Author:
Bakari Jabiri Kuwe,Tarimo Charles N.,Yngström Louise,Magnusson Christer,Kowalski Stewart
Subject
Law,General Computer Science
Reference21 articles.
1. Managing information security risks: the OCTAVE approach;Alberts,2003
2. Bakari JK. Towards a holistic approach for managing ICT security in developing countries: a case study of Tanzania. Ph.L. thesis, SU-KTH, Stockholm. DSV report Series 05-011; 2005.
3. Bakari JK, Tarimo CN, Yngström L, Magnusson C. State of ICT security management in the institutions of higher learning in developing countries: Tanzania case study. In: The 5th IEEE ICALT, Kaohsiung, Taiwan; 2005a. p. 1007–11.
4. Bakari JK, Magnusson C, Tarimo CN, Yngström, L. Ensuring ICT risks using EMitL tool: an empirical study, IFIP TC-11 WG 11.1 & WG 11.5 joint working conference on security management, integrity, and internal control in information systems, December 1–2, Fairfax, Virginia, Washington, US; 2005b. p. 157–73.
5. Computer security, art and science;Bishop,2003
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献