Louise Yngström
According to our database1,
Louise Yngström
authored at least 38 papers
between 1991 and 2013.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2013
Proceedings of the Information Assurance and Security Education and Training, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions-The Need for Security Services.
Int. J. Electron. Gov. Res., 2012
2011
The 14 Layered Framework for Including Social and Organisational Aspects in Security Management.
Inf. Manag. Comput. Secur., 2011
Inf. Manag. Comput. Secur., 2011
Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models.
Proceedings of the Information Security South Africa Conference 2011, 2011
Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011
2009
Int. J. Electron. Secur. Digit. Forensics, 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Methodology for Considering Environments and Culture in Developing Information Security Systems.
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the First IEEE Eastern European Conference on the Engineering of Computer Based Systems, 2009
2008
Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
2007
Bridging the gap between general management and technicians - A case study on ICT security in a developing country.
Comput. Secur., 2007
Proceedings of the Fifth World Conference on Information Security Education, 2007
2006
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security.
Proceedings of the Security and Privacy in Dynamic Environments, 2006
A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security - The Case of Tanzania.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
2005
An approach to enhance the security of ICT infrastructure through legal, regulatory influences.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case Study.
Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, 2005
2004
Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the Information Security Management, Education and Privacy, 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
Integrating Security into Systems Development.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
IT Security Readiness in Developing Countries.
Proceedings of the Security Education and Critical Infrastructures, 2003
2002
BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
1999
An approach to standardizing security analysis methods for virtual systems.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999
1996
IT security and privacy education.
Proceedings of the Information Systems Security, 1996
1993
Evaluation of an Academic Programme in IT Security 1985-1990.
Proceedings of the Computer Security, 1993
Education in IT Security at Bachelor and Master Levels Using a Systemic-Holistic Approach.
Proceedings of the Security and Control of Information Technology in Society, 1993
The Conference in Perspective.
Proceedings of the Security and Control of Information Technology in Society, 1993
1992
Addressing Vulnerability and Privacy Problems generated by the Use of IT-Security Mechanisms.
Proceedings of the Education and Society, 1992
1991
General Systems Theory Can Bridge the Gaps of Knowledge Between IT-Security Specialists.
Proceedings of the Managing Information Technology's Organisational Impact, 1991