dblp.uni-trier.dewww.uni-trier.de

Louise Yngström

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
26EEGeoffrey Karokola, Louise Yngström: Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania. ISSA 2008: 1-24
2007
25EEHelen Armstrong, Louise Yngström: Resubmit my Information Security Thesis? - You must be joking! World Conference on Information Security Education 2007: 9-16
24EEJabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski: Bridging the gap between general management and technicians - A case study on ICT security in a developing country. Computers & Security 26(1): 44-55 (2007)
2006
23 Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, Stefan Lindskog: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden Springer 2006
22EEJabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström: Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World. ISSA 2006: 1-11
21EECharles N. Tarimo, Jabiri Kuwe Bakari, Louise Yngström, Stewart Kowalski: A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security – The Case of Tanzania. ISSA 2006: 1-12
20EEJeffy Mwakalinga, Louise Yngström: Framework for Securing Mobile Software Agents. ISSA 2006: 1-12
19EEJabiri Kuwe Bakari, Charles N. Tarimo, Christer Magnusson, Louise Yngström: Bridging the Gap between General Management and Technicians - A Case Study in ICT Security. SEC 2006: 442-447
2005
18EEJabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson: State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case Study. ICALT 2005: 1007-1011
17EEJob Asheri Chaula, Louise Yngström, Stewart Kowalski: A Framework for Evaluation of Information Systems Security. ISSA 2005: 1-11
16EEJeffy Mwakalinga, Louise Yngström: Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system. ISSA 2005: 1-11
15EECharles N. Tarimo, Louise Yngström, Stewart Kowalski: An approach to enhance the security of ICT infrastructure through legal, regulatory influences. ISSA 2005: 1-12
2004
14EEChrister Magnusson, Louise Yngström: Method for Insuring IT Risks. HICSS 2004
13 Louise Yngström: An Holistic Approach to an International Doctoral Program in Information Security. International Information Security Workshops 2004: 117-132
2003
12 Ulrika Evertsson, Urban Örthberg, Louise Yngström: Integrating Security into Systems Development. SEC 2003: 157-168
11 Respickius Casmir, Louise Yngström: IT Security Readiness in Developing Countries. World Conference on Information Security Education 2003: 117-129
2002
10 Christer Magnusson, Louise Yngström: BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business. SEC 2002: 335-346
1999
9 Ann Frisinger, Louise Yngström: An approach to standardizing security analysis methods for virtual systems. Conference on Information Security Management & Small Systems Security 1999: 63-74
1997
8 Louise Yngström, Jan Carlsen: Information Security in Research and Business, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC '97), 14-16 May 1997, Copenhagen, Denmark Chapman & Hall 1997
1996
7 Louise Yngström: IT security and privacy education. SEC 1996: 351-364
1994
6 Richard Sizer, Louise Yngström, Henrik Kaspersen, Simone Fischer-Hübner: Security and Control of Information Technology in Society, Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Illich and ashore at St. Petersburg, Russia, 12-17 August, 1993 North-Holland 1994
1993
5 Louise Yngström: Evaluation of an Academic Programme in IT Security 1985-1990. SEC 1993: 287-299
4 Richard Sizer, Louise Yngström: The Conference in Perspective. Security and Control of Information Technology in Society 1993: 1-3
3 Louise Yngström: Education in IT Security at Bachelor and Master Levels Using a Systemic-Holistic Approach. Security and Control of Information Technology in Society 1993: 161-181
1992
2 Simone Fischer-Hübner, Louise Yngström, Jan Holvast: Addressing Vulnerability and Privacy Problems generated by the Use of IT-Security Mechanisms. IFIP Congress (2) 1992: 314-321
1991
1 Louise Yngström: General Systems Theory Can Bridge the Gaps of Knowledge Between IT-Security Specialists. Managing Information Technology's Organisational Impact 1991: 299-312

Coauthor Index

1Helen Armstrong [25]
2Jabiri Kuwe Bakari [18] [19] [21] [22] [24]
3Jan Carlsen [8]
4Respickius Casmir [11]
5Job Asheri Chaula [17]
6Ulrika Evertsson [12]
7Simone Fischer-Hübner [2] [6] [23]
8Ann Frisinger [9]
9Jan Holvast [2]
10Geoffrey Karokola [26]
11Henrik Kaspersen [6]
12Stewart Kowalski [15] [17] [21] [24]
13Stefan Lindskog [23]
14Christer Magnusson [10] [14] [18] [19] [22] [24]
15Jeffy Mwakalinga [16] [20]
16Urban Örthberg [12]
17Kai Rannenberg [23]
18Richard Sizer [4] [6]
19Charles N. Tarimo [15] [18] [19] [21] [22] [24]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)