The SCEAS System
Navigation Menu

Search the dblp DataBase


Louise Yngström: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christer Magnusson, Louise Yngström
    Method for Insuring IT Risks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  2. Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson
    State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case Study. [Citation Graph (0, 0)][DBLP]
    ICALT, 2005, pp:1007-1011 [Conf]
  3. Simone Fischer-Hübner, Louise Yngström, Jan Holvast
    Addressing Vulnerability and Privacy Problems generated by the Use of IT-Security Mechanisms. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:314-321 [Conf]
  4. Ann Frisinger, Louise Yngström
    An approach to standardizing security analysis methods for virtual systems. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:63-74 [Conf]
  5. Respickius Casmir, Louise Yngström
    IT Security Readiness in Developing Countries. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:117-129 [Conf]
  6. Louise Yngström
    An Holistic Approach to an International Doctoral Program in Information Security. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:117-132 [Conf]
  7. Richard Sizer, Louise Yngström
    The Conference in Perspective. [Citation Graph (0, 0)][DBLP]
    Security and Control of Information Technology in Society, 1993, pp:1-3 [Conf]
  8. Louise Yngström
    Education in IT Security at Bachelor and Master Levels Using a Systemic-Holistic Approach. [Citation Graph (0, 0)][DBLP]
    Security and Control of Information Technology in Society, 1993, pp:161-181 [Conf]
  9. Louise Yngström
    General Systems Theory Can Bridge the Gaps of Knowledge Between IT-Security Specialists. [Citation Graph (0, 0)][DBLP]
    Managing Information Technology's Organisational Impact, 1991, pp:299-312 [Conf]
  10. Ulrika Evertsson, Urban Örthberg, Louise Yngström
    Integrating Security into Systems Development. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:157-168 [Conf]
  11. Jabiri Kuwe Bakari, Charles N. Tarimo, Christer Magnusson, Louise Yngström
    Bridging the Gap between General Management and Technicians - A Case Study in ICT Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:442-447 [Conf]
  12. Christer Magnusson, Louise Yngström
    BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:335-346 [Conf]
  13. Louise Yngström
    Evaluation of an Academic Programme in IT Security 1985-1990. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:287-299 [Conf]
  14. Louise Yngström
    IT security and privacy education. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:351-364 [Conf]
  15. Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski
    Bridging the gap between general management and technicians - A case study on ICT security in a developing country. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:1, pp:44-55 [Journal]
  16. Helen Armstrong, Louise Yngström
    Resubmit my Information Security Thesis? - You must be joking! [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:9-16 [Conf]

  17. Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania. [Citation Graph (, )][DBLP]

  18. Framework for Securing Mobile Software Agents. [Citation Graph (, )][DBLP]

  19. Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World. [Citation Graph (, )][DBLP]

  20. A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security – The Case of Tanzania. [Citation Graph (, )][DBLP]

  21. An approach to enhance the security of ICT infrastructure through legal, regulatory influences. [Citation Graph (, )][DBLP]

  22. Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system. [Citation Graph (, )][DBLP]

  23. A Framework for Evaluation of Information Systems Security. [Citation Graph (, )][DBLP]

  24. Adaptability infrastructure for bridging IT security evaluation and options theory. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002