Louise Yngström

According to our database1, Louise Yngström authored at least 38 papers between 1991 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A Review of IFIP TC 11 WG 11.8 Publications through the Ages.
Proceedings of the Information Assurance and Security Education and Training, 2013

Evaluating a Framework for Securing E-Government Services - A Case of Tanzania.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions-The Need for Security Services.
Int. J. Electron. Gov. Res., 2012

2011
The 14 Layered Framework for Including Social and Organisational Aspects in Security Management.
Inf. Manag. Comput. Secur., 2011

Addressing Dynamic Issues in Information Security Management.
Inf. Manag. Comput. Secur., 2011

Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models.
Proceedings of the Information Security South Africa Conference 2011, 2011

Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

2009
A Swedish IT forensics course - expert opinions.
Int. J. Electron. Secur. Digit. Forensics, 2009

Adaptability infrastructure for bridging IT security evaluation and options theory.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Methodology for Considering Environments and Culture in Developing Information Security Systems.
Proceedings of the Information Security South Africa Conference 2009, 2009

Discussing E-Government Maturity Models for the Developing World - Security View.
Proceedings of the Information Security South Africa Conference 2009, 2009

Secure e-learning using a holistic and immune security framework.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory.
Proceedings of the First IEEE Eastern European Conference on the Engineering of Computer Based Systems, 2009

2008
Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

2007
Bridging the gap between general management and technicians - A case study on ICT security in a developing country.
Comput. Secur., 2007

Resubmit my Information Security Thesis? - You must be joking!
Proceedings of the Fifth World Conference on Information Security Education, 2007

2006
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security - The Case of Tanzania.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Framework for Securing Mobile Software Agents.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
An approach to enhance the security of ICT infrastructure through legal, regulatory influences.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

A Framework for Evaluation of Information Systems Security.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case Study.
Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, 2005

2004
Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

An Holistic Approach to an International Doctoral Program in Information Security.
Proceedings of the Information Security Management, Education and Privacy, 2004

Method for Insuring IT Risks.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Integrating Security into Systems Development.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

IT Security Readiness in Developing Countries.
Proceedings of the Security Education and Critical Infrastructures, 2003

2002
BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

1999
An approach to standardizing security analysis methods for virtual systems.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

1996
IT security and privacy education.
Proceedings of the Information Systems Security, 1996

1993
Evaluation of an Academic Programme in IT Security 1985-1990.
Proceedings of the Computer Security, 1993

Education in IT Security at Bachelor and Master Levels Using a Systemic-Holistic Approach.
Proceedings of the Security and Control of Information Technology in Society, 1993

The Conference in Perspective.
Proceedings of the Security and Control of Information Technology in Society, 1993

1992
Addressing Vulnerability and Privacy Problems generated by the Use of IT-Security Mechanisms.
Proceedings of the Education and Society, 1992

1991
General Systems Theory Can Bridge the Gaps of Knowledge Between IT-Security Specialists.
Proceedings of the Managing Information Technology's Organisational Impact, 1991


  Loading...