Towards automating social engineering using social networking sites M Huber, S Kowalski, M Nohlberg, S Tjoa 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 139 | 2009 |
IT insecurity: A multi-disciplinary inquiry. S Kowalski | 94 | 1996 |
A formal approach enabling risk-aware business process modeling and simulation S Tjoa, S Jakoubi, G Goluch, G Kitzler, S Goluch, G Quirchmayr IEEE Transactions on Services Computing 4 (2), 153-166, 2010 | 51 | 2010 |
Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View. G Karokola, S Kowalski, L Yngström HAISA, 58-73, 2011 | 50 | 2011 |
Two case studies in using chatbots for security training S Kowalski, K Pavlovska, M Goldstein Information Assurance and Security Education and Training, 265-272, 2013 | 34 | 2013 |
Information security metrics: State of the art R Barabanov, S Kowalski, L Yngström DSV Report series 11, 007, 2011 | 34 | 2011 |
Secure e-government services: a comparative analysis of e-government maturity models for the developing regions–the need for security services G Karokola, L Yngström, S Kowalski International Journal of Electronic Government Research (IJEGR) 8 (1), 1-25, 2012 | 31 | 2012 |
A socio-technical framework for threat modeling a software supply chain B Al Sabbagh, S Kowalski IEEE Security & Privacy 13 (4), 30-39, 2015 | 28 | 2015 |
Secure e-government services: Towards a framework for integrating it security services into e-government maturity models G Karokola, S Kowalski, L Yngström 2011 Information Security for South Africa, 1-9, 2011 | 25 | 2011 |
The cycle of deception: a model of social engineering attacks, defenses and victims M Nohlberg, S Kowalski | 24 | 2008 |
Consumers’ awareness of, attitudes towards and adoption of mobile phone security S Kowalski, M Goldstein 20th International Symposium on Human Factors in Telecommunication, 20-23, 2006 | 23 | 2006 |
Computer ethics and computer abuse: A longitudinal study of Swedish university students S Kowalski IFIP TC11 6th international conference on information systems security, 1990 | 23 | 1990 |
Computer ethics and computer abuse: a study of Swedish and Canadian university data processing students S Kowalski, H Kowalski Information Age 12 (4), 206-212, 1990 | 21 | 1990 |
Developing social metrics for security modeling the security culture of it workers individuals (case study) B Al Sabbagh, S Kowalski The 5th International Conference on Communications, Computers and …, 2012 | 19 | 2012 |
Bridging the gap between general management and technicians–A case study on ICT security in a developing country JK Bakari, CN Tarimo, L Yngström, C Magnusson, S Kowalski Computers & Security 26 (1), 44-55, 2007 | 18 | 2007 |
Generating features for named entity recognition by learning prototypes in semantic space: The case of de-identifying health records A Henriksson, H Dalianis, S Kowalski 2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2014 | 16 | 2014 |
HIP–A technology-rich and interactive multimedia pedagogical platform AS Imran, SJ Kowalski International Conference on Learning and Collaboration Technologies, 151-160, 2014 | 16 | 2014 |
A framework for synchronizing human behavior, processes and support systems using a socio-technical approach I Bider, S Kowalski Enterprise, Business-Process and Information Systems Modeling, 109-123, 2014 | 16 | 2014 |
Evaluating a Framework for Securing E-Government Services--A Case of Tanzania G Karokola, S Kowalski, L Yngström 2013 46th Hawaii International Conference on System Sciences, 1792-1801, 2013 | 16 | 2013 |
Simulating apprenticeship using multimedia in higher education I Bider, M Henkel, S Kowalski, E Perjons Interactive Technology and Smart Education, 2015 | 15 | 2015 |