Follow
Elham Rostami
Elham Rostami
PhD. Senior Lecturer
Verified email at oru.se
Title
Cited by
Cited by
Year
Requirements for computerized tools to design information security policies
E Rostami, F Karlsson, S Gao
computers & security 99, 102063, 2020
242020
The hunt for computerized support in information security policy management: a literature review
E Rostami, F Karlsson, E Kolkowska
Information & Computer Security 28 (2), 215-259, 2020
132020
Policy components–a conceptual model for modularizing and tailoring of information security policies
E Rostami, F Karlsson, S Gao
Information & Computer Security 31 (3), 331-352, 2023
42023
Tailoring policies and involving users in constructing security policies -A mapping study
E Rostami
HAISA 2019, 2019
42019
A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies’ Information Security Policies
E Rostami, F Karlsson
International Symposium on Human Aspects of Information Security and …, 2023
12023
Tailoring information security policies: a computerized tool and a design theory
E Rostami
Örebro universitet, 2023
12023
Policy components-a conceptual model for tailoring information security policies
E Rostami, F Karlsson, S Gao
International Symposium on Human Aspects of Information Security and …, 2022
12022
Factors Influencing Non-native Parents to Use Educational e-Services: A Case Study of Preschools in A Swedish Municipality
G Thangavel, E Rostami, MS Islam
International Journal of E-Services and Mobile Applications (IJESMA) 9 (4 …, 2017
12017
Qualitative content analysis of actionable advice in information security policies–introducing the keyword loss of specificity metric
E Rostami, F Karlsson
Information & Computer Security, 2024
2024
Towards software for tailoring information security policies to organizations’ different target groups
E Rostami, F Karlsson, E Kolkowska, S Gao
2023
The Relation Between Information Security Conscious CareBehavior and Characteristics of Recent Immigrants
E Rostami
2017
A web-based software to assist managers to design tailorable information security policies
E Rostami
The system can't perform the operation now. Try again later.
Articles 1–12