Requirements for computerized tools to design information security policies E Rostami, F Karlsson, S Gao computers & security 99, 102063, 2020 | 24 | 2020 |
The hunt for computerized support in information security policy management: a literature review E Rostami, F Karlsson, E Kolkowska Information & Computer Security 28 (2), 215-259, 2020 | 13 | 2020 |
Policy components–a conceptual model for modularizing and tailoring of information security policies E Rostami, F Karlsson, S Gao Information & Computer Security 31 (3), 331-352, 2023 | 4 | 2023 |
Tailoring policies and involving users in constructing security policies -A mapping study E Rostami HAISA 2019, 2019 | 4 | 2019 |
A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies’ Information Security Policies E Rostami, F Karlsson International Symposium on Human Aspects of Information Security and …, 2023 | 1 | 2023 |
Tailoring information security policies: a computerized tool and a design theory E Rostami Örebro universitet, 2023 | 1 | 2023 |
Policy components-a conceptual model for tailoring information security policies E Rostami, F Karlsson, S Gao International Symposium on Human Aspects of Information Security and …, 2022 | 1 | 2022 |
Factors Influencing Non-native Parents to Use Educational e-Services: A Case Study of Preschools in A Swedish Municipality G Thangavel, E Rostami, MS Islam International Journal of E-Services and Mobile Applications (IJESMA) 9 (4 …, 2017 | 1 | 2017 |
Qualitative content analysis of actionable advice in information security policies–introducing the keyword loss of specificity metric E Rostami, F Karlsson Information & Computer Security, 2024 | | 2024 |
Towards software for tailoring information security policies to organizations’ different target groups E Rostami, F Karlsson, E Kolkowska, S Gao | | 2023 |
The Relation Between Information Security Conscious CareBehavior and Characteristics of Recent Immigrants E Rostami | | 2017 |
A web-based software to assist managers to design tailorable information security policies E Rostami | | |