Follow
Teodor Sommestad
Teodor Sommestad
Deputy research director, Swedish Defence Research Agency (FOI)
Verified email at sommestad.com - Homepage
Title
Cited by
Cited by
Year
Variables influencing information security policy compliance: A systematic review of quantitative studies
T Sommestad, J Hallberg, K Lundholm, J Bengtsson
Information Management & Computer Security 22 (1), 42-75, 2014
3422014
The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures
T Sommestad, M Ekstedt, H Holm
IEEE Systems Journal 7 (3), 363-373, 2012
2012012
The Sufficiency of the Theory of Planned Behavior for Explaining Information Security Policy Compliance
T Sommestad, H Karlzen, J Hallberg
Information and computer security 23 (2), 2015
1872015
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
T Sommestad, H Karlzén, J Hallberg
International Journal of Information Security and Privacy (IJISP) 9 (1), 26-46, 2015
1692015
A probabilistic relational model for security risk analysis
T Sommestad, M Ekstedt, P Johnson
Computers & Security 29 (6), 659-679, 2010
1342010
A tool for enterprise architecture analysis
P Johnson, E Johansson, T Sommestad, J Ullberg
Enterprise Distributed Object Computing Conference, 2007. EDOC 2007. 11th …, 2007
1252007
A quantitative evaluation of vulnerability scanning
H Holm, T Sommestad, J Almroth, M Persson
Information Management & Computer Security 19 (4), 231-247, 2011
1162011
Cyber security risks assessment with bayesian defense graphs and architectural models
T Sommestad, M Ekstedt, P Johnson
System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, 1-10, 2009
1012009
The theory of planned behavior and information security policy compliance
T Sommestad, H Karlzén, J Hallberg
Journal of Computer Information Systems 59 (4), 344-353, 2019
932019
A tool for enterprise architecture analysis using the PRM formalism
M Buschle, J Ullberg, U Franke, R Lagerström, T Sommestad
Information Systems Evolution, 108-121, 2010
812010
SCADA system cyber security—A comparison of standards
T Sommestad, GN Ericsson, J Nordlander
Power and Energy Society General Meeting, 2010 IEEE, 1-8, 2010
772010
Enterprise architecture management's impact on information technology success
R Lagerström, T Sommestad, M Buschle, M Ekstedt
System Sciences (HICSS), 2011 44th Hawaii International Conference on, 1-10, 2011
762011
A review of the theory of planned behaviour in the context of information security policy compliance
T Sommestad, J Hallberg
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
642013
Cyber security exercises and competitions as a platform for cyber security experiments
T Sommestad, J Hallberg
Nordic Conference on Secure IT Systems, 47-60, 2012
622012
Enterprise architecture models for cyber security analysis
M Ekstedt, T Sommestad
2009 IEEE/PES Power Systems Conference and Exposition, 1-6, 2009
602009
A Tool for Automatic Enterprise Architecture Modeling
M Buschle, H Holm, T Sommestad, M Ekstedt, K Shahzad
Caise workshops, 2011
592011
Modeling security of power communication systems using defense graphs and influence diagrams
T Sommestad, M Ekstedt, L Nordström
Power Delivery, IEEE Transactions on 24 (4), 1801-1808, 2009
552009
CySeMoL: A tool for cyber security analysis of enterprises
H Holm, T Sommestad, M Ekstedt, L NordströM
Electricity Distribution (CIRED 2013), 22nd International Conference and …, 2013
412013
SVED: Scanning, Vulnerabilities, Exploits and Detection
H Holm, T Sommestad
Military Communications Conference, MILCOM 2016-2016 IEEE, 976-981, 2016
372016
A meta-analysis of field experiments on phishing susceptibility
T Sommestad, H Karlzén
2019 APWG Symposium on Electronic Crime Research (eCrime), 1-14, 2019
342019
The system can't perform the operation now. Try again later.
Articles 1–20