SHEPHERD, L.A.,DE PAOLI, S.,CONACHER, J., (2020). Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime, 9(2), 28-32. Retrieve from https://www.ijisc.comSHEPHERD, L.A., DE PAOLI, S., CONACHER, J., 2020. Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime 9(2), 28-32. Available from: https://www.ijisc.comL.A. SHEPHERD, S. DE PAOLI, J. CONACHER, "Human-Computer Interaction Considerations When Developing Cyber Ranges," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 28-32, 2020. Available: https://www.ijisc.comSHEPHERD, L.A., DE PAOLI, S., CONACHER, J., 'Human-Computer Interaction Considerations When Developing Cyber Ranges', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 28-32, (2020).SHEPHERD, L.A.,DE PAOLI, S.,CONACHER, J.,: Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime 9 (2020) 28-32. https://www.ijisc.comSHEPHERD, L.A., DE PAOLI, S., CONACHER, J., (2020), Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime, 9: 28-32. https://www.ijisc.com Citation Format :
GOLDMAN, E. (2019). Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime, 8(1), 30-34. Retrieve from https://www.ijisc.comGOLDMAN, E., 2019. Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime 8(1), 30-34. Available from: https://www.ijisc.comE. GOLDMAN, "Push the Button: Making Security Training Fun and Interactive," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 30-34, 2019. Available: https://www.ijisc.comGOLDMAN, E., 'Push the Button: Making Security Training Fun and Interactive', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 30-34, (2019).GOLDMAN, E.: Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime 8 (2019) 30-34. https://www.ijisc.comGOLDMAN, E., (2019), Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime, 8: 30-34. https://www.ijisc.com Citation Format :
DJEROUNI, M. (2019). Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime, 8(1), 23-29. Retrieve from https://www.ijisc.comDJEROUNI, M., 2019. Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime 8(1), 23-29. Available from: https://www.ijisc.comM. DJEROUNI, "Implication of Employees in Security Policies Definition," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 23-29, 2019. Available: https://www.ijisc.comDJEROUNI, M., 'Implication of Employees in Security Policies Definition', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 23-29, (2019).DJEROUNI, M.: Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime 8 (2019) 23-29. https://www.ijisc.comDJEROUNI, M., (2019), Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime, 8: 23-29. https://www.ijisc.com Citation Format :