threats; Mobile Device Management Technologies; BYOD Framework

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bougioukos, D. (2013). A Framework of Technologies and Security Controls towards the Support of 'Bring Your Own Device Programmes' in Organizations:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:5079fbee-57ee-4819-a5c7-b4900e4030b7

Chicago Manual of Style (16th Edition):

Bougioukos, D. “A Framework of Technologies and Security Controls towards the Support of 'Bring Your Own Device Programmes' in Organizations:.” 2013. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:5079fbee-57ee-4819-a5c7-b4900e4030b7.

MLA Handbook (7th Edition):

Bougioukos, D. “A Framework of Technologies and Security Controls towards the Support of 'Bring Your Own Device Programmes' in Organizations:.” 2013. Web. 20 Aug 2019.

Vancouver:

Bougioukos D. A Framework of Technologies and Security Controls towards the Support of 'Bring Your Own Device Programmes' in Organizations:. [Internet] [Masters thesis]. Delft University of Technology; 2013. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:5079fbee-57ee-4819-a5c7-b4900e4030b7.

Council of Science Editors:

Bougioukos D. A Framework of Technologies and Security Controls towards the Support of 'Bring Your Own Device Programmes' in Organizations:. [Masters Thesis]. Delft University of Technology; 2013. Available from: http://resolver.tudelft.nl/uuid:5079fbee-57ee-4819-a5c7-b4900e4030b7


Delft University of Technology

2. Van Leeuwen, G.G. The business case in practice:.

Degree: 2009, Delft University of Technology

 The conclusions of this research are based on a combination of the literature on the subject of business cases and projects and of 50 responses… (more)

Subjects/Keywords: project; business case; practice; success; cost; benefit; risk; time

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Leeuwen, G. G. (2009). The business case in practice:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:8bc7521d-490b-4361-9ce7-f77a733b7b6e

Chicago Manual of Style (16th Edition):

Van Leeuwen, G G. “The business case in practice:.” 2009. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:8bc7521d-490b-4361-9ce7-f77a733b7b6e.

MLA Handbook (7th Edition):

Van Leeuwen, G G. “The business case in practice:.” 2009. Web. 20 Aug 2019.

Vancouver:

Van Leeuwen GG. The business case in practice:. [Internet] [Masters thesis]. Delft University of Technology; 2009. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:8bc7521d-490b-4361-9ce7-f77a733b7b6e.

Council of Science Editors:

Van Leeuwen GG. The business case in practice:. [Masters Thesis]. Delft University of Technology; 2009. Available from: http://resolver.tudelft.nl/uuid:8bc7521d-490b-4361-9ce7-f77a733b7b6e


Delft University of Technology

3. Castaneda, O.F. Hierarchy in Meritocracy : Community Building and Code Production in The Apache Software Foundation:.

Degree: 2010, Delft University of Technology

 This research is about code production in top-level open source communities of The Apache Software Foundation (ASF). We extensively analyzed Subversion repository logs from 70… (more)

Subjects/Keywords: open source; self-organization; institutionalization; management of innovation; management of technology; software management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Castaneda, O. F. (2010). Hierarchy in Meritocracy : Community Building and Code Production in The Apache Software Foundation:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:381f7d06-e79b-46be-982a-a9afb0b96247

Chicago Manual of Style (16th Edition):

Castaneda, O F. “Hierarchy in Meritocracy : Community Building and Code Production in The Apache Software Foundation:.” 2010. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:381f7d06-e79b-46be-982a-a9afb0b96247.

MLA Handbook (7th Edition):

Castaneda, O F. “Hierarchy in Meritocracy : Community Building and Code Production in The Apache Software Foundation:.” 2010. Web. 20 Aug 2019.

Vancouver:

Castaneda OF. Hierarchy in Meritocracy : Community Building and Code Production in The Apache Software Foundation:. [Internet] [Masters thesis]. Delft University of Technology; 2010. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:381f7d06-e79b-46be-982a-a9afb0b96247.

Council of Science Editors:

Castaneda OF. Hierarchy in Meritocracy : Community Building and Code Production in The Apache Software Foundation:. [Masters Thesis]. Delft University of Technology; 2010. Available from: http://resolver.tudelft.nl/uuid:381f7d06-e79b-46be-982a-a9afb0b96247


Delft University of Technology

4. Hoekstra, S. Organizing a public party in a Design & Construct project:.

Degree: 2010, Delft University of Technology

 In the construction industry, the design and construct (D&C) project delivery method is being used more often. Smaller public parties are becoming aware of the… (more)

Subjects/Keywords: design and construct; public client; framework for success

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hoekstra, S. (2010). Organizing a public party in a Design & Construct project:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:36d359ab-42d6-434a-b23d-aa4f1ab07ed5

Chicago Manual of Style (16th Edition):

Hoekstra, S. “Organizing a public party in a Design & Construct project:.” 2010. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:36d359ab-42d6-434a-b23d-aa4f1ab07ed5.

MLA Handbook (7th Edition):

Hoekstra, S. “Organizing a public party in a Design & Construct project:.” 2010. Web. 20 Aug 2019.

Vancouver:

Hoekstra S. Organizing a public party in a Design & Construct project:. [Internet] [Masters thesis]. Delft University of Technology; 2010. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:36d359ab-42d6-434a-b23d-aa4f1ab07ed5.

Council of Science Editors:

Hoekstra S. Organizing a public party in a Design & Construct project:. [Masters Thesis]. Delft University of Technology; 2010. Available from: http://resolver.tudelft.nl/uuid:36d359ab-42d6-434a-b23d-aa4f1ab07ed5


Delft University of Technology

5. Van Driel, J.W. Evaluating Risk Management Strategies for Third Party Payment Networks:.

Degree: 2015, Delft University of Technology

 Like most consumers, you probably take the payment process when checking out at your favorite webshop, for granted. Regardless of which payment method you select,… (more)

Subjects/Keywords: Third Party Payment Network; Risk Management; Non-payment; Payment Service Provider

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Driel, J. W. (2015). Evaluating Risk Management Strategies for Third Party Payment Networks:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:10302e8a-5bba-4bd1-a8a5-8491cae7d0ad

Chicago Manual of Style (16th Edition):

Van Driel, J W. “Evaluating Risk Management Strategies for Third Party Payment Networks:.” 2015. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:10302e8a-5bba-4bd1-a8a5-8491cae7d0ad.

MLA Handbook (7th Edition):

Van Driel, J W. “Evaluating Risk Management Strategies for Third Party Payment Networks:.” 2015. Web. 20 Aug 2019.

Vancouver:

Van Driel JW. Evaluating Risk Management Strategies for Third Party Payment Networks:. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:10302e8a-5bba-4bd1-a8a5-8491cae7d0ad.

Council of Science Editors:

Van Driel JW. Evaluating Risk Management Strategies for Third Party Payment Networks:. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:10302e8a-5bba-4bd1-a8a5-8491cae7d0ad


Delft University of Technology

6. Nieuwesteeg, B.F.H. The legal position and societal effects of security breach notification laws:.

Degree: 2013, Delft University of Technology

 This thesis scrutinizes the proportionality and describes the subsidiarity of proposals for security breach notification laws (hereafter: SBNLs) in the European Union. An SBNL obliges… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nieuwesteeg, B. F. H. (2013). The legal position and societal effects of security breach notification laws:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:38d4fa0e-8a3a-4216-9044-e8507a60ed66

Chicago Manual of Style (16th Edition):

Nieuwesteeg, B F H. “The legal position and societal effects of security breach notification laws:.” 2013. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:38d4fa0e-8a3a-4216-9044-e8507a60ed66.

MLA Handbook (7th Edition):

Nieuwesteeg, B F H. “The legal position and societal effects of security breach notification laws:.” 2013. Web. 20 Aug 2019.

Vancouver:

Nieuwesteeg BFH. The legal position and societal effects of security breach notification laws:. [Internet] [Masters thesis]. Delft University of Technology; 2013. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:38d4fa0e-8a3a-4216-9044-e8507a60ed66.

Council of Science Editors:

Nieuwesteeg BFH. The legal position and societal effects of security breach notification laws:. [Masters Thesis]. Delft University of Technology; 2013. Available from: http://resolver.tudelft.nl/uuid:38d4fa0e-8a3a-4216-9044-e8507a60ed66

7. Tajalizadehkhoob, S. Online Banking Fraud Mitigation: A Quantitative Study for Extracting Intelligence about Target Selection by Cybercriminals from Zeus Financial Malware Files :.

Degree: 2013, Delft University of Technology

Subjects/Keywords: malware; target selection; Zeus; online banking fraud; intelligence; cyber criminal; cyber security

…for Delft university of Technology. Fox-IT is a security company located in the Netherlands… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tajalizadehkhoob, S. (2013). Online Banking Fraud Mitigation: A Quantitative Study for Extracting Intelligence about Target Selection by Cybercriminals from Zeus Financial Malware Files :. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:431bf409-a321-4724-99d0-fc0679145f46

Chicago Manual of Style (16th Edition):

Tajalizadehkhoob, S. “Online Banking Fraud Mitigation: A Quantitative Study for Extracting Intelligence about Target Selection by Cybercriminals from Zeus Financial Malware Files :.” 2013. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:431bf409-a321-4724-99d0-fc0679145f46.

MLA Handbook (7th Edition):

Tajalizadehkhoob, S. “Online Banking Fraud Mitigation: A Quantitative Study for Extracting Intelligence about Target Selection by Cybercriminals from Zeus Financial Malware Files :.” 2013. Web. 20 Aug 2019.

Vancouver:

Tajalizadehkhoob S. Online Banking Fraud Mitigation: A Quantitative Study for Extracting Intelligence about Target Selection by Cybercriminals from Zeus Financial Malware Files :. [Internet] [Masters thesis]. Delft University of Technology; 2013. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:431bf409-a321-4724-99d0-fc0679145f46.

Council of Science Editors:

Tajalizadehkhoob S. Online Banking Fraud Mitigation: A Quantitative Study for Extracting Intelligence about Target Selection by Cybercriminals from Zeus Financial Malware Files :. [Masters Thesis]. Delft University of Technology; 2013. Available from: http://resolver.tudelft.nl/uuid:431bf409-a321-4724-99d0-fc0679145f46

8. Sæmundsson, G.D. Anomaly Detection Beyond the Research Setting: An exploration of the use of statistics and machine learning to detect cyber attacks:.

Degree: 2015, Delft University of Technology

 In this work we approach the problem of deploying anomaly detection techniques for detecting cyber attacks in an organisational environment. Anomaly detection has been an… (more)

Subjects/Keywords: anomaly detection; cyber security; intrusion detection; usability; organisational challenges

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sæmundsson, G. D. (2015). Anomaly Detection Beyond the Research Setting: An exploration of the use of statistics and machine learning to detect cyber attacks:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:8b3cc7b9-e2c0-43c4-92cf-b8bde8cbbedf

Chicago Manual of Style (16th Edition):

Sæmundsson, G D. “Anomaly Detection Beyond the Research Setting: An exploration of the use of statistics and machine learning to detect cyber attacks:.” 2015. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:8b3cc7b9-e2c0-43c4-92cf-b8bde8cbbedf.

MLA Handbook (7th Edition):

Sæmundsson, G D. “Anomaly Detection Beyond the Research Setting: An exploration of the use of statistics and machine learning to detect cyber attacks:.” 2015. Web. 20 Aug 2019.

Vancouver:

Sæmundsson GD. Anomaly Detection Beyond the Research Setting: An exploration of the use of statistics and machine learning to detect cyber attacks:. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:8b3cc7b9-e2c0-43c4-92cf-b8bde8cbbedf.

Council of Science Editors:

Sæmundsson GD. Anomaly Detection Beyond the Research Setting: An exploration of the use of statistics and machine learning to detect cyber attacks:. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:8b3cc7b9-e2c0-43c4-92cf-b8bde8cbbedf

9. Schoenmakers, F.A. Perspectives on Control System Security: Assessing security risks resulting from contradicting values between Operational and Information Technology :.

Degree: 2013, Delft University of Technology

 Industrial control systems in the electricity domain become increasingly connected. The change in the control systems industry has several drivers. Business drivers on the one… (more)

Subjects/Keywords: Cyber security;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schoenmakers, F. A. (2013). Perspectives on Control System Security: Assessing security risks resulting from contradicting values between Operational and Information Technology :. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:5b2e19c4-c493-4575-972d-d91825d4ef67

Chicago Manual of Style (16th Edition):

Schoenmakers, F A. “Perspectives on Control System Security: Assessing security risks resulting from contradicting values between Operational and Information Technology :.” 2013. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:5b2e19c4-c493-4575-972d-d91825d4ef67.

MLA Handbook (7th Edition):

Schoenmakers, F A. “Perspectives on Control System Security: Assessing security risks resulting from contradicting values between Operational and Information Technology :.” 2013. Web. 20 Aug 2019.

Vancouver:

Schoenmakers FA. Perspectives on Control System Security: Assessing security risks resulting from contradicting values between Operational and Information Technology :. [Internet] [Masters thesis]. Delft University of Technology; 2013. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:5b2e19c4-c493-4575-972d-d91825d4ef67.

Council of Science Editors:

Schoenmakers FA. Perspectives on Control System Security: Assessing security risks resulting from contradicting values between Operational and Information Technology :. [Masters Thesis]. Delft University of Technology; 2013. Available from: http://resolver.tudelft.nl/uuid:5b2e19c4-c493-4575-972d-d91825d4ef67


Delft University of Technology

10. Bogman, F.J. Incident management: Pursuing stable service provision under varying circumstances:.

Degree: 2010, Delft University of Technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bogman, F. J. (2010). Incident management: Pursuing stable service provision under varying circumstances:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:5ff07787-a073-41c0-82dc-fce984746dd1

Chicago Manual of Style (16th Edition):

Bogman, F J. “Incident management: Pursuing stable service provision under varying circumstances:.” 2010. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:5ff07787-a073-41c0-82dc-fce984746dd1.

MLA Handbook (7th Edition):

Bogman, F J. “Incident management: Pursuing stable service provision under varying circumstances:.” 2010. Web. 20 Aug 2019.

Vancouver:

Bogman FJ. Incident management: Pursuing stable service provision under varying circumstances:. [Internet] [Masters thesis]. Delft University of Technology; 2010. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:5ff07787-a073-41c0-82dc-fce984746dd1.

Council of Science Editors:

Bogman FJ. Incident management: Pursuing stable service provision under varying circumstances:. [Masters Thesis]. Delft University of Technology; 2010. Available from: http://resolver.tudelft.nl/uuid:5ff07787-a073-41c0-82dc-fce984746dd1


Delft University of Technology

11. Kreiken, F.H. Large-scale copyright enforcement and human rights safeguards in online markets: A comparative study of 22 sanctioning mechanisms from eight enforcement strategies in six countries between 2004 and 2014.

Degree: 2017, Delft University of Technology

 The Internet has facilitated large-scale copyright infringement. Fighting this one case at a time via the standard civil law procedures is costly in terms of… (more)

Subjects/Keywords: copyright; enforcement; safeguards; due process; fair trial; privacy; internet; governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kreiken, F. H. (2017). Large-scale copyright enforcement and human rights safeguards in online markets: A comparative study of 22 sanctioning mechanisms from eight enforcement strategies in six countries between 2004 and 2014. (Doctoral Dissertation). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; urn:NBN:nl:ui:24-uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; be493008-78cc-46fa-937e-ee7de4559d98 ; urn:isbn:978-90-79787-69-2 ; 10.4233/uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; urn:NBN:nl:ui:24-uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; http://resolver.tudelft.nl/uuid:be493008-78cc-46fa-937e-ee7de4559d98

Chicago Manual of Style (16th Edition):

Kreiken, F H. “Large-scale copyright enforcement and human rights safeguards in online markets: A comparative study of 22 sanctioning mechanisms from eight enforcement strategies in six countries between 2004 and 2014.” 2017. Doctoral Dissertation, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; urn:NBN:nl:ui:24-uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; be493008-78cc-46fa-937e-ee7de4559d98 ; urn:isbn:978-90-79787-69-2 ; 10.4233/uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; urn:NBN:nl:ui:24-uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; http://resolver.tudelft.nl/uuid:be493008-78cc-46fa-937e-ee7de4559d98.

MLA Handbook (7th Edition):

Kreiken, F H. “Large-scale copyright enforcement and human rights safeguards in online markets: A comparative study of 22 sanctioning mechanisms from eight enforcement strategies in six countries between 2004 and 2014.” 2017. Web. 20 Aug 2019.

Vancouver:

Kreiken FH. Large-scale copyright enforcement and human rights safeguards in online markets: A comparative study of 22 sanctioning mechanisms from eight enforcement strategies in six countries between 2004 and 2014. [Internet] [Doctoral dissertation]. Delft University of Technology; 2017. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; urn:NBN:nl:ui:24-uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; be493008-78cc-46fa-937e-ee7de4559d98 ; urn:isbn:978-90-79787-69-2 ; 10.4233/uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; urn:NBN:nl:ui:24-uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; http://resolver.tudelft.nl/uuid:be493008-78cc-46fa-937e-ee7de4559d98.

Council of Science Editors:

Kreiken FH. Large-scale copyright enforcement and human rights safeguards in online markets: A comparative study of 22 sanctioning mechanisms from eight enforcement strategies in six countries between 2004 and 2014. [Doctoral Dissertation]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; urn:NBN:nl:ui:24-uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; be493008-78cc-46fa-937e-ee7de4559d98 ; urn:isbn:978-90-79787-69-2 ; 10.4233/uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; urn:NBN:nl:ui:24-uuid:be493008-78cc-46fa-937e-ee7de4559d98 ; http://resolver.tudelft.nl/uuid:be493008-78cc-46fa-937e-ee7de4559d98


Delft University of Technology

12. Van Meijeren, P.M. Perspectives on Cyber Security: Managerial perspectives on cyber security and the role of end user awareness:.

Degree: 2016, Delft University of Technology

Subjects/Keywords: managerial; perspectives; cyber security; end user; awareness; Q-methodology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Meijeren, P. M. (2016). Perspectives on Cyber Security: Managerial perspectives on cyber security and the role of end user awareness:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:68a5cbff-447d-4568-8053-25b794ff72bd

Chicago Manual of Style (16th Edition):

Van Meijeren, P M. “Perspectives on Cyber Security: Managerial perspectives on cyber security and the role of end user awareness:.” 2016. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:68a5cbff-447d-4568-8053-25b794ff72bd.

MLA Handbook (7th Edition):

Van Meijeren, P M. “Perspectives on Cyber Security: Managerial perspectives on cyber security and the role of end user awareness:.” 2016. Web. 20 Aug 2019.

Vancouver:

Van Meijeren PM. Perspectives on Cyber Security: Managerial perspectives on cyber security and the role of end user awareness:. [Internet] [Masters thesis]. Delft University of Technology; 2016. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:68a5cbff-447d-4568-8053-25b794ff72bd.

Council of Science Editors:

Van Meijeren PM. Perspectives on Cyber Security: Managerial perspectives on cyber security and the role of end user awareness:. [Masters Thesis]. Delft University of Technology; 2016. Available from: http://resolver.tudelft.nl/uuid:68a5cbff-447d-4568-8053-25b794ff72bd


Delft University of Technology

13. Tajalizadehkhoob, S. The Role of Hosting Providers in Web Security: Understanding and Improving Security Incentives and Performance via Analysis of Large-scale Incident Data.

Degree: 2018, Delft University of Technology

 In theory, hosting providers can play an important role in fighting cybercrime and misuse. This is because many online threats, be they high-profile or mundane,… (more)

Subjects/Keywords: cybersecurity; hosting provider; metrics; incentives; shared hosting; patching; vulnerability scan; data analysis; statistical models; machine learning; blacklist data

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tajalizadehkhoob, S. (2018). The Role of Hosting Providers in Web Security: Understanding and Improving Security Incentives and Performance via Analysis of Large-scale Incident Data. (Doctoral Dissertation). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:NBN:nl:ui:24-uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:isbn:978-94-6366-007-5 ; 10.4233/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:NBN:nl:ui:24-uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; http://resolver.tudelft.nl/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8

Chicago Manual of Style (16th Edition):

Tajalizadehkhoob, S. “The Role of Hosting Providers in Web Security: Understanding and Improving Security Incentives and Performance via Analysis of Large-scale Incident Data.” 2018. Doctoral Dissertation, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:NBN:nl:ui:24-uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:isbn:978-94-6366-007-5 ; 10.4233/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:NBN:nl:ui:24-uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; http://resolver.tudelft.nl/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8.

MLA Handbook (7th Edition):

Tajalizadehkhoob, S. “The Role of Hosting Providers in Web Security: Understanding and Improving Security Incentives and Performance via Analysis of Large-scale Incident Data.” 2018. Web. 20 Aug 2019.

Vancouver:

Tajalizadehkhoob S. The Role of Hosting Providers in Web Security: Understanding and Improving Security Incentives and Performance via Analysis of Large-scale Incident Data. [Internet] [Doctoral dissertation]. Delft University of Technology; 2018. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:NBN:nl:ui:24-uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:isbn:978-94-6366-007-5 ; 10.4233/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:NBN:nl:ui:24-uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; http://resolver.tudelft.nl/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8.

Council of Science Editors:

Tajalizadehkhoob S. The Role of Hosting Providers in Web Security: Understanding and Improving Security Incentives and Performance via Analysis of Large-scale Incident Data. [Doctoral Dissertation]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:NBN:nl:ui:24-uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:isbn:978-94-6366-007-5 ; 10.4233/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; urn:NBN:nl:ui:24-uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8 ; http://resolver.tudelft.nl/uuid:c343a2dd-15d1-4921-9b45-f00ee38177d8


Delft University of Technology

14. De Goede, J.A.C. Organizing Stakeholder Participation Effectively:.

Degree: 2011, Delft University of Technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

De Goede, J. A. C. (2011). Organizing Stakeholder Participation Effectively:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:26c6ce9d-d41a-4ebe-9a8f-9eac7adbf136

Chicago Manual of Style (16th Edition):

De Goede, J A C. “Organizing Stakeholder Participation Effectively:.” 2011. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:26c6ce9d-d41a-4ebe-9a8f-9eac7adbf136.

MLA Handbook (7th Edition):

De Goede, J A C. “Organizing Stakeholder Participation Effectively:.” 2011. Web. 20 Aug 2019.

Vancouver:

De Goede JAC. Organizing Stakeholder Participation Effectively:. [Internet] [Masters thesis]. Delft University of Technology; 2011. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:26c6ce9d-d41a-4ebe-9a8f-9eac7adbf136.

Council of Science Editors:

De Goede JAC. Organizing Stakeholder Participation Effectively:. [Masters Thesis]. Delft University of Technology; 2011. Available from: http://resolver.tudelft.nl/uuid:26c6ce9d-d41a-4ebe-9a8f-9eac7adbf136


Delft University of Technology

15. Mulders, M. ASM. The Process of Innovation.:.

Degree: 2004, Delft University of Technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulders, M. (2004). ASM. The Process of Innovation.:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:4e485380-1cc2-452c-b6d5-f0c053f64585

Chicago Manual of Style (16th Edition):

Mulders, M. “ASM. The Process of Innovation.:.” 2004. Masters Thesis, Delft University of Technology. Accessed August 20, 2019. http://resolver.tudelft.nl/uuid:4e485380-1cc2-452c-b6d5-f0c053f64585.

MLA Handbook (7th Edition):

Mulders, M. “ASM. The Process of Innovation.:.” 2004. Web. 20 Aug 2019.

Vancouver:

Mulders M. ASM. The Process of Innovation.:. [Internet] [Masters thesis]. Delft University of Technology; 2004. [cited 2019 Aug 20]. Available from: http://resolver.tudelft.nl/uuid:4e485380-1cc2-452c-b6d5-f0c053f64585.

Council of Science Editors:

Mulders M. ASM. The Process of Innovation.:. [Masters Thesis]. Delft University of Technology; 2004. Available from: http://resolver.tudelft.nl/uuid:4e485380-1cc2-452c-b6d5-f0c053f64585

.