default search action
Prosper Kandabongee Yeng
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c18]Muhammad Ali Fauzi, Prosper Kandabongee Yeng, Bian Yang, Dita Rachmayani, Peter Nimbe:
Examining the Relationship Between Stress Levels and Cybersecurity Practices Among Hospital Employees in Three Countries: Ghana, Norway, and Indonesia. COMPSAC 2023: 1376-1382 - [c17]Prosper Kandabongee Yeng, Bian Yang, Muhammad Ali Fauzi:
Behaviour coding approach for assessing pitfalls in a questionnaire instrument towards assessing healthcare security practice. MSIE 2023: 353-362 - [c16]Pankaj Khatiwada, Muhammad Ali Fauzi, Bian Yang, Prosper Kandabongee Yeng, Jia-Chun Lin, Luyi Sun:
Threats and Risk on Using Digital Technologies for Remote Health Care Process. SIET 2023: 506-522 - [c15]Luyi Sun, Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Pankaj Khatiwada, Bian Yang:
Multi-Party Privacy Policy Management in the Context of Health Monitoring: An Exploratory Study. SIET 2023: 523-528 - [c14]Filip Holík, Prosper Kandabongee Yeng, Muhammad Ali Fauzi:
A Comparative Assessment of Threat Identification Methods in EHR Systems. SIET 2023: 529-537 - [c13]Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang, John-Bosco Diekuu, Peter Nimbe, Filip Holík, Pankaj Khatiwada, Akbar Fahmi, Luyi Sun:
SecHealth: Enhancing EHR Security in Digital Health Transformation. SIET 2023: 538-544 - 2022
- [j3]Ankur Shukla, Basel Katt, Livinus Obiora Nweke, Prosper Kandabongee Yeng, Goitom Kahsay Weldehawaryat:
System security assurance: A systematic literature review. Comput. Sci. Rev. 45: 100496 (2022) - [j2]Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang:
A Comprehensive Assessment of Human Factors in Cyber Security Compliance toward Enhancing the Security Practice of Healthcare Staff in Paperless Hospitals. Inf. 13(7): 335 (2022) - [j1]Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang, Peter Nimbe:
Investigation into Phishing Risk Behaviour among Healthcare Staff. Inf. 13(8): 392 (2022) - [c12]Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang, Sule Yildirim Yayilgan:
Analysing digital evidence towards enhancing healthcare security practice: The KID model. ICAIC 2022: 1-9 - [c11]Prosper Kandabongee Yeng, Bian Yang, Monica Stolt Pedersen:
Assessing cyber-security compliance level in paperless hospitals: An ethnographic approach. IOTSMS 2022: 1-8 - [c10]Muhammad Ali Fauzi, Bian Yang, Prosper Kandabongee Yeng:
Improving Stress Detection Using Weighted Score-Level Fusion of Multiple Sensor. SIET 2022: 65-71 - [c9]Prosper Kandabongee Yeng, Bian Yang, Muhammad Ali Fauzi, Peter Nimbe, Diah Priharsari:
A Framework for Assessing Motivational Methods Towards Incentivizing Cybersecurity Practice in Healthcare. SIET 2022: 325-330 - 2021
- [c8]Muhammad Ali Fauzi, Prosper Kandabongee Yeng, Bian Yang, Dita Rachmayani:
Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia. ARES 2021: 137:1-137:8 - [c7]Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang:
Assessing the effect of human factors in healthcare cyber security practice: An empirical study. PCI 2021: 472-476 - [i1]Ankur Shukla, Basel Katt, Livinus Obiora Nweke, Prosper Kandabongee Yeng, Goitom Kahsay Weldehawaryat:
System Security Assurance: A Systematic Literature Review. CoRR abs/2110.01904 (2021) - 2020
- [c6]Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang:
Comparative analysis of machine learning methods for analyzing security practice in electronic health records' logs. IEEE BigData 2020: 3856-3866 - [c5]Prosper Kandabongee Yeng, Livinus Obiora Nweke, Ashenafi Zebene Woldaregay, Bian Yang, Einar Arthur Snekkenes:
Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review. IntelliSys (1) 2020: 1-18
2010 – 2019
- 2019
- [c4]Prosper Kandabongee Yeng, Bian Yang, Einar Arthur Snekkenes:
Framework for Healthcare Security Practice Analysis, Modeling and Incentivization. IEEE BigData 2019: 3242-3251 - [c3]Ogerta Elezaj, Sule Yildirim Yayilgan, Mohamed Abomhara, Prosper Kandabongee Yeng, Javed Ahmed:
Data-Driven Intrusion Detection System for Small and Medium Enterprises. CAMAD 2019: 1-7 - [c2]Prosper Kandabongee Yeng, Bian Yang, Einar Snekkenes:
Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices. COMPSAC (2) 2019: 397-404 - [c1]Prosper Kandabongee Yeng, Bian Yang, Einar Arthur Snekkenes:
Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey. pHealth 2019: 239-245
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 02:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint