2007 |
9 | EE | Jabiri Kuwe Bakari,
Charles N. Tarimo,
Louise Yngström,
Christer Magnusson,
Stewart Kowalski:
Bridging the gap between general management and technicians - A case study on ICT security in a developing country.
Computers & Security 26(1): 44-55 (2007) |
2006 |
8 | EE | Charles N. Tarimo,
Jabiri Kuwe Bakari,
Louise Yngström,
Stewart Kowalski:
A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security The Case of Tanzania.
ISSA 2006: 1-12 |
2005 |
7 | EE | Job Asheri Chaula,
Louise Yngström,
Stewart Kowalski:
A Framework for Evaluation of Information Systems Security.
ISSA 2005: 1-11 |
6 | EE | Charles N. Tarimo,
Louise Yngström,
Stewart Kowalski:
An approach to enhance the security of ICT infrastructure through legal, regulatory influences.
ISSA 2005: 1-12 |
1993 |
5 | | Stewart Kowalski:
Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification.
SEC 1993: 207-226 |
4 | | Stewart Kowalski:
The SBC Model as a Conceptual Framework for Reporting IT Crimes.
Security and Control of Information Technology in Society 1993: 207-226 |
1991 |
3 | EE | Stewart Kowalski:
The ABCs and Es of national computer security policies.
Computers & Security 10(3): 213-216 (1991) |
2 | EE | Stewart Kowalski:
Cybernetic analysis of national computer security.
Computers & Security 10(3): 217-227 (1991) |
1 | EE | Stewart Kowalski:
Cybernetic analysis of the 12th U.S. National Computer Security Conference.
Computers & Security 10(3): 228-235 (1991) |