Variables influencing information security policy compliance: a systematic review of quantitative studies T Sommestad, J Hallberg, K Lundholm, J Bengtsson Information Management & Computer Security 22 (1), 42-75, 2014 | 344 | 2014 |
The sufficiency of the theory of planned behavior for explaining information security policy compliance T Sommestad, H Karlzén, J Hallberg Information & Computer Security 23 (2), 200-217, 2015 | 190 | 2015 |
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour T Sommestad, H Karlzén, J Hallberg International Journal of Information Security and Privacy (IJISP) 9 (1), 26-46, 2015 | 170 | 2015 |
The theory of planned behavior and information security policy compliance T Sommestad, H Karlzén, J Hallberg Journal of Computer Information Systems 59 (4), 344-353, 2019 | 93 | 2019 |
A review of the theory of planned behaviour in the context of information security policy compliance T Sommestad, J Hallberg IFIP International Information Security Conference, 257-271, 2013 | 64 | 2013 |
Cyber security exercises and competitions as a platform for cyber security experiments T Sommestad, J Hallberg Nordic Conference on Secure IT Systems, 47-60, 2012 | 62 | 2012 |
A framework for system security assessment J Hallberg, A Hunstad, M Peterson Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005 | 41 | 2005 |
Ethical issues in public health informatics: implications for system design when sharing geographic information C Ölvingson, J Hallberg, T Timpka, K Lindqvist Journal of biomedical informatics 35 (3), 178-185, 2002 | 30 | 2002 |
Overview of enterprise information needs in information security risk assessment M Korman, T Sommestad, J Hallberg, J Bengtsson, M Ekstedt 2014 IEEE 18th International Enterprise Distributed Object Computing …, 2014 | 26 | 2014 |
The 14-layered framework for including social and organizational aspects in security management Y Monfelt, S Pilemalm, J Hallberg, L Yngström Information Management & Computer Security 19 (2), 124-133, 2011 | 25 | 2011 |
RICS-el: Building a National Testbed for Research and Training on SCADA Security (Short Paper) M Almgren, P Andersson, G Björkman, M Ekstedt, J Hallberg, ... International Conference on Critical Information Infrastructures Security …, 2018 | 23 | 2018 |
Measuring IT security-a method based on common criteria's security functional requirements A Hunstad, J Hallberg, R Andersson Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004 | 20 | 2004 |
The Usage-Centric Security Requirements Engineering (USeR) Method N Hallberg, J Hallberg 2006 IEEE Information Assurance Workshop, 34-41, 2006 | 18 | 2006 |
Design for securability-Applying engineering principles to the design of security architectures A Hunstad, J Hallberg Proc. of the Workshop of Application of Engineering Principles to System …, 2002 | 12 | 2002 |
Design and Use of Information Security Metrics: Application of the ISO/IEC 27004 standard K Lundholm, J Hallberg, H Granlund Information systems, Swedish Defence Research Agency (FOI), 2011 | 11* | 2011 |
Evaluation of the Security of Components in Distributed Information Systems R Andersson, A Hunstad, J Hallberg https://www.foi.se/report-search/pdf?fileName=D%3A%5CReportSearch%5CFiles …, 2003 | 11 | 2003 |
Synthesis under local timing constraints in the CAMAD high-level synthesis system J Hallberg, Z Peng Linköping University, Department of Computer and Information Science, 1995 | 11 | 1995 |
An empirical test of the perceived relationship between risk and the constituents severity and probability T Sommestad, H Karlzén, P Nilsson, J Hallberg Information & Computer Security 24 (2), 194-204, 2016 | 9 | 2016 |
Controlled Information Security: Results and conclusions from the research project J Hallberg, M Eriksson, H Granlund, S Kowalski, K Lundholm, Y Monfelt, ... FOI Swedish Defence Research Agency, 1-42, 2011 | 9 | 2011 |
System IT Security Assesement J Hallberg Command and control systems, Swedish Defence Research Agency, 2004 | 9 | 2004 |