default search action
Louise Yngström
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [c34]Geoffrey Karokola, Stewart Kowalski, Louise Yngström:
Evaluating a Framework for Securing E-Government Services - A Case of Tanzania. HICSS 2013: 1792-1801 - [c33]Lynn Futcher, Louise Yngström:
A Review of IFIP TC 11 WG 11.8 Publications through the Ages. World Conference on Information Security Education 2013: 113-122 - 2012
- [j5]Geoffrey Karokola, Louise Yngström, Stewart Kowalski:
Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions-The Need for Security Services. Int. J. Electron. Gov. Res. 8(1): 1-25 (2012) - 2011
- [j4]Haider Abbas, Christer Magnusson, Louise Yngström, Ahmed Hemani:
Addressing Dynamic Issues in Information Security Management. Inf. Manag. Comput. Secur. 19(1): 5-24 (2011) - [j3]Yngve Monfelt, Sofie Pilemalm, Jonas Hallberg, Louise Yngström:
The 14 Layered Framework for Including Social and Organisational Aspects in Security Management. Inf. Manag. Comput. Secur. 19(2): 124-133 (2011) - [c32]Geoffrey Karokola, Stewart Kowalski, Louise Yngström:
Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View. HAISA 2011: 58-73 - [c31]Geoffrey Karokola, Stewart Kowalski, Louise Yngström:
Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models. ISSA 2011 - 2010
- [c30]Yngve Monfelt, Sofie Pilemalm, Jonas Hallberg, Louise Yngström:
The 14 layered framework for including social and organisational aspects in security management. SAISMC 2010: 90-99
2000 – 2009
- 2009
- [j2]Alan Davidson, Rein Oja, Louise Yngström:
A Swedish IT forensics course - expert opinions. Int. J. Electron. Secur. Digit. Forensics 2(3): 322-333 (2009) - [c29]Haider Abbas, Louise Yngström, Ahmed Hemani:
Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory. ECBS-EERC 2009: 134-141 - [c28]Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström:
Secure e-learning using a holistic and immune security framework. ICITST 2009: 1-6 - [c27]Geoffrey Karokola, Louise Yngström:
Discussing E-Government Maturity Models for the Developing World - Security View. ISSA 2009: 81-98 - [c26]Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström:
Methodology for Considering Environments and Culture in Developing Information Security Systems. ISSA 2009: 419-436 - [c25]Haider Abbas, Louise Yngström, Ahmed Hemani:
Adaptability infrastructure for bridging IT security evaluation and options theory. SIN 2009: 39-45 - 2008
- [c24]Geoffrey Karokola, Louise Yngström:
Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania. ISSA 2008: 1-24 - 2007
- [j1]Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski:
Bridging the gap between general management and technicians - A case study on ICT security in a developing country. Comput. Secur. 26(1): 44-55 (2007) - [c23]Helen Armstrong, Louise Yngström:
Resubmit my Information Security Thesis? - You must be joking! World Conference on Information Security Education 2007: 9-16 - 2006
- [c22]Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström:
Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World. ISSA 2006: 1-11 - [c21]Jeffy Mwakalinga, Louise Yngström:
Framework for Securing Mobile Software Agents. ISSA 2006: 1-12 - [c20]Charles N. Tarimo, Jabiri Kuwe Bakari, Louise Yngström, Stewart Kowalski:
A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security - The Case of Tanzania. ISSA 2006: 1-12 - [c19]Jabiri Kuwe Bakari, Charles N. Tarimo, Christer Magnusson, Louise Yngström:
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security. SEC 2006: 442-447 - [e3]Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, Stefan Lindskog:
Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden. IFIP 201, Springer 2006, ISBN 0-387-33405-X [contents] - 2005
- [c18]Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson:
State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case Study. ICALT 2005: 1007-1011 - [c17]Job Asheri Chaula, Louise Yngström, Stewart Kowalski:
A Framework for Evaluation of Information Systems Security. ISSA 2005: 1-11 - [c16]Jeffy Mwakalinga, Louise Yngström:
Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system. ISSA 2005: 1-11 - [c15]Charles N. Tarimo, Louise Yngström, Stewart Kowalski:
An approach to enhance the security of ICT infrastructure through legal, regulatory influences. ISSA 2005: 1-12 - 2004
- [c14]Christer Magnusson, Louise Yngström:
Method for Insuring IT Risks. HICSS 2004 - [c13]Louise Yngström:
An Holistic Approach to an International Doctoral Program in Information Security. International Information Security Workshops 2004: 117-132 - [c12]Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström:
The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study. IICIS 2004: 157-173 - [c11]Louise Yngström:
Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper). IICIS 2004: 237-245 - 2003
- [c10]Respickius Casmir, Louise Yngström:
IT Security Readiness in Developing Countries. World Conference on Information Security Education 2003: 117-129 - [c9]Ulrika Evertsson, Urban Örthberg, Louise Yngström:
Integrating Security into Systems Development. SEC 2003: 157-168 - 2002
- [c8]Christer Magnusson, Louise Yngström:
BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business. SEC 2002: 335-346
1990 – 1999
- 1999
- [c7]Ann Frisinger, Louise Yngström:
An approach to standardizing security analysis methods for virtual systems. Conference on Information Security Management & Small Systems Security 1999: 63-74 - 1997
- [e2]Louise Yngström, Jan Carlsen:
Information Security in Research and Business, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC '97), 14-16 May 1997, Copenhagen, Denmark. IFIP Conference Proceedings 92, Chapman & Hall 1997, ISBN 0-412-81780-2 [contents] - 1996
- [c6]Louise Yngström:
IT security and privacy education. SEC 1996: 351-364 - 1994
- [e1]Richard Sizer, Louise Yngström, Henrik Kaspersen, Simone Fischer-Hübner:
Security and Control of Information Technology in Society, Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Illich and ashore at St. Petersburg, Russia, 12-17 August, 1993. IFIP Transactions A-43, North-Holland 1994, ISBN 0-444-81831-6 [contents] - 1993
- [c5]Richard Sizer, Louise Yngström:
The Conference in Perspective. Security and Control of Information Technology in Society 1993: 1-3 - [c4]Louise Yngström:
Education in IT Security at Bachelor and Master Levels Using a Systemic-Holistic Approach. Security and Control of Information Technology in Society 1993: 161-181 - [c3]Louise Yngström:
Evaluation of an Academic Programme in IT Security 1985-1990. SEC 1993: 287-299 - 1992
- [c2]Simone Fischer-Hübner, Louise Yngström, Jan Holvast:
Addressing Vulnerability and Privacy Problems generated by the Use of IT-Security Mechanisms. IFIP Congress (2) 1992: 314-321 - 1991
- [c1]Louise Yngström:
General Systems Theory Can Bridge the Gaps of Knowledge Between IT-Security Specialists. Managing Information Technology's Organisational Impact 1991: 299-312
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint