The SCEAS System
Navigation Menu

Search the dblp DataBase


Christer Magnusson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christer Magnusson, Heidi Ola, Camilla Silversjo Holmqvist
    The knowledge pressure on Risk and Security managers is increasing. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:974-979 [Conf]
  2. Christer Magnusson, Louise Yngström
    Method for Insuring IT Risks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  3. Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson
    State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case Study. [Citation Graph (0, 0)][DBLP]
    ICALT, 2005, pp:1007-1011 [Conf]
  4. Jabiri Kuwe Bakari, Charles N. Tarimo, Christer Magnusson, Louise Yngström
    Bridging the Gap between General Management and Technicians - A Case Study in ICT Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:442-447 [Conf]
  5. Christer Magnusson, Louise Yngström
    BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:335-346 [Conf]
  6. Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski
    Bridging the gap between general management and technicians - A case study on ICT security in a developing country. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:1, pp:44-55 [Journal]

  7. Value creation and Return On Security Investments (ROSI). [Citation Graph (, )][DBLP]

  8. Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002