Teodor Sommestad
Teodor Sommestad
Deputy research director, Swedish Defence Research Agency (FOI)
Verifierad e-postadress på sommestad.com - Startsida
Titel
Citeras av
Citeras av
År
Variables influencing information security policy compliance: A systematic review of quantitative studies
T Sommestad, J Hallberg, K Lundholm, J Bengtsson
Information Management & Computer Security 22 (1), 42-75, 2014
2252014
The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures
T Sommestad, M Ekstedt, H Holm
IEEE Systems Journal 7 (3), 363-373, 2012
1522012
A tool for enterprise architecture analysis
P Johnson, E Johansson, T Sommestad, J Ullberg
Enterprise Distributed Object Computing Conference, 2007. EDOC 2007. 11th …, 2007
1242007
A probabilistic relational model for security risk analysis
T Sommestad, M Ekstedt, P Johnson
Computers & Security 29 (6), 659-679, 2010
1152010
The Sufficiency of the Theory of Planned Behavior for Explaining Information Security Policy Compliance
T Sommestad, H Karlzen, J Hallberg
Information and computer security 23 (2), 2015
1122015
Cyber security risks assessment with bayesian defense graphs and architectural models
T Sommestad, M Ekstedt, P Johnson
System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, 1-10, 2009
882009
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
T Sommestad, H Karlzén, J Hallberg
International Journal of Information Security and Privacy (IJISP) 9 (1), 26-46, 2015
852015
A tool for enterprise architecture analysis using the PRM formalism
M Buschle, J Ullberg, U Franke, R Lagerström, T Sommestad
Information Systems Evolution, 108-121, 2010
752010
A quantitative evaluation of vulnerability scanning
H Holm, T Sommestad, J Almroth, M Persson
Information Management & Computer Security 19 (4), 231-247, 2011
692011
Enterprise architecture management's impact on information technology success
R Lagerström, T Sommestad, M Buschle, M Ekstedt
System Sciences (HICSS), 2011 44th Hawaii International Conference on, 1-10, 2011
662011
SCADA system cyber security—A comparison of standards
T Sommestad, GN Ericsson, J Nordlander
Power and Energy Society General Meeting, 2010 IEEE, 1-8, 2010
542010
A Tool for Automatic Enterprise Architecture Modeling
M Buschle, H Holm, T Sommestad, M Ekstedt, K Shahzad
Caise workshops, 2011
532011
Enterprise architecture models for cyber security analysis
M Ekstedt, T Sommestad
2009 IEEE/PES Power Systems Conference and Exposition, 1-6, 2009
492009
A review of the theory of planned behaviour in the context of information security policy compliance
T Sommestad, J Hallberg
IFIP International Information Security Conference, 257-271, 2013
452013
Modeling security of power communication systems using defense graphs and influence diagrams
T Sommestad, M Ekstedt, L Nordström
Power Delivery, IEEE Transactions on 24 (4), 1801-1808, 2009
452009
Cyber security exercises and competitions as a platform for cyber security experiments
T Sommestad, J Hallberg
Nordic Conference on Secure IT Systems, 47-60, 2012
402012
A Tool for Enterprise Architecture Analysis of Maintainability
M Ekstedt, U Franke, P Johnson, R Lagerstrom, T Sommestad, J Ullberg, ...
Software Maintenance and Reengineering, 2009. CSMR'09. 13th European …, 2009
312009
A pattern-based approach to quantitative enterprise architecture analysis
S Buckl, U Franke, O Holschke, F Matthes, CM Schweda, T Sommestad, ...
15th Americas Conference on Information Systems (AMCIS) 39, 2009
312009
The theory of planned behavior and information security policy compliance
T Sommestad, H Karlzén, J Hallberg
Journal of Computer Information Systems 59 (4), 344-353, 2019
292019
Effort estimates for vulnerability discovery projects
T Sommestad, H Holm, M Ekstedt
Proc. of 45th Hawaii International Conference on System Sciences, 2012
272012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20