Hazelhoff Roelfzema, N. (2011, March). A comparative review of information security risk assessment methodologies for health care. Paper presented at IADIS e-Society, Avilla, Spain
Health care organizations face major compliance challenges as they need to secure patient information. An important compliance requirement is the performance of regular risk a...
Buchanan, W. J. (2011, January). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University
Multiple Choice Questions (MCQs) are often seen as being weak in terms of their coverage, and are criticised for often only assessing knowledge and not encouraging deep learni...
Hazelhoff Roelfzema, N. (2010, November). Novel security assessment for personal health data. Paper presented at Perada workshop on Privacy, Security & Trust, Rome, Italy
Howie, J. (2010, September). Identity management challenges in cloud computing. Paper presented at RSA Europe, London
Howie, J. (2010, August). Key note: Information Lifecycle and Data Governance. Paper presented at Goverance, Risk and Compliance, Lisbon, Portugal
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC), London
Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls...