Author of the publication

State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case Study.

, , , and . ICALT, page 1007-1011. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ICT pollution and liability.. SIGCAS Comput. Soc., 41 (1): 48-53 (2011)Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World., , , and . ISSA, page 1-11. ISSA, Pretoria, South Africa, (2006)Bridging the gap between general management and technicians - A case study on ICT security in a developing country., , , , and . Comput. Secur., 26 (1): 44-55 (2007)The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study., , , and . IICIS, volume 193 of IFIP, page 157-173. Springer, (2004)A method for predicting the probability of business network profitability., , , , , and . Inf. Syst. E Bus. Manag., 12 (4): 567-593 (2014)Risk and Compliance Management Framework for Outsourced Global Software Development., and . ICGSE, page 228-233. IEEE Computer Society, (2010)Business Model Risk Analysis: Predicting the Probability of Business Network Profitability., , , , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 118-130. Springer, (2013)Value creation and Return On Security Investments (ROSI)., , and . SEC, volume 232 of IFIP, page 25-35. Springer, (2007)BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business., and . SEC, volume 214 of IFIP Conference Proceedings, page 335-346. Kluwer, (2002)The knowledge pressure on Risk and Security managers is increasing., , and . ARES, page 974-979. IEEE Computer Society, (2006)